CHAPTER 6
217
1.
Select
Root
in the
Policy Domains
tab.
2.
Go to the
Settings
tab and select the
Application Control
page. On
this page select:
Allow
from the
Default action for server applications
drop-down
list.
Allow
from the
Default action for client applications
drop-down
list.
3.
When creating any application control rules with the Application
Control Rule Wizard, select
Either
Allow
or
Deny
as the action on incoming and outgoing
connection attempts in the
Application Rule Type
dialog box.
No message
in the
Message Shown to Users
dialog box.
4.
When you have made these modifications, save the policy data and
distribute the policy to take the new configuration into use.
6.6
How to use Alerts for Checking that Internet
Shield Works?
In normal use you should not get any alerts from the Internet Shield. If you
suddenly start to receive a lot of alerts it means that there is either a
configuration mistake or then there is a problem.
When configuring alerting you should also remember that you should
have one rule for each type of alert you want. Designing alerting based on
“broad” rules will generate a lot of alerts, and any important information
might be lost in large volumes of useless alerts.
You can also create special rules that you can use for testing that the
Internet Shield works. In this example a rule that allows the use of ping is
created. If this rule included alerting, it can be used for testing that the
alerting works.
1.
Go to
Settings
tab and select the
Firewall Rules
page.
2.
Select the security level you want to use for testing purposes.
Summary of Contents for CLIENT SECURITY 7.00
Page 1: ...F Secure Client Security Administrator s Guide...
Page 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Page 41: ...CHAPTER2 41 Click Next to continue...
Page 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Page 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Page 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Page 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Page 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Page 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Page 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Page 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Page 297: ...297 GLOSSARY...