Table of Contents
Preface ...................................................................................................... ix
Related Documentation .......................................................................................................... ix
Intended Audience................................................................................................................... ix
Technical Support ..................................................................................................................... x
Using the Policy Editor....................................................................................................... 1
Starting the Agent ..................................................................................................................... 3
Traffic History Graphs ....................................................................................................... 4
Broadcast Traffic ............................................................................................................ 5
Message Console.................................................................................................................. 6
Status Bar .............................................................................................................................. 6
Toolbar Buttons................................................................................................................... 8
Scanning Your System............................................................................................................ 13
Types of Scans ......................................................................................................................... 14
Quick Scans ........................................................................................................................ 14
Stealth Scans ....................................................................................................................... 14
Trojan Scans ....................................................................................................................... 14
TCP Scans........................................................................................................................... 14
UDP Scans.......................................................................................................................... 14
ICMP Scans ........................................................................................................................ 15
About Rules ............................................................................................................................. 17
Setting Up Advanced Rules ................................................................................................... 17
General Tab ............................................................................................................................. 19
Rule Description ................................................................................................................ 19
Block this traffic................................................................................................................. 19
Allow this traffic ................................................................................................................ 19
iii