Hp t5740 Thin Client User Manual

Browse online or download User Manual for Computers Hp t5740 Thin Client. HP t5740 Thin Client User Manual

  • Download
  • Add to my manuals
  • Print

Summary of Contents

Page 1 - HP thin clients

Symantec™ Endpoint Protection forMicrosoft® Windows Embedded Standard2009 (WES) and Windows® XP Embedded(XPe) User GuideHP thin clients

Page 2

3 Agent basicsThis chapter includes the following topics:●Opening the agent on page 4●Navigating the main window on page 4●Using the menus and the too

Page 3 - About this book

Using the menus and the toolbarThe top of the screen displays a standard menu and toolbar. The toolbar icons can be used to quicklyaccess logs, view t

Page 4

Hide WindowsServicesToggles the display of Windows ServicesHide Broadcast Traffic Toggles the display of broadcast trafficViewing traffic historyYou c

Page 5 - Table of contents

There are a number of services running at any given time. Since they are often crucial to the operationof your endpoint, you may want to allow them. Y

Page 6

About the notification area iconRED The agent has blocked traffic.GREEN Traffic flows uninterrupted by the agent.GRAY No traffic flows in that directi

Page 7 - 1 System requirements

Menu command Description Server Control mode Client Control modeAbout Opens the About dialog box,providing information on yourversion of the agentX XE

Page 8 - 2 Introducing the agent

Testing your endpointYou can test the vulnerability of your system to outside threats by scanning your system. Assessingyour vulnerability to an attac

Page 9 - Key features of the agent

4 Responding to messages andwarningsThis chapter includes the following topics:●About message types on page 11●Responding to application messages on p

Page 10 - 3 Agent basics

Internet Explorer (IEXPLORE.EXE) is trying to connect to www.symantec.com using remote port 80 (HTTP - World Wide Web). Do you want to allow this prog

Page 11

Responding to Trojan horse warningsIf the agent detects a known Trojan horse on your endpoint, it blocks the Trojan horse from accessingyour system an

Page 12 - Displaying broadcast traffic

© Copyright 2008–2009 Hewlett-PackardDevelopment Company, L.P.Microsoft and Windows are U.S. registeredtrademarks of Microsoft Corporation.Internet Ex

Page 13

Responding to blocked traffic messagesSecurity messages display a message box when applications are blocked:Blocked application message An application

Page 14 - Displaying the shortcut menu

5 Monitoring and loggingThis chapter includes the following topics:●About logs on page 15●Viewing logs on page 19●Back tracing logged events on page 2

Page 15 - Enabling password protection

About the Security logThe Security log records potentially threatening activity that is directed towards your endpoint, such asport scanning, virus at

Page 16 - Testing your endpoint

About the Traffic logWhenever your endpoint makes a connection through the network, this transaction is recorded in theTraffic log. The Traffic log in

Page 17 - 4 Responding to messages and

Domain User’s domain nameLocation The Location (Normal or Block All) that was in effect at the timeof the attackOccurrences Number of packets each pie

Page 18 - Changed application messages

About the System logThe System log records all operational changes, such as the starting and stopping of services, detectionof network applications, s

Page 19

Back tracing logged eventsBack tracing enables you to pinpoint the source of data from a logged event. Back tracing shows theexact steps, or hops, tha

Page 20

Exporting logsYou can save and export the contents of the logs to different locations. You may want to export logs tosave space or to perform a securi

Page 21 - 5 Monitoring and logging

Stopping an active responseIf the agent detects an attack, it triggers an active response. The active response automatically blocksthe IP address of a

Page 22 - About the Security log

6 Command Line ManagementThis chapter includes the following topics:●The command-line interface for the client service●Typing a parameter if the agent

Page 23 - About the Traffic log

About this bookThe software described in this book is furnished under a license agreement and may be used only inaccordance with the terms of the agre

Page 24 - About the Packet log

Parameter Descriptionsmc -exportadvrule Exports the agent's firewall rules to a .sar file.Agent rules are only exported from the agent when in Se

Page 25 - Viewing logs

To type a parameter if the agent is password-protected, perform the following steps:1. On the agent computer, on the taskbar, click Start > Run.2.

Page 26 - Back tracing logged events

IndexAactive response, stopping 15agentabout 2basics 4commands 23features 2opening 4password-protected 24application messages 11application messages,c

Page 27 - Filtering logged events

disabling protection 9enabling passwordprotection 9policies 2viewing policy 7Security log, about 16shortcut menu 8software requirements 1stopping acti

Page 29 - 6 Command Line Management

Table of contents1 System requirementsHardware requirements ...

Page 30

Responding to permission status messages ... 145 Monitoring and lo

Page 31

1 System requirementsThis chapter includes the following topics:●Hardware requirements on page 1●Software requirements on page 1Hardware requirementsT

Page 32

2 Introducing the agentThis chapter includes the following topics:●About the Symantec Endpoint Protection for WES and XPe on page 2●About security pol

Page 33

Key features of the agentThe agent can be used in the following networking environments:●Directly connected to the local area network or wireless netw

Comments to this Manuals

No comments