Outpost Firewall Versie 4.0 Bedienungsanleitung


Lies die bedienungsanleitung für Outpost Firewall Versie 4.0 (100 Seiten) kostenlos online; sie gehört zur Kategorie Firewall. Dieses Handbuch wurde von 11 Personen als hilfreich bewertet und erhielt im Schnitt 4.5 Sterne aus 6 Bewertungen. Hast du eine Frage zu Outpost Firewall Versie 4.0 oder möchtest du andere Nutzer dieses Produkts befragen? Stelle eine Frage

Seite 1/100
User Guide
Reference
Outpost Firewall 4.0
Personal Firewall Software
from
Agnitum
Abstract
This is the complete and detailed reference to the Outpost Firewall Pro software.
For an entry-level guide, please see the Quick Start Guide. Please note that if you are using
Outpost Firewall FREE or a version other than 4.0, then some dialogs and settings will
differ.
Copyright © 1999-2006 by Agnitum, Ltd. All rights reserved.
Table of Contents
Part 1: For All Users..........................................................................................6
1 GETTING STARTED ...................................................................................................................................7
1.1 STARTING OUTPOST FIREWALL ..................................................................................................................7
1.2 STOPPING OUTPOST FIREWALL...................................................................................................................7
1.3 OUTPOST FIREWALL ALERTS ......................................................................................................................8
2 AN ORIENTATION....................................................................................................................................10
2.1 THE SYSTEM TRAY ICON ..........................................................................................................................10
2.2 OUTPOST FIREWALLS MAIN WINDOW.....................................................................................................11
2.3 THE PANELS..............................................................................................................................................12
2.4 THE TOOLBAR...........................................................................................................................................15
3 SETTING UP OUTPOST FIREWALL .....................................................................................................17
3.1 BASIC INFORMATION ................................................................................................................................17
3.2 INITIAL SETTINGS .....................................................................................................................................18
3.3 SELECTING A POLICY ................................................................................................................................19
3.4 INACTIVITY TIMERS ..................................................................................................................................22
3.5 APPLICATION LEVEL FILTERING ...............................................................................................................23
3.6 COMPONENT CONTROL.............................................................................................................................25
3.7 ANTI-LEAK CONTROL...............................................................................................................................28
4 PLUG-INS....................................................................................................................................................31
4.1 INTRODUCTION .........................................................................................................................................31
4.2 AD BLOCKING...........................................................................................................................................33
4.3 ACTIVE CONTENT BLOCKING ...................................................................................................................37
4.4 ATTACK DETECTION.................................................................................................................................40
4.5 E-MAIL ATTACHMENT QUARANTINE........................................................................................................46
4.6 DNS CACHE..............................................................................................................................................48
4.7 CONTENT FILTERING.................................................................................................................................51
4.8 ANTI-SPYWARE ........................................................................................................................................53
4.9 QUICK TUNE .............................................................................................................................................62
Part 2: For Advanced Users Only...................................................................64
5 ADVANCED SETTINGS............................................................................................................................65
5.1 INTRODUCTION .........................................................................................................................................65
5.2 SAVING AND LOADING CONFIGURATIONS.................................................................................................65
5.3 SETTING A PASSWORD ..............................................................................................................................66
5.4 CREATING RULES FOR APPLICATIONS.......................................................................................................67
5.5 SYSTEM LEVEL FILTERING........................................................................................................................69
5.6 USING MACRO ADDRESSES.......................................................................................................................71
5.7 SETTINGS FOR A HOME OR OFFICE NETWORK...........................................................................................72
5.8 RUNNING IN ENTERTAINMENT MODE .......................................................................................................74
5.9 RUNNING IN SELF-PROTECTION MODE .....................................................................................................76
6 THE OUTPOST LOG SYSTEM................................................................................................................77
6.1 INTRODUCTION .........................................................................................................................................77
6.2 OUTPOST LOG VIEWERS MAIN WINDOW.................................................................................................78


Produktspezifikationen

Marke: Outpost Firewall
Kategorie: Firewall
Modell: Versie 4.0

Brauchst du Hilfe?

Wenn Sie Hilfe mit Outpost Firewall Versie 4.0 benötigen, stellen Sie unten eine Frage und andere Benutzer werden Ihnen antworten




Bedienungsanleitung Firewall Outpost Firewall

Andere Handbücher Outpost Firewall