Bipcp GSG36
Bipcp GSG36
BlackICE PC Protection
TM
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
iii
iv
Chapter 1
Overview
Introduction BlackICE PC Protection is a comprehensive personal computer (PC)
security solution that helps you protect your computer from:
How BlackICE BlackICE PC Protection protects your computer using these features:
works
Firewall Capabilities: BlackICE PC Protection provides powerful firewall
capabilities. The BlackICE PC Protection firewall inspects all inbound and
outbound traffic on your computer for suspicious activity. BlackICE
blocks unauthorized activity without affecting legitimate traffic.
1
Chapter 1: Setting Up BlackICE PC Protection
Topic Page
System Requirements 3
Uninstalling BlackICE 18
Getting Help 20
2
System Requirements
System Requirements
Introduction BlackICE PC Protection is designed for computers that run any supported
version of the Windows operating system.
BlackICE PC The following table lists the minimum system requirements for BlackICE
Protection system PC Protection:
requirements
Component Minimum Requirement
3
Chapter 1: Setting Up BlackICE PC Protection
License key You will need a valid license key to download a replacement copy of
BlackICE PC Protection. If you have misplaced the license key, contact
customer support at [email protected] to obtain a copy.
Include this information in your email:
Note: If you purchased the boxed product and did not send in your
registration card, please note that in the email.
4
Downloading BlackICE PC Protection
5
Chapter 1: Setting Up BlackICE PC Protection
Prerequisites Before you install BlackICE PC Protection you must do the following:
6
Installing BlackICE PC Protection
7
Chapter 1: Setting Up BlackICE PC Protection
8
Stopping BlackICE PC Protection
Note: Stopping BlackICE is not the same as removing it. For information
about removing BlackICE PC Protection, see “Uninstalling BlackICE” on
page 18.
9
Chapter 1: Setting Up BlackICE PC Protection
Stopping BlackICE To stop BlackICE from the Windows 2000 control panel:
from the control
panel (Windows 1. Click StartÆ SettingsÆ Control Panel.
2000)
2. Double-click Administrative Tools.
3. Double-click Services.
The Services window appears.
4. In the right pane, right-click BlackICE, and then select Stop.
BlackICE stops monitoring incoming traffic, and a red diagonal line
appears over the BlackICE icon.
5. In the right pane, right-click RapApp, and then select Stop.
BlackICE stops monitoring your system for unauthorized
applications and applications connecting to a network.
10
Stopping BlackICE PC Protection
5. In the right pane, right-click BlackICE, and then select ActionÆ Stop.
BlackICE stops monitoring incoming traffic, and a red diagonal line
appears over the BlackICE icon.
6. In the right pane, right-click RapApp, and then select ActionÆ Stop.
BlackICE stops monitoring your system for unauthorized
applications and applications connecting to a network.
11
Chapter 1: Setting Up BlackICE PC Protection
12
Restarting BlackICE PC Protection
Restarting BlackICE To restart BlackICE from the Windows 2000 control panel:
from the control
panel (Windows 1. Click StartÆ SettingsÆ Control Panel.
2000)
2. Double-click Administrative Tools.
3. Double-click Services.
The Services window appears.
4. In the right pane, right-click BlackICE, and then select Start.
BlackICE resumes monitoring incoming traffic and the red line
disappears from the BlackICE icon.
5. In the right pane, right-click RapApp, and then select Start.
BlackICE resumes monitoring your system for unauthorized
applications and outgoing transmissions
13
Chapter 1: Setting Up BlackICE PC Protection
Restarting BlackICE When you restart your computer, BlackICE automatically resumes
by restarting your monitoring your computer unless you have disabled Application
computer Protection.
14
Updating BlackICE PC Protection
Update notification You can find out when an update is available in one of two ways:
● BlackICE can automatically check the ISS Web site for both kinds of
updates at regular intervals. A small icon in the upper right corner of
the BlackICE window indicates that an update is available.
● You can manually instruct BlackICE to check for updates.
Checking for If your computer is always on and connected to a network, it's a good
updates idea to automatically check for software updates.
automatically
To check for updates automatically:
Downloading a To use a software update, you must download and install it.
software update
Note: If you have not chosen to have BlackICE check for software
updates automatically, use this procedure to check for an update
manually.
15
Chapter 1: Setting Up BlackICE PC Protection
Downloading a To use a security content update, you must download and install it.
Security Content
Update Note: If you have not chosen to have BlackICE check for security content
updates automatically, use this procedure to check for an update
manually.
