The Intrusion Detection Tab
Introduction
Intrusion Detection
tab columns
Intrusion Detection
tab buttons
The Intrusion Detection tab allows you to control the IP addresses or intrusions the
Desktop Protector engine trusts or ignores.
For information about trusting and ignoring, see "Trusting Intruders" on page 39 and
"Ignoring Events" on page 40.
This table describes the information that appears in the columns on the Intrusion
Detection tab.
This column...
Contains this information...
Intruder IP
The IP address of the system you want to trust.
Intruder
The machine name of the system you want to trust.
Event name
The name of the event type you want to ignore.
Event ID
The standard numerical designation for the event type you
want to ignore. You can look up the numerical Event ID in the
ID: field of the Exclude from Reporting dialog.
Table 23: Intrusion Detection tab columns
This table describes the buttons that appear on the Intrusion Detection tab.
This button...
Has this effect...
Add
Click to open the Exclude from Reporting dialog. For
information about using the Exclude from Reporting dialog to
trust addresses or ignore events, see "Blocking Intrusions" on
page 37.
Delete
Click to remove the Trust or Ignore instruction associated with
the highlighted record.
Modify
Click to open the Exclude from Reporting dialog to make
changes to the highlighted Trust or Ignore record.
OK
Click to save your changes and return to the main Desktop
Protector window.
Cancel
Click to discard your changes and return to the Desktop
Protector window.
Apply
Click to save your changes and keep the current tab open.
Help
Displays the online Help for this tab.
Table 24: Intrusion Detection tab buttons
The Intrusion Detection Tab
77
Need help?
Do you have a question about the RealSecure and is the answer not in the manual?
Questions and answers