Protection Levels - Internet Security Systems RealSecure User Manual

Protector
Table of Contents

Advertisement

Protection Levels

Introduction
How protection
levels work
Protection level
definitions
How protection
levels affect
applications
Protection levels are pre-designed sets of security settings developed for different types of
Web use. You can choose to have Desktop Protector block all communications with your
system, some communications with your system, or no communications with your
system. You can change protection levels at any time.
Protection levels modify your firewall by closing some of the software links, or ports, that
your system uses to receive communications from other computers. The more restrictive
the protection level, the more ports are blocked.
Desktop Protector blocks all unsolicited inbound traffic. Very restrictive, but
Paranoid:
useful if your system faces frequent or repeated attacks. This setting may restrict some
Web browsing and interactive content.
Desktop Protector blocks all unsolicited inbound traffic except for some
Nervous:
interactive content on Web sites (such as streaming media and other application-specific
uses of the Internet). Preferable if you are experiencing frequent intrusions.
Desktop Protector blocks unsolicited network traffic that accesses operating
Cautious:
system and networking services. Good for regular use of the Internet.
All ports are open and unblocked and all inbound traffic is allowed. Acceptable
Trusting:
if you have a minimal threat of intrusions. This is the default protection level setting. If
your local agent is not centrally controlled by ICEcap Manager, you should consider
customizing your protection level immediately after installing Desktop Protector.
This table shows how the protection levels affect some representative applications:
Level
Blocked
Paranoid
IRC file transfer (DCC)
NetMeeting
PC Anywhere
ICQ
Nervous
IRC file transfer (DCC)
NetMeeting
Cautious
Unsolicited traffic that
accesses operating
system and networking
services
Trusting
None
To use an application that is blocked under a selected protection level, use the
Note:
Advanced Firewall Settings feature to open the ports the application uses. For more
information on opening ports, see "Blocking Intrusions" on page 37.
Configurable
Quake (II/III)
Internet Phone
Net2Phone
ICQ
Internet Phone
Net2Phone
None
None
Protection Levels
Not Blocked
FTP file transfers
Sending/receiving email
Real Audio
IRC Chat
All of the above, plus PC
Anywhere, Quake (II,III)
All of the above, plus IRC
file transfer (DCC)
NetMeeting
All inbound traffic
3

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the RealSecure and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Realsecure desktop protector 3.5

Table of Contents