HP Compaq t5720 Thin Client User Manual
Page 5
Table Of Contents
System Log Parameters and Description..................................................................34
Description and Data Fields for the System Log ....................................................35
Enabling and Clearing Logs...................................................................................................35
Back Tracing Logged Events.................................................................................................36
Saving Logs ..............................................................................................................................37
Stopping an Active Response................................................................................................37
Automatically load HP Sygate Agent service at startup...............................................40
Block Network Neighborhood traffic while in screensaver mode.............................40
Hide all notification messages..........................................................................................40
Beep before notify .............................................................................................................40
Hide blocking notification................................................................................................40
Hide application popup ....................................................................................................41
Set Password.......................................................................................................................41
Ask password while exiting ..............................................................................................41
Enable Intrusion Prevention System ..............................................................................42
Enable port scan detection...............................................................................................43
Enable driver level protection..........................................................................................43
Enable stealth mode browsing.........................................................................................43
Enable DoS detection .......................................................................................................43
Block Universal Plug and Play Traffic............................................................................43
Automatically block attacker’s IP address for... second(s) ..........................................44
Block all traffic while the service is not loaded .............................................................44
Enable anti-MAC spoofing ..............................................................................................45
Enable anti-IP spoofing....................................................................................................45
Enable OS fingerprint masquerading .............................................................................45
NetBIOS protection..........................................................................................................45
Anti-Application Hijacking ..............................................................................................46
Allow Token Ring Traffic ................................................................................................46
Enable smart DNS ............................................................................................................46
Enable smart DHCP .........................................................................................................46
Enable smart WINS ..........................................................................................................46
v