Zaclient65 User Manual
Zaclient65 User Manual
Zaclient65 User Manual
version 6.5
Smarter Security TM
© 2006 Zone Labs, LLC. All rights reserved.
© 2006 Check Point Software Technologies Ltd. All rights reserved.
Check Point, Application Intelligence, Check Point Express, the Check Point logo, AlertAdvisor,
ClusterXL, Cooperative Enforcement, ConnectControl, Connectra, CoSa, Cooperative Security
Alliance, FireWall-1, FireWall-1 GX, FireWall-1 SecureServer, FloodGate-1, Hacker ID, IMsecure,
INSPECT, INSPECT XL, Integrity, InterSpect, IQ Engine, Open Security Extension, OPSEC, Policy
Lifecycle Management, Provider-1, Safe@Home, Safe@Office, SecureClient, SecureKnowledge,
SecurePlatform, SecurRemote, SecurServer, SecureUpdate, SecureXL, SiteManager-1,
SmartCenter, SmartCenter Pro, Smarter Security, SmartDashboard, SmartDefense, SmartLSM,
SmartMap, SmartUpdate, SmartView, SmartView Monitor, SmartView Reporter, SmartView Status,
SmartViewTracker, SofaWare, SSL Network Extender, TrueVector, UAM, User-to-Address Mapping,
UserAuthority, VPN-1, VPN-1 Accelerator Card, VPN-1 Edge, VPN-1 Pro, VPN-1 SecureClient,
VPN-1 SecuRemote, VPN-1 SecureServer, VPN-1 VSX, Web Intelligence, ZoneAlarm, Zone Alarm
Pro, Zone Labs, and the Zone Labs logo, are trademarks or registered trademarks of Check Point
Software Technologies Ltd. or its affiliates. All other product names mentioned herein are
trademarks or registered trademarks of their respective owners. The products described in this
document are protected by U.S. Patent No. 5,606,668, 5,835,726 and 6,496,935 and may be
protected by other U.S. Patents, foreign patents, or pending applications.
ZLD -0422-0650-2006-0601
Contents
Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
Understanding Zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Zones manage firewall security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Zones provide program control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Responding to alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
Configuring Zone Labs security software for VPN traffic . . . . . . . . . . . . . . . . . . . 234
VPN auto-configuration and expert rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
Automatic VPN detection delay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
Making your computer visible on your local network . . . . . . . . . . . . . . . . . . . . . 236
Sharing files and printers across a local network . . . . . . . . . . . . . . . . . . . . . . . . 236
Resolving a slow start up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
IM Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
IM programs not appearing in status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
Anti-virus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
Anti-virus feature installation problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
Anti-virus Monitoring alert . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
Resolving conflicts with anti-virus products . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
E-mail scanning or IM Security is unavailable . . . . . . . . . . . . . . . . . . . . . . . . . 243
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
Table 4-3: Default access permissions for incoming and outgoing traffic types 50
Conventions
This guide uses the following formatting and graphics conventions.
Convention Description
Bold Used for user interface elements such as panels, tabs, fields, but-
tons, and menu options.
Italic Used for file names and paths.
Topics:
1
Chapter 1: Installation and setup System requirements and supported software
The ideal resolution for Zone Labs security software is 1024 x 768 or higher.
Some software screens might not display properly at resolutions of 800 x 600 or
lower.
Supported IM clients
! MSN 7.5.0299, 7.5.0324
! Windows Messenger 4.7.3001, 5.0.468, 5.1.0701
! Yahoo! IM 5.6.0.1351, 6.0.0.1643 - 6.0.0.1922, 7.0.0.xxx
! Yahoo! Japan IM 6.0.0.1703
Japan Yahoo IM does not support non-Japanese Yahoo's ID. Also, Japan IM uses
a different process: YPagerJ.exe
If you have a previous version of Zone Labs security software installed, you may
receive a security warning during installation. Click OK to dismiss these warnings
before proceeding with installation.
Installing ZoneAlarm
Before you can begin the installation process, you must download ZoneAlarm from the
Zone Labs Web site, then browse to the location on your computer where you saved the
installation file.
