Kaspersky Lab kaspersky anti-hacker 1.7 User Manual
4
Kaspersky Anti-Hacker
5.4. Dialog Boxes' Shortcut Menu.............................................................................. 31
5.5. Rule Wizards ....................................................................................................... 31
5.6. Changing and Saving Interface Settings ............................................................ 32
5.7. Exiting the Program............................................................................................. 34
CHAPTER 6. ENABLING THE SECURITY SYSTEM AND DEFINING ITS
SETTINGS.................................................................................................................. 35
6.1. Enabling the Security System and Selecting the Security Level ....................... 35
6.1.1. Enabling the Security System ...................................................................... 35
6.1.2. Selecting the Security Level ......................................................................... 37
6.1.3. Network Event Warning................................................................................ 38
6.1.4. Training Window (Medium Level) ................................................................ 39
6.1.5. The Executable Module Substitution Warning ............................................ 40
6.2. How the Program Responds to Attack ............................................................... 41
6.3. Customizing Application Rules ........................................................................... 43
6.3.1. Managing the Rule List................................................................................. 43
6.3.2. Adding a New Application Rule.................................................................... 46
6.3.2.1. Step 1. Customizing the Rule................................................................ 46
6.3.2.2. Step 2. Rule Conditions......................................................................... 51
6.3.2.3. Step 3. Additional Actions...................................................................... 57
6.4. Customizing Packet Filtering Rules.................................................................... 57
6.4.1. Managing the Rule List................................................................................. 57
6.4.2. Adding a New Rule....................................................................................... 60
6.4.2.1. Step 1. Rule Conditions......................................................................... 60
6.4.2.2. Step 2. Rule Name and Additional Actions........................................... 65
6.5. Intrusion Detection System ................................................................................. 66
6.5.1. Intrusion Detector Settings ........................................................................... 66
6.5.2. The List of Detectable Attacks...................................................................... 67
CHAPTER 7. VIEWING PERFORMANCE RESULTS................................................ 70
7.1. Viewing the Current Status ................................................................................. 70
7.1.1. Active Applications........................................................................................ 70