Viewing Computers ........................................................................................................................194
Viewing Connections ......................................................................................................................197
Viewing Wireless Statistics.............................................................................................................198
Setting Your Security Policy ............................................................................................................203
Default Security Policy ...................................................................................................................203
Configuring Servers ........................................................................................................................207
Using Rules .....................................................................................................................................209
Adding and Editing Rules ...........................................................................................................213
Enabling/Disabling Rules ...........................................................................................................218
Changing Rules' Priority .............................................................................................................219
Deleting Rules.............................................................................................................................219
Using SmartDefense .......................................................................................................................220
Configuring SmartDefense..........................................................................................................221
SmartDefense Categories............................................................................................................224
Using Secure HotSpot .....................................................................................................................256
Setting Up Secure HotSpot .........................................................................................................257
Customizing Secure HotSpot ......................................................................................................259
Defining an Exposed Host ..............................................................................................................261
Using VStream Antivirus .................................................................................................................263
Overview.........................................................................................................................................263
Contents
Contents
v