Hp t5740 Thin Client Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro Počítače Hp t5740 Thin Client. HP t5740 Thin Client User Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk

Shrnutí obsahu

Strany 1 - HP thin clients

Symantec™ Endpoint Protection forMicrosoft® Windows Embedded Standard2009 (WES) and Windows® XP Embedded(XPe) User GuideHP thin clients

Strany 2

3 Agent basicsThis chapter includes the following topics:●Opening the agent on page 4●Navigating the main window on page 4●Using the menus and the too

Strany 3 - About this book

Using the menus and the toolbarThe top of the screen displays a standard menu and toolbar. The toolbar icons can be used to quicklyaccess logs, view t

Strany 4

Hide WindowsServicesToggles the display of Windows ServicesHide Broadcast Traffic Toggles the display of broadcast trafficViewing traffic historyYou c

Strany 5 - Table of contents

There are a number of services running at any given time. Since they are often crucial to the operationof your endpoint, you may want to allow them. Y

Strany 6

About the notification area iconRED The agent has blocked traffic.GREEN Traffic flows uninterrupted by the agent.GRAY No traffic flows in that directi

Strany 7 - 1 System requirements

Menu command Description Server Control mode Client Control modeAbout Opens the About dialog box,providing information on yourversion of the agentX XE

Strany 8 - 2 Introducing the agent

Testing your endpointYou can test the vulnerability of your system to outside threats by scanning your system. Assessingyour vulnerability to an attac

Strany 9 - Key features of the agent

4 Responding to messages andwarningsThis chapter includes the following topics:●About message types on page 11●Responding to application messages on p

Strany 10 - 3 Agent basics

Internet Explorer (IEXPLORE.EXE) is trying to connect to www.symantec.com using remote port 80 (HTTP - World Wide Web). Do you want to allow this prog

Strany 11

Responding to Trojan horse warningsIf the agent detects a known Trojan horse on your endpoint, it blocks the Trojan horse from accessingyour system an

Strany 12 - Displaying broadcast traffic

© Copyright 2008–2009 Hewlett-PackardDevelopment Company, L.P.Microsoft and Windows are U.S. registeredtrademarks of Microsoft Corporation.Internet Ex

Strany 13

Responding to blocked traffic messagesSecurity messages display a message box when applications are blocked:Blocked application message An application

Strany 14 - Displaying the shortcut menu

5 Monitoring and loggingThis chapter includes the following topics:●About logs on page 15●Viewing logs on page 19●Back tracing logged events on page 2

Strany 15 - Enabling password protection

About the Security logThe Security log records potentially threatening activity that is directed towards your endpoint, such asport scanning, virus at

Strany 16 - Testing your endpoint

About the Traffic logWhenever your endpoint makes a connection through the network, this transaction is recorded in theTraffic log. The Traffic log in

Strany 17 - 4 Responding to messages and

Domain User’s domain nameLocation The Location (Normal or Block All) that was in effect at the timeof the attackOccurrences Number of packets each pie

Strany 18 - Changed application messages

About the System logThe System log records all operational changes, such as the starting and stopping of services, detectionof network applications, s

Strany 19

Back tracing logged eventsBack tracing enables you to pinpoint the source of data from a logged event. Back tracing shows theexact steps, or hops, tha

Strany 20

Exporting logsYou can save and export the contents of the logs to different locations. You may want to export logs tosave space or to perform a securi

Strany 21 - 5 Monitoring and logging

Stopping an active responseIf the agent detects an attack, it triggers an active response. The active response automatically blocksthe IP address of a

Strany 22 - About the Security log

6 Command Line ManagementThis chapter includes the following topics:●The command-line interface for the client service●Typing a parameter if the agent

Strany 23 - About the Traffic log

About this bookThe software described in this book is furnished under a license agreement and may be used only inaccordance with the terms of the agre

Strany 24 - About the Packet log

Parameter Descriptionsmc -exportadvrule Exports the agent's firewall rules to a .sar file.Agent rules are only exported from the agent when in Se

Strany 25 - Viewing logs

To type a parameter if the agent is password-protected, perform the following steps:1. On the agent computer, on the taskbar, click Start > Run.2.

Strany 26 - Back tracing logged events

IndexAactive response, stopping 15agentabout 2basics 4commands 23features 2opening 4password-protected 24application messages 11application messages,c

Strany 27 - Filtering logged events

disabling protection 9enabling passwordprotection 9policies 2viewing policy 7Security log, about 16shortcut menu 8software requirements 1stopping acti

Strany 29 - 6 Command Line Management

Table of contents1 System requirementsHardware requirements ...

Strany 30

Responding to permission status messages ... 145 Monitoring and lo

Strany 31

1 System requirementsThis chapter includes the following topics:●Hardware requirements on page 1●Software requirements on page 1Hardware requirementsT

Strany 32

2 Introducing the agentThis chapter includes the following topics:●About the Symantec Endpoint Protection for WES and XPe on page 2●About security pol

Strany 33

Key features of the agentThe agent can be used in the following networking environments:●Directly connected to the local area network or wireless netw

Komentáře k této Příručce

Žádné komentáře