Bitdefender Internet Security 2014 Guía de usuario Pagina 127

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 194
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 126
Note
The operation of the Intrusion Detection System is related to that of the Active Virus
Control. Process exclusion rules apply to both systems.
19.6.2. Other settings
The following features can be enabled or disabled.
Internet connection sharing - enables support for Internet connection sharing.
Note
This option does not automatically enable Internet connection sharing on your
system, but only allows this type of connection in case you enable it from your
operating system.
Block port scans - detects and blocks attempts to find out which ports are open.
Port scans are frequently used by hackers to find out which ports are open on
your computer. They might then break into your computer if they find a less
secure or vulnerable port.
Increase log verbosity - increases the verbosity of the Firewall log.
Bitdefender maintains a log of events regarding the Firewall module usage
(enabling/disabling firewall, traffic blocking, modifying settings) or generated by
the activities detected by this module (scanning ports, blocking connection
attempts or traffic according to the rules). The log can be accessed from the
Firewall Activity window by clicking Show Log.
Monitor Wi-Fi connections - when you are connected to wireless networks,
information is displayed regarding specific network events (for example, when a
new computer has joined the network).
Firewall
118
Bitdefender Internet Security
Vista de pagina 126
1 2 ... 122 123 124 125 126 127 128 129 130 131 132 ... 193 194

Comentarios a estos manuales

Sin comentarios