Internet Security Systems 3.5 Computer Hardware User Manual


 
113
Index
a
accepting events 39
adaptive protection 4
, 9293
adding an entry 94
addresses
blocking and accepting 37
Advanced Application Control Settings window 102
Advanced Firewall Settings window 90
advICE library 110
alerts
choosing 48
, 81, 83
interpreting 9
responding to 43
44, 50, 56
anti-virus 6
Application Control tab 84
application file types 103
Application Protection 6
application control 42
, 84, 101
communications control 8
, 46, 86, 101
disabling 45
stopping 44
vs virus detection 6
application protection
restarting 26
stopping 24
audible alerts 48
, 81
auto-blocking 34
, 70
b
Back Trace tab 76
back tracing
direct vs. indirect 11
setting up 76
baseline 6
, 42, 46
creating and updating 42
managing 44
BlackICE
restarting 26
uninstalling 28
blocking
addresses 37
events 37
intruders 37
ports 40
c
Cautious protection level 3, 70
checksum 100
choosing a protection level 34
clearing 48
events 48
, 109
evidence logs 52
, 109
packet logs 48
, 54, 109
closing BlackICE 106
collecting evidence of intrusions 52
, 74
collecting information
back tracing 11
evidence logs 11
, 52, 74
packet logs 11
, 54, 72
columns, customizing 49
communications control 8
, 46, 101
Communications Control tab 86
controlling applications 102
, 109
controlling network access 8
, 46, 86, 101
conventions, typographical
in commands vii
in procedures vii
in this manual vii
copying an event 57
, 6465, 91, 107
Critical events 9
, 67
customizing your firewall 37
d
data
collecting 11
, 52, 54, 72, 74
deleting 52
, 54, 107, 109
printing 106
searching 107
deleting information 48
, 52, 54, 6465, 109
direct back tracing 11
disabling Application Protection 45
dll files 43
, 103
drv files 103
dynamic protection level 4
, 9293