Table Of Contents - HP Compaq t5700 User Manual

Hp compaq t5700: supplementary guide
Hide thumbs Also See for Compaq t5700:
Table of Contents

Advertisement

Table of Contents

Preface ...................................................................................................... ix
Related Documentation .......................................................................................................... ix
Intended Audience................................................................................................................... ix
Technical Support ..................................................................................................................... x
Chapter 1. Overview of the Agent ............................................................................. 1
Modifying the Security Policy.................................................................................................. 1
Using the Policy Editor....................................................................................................... 1
Chapter 2. Getting Around........................................................................................ 3
Starting the Agent ..................................................................................................................... 3
Navigating the Main Console .................................................................................................. 3
Menus and Toolbar Buttons .............................................................................................. 4
Traffic History Graphs ....................................................................................................... 4
Broadcast Traffic ............................................................................................................ 5
Running Applications Field................................................................................................ 5
Message Console.................................................................................................................. 6
Status Bar .............................................................................................................................. 6
Using the Menus and the Toolbar .......................................................................................... 6
Toolbar Buttons................................................................................................................... 8
Using the System Tray Icon..................................................................................................... 8
What the System Tray Icon Tells You.............................................................................. 8
What Does the Flashing System Tray Icon Mean?....................................................... 10
The System Tray Icon Menu............................................................................................ 10
Enabling Password Protection .............................................................................................. 11
Chapter 3. Testing Your System's Vulnerability..................................................... 13
Scanning Your System............................................................................................................ 13
Types of Scans ......................................................................................................................... 14
Quick Scans ........................................................................................................................ 14
Stealth Scans ....................................................................................................................... 14
Trojan Scans ....................................................................................................................... 14
TCP Scans........................................................................................................................... 14
UDP Scans.......................................................................................................................... 14
ICMP Scans ........................................................................................................................ 15
Chapter 4. Working With Rules .............................................................................. 17
About Rules ............................................................................................................................. 17
Using Rules to Protect Your System.................................................................................... 17
Setting Up Advanced Rules ................................................................................................... 17
General Tab ............................................................................................................................. 19
Rule Description ................................................................................................................ 19
Block this traffic................................................................................................................. 19
Allow this traffic ................................................................................................................ 19
Apply Rule to Network Interface.................................................................................... 20
Apply this rule during Screensaver Mode ...................................................................... 20
iii

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents