About customizing settings and options
Intrusion Prevention
Customizing protection features
Intrusion Prevention scans all
the network traffic to and from
your computer and compares
this information against a set of
attack signatures. Attack
signatures contain the
information that identifies an
attacker's attempt to exploit a
known vulnerability in the
operating system or in a
program. If the information
matches an attack signature,
Intrusion Prevention blocks the
traffic from the suspicious
computer.
The following are some activities
that you can do using the
Intrusion Prevention options:
View the list of Intrusion
1
Prevention signatures.
Exclude individual signatures
1
from being monitored.
Specify whether or not you
1
must be notified when
Intrusion Prevention
signatures are detected.
Activate AutoBlock for a
1
specified duration to block
all incoming traffic from a
computer that continues to
attack your system.
View, restrict, or unblock the
1
list of computers that
AutoBlock blocks.
View or unblock the list of
1
computers that AutoBlock
blocks.
Determine whether or not
1
you are notified when
Intrusion Prevention
activities are detected.
275