Symantec Norton 360 Multi-Device, 5U Manual Pagina 287

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 618
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 286
6
Click OK.
7
In the Intrusion Signatures window, click OK.
8
In the Settings window, click Apply.
Excluding or including attack signatures in monitoring
In some cases, benign network activity may appear
similar to an attack signature. You may receive
repeated notifications about possible attacks. If you
know that the attacks that trigger these notifications
are safe, you can create exclusion for the attack
signature that matches the benign activity.
Each exclusion that you create leaves your computer
vulnerable to attacks.
If you have excluded the attack signatures that you
want to monitor again, you can include them in the list
of active signatures.
To exclude attack signatures from being monitored
1
In the Norton 360 main window, click Settings.
2
In the Settings window, under Detailed Settings,
click Firewall.
3
On the Intrusion and BrowserProtection tab, under
Intrusion Prevention, in the Intrusion Signatures
row, click Configure.
4
In the Intrusion Signatures window, uncheck the
attack signatures that you want to exclude.
5
Click OK.
To include the attack signatures that were previously
excluded
1
In the Norton 360 main window, click Settings.
2
In the Settings window, under Detailed Settings,
click Firewall.
3
On the Intrusion and BrowserProtection tab, under
Intrusion Prevention, in the Intrusion Signatures
row, click Configure.
4
In the Intrusion Signatures window, check the
attack signatures that you want to include.
287Keeping secure on the Internet
About Intrusion Prevention
Vista de pagina 286
1 2 ... 282 283 284 285 286 287 288 289 290 291 292 ... 617 618

Comentarios a estos manuales

Sin comentarios