1. Double-click the installation file you downloaded.
The installation program begins.
2. Either specify a location for the installation files, or click Next to continue.
The default location is C:Program FilesZone LabsZoneAlarm.
3. Type your name, company (optional), and e-mail address, then click Next.
4. Read and accept the license agreement, then click Install.
The installation program runs.
7. Select either the ZoneAlarm Pro trial or free ZoneAlarm, then click Next
When installing ZoneAlarm, you have the option to install a trial version of ZoneAlarm
Pro, free for 15 days. During the trial period you will experience the advanced security
protection available in ZoneAlarm Pro. At the end of the trial period, you can continue
to use these advanced features by purchasing ZoneAlarm Pro, or you can revert to
ZoneAlarm. When reverting to ZoneAlarm after the ZoneAlarm Pro trial, any custom
settings you have created in ZoneAlarm Pro will be discarded.
the Zone Labs Web site, browse to the location on your computer where you saved the
installation file.
If you click Cancel, remember to restart your computer later to complete the
installation process.
Even with the “Alert me before I make contact” preference selected in the
Overview|Preferences tab, you will not be alerted before sending configuration
data to Zone Labs.
The data collected is completely anonymous and is for Zone Labs internal use only and
will not be shared with others. Of the millions of Zone Labs security software users,
only a small percentage of users will have their information collected. The frequency of
data transmission depends upon the configuration of your computer. For most users,
data will be sent once per day.
To send configuration data to Zone Labs, select Yes, automatically and anonymously
share my settings in the Configuration Wizard.
If you later decide that you do not want to send anonymous data, select
Overview|Preferences, in the Contact with Zone Labs area, then clear the Share
my settings anonymously... check box.
If you are upgrading, there is no need to uninstall your existing version. For more
information, see “Installing Zone Labs security software” on page 4.
Topics:
11
Chapter 2: Zone Labs security software basics Tour of the Zone Labs security software Control Center
Help
Menu bar
The menu bar provides access to the available panels. The tools in each panel are
arranged in two or more tabs.
Tab selectors
Click a tab selector to bring the tab you want to see to the top.
With the exception of the Overview panel, each panel in the Control Center has a Main
tab and one or two other tabs. The Main tab contains the global controls for that panel.
Show /Hide Text
Click this link to show or hide instructional text for the selected tab. The text gives a
brief explanation of the tab and its controls.
Help button
To get help with the controls on any panel, click the Help link in the upper-right corner.
Zone Labs security software’s online help system goes immediately to the help topic for
the selected tab.
Some applications access network resources in the background, so you may see
network traffic occurring even when you aren’t actively accessing the Internet.
Stop button
Click the Stop button to immediately block all network activity including Internet
access. Clicking the Stop button on the dashboard instantly closes your computer to
incoming and outgoing Internet traffic. Therefore, you should click the Stop button
only if you believe your computer is under attack, otherwise, Zone Labs security
software may block legitimate programs that require access, as well as DHCP (Dynamic
Host Configuration Protocol) messages or ISP heartbeat messages used to maintain your
Internet connection. To re-open access, click the Stop button again.
Internet Lock
The Internet Lock stops all traffic except traffic initiated by programs to which you have
given pass-lock permission. Clicking the Internet Lock instantly blocks DHCP messages
or ISP heartbeats used to maintain your Internet connection. As a result, you may lose
your Internet connection. To reopen access, click the Lock button again.
You also can activate the Stop button and Internet Lock by right-clicking on the
system tray icon and choosing either Stop all Internet activity or Engage Internet
Lock from the shortcut menu.
Networks indicator
The networks indicator shows you when you have wired or wireless networks in either
the Trusted Zone or Internet Zone.
Click the network symbol to go immediately to the Zones tab, where the settings for the
network are stored.
Active Programs area
The active programs area displays the icons of programs that are currently open and
that have accessed the Internet in your current session. To see information about a
program displayed here, hover your mouse pointer over the icon.
The icon blinks when the program is sending or receiving data.
A hand symbol under the icon indicates that the program is active as server and is
listening for connection requests.
System area
This area can display two messages.
