beautypg.com

HP Compaq t5720 Thin Client User Manual

Page 3

background image

Table of Contents

Preface...................................................................................................... ix

Related Documentation .......................................................................................................... ix
Intended Audience................................................................................................................... ix
Technical Support ..................................................................................................................... x

Chapter 1. Overview of the Agent ............................................................................. 1

Modifying the Security Policy.................................................................................................. 1

Using the Policy Editor....................................................................................................... 1

Chapter 2. Getting Around........................................................................................ 3

Starting the Agent ..................................................................................................................... 3
Navigating the Main Console.................................................................................................. 3

Menus and Toolbar Buttons .............................................................................................. 4
Traffic History Graphs ....................................................................................................... 4

Broadcast Traffic............................................................................................................ 5

Running Applications Field................................................................................................ 5
Message Console.................................................................................................................. 6
Status Bar .............................................................................................................................. 6

Using the Menus and the Toolbar.......................................................................................... 6

Toolbar Buttons................................................................................................................... 8

Using the System Tray Icon..................................................................................................... 8

What the System Tray Icon Tells You.............................................................................. 8
What Does the Flashing System Tray Icon Mean?.......................................................10
The System Tray Icon Menu............................................................................................10

Enabling Password Protection..............................................................................................11

Chapter 3. Testing Your System’s Vulnerability..................................................... 13

Scanning Your System............................................................................................................13
Types of Scans.........................................................................................................................14

Quick Scans ........................................................................................................................14
Stealth Scans .......................................................................................................................14
Trojan Scans .......................................................................................................................14
TCP Scans...........................................................................................................................14
UDP Scans..........................................................................................................................14
ICMP Scans ........................................................................................................................15

Chapter 4. Working With Rules .............................................................................. 17

About Rules .............................................................................................................................17
Using Rules to Protect Your System....................................................................................17
Setting Up Advanced Rules ...................................................................................................17
General Tab .............................................................................................................................19

Rule Description ................................................................................................................19
Block this traffic.................................................................................................................19
Allow this traffic ................................................................................................................19
Apply Rule to Network Interface....................................................................................20
Apply this rule during Screensaver Mode ......................................................................20
Record this traffic in “Packet Log”.................................................................................20

iii

This manual is related to the following products: