Chapter 4
Configuring RealSecure Desktop
Protector
Overview
Introduction
This chapter provides the procedures to configure RealSecure Desktop Protector for your
specific conditions. These procedures are designed to be performed in sequence.
In this chapter
This chapter includes the following topics:
Topic
Connecting to ICEcap Manager
Setting Your Protection Level
Using Adaptive Protection
Blocking Intrusions
Trusting Intruders
Ignoring Events
Working with the Application Protection Baseline
Configuring Communications Control
Controlling Event Notification
Back Tracing
Collecting Evidence Files
Collecting Packet Logs
Responding to Application Protection Alerts
Exporting Desktop Protector Data
Page
32
34
35
37
39
40
42
46
48
50
52
54
56
57
31
Need help?
Do you have a question about the RealSecure and is the answer not in the manual?
Questions and answers