Instrukcja obsługi Outpost Firewall Versie 4.0


Przeczytaj poniżej 📖 instrukcję obsługi w języku polskim dla Outpost Firewall Versie 4.0 (100 stron) w kategorii Zapora sieciowa. Ta instrukcja była pomocna dla 2 osób i została oceniona przez 2 użytkowników na średnio 4.5 gwiazdek

Strona 1/100
User Guide
Reference
Outpost Firewall 4.0
Personal Firewall Software
from
Agnitum
Abstract
This is the complete and detailed reference to the Outpost Firewall Pro software.
For an entry-level guide, please see the Quick Start Guide. Please note that if you are using
Outpost Firewall FREE or a version other than 4.0, then some dialogs and settings will
differ.
Copyright © 1999-2006 by Agnitum, Ltd. All rights reserved.
Table of Contents
Part 1: For All Users..........................................................................................6
1 GETTING STARTED ...................................................................................................................................7
1.1 STARTING OUTPOST FIREWALL ..................................................................................................................7
1.2 STOPPING OUTPOST FIREWALL...................................................................................................................7
1.3 OUTPOST FIREWALL ALERTS ......................................................................................................................8
2 AN ORIENTATION....................................................................................................................................10
2.1 THE SYSTEM TRAY ICON ..........................................................................................................................10
2.2 OUTPOST FIREWALLS MAIN WINDOW.....................................................................................................11
2.3 THE PANELS..............................................................................................................................................12
2.4 THE TOOLBAR...........................................................................................................................................15
3 SETTING UP OUTPOST FIREWALL .....................................................................................................17
3.1 BASIC INFORMATION ................................................................................................................................17
3.2 INITIAL SETTINGS .....................................................................................................................................18
3.3 SELECTING A POLICY ................................................................................................................................19
3.4 INACTIVITY TIMERS ..................................................................................................................................22
3.5 APPLICATION LEVEL FILTERING ...............................................................................................................23
3.6 COMPONENT CONTROL.............................................................................................................................25
3.7 ANTI-LEAK CONTROL...............................................................................................................................28
4 PLUG-INS....................................................................................................................................................31
4.1 INTRODUCTION .........................................................................................................................................31
4.2 AD BLOCKING...........................................................................................................................................33
4.3 ACTIVE CONTENT BLOCKING ...................................................................................................................37
4.4 ATTACK DETECTION.................................................................................................................................40
4.5 E-MAIL ATTACHMENT QUARANTINE........................................................................................................46
4.6 DNS CACHE..............................................................................................................................................48
4.7 CONTENT FILTERING.................................................................................................................................51
4.8 ANTI-SPYWARE ........................................................................................................................................53
4.9 QUICK TUNE .............................................................................................................................................62
Part 2: For Advanced Users Only...................................................................64
5 ADVANCED SETTINGS............................................................................................................................65
5.1 INTRODUCTION .........................................................................................................................................65
5.2 SAVING AND LOADING CONFIGURATIONS.................................................................................................65
5.3 SETTING A PASSWORD ..............................................................................................................................66
5.4 CREATING RULES FOR APPLICATIONS.......................................................................................................67
5.5 SYSTEM LEVEL FILTERING........................................................................................................................69
5.6 USING MACRO ADDRESSES.......................................................................................................................71
5.7 SETTINGS FOR A HOME OR OFFICE NETWORK...........................................................................................72
5.8 RUNNING IN ENTERTAINMENT MODE .......................................................................................................74
5.9 RUNNING IN SELF-PROTECTION MODE .....................................................................................................76
6 THE OUTPOST LOG SYSTEM................................................................................................................77
6.1 INTRODUCTION .........................................................................................................................................77
6.2 OUTPOST LOG VIEWERS MAIN WINDOW.................................................................................................78


Specyfikacje produktu

Marka: Outpost Firewall
Kategoria: Zapora sieciowa
Model: Versie 4.0

Potrzebujesz pomocy?

Jeśli potrzebujesz pomocy z Outpost Firewall Versie 4.0, zadaj pytanie poniżej, a inni użytkownicy Ci odpowiedzą




Instrukcje Zapora sieciowa Outpost Firewall

Inne instrukcje Outpost Firewall