In addition to its powerful anti-malware features, VirusBarrier X6 protects your Mac from network attacks and web threats using a number of powerful features. These features can be broken down into four groups:
These four defenses protect you against virtually every kind of attack possible, including Trojan horses, ping attacks, and port scans. Together with its malware protection, VirusBarrier X6 offers total network and malware protection for your Mac.
Launching VirusBarrier X6 brings you to the Overview screen, which you can always return to by clicking the Overview button in the middle of the top row of buttons. The screen is divided into columns: to the left of the central Orb are Malware Protection tools, and to the right are the Network Protection tools we'll discuss in this chapter. Malware protection is discussed in Protecting Your Mac from Viruses and Malware.
The Overview screen gives quick access to:
Central to the Overview screen are sections that control VirusBarrier X6's four lines of network defense. Controls for Firewall, Antivandal, Surf and Privacy protection appear as large buttons at the top right of the Overview screen; they are green when selected and black when unselected. Controls for monitoring are the smaller buttons in the bottom-right corner. In between those two groups are helpful indicators that lead you to relevant controls when clicked.
The Firewall section gives you access to rules that define which programs can send and receive information to and from your Mac. |
The Antivandal section gives you ways to stop certain types of network attacks and choose policies to determine how to handle attacks when they occur. |
The Surf section blocks certain types of information from being sent and received when you surf the Internet, protecting you from phishing attempts, ads, and cookies. It also lets you hide certain information your browser customarily transmits. |
|
The Privacy section gives you access to settings that prevent specific data from being sent over the Internet and local networks, and its Anti-Spyware tools protect you against programs that secretly connect to remote computers. |
You can access Monitoring functions through buttons in the bottom-right corner of the Overview screen. See Using VirusBarrier X6 Monitoring Tools for more on using these features.
VirusBarrier X6 lets you create different configurations, which are groups of settings for the program's various features. To see a list of configurations, click the small arrow button in the bottom-left corner of the Overview screen. (You can also toggle between showing and hiding the Configurations list by pressing Command-K or choosing View > Hide/Show Configurations.)
At first there is only one configuration, named according to the settings you chose in the Setup Assistant, when first launching the program, or "default" if you did not run the Setup Assistant. The radio button shows which configuration is currently active.
At the bottom of the Configurations list is an action button that let you duplicate, edit and remove configurations. For more information, see VirusBarrier X6 Preferences and Configurations.
At the very top of the screen is the NetUpdate Status Bar, which shows the dates of the latest VirusBarrier filters installed on your Mac, and the date of the latest filters available. VirusBarrier X6 uses Intego NetUpdate, installed with the program, to update filters and virus definitions as well as Intego programs themselves. It checks for updates automatically, and you can have it check immediately by clicking the Check Now... button in the upper-right corner. To hide the NetUpdate Status Bar, choose View > Hide NetUpdate Status Bar. For more on using NetUpdate, see the Intego Getting Started Manual.
The status of various VirusBarrier X6's network protection features appears as a stack of clickable indicators in the right column of the Overview screen.
The top indicator tells you which Firewall mode you've selected; clicking it leads you to a screen where you can change that setting. (The large Firewall button at the top of the screen leads to the same place.)
The first indicator of the middle group tells you whether Anti-Phishing protection is enabled. "Phishing" is a kind of attack where a cyber-criminal attempts to trick you into entering private information, such as financial data or a password, in order to gain access to personal data, such as that for e-mail accounts or even bank accounts. Clicking this button leads you to a screen where you can add sites that you trust, and should therefore be exempted from Anti-Phishing protection. (You can also reach this screen by clicking the large Surf button at the top of the screen, and then clicking the Anti-Phishing tab.)
The second indicator in that group tells you whether Web Threat Protection is enabled. Clicking this button leads you to a screen where you can add sites that you trust, and should therefore be exempted from Web Threat protection. (You can also reach this screen by clicking the large Surf button at the top of the screen, and then clicking the Web Threats tab.)