! All Systems Active
Indicates that Zone Labs security software is functioning normally.
! Error Please Reboot
Indicates that you are not protected by Zone Labs security software because the
underlying security process is not running. Restart your computer to allow Zone Labs
security software to reset.
Icon Description
(Red lock) The Stop button is engaged. You may also begin to see a lot of
alerts.
Shortcut menu
Right-click any of the system tray icons to access a shortcut menu.
Engage Internet Lock
This menu option engages the Internet Lock and displays the yellow lock icon in the
system tray. All Internet traffic initiated by programs without pass-lock permission is
blocked. Provides the same function as clicking on the Internet Lock in the dashboard.
Stop All Internet Traffic
This menu option engages the Stop button and displays the red lock icon in the system
tray. All Internet traffic is blocked. Provides the same function as clicking on the Stop
button in the dashboard.
Game Mode / Stop Game Mode
The Game Mode option brings up the dialog that controls Game Mode. When
activated, Game Mode causes Zone Labs security software to suppress updates, scans,
and most alerts. Depending on your settings, Zone Labs security software will either
deny or allow most program and network permission requests while Game Mode is
active. You can use the Stop Game Mode option, which appears only while Game Mode
is active, to turn Game Mode off. For details about this feature, see “Game Mode,” on
page 162.
Help
Displays help files.
View Scan
Displays the Scanning Status dialog box, which tracks the progress of spyware and virus
scans. This menu option is available only during such scans.
About
Displays version information for the Zone Labs security software you have installed,
including driver and engine information. If you are experiencing problems with your
software you can copy this information to the clipboard and paste it into an e-mail to
support.
Restore ...Control Center
Restores the Zone Labs security software Control Center to its full size. The label for
this menu option reflects the version of Zone Labs security software you have installed
(for example Zone Labs Anti-virus or ZoneAlarm Security Suite).
Shutdown...
Closes the Zone Labs security software application. The label for this menu option
reflects the version of the Zone Labs security software you have installed (for example,
Zone Labs Anti-virus or ZoneAlarm Security Suite).
Outbound Protection
Indicates whether program control is configured safely and displays the number of
program alerts that have occurred since the last reset. Zone Labs security software will
warn you if program control is disabled.
Anti-virus Protection
Indicates whether your computer is protected against viruses and displays the number
of viruses that have been treated to date. The Anti-virus Protection status only appears
in ZoneAlarm Anti-virus and ZoneAlarm Security Suite. If you are using ZoneAlarm or
ZoneAlarm Pro, you will see Anti-virus Monitoring status instead.
E-mail Protection area
Indicates whether MailSafe is enabled and displays the number of attachments that have
been quarantined since the last reset. If a warning is displayed, click the underlined
warning text to go immediately to the panel where you can adjust your settings.
Anti-virus / Anti-spyware
Indicates whether virus and spyware protection is enabled and displays the number of
viruses and spies that have been treated.
IM Security Protection
Indicates whether Instant Messaging protection is enabled and displays the number of
messages that have been scanned.
Update and tutorial information
When you purchase Zone Labs security software, you receive an automatic update
subscription valid for one year.
The update box helps you make sure you’re running the latest version of Zone Labs
security software, and gives you quick access to product updates when they arrive.
Message Meaning
“Check for update.” Click the link to see if there are any impor-
tant updates to Zone Labs security software
available for download.
“An update is available.” Your automatic update subscription indi-
cates that an update to Zone Labs security
software is available. Click the link to go to
the Zone Labs Web site to download the
update.
“Firewall is up to date” You have the most up-to-date version of
Zone Labs security software.
“Update subscription expired. Click to Your automatic update subscription has
Renew.” expired. Click the link to go to the Zone Labs
Web site to renew your subscription.
Click Tutorial to learn the basics of how Zone Labs security software works.
Understanding Zones
Zone Labs security software keeps track of the good, the bad, and the unknown out on
the Internet by using virtual containers, called Zones, to classify the computers and
networks that connect to your computer.
The Internet Zone is the “unknown.” All the computers and networks in the world
belong to this Zone—until you move them to one of the other Zones.
