Symantec ™ Internet Security 2012 Instrukcja Obsługi Strona 192

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 334
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 191
6
In the Signature Properties window, uncheck or
check Notify me when this signature is detected.
7
Click OK.
8
In the Intrusion Signatures window, click OK.
Excluding or including attack signatures in monitoring
In some cases, benign network activity may appear
similar to an attack signature. You may receive
repeated notifications about possible attacks. If you
know that the attacks that trigger these notifications
are safe, you can create exclusion for the attack
signature that matches the benign activity.
Each exclusion that you create leaves your computer
vulnerable to attacks.
If you have excluded the attack signatures that you
want to monitor again, you can include them in the list
of active signatures.
To exclude attack signatures from being monitored
1
In the Norton AntiVirus main window, click
Settings.
2
In the Settings window, click the Network tab.
3
In the left pane, click Intrusion Prevention.
4
Under Intrusion Prevention, in the Intrusion
Signatures row, click Configure.
5
In the Intrusion Signatures window, uncheck the
attack signatures that you want to exclude.
6
Click OK.
To include the attack signatures that were previously
excluded
1
In the Norton AntiVirus main window, click
Settings.
2
In the Settings window, click the Network tab.
3
In the left pane, click Intrusion Prevention.
4
Under Intrusion Prevention, in the Intrusion
Signatures row, click Configure.
Protecting Internet activities
About Intrusion Prevention
192
Przeglądanie stron 191
1 2 ... 187 188 189 190 191 192 193 194 195 196 197 ... 333 334

Komentarze do niniejszej Instrukcji

Brak uwag