Bitdefender Internet Security 2014 Betriebsanweisung Seite 126

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 194
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 125
3. In the Settings Overview window, select Firewall.
4. In the Firewall Settings window, select the Settings tab.
5. Turn on Paranoid Mode by clicking the corresponding switch.
Note
When Paranoid Mode is turned on, the Autopilot is automatically switched off.
As long as Paranoid Mode is on, an alert will be displayed prompting you for action
every time one of the following situations occurs:
An application tries to connect to the Internet.
An application tries to perform an action considered suspicious by the Intrusion
Detection System or the Active Virus Control.
The alert contains detailed information regarding the application and the detected
behavior. You must select to Allow or Deny the action using the corresponding
button.
19.6. Configuring advanced settings
To configure advanced firewall settings, follow these steps:
1. Open the Bitdefender window.
2. Click the Settings button on the upper toolbar.
3. In the Settings Overview window, select Firewall.
4. In the Firewall Settings window, select the Advanced tab.
19.6.1. Intrusion Detection System
To configure the Intrusion Detection System, follow these steps:
1. To turn on the Intrusion Detection System, click the corresponding switch.
2. Drag the slider along the scale to set the desired aggressiveness level. Use the
description on the right side of the scale to choose the level that better fits your
security needs.
You can check what applications have been detected by the Intrusion Detection
System in the Events window.
If there are applications you trust and do not want the Intrusion Detection System
to scan, you can add exclusion rules for them. To exclude an application from
scanning, follow the steps described in section Managing excluded processes (p.
88).
Firewall
117
Bitdefender Internet Security
Seitenansicht 125
1 2 ... 121 122 123 124 125 126 127 128 129 130 131 ... 193 194

Kommentare zu diesen Handbüchern

Keine Kommentare