The Trusted Zone is the “good.” It contains all the computers and networks you trust and
want to share resources with—for example, the other machines on your local or home
network.
The Blocked Zone is the “bad.” It contains computers and networks you distrust.
When another computer wants to communicate with your computer, Zone Labs
security software looks at the Zone it is in to help decide what to do.
To learn how to put a computer, network, or program in the Trusted Zone, see
“Managing traffic sources,” on page 46.
of the components needed by your Internet-accessing programs, and will remind you to
raise the Program Authentication level to High.
No security level is necessary for the Blocked Zone, because no traffic to or from that
Zone is allowed.
Advanced users can customize high and medium security for each Zone by
blocking or opening specific ports. For more information, see “Blocking and
unblocking ports,” on page 50.
Advanced users can specify the ports and protocols a particular program can
use, the hosts it can access, and other details. For more information, see
“Creating an expert rule for a Program,” on page 87.
Responding to alerts
When you first start using Zone Labs security software, it is not unusual to see a number
of alerts. Don’t worry! This doesn’t mean you’re under attack. It just means that Zone
Labs security software is learning your program and network configurations, and giving
you the opportunity to set up your security the way you want it.
How you respond to an alert depends upon the type of alert displayed. For information
on responding to a particular type of alert, see Appendix A,“Alert reference,” starting on
page 203.
Use the check box labeled Remember this answer to give permanent permission
to programs you trust.
Automatically Zone Labs security software automatically notifies you when an update
is available.
Manually You monitor the Status tab for updates. To invoke an update check
immediately, click Check for Update.
5. Click OK.
Valid passwords are between 6 and 31 characters long. Valid characters include
A-Z, a-z, 0-9, and characters !,@,#,$,%,^,&,*.
Once you have set a password, you must log in before you can change settings, shut
down the TrueVector security engine, or uninstall Zone Labs security software.
The backup and restore feature should not be used to share settings among
different computers or to distribute security policies. To do so could cause an
extremely high number of alerts to appear due to differences among computers,
applications, and Windows processes.
The ability to back up and restore settings is only available in ZoneAlarm Pro and
ZoneAlarm Security Suite.
5. In the Proxy Configuration area, enter the IP address of your proxy server
information only if you are certain that it is necessary to do so.
uncommon proxy configuration, such as a scripted proxy, and if you find that some
product features such as anti-virus updates aren't working.
To purchase a license:
1. Select Overview|Product Info.
2. In the Licensing Information area, click Buy Now!
You will be directed to the Zone Labs Web site, where you can complete your
product purchase.
The e-mail address you enter here is used to configure your Outbound MailSafe
protection. Be sure to enter your e-mail address correctly. For more information,
see “Setting Outbound MailSafe protection options,” on page 121.
4. To be notified of product news and updates, select the check box labeled Inform me
of important updates and news.
5. Click OK.
Topics:
29
Chapter 3: Networking with Zone Labs security software Configuring a new network connection
If you prefer not to use the Network Configuration Wizard, click Cancel in the
Wizard screen. A New Network alert will appear. The detected network will be
placed in the Internet Zone, even if it is a private network. For information on
using the New Network alert, see “New Network alert,” on page 221.
If you prefer not to use the Network Configuration Wizard, click Cancel in any
Wizard screen. A New Network alert will appear. The detected network will be
placed in the Internet Zone, even if it is a secured wireless network. For
information on using the New Network alert, see “New Network alert,” on
page 221.
To configure Zone Labs security software for file and printer sharing:
1. Add the network subnet (or, in a small network, the IP address of each computer
you’re sharing with) to your Trusted Zone.
See “Adding to the Trusted Zone,” on page 47.
2. Set the Trusted Zone security level to Medium. This allows trusted computers to
access your shared files.
See “Setting the security level for a Zone,” on page 41.
3. Set Internet Zone security to High. This makes your computer invisible to non-
trusted machines.
See “Setting the security level for a Zone,” on page 41.
To configure Zone Labs security software for mail servers with collaboration and
synchronization features:
1. Add the network subnet or IP address of the mail server to your Trusted Zone.
2. Set the Trusted Zone security level to Medium. This allows server collaboration
features to work.
