McAfee UTILITIES 4.0 Guía de usuario Pagina 97

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 112
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 96
What it showsColumn
Time
The time and date when you added this address to the blocked addresses list.
Time Remaining
How long Host Intrusion Prevention will continue to block this address.
If you specified an expiration time when you blocked the address, this column shows
the number of minutes left until Host Intrusion Prevention removes the address from
the list.If you specified that you wanted this address blocked until you manually removed
it from the list, this column displays Until removed.
Editing the Blocked Hosts list
Use this task to edit the list of blocked addresses. Edits include adding, removing, editing blocked
hosts, and viewing blocked host details.
Task
1 Click Add to add a host.
2 In the Blocked Host dialog box, enter the IP address you want to block. To search for an
IPS address by domain name, click DNS Lookup.
3 Determine how long to block the IP address:
Select Until Removed to keep the host blocked until deleted.
Select For and type the number of minutes, up to 60, to keep the host blocked for a
fixed period of time.
4 Click OK.
NOTE: After you create a blocked address, Host Intrusion Prevention adds a new entry to
the list on the Application Protection tab. It blocks any communication attempt from
that IP address until you remove it from the blocked addresses list, or a set period of time
expires.
5 For other edits, do one of the following:
Do this...To...
Double-click a host entry, or select a host and click Properties. The
Blocked Host dialog box displays information that can be edited.
View the details of or edit a blocked host
Select a host and click Remove.Delete a blocked host
About the Application Protection tab
The Application Protection tab displays a list of applications protected on the client. This is
a view-only list populated by administrative policy and a client-specific application list created
heuristically.
This list shows all monitored processes on the client.
What it showsColumn
The application process.Process
The process ID, which is the key for the cache lookup of a process.PID
The full path name of the application process.Process Full Path
Working with Host Intrusion Prevention Clients
Overview of the Windows client
97McAfee Host Intrusion Prevention 7.0 Product Guide for use with ePolicy Orchestrator 4.0
Vista de pagina 96
1 2 ... 92 93 94 95 96 97 98 99 100 101 102 ... 111 112

Comentarios a estos manuales

Sin comentarios