
Table Of Contents
System Log Parameters and Description..................................................................34
Description and Data Fields for the System Log ....................................................35
Enabling and Clearing Logs...................................................................................................35
Back Tracing Logged Events.................................................................................................36
Saving Logs ..............................................................................................................................37
Stopping an Active Response................................................................................................37
Chapter 6. Configuring the Agent’s Settings .......................................................... 39
General Tab .............................................................................................................................39
Automatically load HP Sygate Agent service at startup ...............................................40
Block Network Neighborhood traffic while in screensaver mode.............................40
Hide all notification messages..........................................................................................40
Beep before notify .............................................................................................................40
Hide blocking notification................................................................................................40
Hide application popup ....................................................................................................41
Set Password.......................................................................................................................41
Ask password while exiting ..............................................................................................41
Network Neighborhood Tab ................................................................................................41
Network Interface .............................................................................................................42
Allow to browse Network Neighborhood files and printer(s)....................................42
Allow others to share my files and printer(s).................................................................42
Security Tab .............................................................................................................................42
Enable Intrusion Prevention System ..............................................................................42
Enable port scan detection...............................................................................................43
Enable driver level protection..........................................................................................43
Enable stealth mode browsing.........................................................................................43
Enable DoS detection .......................................................................................................43
Block Universal Plug and Play Traffic............................................................................43
Automatically block attacker’s IP address for... second(s) ..........................................44
Block all traffic while the service is not loaded .............................................................44
Allow initial traffic........................................................................................................44
Enable DLL authentication..............................................................................................44
Reset all fingerprints for all applications ........................................................................44
Automatically allow all known DLLs........................................................................45
Enable anti-MAC spoofing ..............................................................................................45
Enable anti-IP spoofing....................................................................................................45
Enable OS fingerprint masquerading .............................................................................45
NetBIOS protection..........................................................................................................45
Anti-Application Hijacking ..............................................................................................46
Allow Token Ring Traffic ................................................................................................46
Enable smart DNS ............................................................................................................46
Enable smart DHCP .........................................................................................................46
Enable smart WINS ..........................................................................................................46
E-Mail Notification Tab.........................................................................................................46
Do Not Notify ...................................................................................................................47
Notify Immediately............................................................................................................47
After Every . . . Minutes ..................................................................................................47
From:..............................................................................................................................47
v