16
Updating BlackICE PC Protection
17
Chapter 1: Setting Up BlackICE PC Protection
Unable to uninstall If you are unable to remove BlackICE PC Protection from your computer
using the Windows Add/Remove Programs utility, you can use the
biremove utility. The biremove.exe program deletes all the files in the
BlackICE directory.
Important: Use the biremove utility only if you are unable to remove
BlackICE PC Protection through the Windows Add/Remove utility.
18
Removing BlackICE PC Protection
19
Chapter 1: Setting Up BlackICE PC Protection
Getting Help
Introduction You can find detailed information about using BlackICE PC Protection by
using the online Help, downloading documents from ISS, or requesting
technical support.
From the Web site For the latest information about BlackICE PC Protection, go to http://
www.iss.net, and then click Products and ServicesÆ Home and Small
Office ProtectionÆ BlackICE. Here you can search the following online
resources:
20
Chapter 2
Overview
Introduction BlackICE PC Protection protects your computer from most types of
intrusions as soon as you install it. There are, however, many features of
BlackICE PC Protection you can customize. This chapter explains how to
customize BlackICE PC Protection.
Topic Page
21
Chapter 2: BlackICE PC Protection Basics
Protection levels Paranoid: BlackICE blocks all unsolicited inbound traffic. This setting is
very restrictive, but is useful if your system faces frequent or repeated
attacks. This setting may restrict some Web browsing and interactive
content. This setting is selected by default.
Nervous: BlackICE blocks all unsolicited inbound traffic except for some
interactive content on Web sites (such as streaming media and other
application-specific uses of the Internet). This setting is preferable if you
are experiencing frequent intrusions.
Trusting: All ports are open and unblocked and BlackICE allows all
inbound traffic. This setting is acceptable if you have a minimal threat of
intrusions.
22
Choosing a Protection Level
4. Do you want to be able to share files and printers with other users on
a network?
■ If yes, select Allow Internet File Sharing.
■ If no, clear Allow Internet File Sharing.
5. Do you want this computer to appear in the Network Neighborhood
window of other computers on a network?
■ If yes, select Allow NetBIOS Neighborhood.
■ If no, clear Allow NetBIOS Neighborhood.
6. Click Apply.
Customizing You can customize a protection level after you choose it. For more
protection levels information about customizing a protection level, see the Help or the
BlackICE PC Protection User Guide.
23
Chapter 2: BlackICE PC Protection Basics
Filter events You can configure BlackICE to display only those events that present a
certain level of risk to your system. For example, BlackICE determines
port scans from your ISP to be of only informational interest. You can
have BlackICE omit those events from the Events tab.
Freeze events Sometimes BlackICE records events so quickly that you can have trouble
keeping track of them as they appear on the Events tab. When this
happens, you can freeze the Events tab and respond to the events at your
convenience. Freezing the Events list only stops BlackICE from refreshing
the tab information, it does not stop the monitoring, detection, and
protection features of BlackICE PC Protection.
Note: Remember to unfreeze the application after you view the events so
that BlackICE can show any new attacks. When you restart the computer,
BlackICE resets itself to an unfrozen state.
24
Choosing the Information You Need
Clear events Even if you are filtering out low risk events, your events list can grow
very long. You can clear individual events from the Events tab, or you can
clear the whole events list.
Display relevant You can configure BlackICE to show only the information you are most
information interested in. For example, if you find that multiple attacks on your
computer use the same protocol, you can have BlackICE display the
Protocol column in the Events tab.
25
Chapter 2: BlackICE PC Protection Basics
26
Managing Notification Settings
27
Chapter 2: BlackICE PC Protection Basics
Caution: Do not block port scans from your own ISP. This can violate
your ISP term of service and you may be disconnected.
Block intruders You can block any intruder listed on your events list by adding the
intruder’s IP address to your firewall. After you block an intruder,
BlackICE blocks any traffic from that intruder’s IP address.
Ignore events To help reduce the amount of information BlackICE displays, you can
choose to ignore events that do not present a threat to your computer. For
example, your ISP may carry out routine port scans for its own
management purposes. If BlackICE displays many port scan events from
your ISP, you may want to configure BlackICE to ignore all events of this
type from this intruder.
Note: When you configure BlackICE to ignore events, BlackICE does not
log any information about those events.
