Outpost Firewall Versie 4.0 Handleiding


Lees hieronder de 📖 handleiding in het Nederlandse voor Outpost Firewall Versie 4.0 (100 pagina's) in de categorie Firewall. Deze handleiding was nuttig voor 24 personen en werd door 2 gebruikers gemiddeld met 4.5 sterren beoordeeld

Pagina 1/100
User Guide
Reference
Outpost Firewall 4.0
Personal Firewall Software
from
Agnitum
Abstract
This is the complete and detailed reference to the Outpost Firewall Pro software.
For an entry-level guide, please see the Quick Start Guide. Please note that if you are using
Outpost Firewall FREE or a version other than 4.0, then some dialogs and settings will
differ.
Copyright © 1999-2006 by Agnitum, Ltd. All rights reserved.
Table of Contents
Part 1: For All Users..........................................................................................6
1 GETTING STARTED ...................................................................................................................................7
1.1 STARTING OUTPOST FIREWALL ..................................................................................................................7
1.2 STOPPING OUTPOST FIREWALL...................................................................................................................7
1.3 OUTPOST FIREWALL ALERTS ......................................................................................................................8
2 AN ORIENTATION....................................................................................................................................10
2.1 THE SYSTEM TRAY ICON ..........................................................................................................................10
2.2 OUTPOST FIREWALL’S MAIN WINDOW.....................................................................................................11
2.3 THE PANELS..............................................................................................................................................12
2.4 THE TOOLBAR...........................................................................................................................................15
3 SETTING UP OUTPOST FIREWALL .....................................................................................................17
3.1 BASIC INFORMATION ................................................................................................................................17
3.2 INITIAL SETTINGS .....................................................................................................................................18
3.3 SELECTING A POLICY ................................................................................................................................19
3.4 INACTIVITY TIMERS ..................................................................................................................................22
3.5 APPLICATION LEVEL FILTERING ...............................................................................................................23
3.6 COMPONENT CONTROL.............................................................................................................................25
3.7 ANTI-LEAK CONTROL...............................................................................................................................28
4 PLUG-INS....................................................................................................................................................31
4.1 INTRODUCTION .........................................................................................................................................31
4.2 AD BLOCKING...........................................................................................................................................33
4.3 ACTIVE CONTENT BLOCKING ...................................................................................................................37
4.4 ATTACK DETECTION.................................................................................................................................40
4.5 E-MAIL ATTACHMENT QUARANTINE........................................................................................................46
4.6 DNS CACHE..............................................................................................................................................48
4.7 CONTENT FILTERING.................................................................................................................................51
4.8 ANTI-SPYWARE ........................................................................................................................................53
4.9 QUICK TUNE .............................................................................................................................................62
Part 2: For Advanced Users Only...................................................................64
5 ADVANCED SETTINGS............................................................................................................................65
5.1 INTRODUCTION .........................................................................................................................................65
5.2 SAVING AND LOADING CONFIGURATIONS.................................................................................................65
5.3 SETTING A PASSWORD ..............................................................................................................................66
5.4 CREATING RULES FOR APPLICATIONS.......................................................................................................67
5.5 SYSTEM LEVEL FILTERING........................................................................................................................69
5.6 USING MACRO ADDRESSES.......................................................................................................................71
5.7 SETTINGS FOR A HOME OR OFFICE NETWORK...........................................................................................72
5.8 RUNNING IN ENTERTAINMENT MODE .......................................................................................................74
5.9 RUNNING IN SELF-PROTECTION MODE .....................................................................................................76
6 THE OUTPOST LOG SYSTEM................................................................................................................77
6.1 INTRODUCTION .........................................................................................................................................77
6.2 OUTPOST LOG VIEWER’S MAIN WINDOW.................................................................................................78


Product specificaties

Merk: Outpost Firewall
Categorie: Firewall
Model: Versie 4.0

Heb je hulp nodig?

Als je hulp nodig hebt met Outpost Firewall Versie 4.0 stel dan hieronder een vraag en andere gebruikers zullen je antwoorden




Handleiding Firewall Outpost Firewall

Andere handleidingen Outpost Firewall