Communications Control - Internet Security Systems RealSecure User Manual

Protector
Table of Contents

Advertisement

Chapter 1: Introduction to RealSecure Desktop Protector

Communications Control

Introduction
How
Communications
Control works
Example: auto-
update
More information
8
To reduce security risks from potential "Trojan horse" applications on your system,
RealSecure Desktop Protector lets you choose which applications or processes can access a
network, such as the Internet or a local area network.
Desktop Protector tracks all the applications (and related processes) that you authorize to
access a network from your system. If any software installed on your system attempts to
access a network without your authorization, Desktop Protector detects its outbound
transmissions and asks you what to do:
If you recognize the application, you can allow it to continue or you can block it.
G
If you block it, you can have Desktop Protector automatically block the application in
G
the future.
For example, some applications include a feature that automatically checks the
application provider's Web site for software updates. The first time a newly installed or
modified program tries to do this, Desktop Protector asks if you want this application to
access the network. You can control this behavior by altering the settings on the
Communications Control tab.
For instructions, see "Configuring Communications Control" on page 46.

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the RealSecure and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Realsecure desktop protector 3.5

Table of Contents