Intego NetBarrier X5 User’s Manual Page 4
Creating Rules Manually..............................................................................................................48
Rule Naming, Logging, Evaluation and Schedules.............................................................................49
Rule Sources and Destinations................................................................................................................. 52
Rule Services ................................................................................................................................................55
Rule Interfaces .............................................................................................................................................60
Rule Actions................................................................................................................................................. 61
Multi-Part Sources, Destinations, Services and Interfaces.................................................................61
Deleting Sources, Destinations, Services and Interfaces .................................................................... 62
Working with Rules .......................................................................................................................63
Rule Order....................................................................................................................................................63
Editing and Deleting Rules.......................................................................................................................63
Using the Rule Contextual Menu ............................................................................................................64
Trojan Horse Protection ................................................................................................................66
6—The Four Lines of Defense: Privacy ........................................................................68
Data Filter .........................................................................................................................................69
How the Data Filter Works.......................................................................................................................70
What to Protect............................................................................................................................................ 71
Adding Data to the Filter ..........................................................................................................................72
Activating, Deactivating and Deleting Data Items..............................................................................75
Data Filter Options .....................................................................................................................................76
Surf Filters ........................................................................................................................................77
Banners Filter ............................................................................................................................................... 78
Cookies Filter ...............................................................................................................................................82
Information Hiding ....................................................................................................................................85
7—The Four Lines of Defense: Antivandal..................................................................86
Antivandal ........................................................................................................................................87
Policy .............................................................................................................................................................88
Options..........................................................................................................................................................91
Unifying Policy Options............................................................................................................................ 92
Anti-Spyware ...................................................................................................................................93
Options..........................................................................................................................................................96
Applications: Adding, Removing and Changing Settings.................................................................97
The Stop List and Trusted Group...............................................................................................99
Stop List/Trusted Group Information .................................................................................................101
A Note About DNS Lookups .................................................................................................................103
Adding Addresses ....................................................................................................................................104
Using Wildcards........................................................................................................................................105
Removing Addresses ...............................................................................................................................105
Moving Addresses Between the Stop List and Trusted Group ......................................................106
Editing an Address ...................................................................................................................................107
The Contextual Menu ..............................................................................................................................108
8—The Four Lines of Defense: Monitoring................................................................109
The Log ............................................................................................................................................110
Log View Options .....................................................................................................................................111
Log Window Contextual Menu .............................................................................................................115
Pausing the Log.........................................................................................................................................117
Clearing the Log........................................................................................................................................117
Exporting the Log .....................................................................................................................................118
Filtering Data in the Log Window ........................................................................................................120