Chapter 4: Configuring Realsecure Desktop Protector; Overview - Internet Security Systems RealSecure User Manual

Protector
Table of Contents

Advertisement

Chapter 4
Configuring RealSecure Desktop
Protector

Overview

Introduction
This chapter provides the procedures to configure RealSecure Desktop Protector for your
specific conditions. These procedures are designed to be performed in sequence.
In this chapter
This chapter includes the following topics:
Topic
Connecting to ICEcap Manager
Setting Your Protection Level
Using Adaptive Protection
Blocking Intrusions
Trusting Intruders
Ignoring Events
Working with the Application Protection Baseline
Configuring Communications Control
Controlling Event Notification
Back Tracing
Collecting Evidence Files
Collecting Packet Logs
Responding to Application Protection Alerts
Exporting Desktop Protector Data
Page
32
34
35
37
39
40
42
46
48
50
52
54
56
57
31

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the RealSecure and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

This manual is also suitable for:

Realsecure desktop protector 3.5

Table of Contents