The bottom indicator in this group shows the number of addresses that have been blocked, that is, forbidden to communicate with your computer. These addresses are blocked either because VirusBarrier X6 found them to be malicious, or because you added them manually. Clicking this button leads you to a screen that shows you which addresses are blocked, and details about why they were blocked and how long they will continue to be blocked. (You can also reach this screen by clicking the large Antivandal button at the top of the screen, and then clicking the Blocked Addresses tab.)
The last indicator in the Network Protection column is the Network Traffic indicator, which updates in real time to show how much data is entering and leaving your computer. This indicator is not a button, so clicking it does nothing; for more details on your network traffic, click the Traffic monitoring button in the bottom-right corner of the screen.
VirusBarrier X6 includes a personal firewall, a powerful feature that filters all data packets entering or leaving your Mac through the Internet or a local TCP/IP network. It also protects you from Trojan horses by blocking the ports they use.
To view or change Firewall settings, click the Firewall button.
When you click the Firewall button, VirusBarrier X6 presents its Simple mode for controlling Firewall settings. There are five preset firewall settings that cover all the situations that you will encounter in normal use, each accompanied by an animation that graphically shows the effect of applying the setting. The screen closest to you represents your Mac; the globe represents the Internet; the screen halfway between the two represents the limit of your local network. Here the default setting, "Client, local server", shows how your computer can receive information from beyond the local network, but that computers beyond your local network cannot access your Mac.
The five standard firewall settings are:
These five settings are sufficient for most people. But if you want more control over access to your computer - if, for example, you're running a gaming party and want to forbid all traffic except for communications that are part of the game - then you need to switch to VirusBarrier X6's Advanced mode.
VirusBarrier X6 also offers an advanced firewall mode you can use to create your own rules to choose exactly which types of traffic you want to allow or block to and from your Mac. For more on using Advanced Mode, see Appendix: Creating Custom Firewall Rules.
Trojan horses are applications that are surreptitiously installed on your computer, either by attachments you receive with e-mail messages, or by programs you download from malicious web sites. In some cases, programs install a specific type of Trojan horse, known as spyware, which sends your personal information to a server. Since the connection is made from your computer, it is generally trusted.
VirusBarrier X6 knows how to spot the actions of the most common Trojan horses and stop them in their tracks. Some such programs send information about users' browsing habits to a central server; other Trojan horses open "back doors" in your computer that allow hackers to take control of it or steal files. In addition, VirusBarrier X6 recognizes the actions of Windows Trojan horses, so if you are running Windows in virtualization - with a program such as VMware Fusion or Parallels Desktop - and sharing your Mac's Internet connection in NAT mode, you'll be protected.
To see VirusBarrier X6's Trojan Horse controls, click the Trojan tab at the top of the Firewall screen.
To turn on Trojan horse protection, set the Trojan Horse Protection slider to On, then click the checkboxes of individual Trojans to select them. The Enable All and Disable All buttons at the bottom are handy shortcuts that select or deselect all checkboxes at once.
You can also enable Trojan blocking for an individual Trojan horse, or for all Trojan horses, by holding down the Control key on your keyboard and clicking on the name of a Trojan, and choosing the appropriate command from the contextual menu that displays.
VirusBarrier X6's Antivandal watches over data entering your Mac and filters it, looking for signs of intrusion. This filtering is transparent: the only time you'll see signs of it working is if it detects suspicious data, in which case an alert displays. Otherwise, Antivandal silently monitors your Mac's network activity at all times.
To go to the Antivandal screen, click the Antivandal button.
The Antivandal Policy tab controls how data entering your computer is filtered. The Blocked Addresses and Trusted Addresses tabs store specific hosts, or IP addresses, that you deem suspicious or trustworthy.
The Antivandal Policy panel provides tools to prevent six types of intrusions.
