ESET SMART SECURITY Betriebsanweisung Seite 22

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 46
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 21
22
When the Personal firewall switches to another profile, a notification
will appear in the lower right corner near the system clock.
4.2.3 Block all network trac: disconnect network
The only option for blocking all network trac is to click Block all
network trac: disconnect network. All inbound and outbound
communication is blocked by the Personal firewall with no warning
displayed. Use this option only if you suspect critical security risks
requiring disconnection of the system from the network.
4.2.4 Disable filtering: allow all trac
The Disable filtering option is the opposite of blocking all network
trac. If selected, all Personal firewall filtering options are turned o
and all incoming and outgoing connections are permitted. It has the
same eect as no firewall being present.
4.2.5 Configuring and using rules
Rules represent a set of conditions used to meaningfully test all
network connections and all actions assigned to these conditions.
With the Personal firewall, you can define what action to take if a
connection defined by a rule is established.
To access the rule filtering setup, navigate to Advanced Setup
(F5) > Personal firewall > Rules and zones. To display the current
configuration, click Setup... in the Zone and rule editor section (if
the Personal firewall is set to Automatic mode, these settings are not
available).
In the Zone and rule setup window, an overview of either rules or
zones is displayed (based on the currently selected tab). The window
is divided into two sections. The upper section lists all rules in a
shortened view. The lower section displays details about the rule
currently selected in the upper section. At the very bottom are the
buttons New, Edit, and Delete (Del), which allow you to configure
rules.
Connections can be divided into incoming and outgoing connections.
Incoming connections are initiated by a remote computer attempting
to establish connection with the local system. Outgoing connections
work in the opposite way – the local side contacts a remote computer.
If a new unknown communication is detected, you must carefully
consider whether to allow or deny it. Unsolicited, unsecured or
unknown connections pose a security risk to the system. If such a
connection is established, we recommend that you pay particular
attention to the remote side and the application attempting to
connect to your computer. Many infiltrations try to obtain and
send private data, or download other malicious applications to
host workstations. The Personal firewall allows you to detect and
terminate such connections.
4.2.5.1 Creating a new rule
When installing a new application which accesses the network or
when modifying an existing connection (remote side, port number,
etc.), a new rule must be created.
To add a new rule, verify that the Rules tab is selected. Then, click
the New button in the Zone and rule setup window. Clicking on this
button opens a new dialog window to specify a new rule. The upper
part of the window contains three tabs:
General: Specify a rule name, the direction of the connection, the
action, the protocol and the profile in which the rule will apply.
Seitenansicht 21
1 2 ... 17 18 19 20 21 22 23 24 25 26 27 ... 45 46

Kommentare zu diesen Handbüchern

Keine Kommentare