
Note
The operation of the Intrusion Detection System is related to that of the Active Virus
Control. Process exclusion rules apply to both systems.
19.6.2. Other settings
The following features can be enabled or disabled.
● Internet connection sharing - enables support for Internet connection sharing.
Note
This option does not automatically enable Internet connection sharing on your
system, but only allows this type of connection in case you enable it from your
operating system.
● Block port scans - detects and blocks attempts to find out which ports are open.
Port scans are frequently used by hackers to find out which ports are open on
your computer. They might then break into your computer if they find a less
secure or vulnerable port.
● Increase log verbosity - increases the verbosity of the Firewall log.
Bitdefender maintains a log of events regarding the Firewall module usage
(enabling/disabling firewall, traffic blocking, modifying settings) or generated by
the activities detected by this module (scanning ports, blocking connection
attempts or traffic according to the rules). The log can be accessed from the
Firewall Activity window by clicking Show Log.
● Monitor Wi-Fi connections - when you are connected to wireless networks,
information is displayed regarding specific network events (for example, when a
new computer has joined the network).
Firewall
118
Bitdefender Internet Security
Kommentare zu diesen Handbüchern