ESET SMART SECURITY 4 - QUICK START GUIDE FOR MICROSOFT WINDOWS 7-VISTA-XP-2000-2003-2008 Podręcznik Użytkownika Strona 46

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 124
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 45
46
4.2.3 Configuring and using rules
Rules represent a set of conditions used to meaningfully test all network connections and all actions assigned to these
conditions. With the Personal firewall, you can define what action to take if a connection defined by a rule is
established. To access the rule filtering setup, navigate to Advanced setup (F5) > Network > Personal firewall > Rules
and zones.
Click the Setup... button in the Trusted zone section to display the Trusted zone setup window. The Do not display
with Trusted zone settings... option allows the user to disable the trusted zone setup window each time the presence
of a new subnet is detected. The currently specified zone configuration is automatically used.
NOTE: If the Personal firewall is set to Automatic mode, some settings are not available.
Click the Setup... button in the Zone and rule editor section to display the Zone and rule setup window, where an
overview of either rules or zones is displayed (based on the currently selected tab). The window is divided into two
sections. The upper section lists all rules in a shortened view. The lower section displays details about the rule currently
selected in the upper section. The bottom of the window has New, Edit, and Delete (Del) buttons, which allow you to
configure rules.
Connections can be divided into incoming and outgoing connections. Incoming connections are initiated by a remote
computer attempting to establish a connection with the local system. Outgoing connections work in the opposite way
the local system contacts a remote computer.
If a new unknown communication is detected, you must carefully consider whether to allow or deny it. Unsolicited,
unsecured or unknown connections pose a security risk to the system. If such a connection is established, we
recommend that you pay particular attention to the remote computer and the application attempting to connect to
your computer. Many infiltrations try to obtain and send private data, or download other malicious applications to host
workstations. The Personal firewall allows you to detect and terminate such connections.
Display information about application allows you to define how applications will be displayed in the list of rules. The
following options are available:
Full pathFull path to the application’s executable.
Description Description of the application.
Name Name of the application's executable.
Select what type of rules will be displayed in the Rules to display list:
Only user defined rulesDisplays only those rules created by the user.
User and pre-defined rules Displays all user-defined and default pre-defined rules.
All rules (including system) All rules are displayed.
Przeglądanie stron 45
1 2 ... 41 42 43 44 45 46 47 48 49 50 51 ... 123 124

Komentarze do niniejszej Instrukcji

Brak uwag