Outpost Firewall Versie 4.0 Bedienungsanleitung
Outpost Firewall
Firewall
Versie 4.0
Lesen Sie kostenlos die 📖 deutsche Bedienungsanleitung für Outpost Firewall Versie 4.0 (100 Seiten) in der Kategorie Firewall. Dieser Bedienungsanleitung war für 4 Personen hilfreich und wurde von 2 Benutzern mit durchschnittlich 4.5 Sternen bewertet
Seite 1/100
User Guide
Reference
Outpost Firewall 4.0
Personal Firewall Software
from
Agnitum
Abstract
This is the complete and detailed reference to the Outpost Firewall Pro software.
For an entry-level guide, please see the Quick Start Guide. Please note that if you are using
Outpost Firewall FREE or a version other than 4.0, then some dialogs and settings will
differ.
Copyright © 1999-2006 by Agnitum, Ltd. All rights reserved.
Table of Contents
Part 1: For All Users..........................................................................................6
1 GETTING STARTED ...................................................................................................................................7
1.1 STARTING OUTPOST FIREWALL ..................................................................................................................7
1.2 STOPPING OUTPOST FIREWALL...................................................................................................................7
1.3 OUTPOST FIREWALL ALERTS ......................................................................................................................8
2 AN ORIENTATION....................................................................................................................................10
2.1 THE SYSTEM TRAY ICON ..........................................................................................................................10
2.2 OUTPOST FIREWALL’S MAIN WINDOW.....................................................................................................11
2.3 THE PANELS..............................................................................................................................................12
2.4 THE TOOLBAR...........................................................................................................................................15
3 SETTING UP OUTPOST FIREWALL .....................................................................................................17
3.1 BASIC INFORMATION ................................................................................................................................17
3.2 INITIAL SETTINGS .....................................................................................................................................18
3.3 SELECTING A POLICY ................................................................................................................................19
3.4 INACTIVITY TIMERS ..................................................................................................................................22
3.5 APPLICATION LEVEL FILTERING ...............................................................................................................23
3.6 COMPONENT CONTROL.............................................................................................................................25
3.7 ANTI-LEAK CONTROL...............................................................................................................................28
4 PLUG-INS....................................................................................................................................................31
4.1 INTRODUCTION .........................................................................................................................................31
4.2 AD BLOCKING...........................................................................................................................................33
4.3 ACTIVE CONTENT BLOCKING ...................................................................................................................37
4.4 ATTACK DETECTION.................................................................................................................................40
4.5 E-MAIL ATTACHMENT QUARANTINE........................................................................................................46
4.6 DNS CACHE..............................................................................................................................................48
4.7 CONTENT FILTERING.................................................................................................................................51
4.8 ANTI-SPYWARE ........................................................................................................................................53
4.9 QUICK TUNE .............................................................................................................................................62
Part 2: For Advanced Users Only...................................................................64
5 ADVANCED SETTINGS............................................................................................................................65
5.1 INTRODUCTION .........................................................................................................................................65
5.2 SAVING AND LOADING CONFIGURATIONS.................................................................................................65
5.3 SETTING A PASSWORD ..............................................................................................................................66
5.4 CREATING RULES FOR APPLICATIONS.......................................................................................................67
5.5 SYSTEM LEVEL FILTERING........................................................................................................................69
5.6 USING MACRO ADDRESSES.......................................................................................................................71
5.7 SETTINGS FOR A HOME OR OFFICE NETWORK...........................................................................................72
5.8 RUNNING IN ENTERTAINMENT MODE .......................................................................................................74
5.9 RUNNING IN SELF-PROTECTION MODE .....................................................................................................76
6 THE OUTPOST LOG SYSTEM................................................................................................................77
6.1 INTRODUCTION .........................................................................................................................................77
6.2 OUTPOST LOG VIEWER’S MAIN WINDOW.................................................................................................78
Produktspezifikationen
Marke: | Outpost Firewall |
Kategorie: | Firewall |
Modell: | Versie 4.0 |
Brauchst du Hilfe?
Wenn Sie Hilfe mit Outpost Firewall Versie 4.0 benötigen, stellen Sie unten eine Frage und andere Benutzer werden Ihnen antworten
Bedienungsanleitung Firewall Outpost Firewall
22 August 2024
Andere Handbücher Outpost Firewall
22 August 2024