Kaspersky Lab kaspersky anti-hacker 1.7 User Manual

Page of 101
4
 
Kaspersky Anti-Hacker 
5.4. Dialog Boxes' Shortcut Menu.............................................................................. 31
 
5.5. Rule Wizards ....................................................................................................... 31
 
5.6. Changing and Saving Interface Settings ............................................................ 32
 
5.7. Exiting the Program............................................................................................. 34
 
CHAPTER 6. ENABLING THE SECURITY SYSTEM AND DEFINING ITS 
SETTINGS.................................................................................................................. 35
 
6.1. Enabling the Security System and Selecting the Security Level ....................... 35
 
6.1.1. Enabling the Security System ...................................................................... 35
 
6.1.2. Selecting the Security Level ......................................................................... 37
 
6.1.3. Network Event Warning................................................................................ 38
 
6.1.4. Training Window (Medium Level) ................................................................ 39
 
6.1.5. The Executable Module Substitution Warning ............................................ 40
 
6.2. How the Program Responds to Attack ............................................................... 41
 
6.3. Customizing Application Rules ........................................................................... 43
 
6.3.1. Managing the Rule List................................................................................. 43
 
6.3.2. Adding a New Application Rule.................................................................... 46
 
6.3.2.1. Step 1. Customizing the Rule................................................................ 46
 
6.3.2.2. Step 2. Rule Conditions......................................................................... 51
 
6.3.2.3. Step 3. Additional Actions...................................................................... 57
 
6.4. Customizing Packet Filtering Rules.................................................................... 57
 
6.4.1. Managing the Rule List................................................................................. 57
 
6.4.2. Adding a New Rule....................................................................................... 60
 
6.4.2.1. Step 1. Rule Conditions......................................................................... 60
 
6.4.2.2. Step 2. Rule Name and Additional Actions........................................... 65
 
6.5. Intrusion Detection System ................................................................................. 66
 
6.5.1. Intrusion Detector Settings ........................................................................... 66
 
6.5.2. The List of Detectable Attacks...................................................................... 67
 
CHAPTER 7. VIEWING PERFORMANCE RESULTS................................................ 70
 
7.1. Viewing the Current Status ................................................................................. 70
 
7.1.1. Active Applications........................................................................................ 70