Clicking the checkbox next to each of these enables or disables protection for that intrusion type. Clicking on the name of the intrusion type shows the notification and action policies for that intrusion type. Here, for example, we see the policy for Buffer Overflow Attacks.
These options are described later in this chapter, in Understanding Alerts.
While an intrusion type is selected, clicking the Advanced tab in the right-side pane brings up additional options that are specific to that intrusion type. These are:
Click the Options button in the bottom-left corner of the Antivandal Policy screen to adjust additional Filtering settings.
The options appear in the pane to the right.
The second part of this screen allows you to be notified by e-mail when an attack is detected. See later in this chapter, Understanding Alerts, for more information.
Each type of intrusion has settings that determine how you're alerted and what actions are taken when that type of intrusion is detected.
The "Use same policy for all types of protection" checkbox unifies all notifications and actions. With this box unchecked, you could, for example, choose to receive an e-mail when a buffer overflow attack is detected, but only see an alert box when an intrusion attempt occurs. Checking the box tells VirusBarrier X6 that you want to get the same sort of response no matter what type of intrusion occurs.
When you activate this option, you'll see a dialog box that asks which settings should become the model that other intrusion types will follow.
The Blocked Addresses list ensures that once an attempted attack or intrusion has been foiled, communication between the attacking machine and your Mac won't occur for a period of time that you define.
The Trusted Addresses list is the opposite of the Blocked Addresses list: it lists "friendly" computers that are allowed to connect to your Mac. While the Blocked Addresses list protects you from foes, the Trusted Addresses list opens the door to your friends. VirusBarrier X6's Antivandal tool will not block access to computers listed in the Trusted Addresses list, nor will it set off alerts for any actions they carry out. However, computers in the Trusted Addresses list will still be affected by all active Firewall rules.
The interface for the Trusted Addresses window is essentially the same as for the Blocked Addresses window, so we'll examine them both at the same time, pointing out differences as necessary. Here's the Blocked Addresses window.
The panel on the left displays information about the various IP addresses that are currently in the Blocked Addresses list or Trusted Addresses list, if any.
Clicking an item in the Blocked/Trusted Address lists shows some additional information on the right side of the panel. Double-clicking the item opens a new window with the same information.
In various places throughout VirusBarrier X6's interface you'll see a question mark in a dark circle. Clicking it toggles nearby information from a numerical IP address to its associated domain name and back again.
Be aware that IP addresses do not always have a one-to-one relationship to domain names. For example, a large domain might have www.example.com hosted on one IP address, forums.example.com hosted on another, and blog.example.com hosted on another.
Meanwhile, small domains often share one IP address with others, all hosted as "virtual domains" on a single computer. In such cases a domain lookup gives an IP address that actually leads to the larger, unexpected machine name, for example apache2-vat.market.example.com.
As a result, entering an IP address could block (or allow) traffic from unintended domains, while entering a domain might not block (or allow) all desired traffic. This is the nature of the Internet domain structure, and isn't an error of VirusBarrier X6. If you have problems with unexpectedly blocked or permitted traffic, try using a domain name instead of an IP address, or vice-versa.
There are two ways to manually add addresses to the Blocked Addresses list or Trusted Addresses list. (VirusBarrier X6 can also add addresses automatically to the Blocked Addresses list in response to Alerts. For more details, see later in this chapter, Understanding Alerts.)
The first way to add an address to the Blocked Addresses list or Trusted Addresses list is by selecting an IP address in the Log window and choosing Add to Blocked Addresses or Add to Trusted Addresses from the contextual menu. For more on this, see Using VirusBarrier X6 Monitoring Tools.
You can also manually add addresses to the Blocked/Trusted Addresses list by clicking the + button at the bottom of the list. A window appears.