3. Set Internet Zone security level to High. This makes your computer invisible to non-
trusted machines.
Before you configure Zone Labs security software, use your ICS software to set
up the gateway and client relationships. If you use hardware such as a router to
share your Internet connection rather than Microsoft’s Internet Connection
Sharing (ICS), ensure that the local subnet is in the Trusted Zone.
If you have created an expert firewall rule that blocks VPN traffic, you will need
to modify the expert rule to allow VPN traffic. See “Creating expert firewall
rules,” on page 55.
If you have created an expert firewall rule that has blocked PPTP traffic and your
VPN software uses PPTP, you will need to modify the expert rule. See “Creating
expert firewall rules,” on page 55.
The resources below are required by all VPN The resources below may or may not be
client computers and must be added to the required, depending on your specific VPN
Trusted Zone. implementation.
VPN Concentrator DNS servers
Remote host computers connected to the Local host computer’s NIC loopback address
VPN client (if not included in the subnet def- (depending on Windows version). If you
initions for the corporate network) specify a local host loopback address of
127.0.0.1, do not run proxy software on the
local host.
Corporate Wide Area Network (WAN) subnets Internet Gateway
that will be accessed by the VPN client com-
puter
Corporate LANs that will be accessed by the Local subnets
VPN computer
See “Adding to the Trusted Zone,” on page 47, to learn how to add resources to your
computer’s Trusted Zone.
2. In the General settings area, select the check box labeled Allow VPN protocols.
3. Click OK.
If your VPN program uses protocols other than GRE, ESP, and AH, also select the
check box labeled Allow uncommon protocols at high security.
If your VPN program is not listed, click Add to add it to the list.
Topics:
39
Chapter 4: Firewall protection Understanding Firewall protection
3. In the Trusted Zone Security area, click the slider and drag it to the desired area.
High Your computer is in stealth mode, making it invisible to other computers.
Access to Windows (NetBIOS) services, file and printer shares is blocked.
Ports are blocked unless you have provided permission for a program to use
them.
Med Your computer is visible to other computers.
Access to Windows services, file and printer shares is allowed.
Program permissions are still enforced.
Off Your computer is visible to other computers.
Access to Windows services, file and printer shares is allowed.
Program permissions are still enforced.
4. Click OK.
4. Click OK.
4. Click OK.
For more information about networking, see Chapter 3,“Networking with Zone Labs
security software,” starting on page 29.
4. Click OK.
For more information about networking, see Chapter 3,“Networking with Zone Labs
security software,” starting on page 29.
Field Description
To add an IP range:
1. Select Firewall|Zones.
2. Click Add, then select IP address from the shortcut menu.
The Add IP Range dialog appears.
3. Select Trusted from the Zone drop-down list.
4. Type the beginning IP address in the first field, and the ending IP address in the
second field.
5. Type a description in the field provided, then click OK.
To add a subnet:
1. Select Firewall|Zones.
2. Click Add, then select Subnet from the shortcut menu.
The Add Subnet dialog appears.
3. Select Trusted from the Zone drop-down list.
4. Type the IP address in the first field, and the Subnet mask in the second field.
5. Type a description in the field provided, then click OK.
Zone Labs security software automatically detects new network connections and
helps you add them to the right Zone. For more information, see Chapter
3,“Networking with Zone Labs security software,” starting on page 29.
Field Information
Field Information
Security levels
Traffic Type
HIGH MED OFF
Table 4-3: Default access permissions for incoming and outgoing traffic types
Security levels
Traffic Type
HIGH MED OFF
Table 4-3: Default access permissions for incoming and outgoing traffic types
Be aware that when you select a traffic type in the High security settings list, you
are choosing to ALLOW that traffic type to enter your computer under High
security, thus decreasing the protection of the High security level. Conversely,
when you select a traffic type in the Medium security settings list, you are
choosing to BLOCK that traffic type under Medium security, thus increasing the
protection of the Med security level.
3. Scroll to the security level (High or Medium) to which you want to add ports.
4. Select the desired port type: incoming UDP, outgoing UDP, incoming TCP, or
outgoing TCP.