28
Customizing Your Firewall
1. On the Events tab, right-click the event, and then select Ignore Event.
2. From the pop-up menu, select one of the following:
■ This Event: BlackICE ignores all future instances of the selected
event.
■ This Event by this Intruder: BlackICE ignores all future instances
of this event by this intruder.
3. Click Yes.
BlackICE adds the event to the list of ignored events on the Detection
tab in the BlackICE Settings window.
29
Chapter 2: BlackICE PC Protection Basics
Additional firewall BlackICE allows you to customize additional firewall settings, such as:
customization
● blocking a port
● blocking a specific IP address
● accepting a specific IP address
● accepting a specific port
● trusting a specific address
For more information about customizing these settings, see the BlackICE
PC Protection User Guide.
30
Setting Up Application Protection
Application BlackICE protects your computer from unknown applications and from
Protection applications connecting to a network, such as the Internet. First, BlackICE
creates a baseline record of the approved applications on your computer.
Then, it compares that baseline with any application that attempts to
launch or communicate with a network. If the application does not match
the baseline, BlackICE asks you if you want to stop the application or let it
continue.
Turning off To turn off Application Protection, click ToolsÆ Edit BlackICE Settings,
Application and select either the Application Control tab or the Communications
Protection Control tab. Then clear the Enable Protection check box.
Application control BlackICE PC Protection is initially configured to ask you what to do when
default setting it detects an unknown or a modified application trying to launch.
BlackICE also is configured to protect its own program files, so that
BlackICE configuration files cannot be altered without your
authorization.
31
Chapter 2: BlackICE PC Protection Basics
32
Setting Up Application Protection
33
Chapter 2: BlackICE PC Protection Basics
Mark Effect
34
Responding to BlackICE Alerts
Mark Effect
35
Chapter 2: BlackICE PC Protection Basics
36
Index
a BlackICE
controlling applications 2
controlling network access 1
accepting a specific IP 30
firewall capabilities 1
accessing the online Help 20
intrusion detection 1
alert
restarting 12
audible 27
stopping 9
visual 27
uninstalling 18
alert preference
BlackICE Help 20
setting 27
blocking
application control 2, 32
intruders 28
default setting 31
port 30
limitations 31
specific IP 30
application protection 31
application control 31
communication control 31
disabling 33 c
restarting 12 Cautious 22
stopping 9 changing
Attack Blocked overlay 34 protection level 23
Attack Possible overlay 35 wav file 27
Attack Status Unknown overlay 35 checking for updates 15
Attack Successful overlay 35 choosing
Attack Unsuccessful overlay 34 protection level 22
audible alert 27 clear events list 25
wav file 27 communications control 1, 32–33
automatically checking for updates 15 default setting 32
contacting support 4, 20
b controlling
applications 32
communications 33
baseline record
Critical event icon 34
creating a new record 31
customizing
installation prerequisites for 6
protection level 23
biremove utility 18
37
d i
default 33 icon
default setting Critical event 34
application control 31 Informational event 34
communications control 32 Serious event 34
protection level 22 Suspicious event 34
disabling ignoring events 29
application protection 33 Informational event icon 34
downloading 4 installation
downloading updates 15 default location 7
updating existing 15
installation instructions 6
e installation prerequisites 6
installing 6
events prerequisites 6
clear, list 25 intruders
filter, list 24 blocking 28
freeze list 24 intrusion
ignoring 29 severity levels 34
f l
FAQ 20 license key
filter events list 24 needed for installation 6
freeze events list 24 recording 18
frequently asked questions 20 replacing 4
limitations of application control 31
g
getting help 20 m
getting support 20 manually checking for updates 15
monitoring
h restarting 12
stopping 9
help 20
product documentation
technical support 20
20
n
with BlackICE 20 Nervous 22
38
o restarting BlackICE
by restarting your system 14
from the control panel 13
online resources
from the desktop 12
advICE library 20
help 20
knowledge base 20
product documentation 20 s
outbound communications 33 Serious event icon 34
overlay setting
Attack Blocked 34 alert preference 27
Attack Possible 35 severity levels 34
Attack Status Unknown 35 software updates 15
Attack Successful 35 specific IP
Attack Unsuccessful 34 blocking 30
trusting 30
r
restarting u
application protection 12 unable to uninstall 18
BlackICE 12 uninstalling
monitoring 12 biremove utility 18
BlackICE 18
39
updates 15
checking for automatically 15
checking for manually 15
downloading 15
updating
existing installation 15
updating an application 31
upgrade information 20
v
visual alert 27
w
wav file 27
40
END-USER SOFTWARE LICENSE AGREEMENT FOR INTERNET SECURITY SYSTEMS(TM)
BLACKICE(TM) SOFTWARE
(Intrusion Countermeasure Enhancements Products)
1. DEFINITIONS.
a. PRODUCT means all components of BlackICE PC Protection supplied by ISS including, but not
limited to, the License Key, computer software, online electronic documentation, HTML files, help
text, and PDF files, and may include associated media or printed materials.