Enter an IP address in the Host field, and select the time this address is to remain in the Blocked Addresses list or Trusted Addresses list by entering a number in the Duration field. Then, select a time unit from the popup menu. If you do not know the numerical IP address of the host you wish to add, enter its name and click the ? button. VirusBarrier X6 queries your Internet provider's DNS server and enters the correct number in the field. You can also add comments, such as the reason for adding the address, in the Note field. If you decide you do not wish to add this address to the Blocked Addresses list or Trusted Addresses list, click Cancel.
You can use wildcards to indicate ranges of IP addresses in the Blocked Addresses list or Trusted Addresses list. To do so, enter the first part of the IP address you wish to block, followed by asterisks, For example, 192.168.1.* will block all IP addresses from 192.168.1.0 to 192.168.1.255 inclusive; 192.168.*.* will block IP addresses from 192.168.[0-255].[0-255]; and so on.
To remove an address from the Blocked Addresses or Trusted Addresses list, click the address you want to remove, then click the - button.
Another way to remove an address is by clicking it while holding down the Control key on your keyboard, then selecting Remove... from the resulting contextual menu. From this contextual menu, you can also move an address from the Blocked Addresses list to the Trusted Addresses list, or vice-versa.
There are three ways to edit an address in the Blocked Addresses or Trusted Addresses list:
The Blocked/Trusted Addresses Editor window appears. You can change the address, add or change comments, or change the amount of time you want the item to remain on the Blocked/Trusted Addresses list.
There is one option available in the Trusted Addresses list that is not present in the Blocked Addresses list: Trust AppleTV. The AppleTV is a device made by Apple that serves as a set-top portal to movie and TV show rentals from the iTunes Store, and that can also stream music and videos from an iTunes library on any Mac or PC. The AppleTV has a particular way of acting on the network, and in some cases VirusBarrier X6 would see this as a threat because of the way it polls computers. Checking Trust AppleTV on the Trusted Addresses list ensures that VirusBarrier X6 does not see your AppleTV as hostile.
Note: if you have trusted IP addresses on your local network, by adding 192.168.1.* to the Trusted Addresses list, and the AppleTV is on the same network, you won't need to check this option.
As you have seen above, you can click an item in the Blocked/Trusted Addresses list while pressing the Control key on your keyboard to raise a contextual menu. There are four functions in this menu that have not yet been discussed: Copy to Clipboard, Find Domain Info, Find Route, and Show in Google Earth.
VirusBarrier X6 provides protection against phishing, web threats (threats that arise from booby-trapped web pages), as well as providing three filters that help you control the information your Mac sends and receives while surfing the Internet.
To see VirusBarrier X6's Surf settings, click the Surf button.
VirusBarrier X6's Anti-Phishing protection keeps you safe from phishing (attempts to trick you into entering personal information on bogus web sites that impersonate real sites). VirusBarrier X6 blocks such sites, protecting you from this type of scam. Nevertheless, you should never click a link in an unsolicited e-mail message if you have doubts about its veracity.
To activate VirusBarrier X6's Anti-Phishing protection, move the Fraudulent website protection slider to ON. You can manually add sites that you always want to trust by clicking the + button at the bottom of the window, then typing the URL of a site you trust. The only reason you might want to do this is if certain sites are incorrectly flagged as being phishing sites.
VirusBarrier X6 offers protection from web threats, such as cross-site scripting attacks, drive-by downloads, clickjacking, as well as web pages with malicious JavaScript or malicious Java applets.
To activate VirusBarrier X6's Web Threat protection, move the Web threats protection slider to ON. You can manually add sites that you always want to trust by clicking the + button at the bottom of the window, then typing the URL of a site you trust. The only reason you might want to do this is if certain sites are incorrectly flagged as being malicious.
Three other Surf filters help you choose what type of information you want to send about your Mac to web servers, and help keep your surfing ad-free:
Surf filters affect all computer programs that communicate using the HTTP protocol. Web browsers are the most common programs using HTTP, but it's also part of iTunes, RSS newsreaders, and a lot of other software that has Internet browsing capabilities. If you have unexpected difficulties with such programs - downloading music through iTunes, or accessing specific RSS feeds, for example - try disabling the surf filters temporarily.
The Ad Banner Filter is a list of rules that VirusBarrier X6 uses to filter unwanted web material such as graphic ads known as "ad banners," helping you surf much faster and with less distraction. VirusBarrier X6 blocks these ads, and replaces them with tiny, transparent graphics. VirusBarrier X6 contains an internal list of ad banner strings to filter, but you can also add custom strings to filter more ads you encounter when surfing.
Click the Ad Banner Filter tab to view the filter window. Here it is, populated with sample data:
To enable the Ad Banner filter, move the Banner advertisement filter slider to ON.
The Ad Banner filter already contains a set of rules, which is kept up-to-date when you update your VirusBarrier X6 Filters but you can easily add your own. To add rules to the Ad Banner filter, click the + button. A new line is added to the ad banner list for you to edit.
The list contains four columns: a checkbox, URL Component, Comparator and Pattern. The pattern, obviously, is how you define what you want blocked.
The URL Component popup menu has three options. VirusBarrier X6 searches each ad banner filter in the selected element:
The Comparator popup menu lets you choose whether content should be blocked based on an exact match ("is") or when your text matches at least a portion of the URL ("contains").
Each ad banner rule appears on a line in the Ad Banner window. A checkbox at the left of each line allows you to activate or deactivate the filter for each ad banner rule. When you add a new ad banner rule, the box is checked, indicating that the filter is active for this rule. To stop blocking certain ad banners, uncheck the checkboxes for the ad banners in question.
You can also enable ad banner blocking for an individual ad banner rule, or for all ad banner rules, by holding down the Control key on your keyboard and clicking the name of an ad banner rule. A contextual menu displays.
Select DisPatternable to disable protection for the selected ad banner rule, or select Disable All to disable protection for all ad banner rules. (If the Rule was already disabled, the Enable and Enable All choices would be available.)
To remove ad banner rules, either choose the Remove option in the contextual menu or click the - button below the list of ad banner rules.
Note that the Ad Banner filter doesn't know what content it's filtering, only that the URL matches the criteria you specified. Therefore, you might occasionally have difficulty seeing information on Web pages that coincidentally match your criteria, but aren't actually ad banners. If this is the case, try turning off the Ad Banner filter temporarily. You can do this from the VirusBarrier X6 application, or from the Intego menu in your menubar.
VirusBarrier X6 includes a Cookie Filter, which prevents your Mac from sending tracking information, called "cookies," to all web sites except for those you specify.
The Cookie Filter is useful when you want to surf in extreme privacy, only telling a few, trusted sites about your actions. However, many Web sites - particularly those that require a password - won't work correctly unless you specifically include them in the list of trusted sites.
To turn on the Cookie Filter, click the Cookie Filter tab and move the Cookie Filter slider to ON.
You'll see a warning that certain sites won't function properly unless you add them to the Trusted Sites list. Click OK to continue.
To add a server to the Cookies Filter list, click the + button at the bottom of the list. A dummy server address (www.example.com) displays: change it to the site of your choice.
Erase the dummy server address and enter the name of the server you want to allow cookies to be sent to. You can also drag a URL from a browser, or even a URL in text format, to this field to add it to the list.
As with the Ad Banner filter, you can enable or disable individual servers by clicking the checkboxes next to them, or by holding down the Control key while clicking on them and using the contextual menu, or clicking with your right mouse button.
VirusBarrier X6 can also count the number of cookies for all users on your Mac, if you check the Count the cookies received checkbox at the bottom of the cookies filter screen. A display tells you how many cookies your Mac has accepted since you first installed VirusBarrier X6, or last reset the counter. At any time you can reset the counter to zero by clicking the small arrow to the right.
All Web browsers reply to requests from web sites, telling which platform you are using (Mac, Windows, Linux, etc.) and which browser and version you are using. This information can help the site deliver information in the best way, for example by turning on features that only work for the Web browser that you're using. On the other hand, some sites limit access by platform and browser, in some cases forbidding access to everybody using a Mac. VirusBarrier X6 can hide some information concerning your computer, possibly permitting access where it would otherwise be denied.
To see and change Information Hiding settings, click the Information Hiding tab.
Check the Hide information about my computer and web browser checkbox to reply to such web site requests by sending only generic information. For example, your computer will reply to the web site that you're using a Mozilla browser, but with no version number or platform.
Some sites also keep track of the last site you visited. Again, this can improve your web experience if, for example, a shopping site offers you discounts if you come from a specific Web site. But unscrupulous sites might use this feature to follow your browsing habits in ways you don't want. By checking the Hide information about the last web site visited checkbox, VirusBarrier X6 prevents your Mac from replying to this type of request.
VirusBarrier X6's privacy protectors examine both incoming and outgoing data packets, looking for specific types of data and helping protect your privacy. To see and change your Privacy settings, click the Privacy button.
VirusBarrier X6 lets you control access from your Mac to the Internet and local networks by individual applications. While your firewall settings may allow general network access, the Anti-Spyware tab lets you choose how VirusBarrier X6 reacts when specific applications try to access the network. This helps you in two ways:
Your Mac has many applications that access the Internet or other networks, including web browsers, e-mail programs, FTP (file transfer) programs and instant messaging applications. But there may also be programs that connect to the network without telling you, in order to verify the serial numbers of software installed on your computer, collect and send personal information without your awareness, or open a backdoor on your Mac to provide access to hackers or vandals. VirusBarrier X6 notifies you of such attempts and allows you to decide whether to allow them.
To turn on the Anti-Spyware feature, move the Spyware protection slider to ON.
Anti-Spyware works by first asking you to make a list of applications for which you want to apply settings. These are known as "defined" applications, while all those that aren't on the list are "undefined". In the following example, Safari is defined, while the Firefox web browser (which isn't on the list) is undefined.
Once you've built this list, you can finely control communications from defined applications and set a general policy for communications from undefined applications. Two typical configurations would be:
Four behavior options are available for undefined applications:
The Options button in the lower-left corner of the Anti-Spyware pane allows you to configure some general Anti-Spyware settings.
The one option that's special to Anti-Spyware is Trust System Processes, which allows communications from the many parts of Mac OS X itself that request Internet or network access. Such requests might relate to printing services, domain name resolution, checks for software updates or clock synchronization. These are requests that come from parts of Mac OS X, not separate applications. To trust these processes, and not be asked when they attempt to connect to the Internet or network, check the Trust System Processes checkbox.
The other options relate to alerts and feedback when connections are blocked. Choose those that suit the way you want to be alerted to unauthorized or blocked connections. For more about these options, see Understanding Alerts later in this manual.
After you have chosen to allow or deny network access to undefined applications, define an application by clicking the + button, then navigating through the Mac OS X dialog box to the application itself to add it. (You can also add applications by dragging their icons from the Finder.) Repeat the process for all the applications you wish to add. To remove an application from the list, click it and then click the - button at the bottom of the application list.
You can then change the settings for each application to allow or block communications from the application as a whole, or over specific ports. Similar to the process above, where you specify what should happen when undefined applications attempt outgoing communications, here you define what you'd like to happen when a specific application attempts communication from an undefined port. Then you define a list of ports for that specific application that are exceptions to the general rule.
In the above example:
This list of ports contains three columns:
To view an application on the Applications list in the Finder, hold down the Control key on your keyboard and click on the name of an application. A contextual menu appears. Select Show in Finder, and a Finder window opens revealing the location of the application. This helps you find applications that were added following alerts or time-outs.