5. Type the port or port ranges you want to allow or block in the Ports field, separated
by commas. For example, 139, 200-300
6. Click Apply, then click OK.
rules determine that traffic should be blocked, it is blocked. Note that this means that
you can use firewall rules to override or redefine program permissions.
Note that packets coming from the Blocked Zone will not be blocked if they are
allowed by an Expert Firewall Rule.
Rule 1 allows FTP clients in the Trusted Zone to connect to an FTP server on port 21.
Rule 2 blocks all FTP clients from connecting on port 21, regardless of Zone. These two
rules together allow clients in the Trusted Zone to use an FTP server on the client
computer, but block all other FTP access.
If the order of the rules were reversed, Rule 2 would match first, and all FTP access
would be blocked. Rule 1 would never have a chance to execute, so the FTP clients in
the Trusted Zone would still be blocked.
3. In the Source area, select a location from the list, or click Modify, then select Add
location from the shortcut menu. You can add any number of sources to a rule.
My Computer Applies the expert rule to traffic originating on your computer.
Trusted Zone Applies the expert rule to network traffic from sources in your
Trusted Zone.
Internet Zone Applies the expert rule to network traffic from sources in your
Internet Zone.
All Applies the expert rule to network traffic coming from any source.
Host/Site Applies the expert rule to network traffic coming from specified
domain name.
IP Address Applies the expert rule to network traffic coming from specified IP
address.
IP Range Applies the expert rule to network traffic coming from a computer
within the specified IP range.
Subnet Applies the expert rule to network traffic coming from a computer
within the specified subnet.
Gateway Applies the expert rule to network traffic coming from a computer
on the specified gateway.
New Group Choose this option, then click Add to create a new location group
to apply to the expert rule.
Existing Group Choose this option to select one or more location groups to apply
to the expert rule, then click OK.
4. In the Destination area, select a location from the list, or click Modify, then select
Add location from the shortcut menu.
Available location types are the same for Source and Destination locations.
5. In the Protocol area, select a protocol from the list, or click Modify, then select Add
Protocol.
Add Protocol Choose this option to add a protocol to the rule. Specify: TCP, UDP,
TCP + UDP, ICMP, IGMP, or Custom.
New Group Choose this option, then click Add to create a new protocol group to
apply to the expert rule.
Existing Group Choose this option to select one or more protocol groups to apply to
the expert rule, then click OK.
6. In the Time area, select a time from the list, or click Modify, then select Add Time.
Day/Time Choose this option to add a day/time range to the rule. Specify a
Range description, time range and one or more days. Time range is specified
using a 24 hour clock.
New Group Choose this option, then click Add to create a new day/time group to
apply to the expert rule.
Existing Group Choose this option to select one or more day/time groups to apply to
the expert rule, then click OK.
7. Click OK.
If a rule is currently selected in the list, the pasted rule will be inserted above the
selected rule. If no rule is selected, the pasted rule will be inserted at the top of
the rules list.
A “1” is appended to the name of the copied rule. If you paste a rule a second
time, the number 2 is appended to the second rule copied.
Creating groups
Use groups to simplify the management of locations, protocols, and days/times that you
use in your expert firewall rules.
Once created, the names of groups cannot be changed. For example, if you
create a Location Group named “Home” and subsequently decide to call the
group “Work”, you would need to remove the group called “Home” and create a
new group with the name “Work.”
can easily add to expert rules. For example, you might create a group including POP3
and IMAP4 protocols in order to simplify the administration of your rules regarding e-
mail traffic.
6. If you chose ICMP in step 4, specify a description, message name, and type number.
Message name Type number
Source Quench 4
Redirect 5
Alt 6
Echo Request 8
Router Advertisement 9
Router Solicitation 10
Time Exceeded 11
Parameter Problem 12
Timestamp 13
Timestamp reply 14
Information request 15
Information reply 16
Address Mask Request 17
Address Mask Reply 18
Traceroute 30
Other Specify type
number
7. If you chose IGMP in step 4, specify a description, message name, and type number.
Membership Query 17
Membership Report (ver 1) 18
Cisco Trace 21
Membership Report (ver 2) 22
Leave Group (ver 2) 23
Multicast Traceroute Response 30
Multicast Traceroute 31
Membership Report (ver 3) 34
Other Specify type
number.
