beautypg.com

HP Compaq t5720 Thin Client User Manual

Page 5

background image

Table Of Contents

System Log Parameters and Description..................................................................34
Description and Data Fields for the System Log ....................................................35

Enabling and Clearing Logs...................................................................................................35
Back Tracing Logged Events.................................................................................................36
Saving Logs ..............................................................................................................................37
Stopping an Active Response................................................................................................37

Chapter 6. Configuring the Agent’s Settings .......................................................... 39

General Tab .............................................................................................................................39

Automatically load HP Sygate Agent service at startup...............................................40
Block Network Neighborhood traffic while in screensaver mode.............................40
Hide all notification messages..........................................................................................40
Beep before notify .............................................................................................................40
Hide blocking notification................................................................................................40
Hide application popup ....................................................................................................41
Set Password.......................................................................................................................41
Ask password while exiting ..............................................................................................41

Network Neighborhood Tab ................................................................................................41

Network Interface .............................................................................................................42
Allow to browse Network Neighborhood files and printer(s)....................................42
Allow others to share my files and printer(s).................................................................42

Security Tab .............................................................................................................................42

Enable Intrusion Prevention System ..............................................................................42
Enable port scan detection...............................................................................................43
Enable driver level protection..........................................................................................43
Enable stealth mode browsing.........................................................................................43
Enable DoS detection .......................................................................................................43
Block Universal Plug and Play Traffic............................................................................43
Automatically block attacker’s IP address for... second(s) ..........................................44
Block all traffic while the service is not loaded .............................................................44

Allow initial traffic........................................................................................................44

Enable DLL authentication..............................................................................................44
Reset all fingerprints for all applications ........................................................................44

Automatically allow all known DLLs........................................................................45

Enable anti-MAC spoofing ..............................................................................................45
Enable anti-IP spoofing....................................................................................................45
Enable OS fingerprint masquerading .............................................................................45
NetBIOS protection..........................................................................................................45
Anti-Application Hijacking ..............................................................................................46
Allow Token Ring Traffic ................................................................................................46
Enable smart DNS ............................................................................................................46
Enable smart DHCP .........................................................................................................46
Enable smart WINS ..........................................................................................................46

E-Mail Notification Tab.........................................................................................................46

Do Not Notify ...................................................................................................................47
Notify Immediately............................................................................................................47
After Every . . . Minutes ..................................................................................................47

From:..............................................................................................................................47

v

This manual is related to the following products: