Der neue Log-Viewer gefällt mir besser. Übersichtlicher.
Field Information Rating Each alert is high-rated or medium-rated. High-rated alerts are those likely to have been caused by hacker activity. Medium-rated alerts are likely to have been caused by unwanted but harmless network traffic. Date/Time The date and time the alert occurred. Type The type of alert: Firewall, Program, or Lock Enabled. Protocol The communications protocol used by the traffic that caused the alert. Program The name of the program attempting to send or receive data. (Applies only to Program alerts). Source IP The IP address of the computer that sent the traffic that ZoneAlarm blocked. Destination IP The address of the computer the blocked traffic was sent to. Direction The direction of the blocked traffic. "Incoming" means the traffic was sent to your computer. "Outgoing" means the traffic was sent from your computer. Action Taken How the traffic was handled by ZoneAlarm. Count The number of times an alert of the same type, with the same source, destination, and protocol, occurred during a single session. Source DNS The domain name of the computer that sent the traffic that caused the alert. Destination DNS The domain name of the intended addressee of the traffic that caused the alert.
Nun wird im Firewall Panel unterschieden zwischen Internet Security Zone und Trusted Zone Security.
3 Sicherheitsstufen
Internet Zone security levels
High security puts your computer in stealth mode. Windows (NetBIOS) services and file and printer shares are blocked. Ports are opened only when a program to which you have given permission needs them.
Medium security takes your computer out of stealth mode, making it visible to other computers on the Internet. Windows services are still blocked. Program permissions are still enforced.
Low security enables Windows services. Your computer is visible to others, and file sharing is allowed. Program controls is still enforced.
Trusted Zone security levels
High security puts your computer in stealth mode. Windows (NetBIOS) services and file and printer shares are blocked. Ports are opened only when a program you have given access permission or server permission needs them. Programs must have your permission in order to access the Internet or local network.
Medium security takes your computer out of stealth mode, making it visible to other computers on the Internet. File and printer sharing, as well as Windows services (NetBIOS), are enabled. Programs must still have permission to access the Internet or local network.
Low security enables Windows services. Your computer is visible to others, and file sharing is allowed. Program controls is still enforced.
|