Használati útmutató Outpost Firewall Versie 4.0
Outpost Firewall
Tűzfal
Versie 4.0
Olvassa el alább 📖 a magyar nyelvű használati útmutatót Outpost Firewall Versie 4.0 (100 oldal) a Tűzfal kategóriában. Ezt az útmutatót 3 ember találta hasznosnak és 2 felhasználó értékelte átlagosan 4.5 csillagra
Oldal 1/100
User Guide
Reference
Outpost Firewall 4.0
Personal Firewall Software
from
Agnitum

Abstract
This is the complete and detailed reference to the Outpost Firewall Pro software.
For an entry-level guide, please see the Quick Start Guide. Please note that if you are using
Outpost Firewall FREE or a version other than 4.0, then some dialogs and settings will
differ.
Copyright © 1999-2006 by Agnitum, Ltd. All rights reserved.
Table of Contents
Part 1: For All Users..........................................................................................6
1 GETTING STARTED ...................................................................................................................................7
1.1 STARTING OUTPOST FIREWALL ..................................................................................................................7
1.2 STOPPING OUTPOST FIREWALL...................................................................................................................7
1.3 OUTPOST FIREWALL ALERTS ......................................................................................................................8
2 AN ORIENTATION....................................................................................................................................10
2.1 THE SYSTEM TRAY ICON ..........................................................................................................................10
2.2 OUTPOST FIREWALL’S MAIN WINDOW.....................................................................................................11
2.3 THE PANELS..............................................................................................................................................12
2.4 THE TOOLBAR...........................................................................................................................................15
3 SETTING UP OUTPOST FIREWALL .....................................................................................................17
3.1 BASIC INFORMATION ................................................................................................................................17
3.2 INITIAL SETTINGS .....................................................................................................................................18
3.3 SELECTING A POLICY ................................................................................................................................19
3.4 INACTIVITY TIMERS ..................................................................................................................................22
3.5 APPLICATION LEVEL FILTERING ...............................................................................................................23
3.6 COMPONENT CONTROL.............................................................................................................................25
3.7 ANTI-LEAK CONTROL...............................................................................................................................28
4 PLUG-INS....................................................................................................................................................31
4.1 INTRODUCTION .........................................................................................................................................31
4.2 AD BLOCKING...........................................................................................................................................33
4.3 ACTIVE CONTENT BLOCKING ...................................................................................................................37
4.4 ATTACK DETECTION.................................................................................................................................40
4.5 E-MAIL ATTACHMENT QUARANTINE........................................................................................................46
4.6 DNS CACHE..............................................................................................................................................48
4.7 CONTENT FILTERING.................................................................................................................................51
4.8 ANTI-SPYWARE ........................................................................................................................................53
4.9 QUICK TUNE .............................................................................................................................................62
Part 2: For Advanced Users Only...................................................................64
5 ADVANCED SETTINGS............................................................................................................................65
5.1 INTRODUCTION .........................................................................................................................................65
5.2 SAVING AND LOADING CONFIGURATIONS.................................................................................................65
5.3 SETTING A PASSWORD ..............................................................................................................................66
5.4 CREATING RULES FOR APPLICATIONS.......................................................................................................67
5.5 SYSTEM LEVEL FILTERING........................................................................................................................69
5.6 USING MACRO ADDRESSES.......................................................................................................................71
5.7 SETTINGS FOR A HOME OR OFFICE NETWORK...........................................................................................72
5.8 RUNNING IN ENTERTAINMENT MODE .......................................................................................................74
5.9 RUNNING IN SELF-PROTECTION MODE .....................................................................................................76
6 THE OUTPOST LOG SYSTEM................................................................................................................77
6.1 INTRODUCTION .........................................................................................................................................77
6.2 OUTPOST LOG VIEWER’S MAIN WINDOW.................................................................................................78
Termékspecifikációk
Márka: | Outpost Firewall |
Kategória: | Tűzfal |
Modell: | Versie 4.0 |
Szüksége van segítségre?
Ha segítségre van szüksége Outpost Firewall Versie 4.0, tegyen fel kérdést alább, és más felhasználók válaszolnak Önnek
Útmutatók Tűzfal Outpost Firewall

19 Augusztus 2024
Egyéb Outpost Firewall útmutatók

19 Augusztus 2024