b. LICENSE means the rights to use the PRODUCT on a single computer running one of the follow-
ing operating systems, Windows XP Home, Windows XP Pro, Windows 2000 Pro, Windows Me,
Windows NT 4.0 Workstation or Windows 98 as set forth in Section 2(b) below.
c. LICENSE KEY means a sequence of ASCII characters that uniquely identifies the Licensee and
is entered into the PRODUCT to define and enable the PRODUCT's features for a period of time.
d. EFFECTIVE DATE means the date that the PRODUCT was delivered to the Licensee, where the
delivery consists of a LICENSE KEY and WEB link (URL) from which the Licensee may download
the PRODUCT.
e. TERM means the period of time ISS grants the LICENSE to the Licensee under the terms and
conditions of this EUSLA and is defined by the Perpetual type LICENSE.
f. PERPETUAL LICENSE has an unlimited LICENSE TERM, unless the EUSLA has been termi-
nated earlier.
g. MAINTENANCE means the Licensee's right to receive product and security updates, patches,
product upgrades and technical support.
h. ANNUAL MAINTENANCE FEE means the fee paid by the Licensee to ISS for the right to receive
one (1) year of MAINTENANCE.
3. LICENSEE'S OBLIGATIONS.
Except as expressly and unambiguously provided herein and as conditions of the Licensee's
LICENSE hereunder, the Licensee represents, warrants and agrees:
a. Not to reverse assemble, de-compile, or otherwise attempt to derive source code (or the underly-
ing ideas, algorithms, structure or organization) from the PRODUCT or from any other information,
except and only to the extent that such activity is expressly permitted by applicable law notwith-
standing this limitation.
b. To keep all copies of the PRODUCT in the possession of the Licensee.
c. Not to sell, give, lend, give access to, or otherwise transfer the PRODUCT, or copies of the
PRODUCT to anyone that is not an employee or consultant of the Licensee, or to anyone that is not
bound to all of the terms and conditions of this EUSLA.
d. Not to use the PRODUCT for timesharing, outsourcing, hosting, or service bureau purposes or
otherwise allow others, or third parties benefit from the use of the PRODUCT.
e. Not to remove from any copies of the PRODUCT any product identification, copyright or other
notices.
f. Not to modify, incorporate into or with other software, or create a derivative work of any part of the
PRODUCT.
g. Not to disseminate performance information or analysis (including, without limitation, bench-
marks) from any source relating to the PRODUCT.
4. TERMINATION.
a. Without prejudice to any other rights, ISS may immediately terminate the LICENSE if the Lic-
ensee fails to comply with all of the terms and conditions of this EUSLA. In such an event, the Lic-
ensee must destroy all copies of the PRODUCT and all of its component parts.
b. All of the terms and conditions of this EUSLA shall survive termination with the exception of the
LICENSE as defined in Sections 1(b) and Sections 2(a) and 2(d). Termination is not an exclusive
remedy and all other remedies will be available to Licensor whether or not the LICENSE is termi-
nated.
5. GOVERNING LAW.
This EUSLA shall be deemed to have been made in, and shall be construed pursuant to the laws of
the State of Georgia and the United States, without regard to conflicts of laws provisions thereof.
This EUSLA will not be governed by the United Nations Convention on Contracts for the Interna-
tional Sale of Goods, the application of which is expressly excluded. The prevailing party in any
action to enforce this EUSLA shall be entitled to recover reasonable costs and expenses, including,
without limitation, reasonable attorneys' fees. If any part of this License is found void or unenforce-
able, it will not affect the validity of the balance of the License, which shall remain valid and enforce-
able according to its terms.
8. NO WARRANTIES.
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, ISS, ITS SUPPLIERS, DIS-
TRIBUTORS AND RESELLERS DISCLAIM ALL OTHER WARRANTIES, EITHER EXPRESS OR
IMPLIED, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS FOR A PARTICULAR PURPOSE, WITH REGARD TO THE PRODUCT.