Note: one way to use the Anti-Spyware feature of VirusBarrier X6 is to turn it on and have the program ask you whether to allow applications to connect to the Internet. Each time this happens - only once per application, and per port - you'll add the applications you want to allow, and slowly build up your list. By doing this, however, you'll see just how many applications connect to remote servers. Bear in mind that, for many applications, these connections are merely to check for updates, as many programs have built-in update features. VirusBarrier X6 has no way of knowing what type of information is being sent or requested.
The Data Vault ensures that any sensitive information you choose to protect cannot leave your Mac and go onto a network. You decide what to protect - your credit card number, passwords, or key words that appear in sensitive documents - and VirusBarrier X6's data filter checks each outgoing packet to make sure that no documents containing this information are sent. Not only does this protect you from accidentally sending documents containing this information, but it also protects against anyone who has network access to your Mac from taking copies of them.
To reach the Data Vault pane, click the Privacy button then click the Data Vault tab.
VirusBarrier X6 examines all data packets that are sent from your computer to the Internet or a local network. If any of the data you indicated in the filter is found, the packet is blocked.
The Data Vault only blocks data that corresponds exactly to the text you indicated, including punctuation and case. For example, if you entered your credit card number as protected data, VirusBarrier X6 prevents it from leaving your computer and can warn you in several ways if you choose. But if you enter the same number in a secure web page, your browser encrypts this number. The data therefore no longer corresponds to the protected data, and is sent. The same is true for data that is encoded in other manners, or compressed.
In extremely rare instances, the Data Vault stops data that matches your criteria but not your intention. For example, graphic files (such as images on web sites) are essentially just strings of data thousands of characters long. It's possible that a graphic file could coincidentally contain a piece of data you want protected, and would therefore be blocked by the Data Vault. (If you decided to block the name "Jodie", for example, a graphic file containing the string "Cg34gb$sEbOJodie8%" would be stopped.) If you find yourself unable to send or receive a specific piece of information, try turning off the Data Vault momentarily, then turn it on after the information has been transferred.
Move the Data protection slider in the upper-left corner to ON to enable the Data Vault. You can turn it off at any time, for example to temporarily allow your protected data to be sent. You can also turn it off through the Intego menu in your menubar.
The Data Vault includes labels for the six most common types of sensitive information:
However, these labels are merely for convenience. VirusBarrier itself doesn't treat these types differently from one another, or differently from any additional types you might decide to enter later - for example, "Wall-safe combination," "Children's names" or "Passwords."
To add data to the Data Vault, click the + button below the Options icon. A new entry named "untitled data" appears in the filter list.
Enter a description for your protected data in the Label field, or choose it from the popup menu: you'll notice that it is echoed in the vault list. Then enter the actual data you wish to protect in the Protected Data field. This text is hidden so nobody watching over your shoulder or who later has access to your Mac can see it. You must enter the data a second time in the Verify field. If the Protected Data and Verify fields do not match, a window displays, giving you the choice of either resetting the protected data, in which case you will have to retype both data fields, or clicking OK. If you click OK, you will have to retype the verified protected data.
You must enter your text exactly as it will be found in your documents for the filter to protect it. For example, a credit card number may be found as ####-####-####-#### or as #### #### #### ####. If you protect only the first example, the filter does not look for the second one. Also, this data is case sensitive. If you need to protect a key word, such as a project name, you must enter it in all possible cases that you may use: i.e., Marketing Study, marketing study, MARKETING STUDY.
The Trusted Services section allows you to choose to block data for all but the selected services. To do this, click the + button below the Trusted Services list. Then, type the port number of the service. Alternately, click the + sign and hold the mouse button down for a few seconds: you'll be able to choose from a popup list of common services. (Some of them, such as Mail in the example below, add several ports in one go.) You can add a single port number, or a range of port numbers, for example 110-123. Data to this port (or these ports) will not be blocked. To add another service, repeat the above operation. You can add as many services as you wish.
You can also drag and drop services from the Services Library. This is particularly helpful if you do not know the specific port numbers you wish to add to the list. To display the Services Library, choose Window > Services Library, or press Option-Command-6. Select the desired service, then drag it onto the Trusted Services list.
