Back Tracing
51
want as much information about the intruder as possible. However, intruders can
detect and block a direct trace.
Where is the back
tracing
information?
Back tracing information appears in two places:
●
in the information pane of the Intruder tab
●
in standard text files in the Hosts folder in the directory where Desktop Protector is
installed. Each file is prefixed with the intruder's IP address.
Note:
The severity of the incoming event, not the identity of the intruder, triggers the
back trace.
For more information about setting your back tracing preferences, see “The Back Trace
Tab” on page 76.
Summary of Contents for RealSecure
Page 1: ...TM Desktop Protector User Guide Version 3 5 ...
Page 28: ...Chapter 2 Using RealSecure Desktop Protector with ICEcap Manager 20 ...
Page 38: ...Chapter 3 Setting Up RealSecure Desktop Protector 30 ...
Page 49: ...Ignoring Events 41 For more information see The Prompts Tab on page 83 ...
Page 66: ...Chapter 4 Configuring RealSecure Desktop Protector 58 ...
Page 67: ...TM Appendixes ...
Page 68: ......
Page 96: ...Appendix B Configuration Tabs 88 ...
Page 106: ...Appendix C Advanced Firewall Settings 98 ...
Page 112: ...Appendix D Advanced Application Protection Settings 104 ...
Page 120: ...Appendix E The Main Menu 112 ...
Page 124: ...Index 116 ...