You can add certain personal information from your card in Apple's Address Book, if you have filled one out. To do this, click and hold the + button below the Data Vault list in the left column, and you'll see items divided into three groups: My Name, My Phone Number and My E-mail Address. Select one of these to add it as protected data.
Once you have finished entering this information, your data is protected. You can go back at any time to edit the data item by clicking on it in the Data Vault list and changing information in its pane to the right.
Each item of protected data appears on a line in the Data Vault window. A checkbox at the left of each line allows you to activate or deactivate the filter for each data item. When you add a new data item, the box is checked, indicating that the filter is active for this item. If you wish to send that data over the Internet or a local network, you must uncheck the checkbox for the item in question, or deactivate all the Data Vaults by moving the Data protection slider to OFF as mentioned earlier.
You can also activate or deactivate Data Filters for individual protected data items, or for all protected data items, by holding down the Control key on your keyboard and clicking the name of a data item, or by clicking with your right mouse button. A contextual menu displays.
Select Disable to disable protection for the selected data item, or select Disable All to disable protection for all data items. (If the selected item in the above example had been disabled already, the choices for Enable and Enable All would be available.)
If you'd like to permanently remove the item from the Data Vault list, either Control-click as described above and choose Remove..., or select the data item and click the - button. In either case, a dialog box asks you to confirm that you really want to remove the data item.
When protected data attempts to enter or leave your Mac, you have several options as to how you're notified, and what to do about future attempts. To see these options, click the Options button in the lower-left of the data screen. Changes to Data Vault options affect all Data Vaults.
To understand these options, see the next section, Understanding Alerts.
VirusBarrier X6 constantly monitors your computer's network activity to both the Internet and local networks, and will look out for specific types of data that indicate an intrusion or attack. If any suspicious data is found, VirusBarrier X6 displays an alert, asking you whether you wish to allow the data to be sent or deny it. Just like the malware alerts explained in Protecting Your Mac from Viruses and Malware, VirusBarrier X6 displays alerts when certain network events occur.
Network alerts are displayed when certain network events occur. This includes when Trojan horses are spotted, when protected data is being sent from your Mac, when the Anti-Spyware feature detects an undefined application attempting to connect to the Internet, when the firewall blocks data and more.
Settings for these alerts appear in several places throughout VirusBarrier X6, as is described in relevant sections of this manual. To understand these settings better, we'll look at them as they appear in the Antivandal Policy section.
If you've requested e-mail notification, you must configure your e-mail settings to receive any alert notifications by e-mail. In the Policy section, you do that by clicking Options, then clicking the Configure... button.
You must enter e-mail addresses for the Sender and Recipient(s), as well as the Outgoing Mail Server. Further, you'll need to enter a username and password that your mail server will accept. E-mail messages can be sent to multiple recipients. To add a recipient, click the + button. To remove a recipient, click the - button.
The following is an example of an alert when the Put in Blocked Addresses radio button is selected and the Show Bezel Window checkbox is enabled.
As you can see, you're given no options, only a notification. If the Show Bezel Window checkbox had been disabled, you'd have seen nothing, and VirusBarrier X6 would have silently added the IP address to the Stop List.
Here's an example of an alert when the Ask radio button is on, and the Bring dialog to the front checkbox is enabled.
The top line shows the reason for the alert. The host is given as an IP address, but you could find out its associated domain name (if any) by clicking the "?" icon. We've already clicked the disclosure triangle to show Details, which gives further information.
Two buttons allow you to decide what action to take for this alert.
Here's an example of an alert that occurred when an application attempted to reach the Internet in violation of Anti-Spyware rules.
Finally, here's the type of alert you'll see when VirusBarrier X6 thwarts a phishing attempt. You have the option of blocking the site or ignoring it and visiting the site; do the latter at your own risk.
© 2011 Intego. All Rights Reserved.