8. If you chose Custom in step 4, specify a description, protocol type, and protocol
number.
RDP 27
GRE 47
ESP 50
AH 51
SKIP 57
Other Specify protocol number.
Rank
The enforcement priority of the rule. Rules are evaluated in order of rank, starting with
number 1, and the first rule that matches will be enforced. Disabled rules will display
“Off ” instead of a rank number, but will retain their rank ordering in the list.
Action
A red means the rule will block network traffic; a green check mark means the
rule will allow network traffic.
Track
None means no notification when the rule is applied. Log ( ) means a log entry will be
created when the rule is applied. Alert and Log ( ) means that an alert will be
displayed and a log entry will be created when an expert rule is applied.
Name
A descriptive name for the rule.
Source
The source addresses and ports for the rule.
Destination
The destination addresses and ports for the rule.
Protocol
The network protocol to which the rule applies.
Time
The time period during which the rule is active.
To edit a rule:
1. Select Firewall|Expert.
2. Select the rule you want to edit, then click Edit.
The Edit Rule dialog appears.
3. Modify rule attributes as necessary, then click OK.
Topics:
63
Chapter 5: Program control Understanding Program Control
Safe programs
Zone Labs security software validates your programs against a database of known safe
programs and automatically assigns the permissions required for the programs to
function properly. If you accepted the default program settings in the Configuration
Wizard, Zone Labs security software is set up to automatically configure the most
popular programs in the following general categories:
! Browsers (e.g., Internet Explorer, Netscape)
! E-mail applications (e.g., Microsoft Outlook, Eudora)
! Instant Messengers (e.g., AOL, Yahoo!)
! Anti-virus (e.g., Symantec, Zone Labs)
! Document utilities (e.g., WinZip® and Adobe® Acrobat®)
! Zone Labs software applications
Even programs that are considered safe can be used by hackers to perform actions that
are not. OSFirewall protection, available in ZoneAlarm Security Suite, displays alerts
when it detects suspicious program behavior. For more information about these alerts,
see “Program alerts,” on page 209.
server permission only to programs you're sure you trust, and that require it in order to
work.
If possible, avoid granting a program server permission for the Internet Zone. If you
need to accept incoming connections from only a small number of machines, add those
machines to the Trusted Zone, and then allow the program server permission for the
Trusted Zone only.
For more information about program alerts, see “Program alerts,” on page 209.
You also can allow Zone Labs security software to automatically allow or deny all
new programs without displaying an alert. For example, if you are sure you have
given access permission to all the programs you want, you might automatically
deny access to any other program that asks for permission. For more information,
see “Setting access permissions for new programs,” on page 74.
Programs list
The Programs list allows you to set or customize permissions for specific programs
based on your individual needs. For more information about using the Programs list and
customizing permissions, see “Using the programs list,” on page 76.
% OSFirewall is disabled.
4. Click OK.
5. Optionally, configure any OSFirewall Special System Protections. For any action in
the list, click the State field and select Allow, Deny, Ask, or Use Program Setting.
If you choose Use Program Setting, Zone Labs security software defers to
SmartDefense Advisor settings or to your manual settings.
6. Click Apply to save the setting and leave the dialog open, or OK to save the setting
and close the dialog.
configure program access manually. The SmartDefense Advisor level is set to Auto by
default.
If you set SmartDefense Advisor to Auto and there is no advice available for a program,
Zone Labs security software displays a Program alert prompting you to allow or deny
access to the program. If you select Remember this setting when responding to such a
Program alert, Zone Labs security software keeps your setting unless SmartDefense
Advisor comes out with a different setting, or until you change the setting manually in
the Programs tab.
For information about setting program permissions manually, see “Setting permissions
for specific programs,” on page 76. You can set SmartDefense Advisor to Manual or
Off and set all program permissions manually. Or, you can set SmartDefense Advisor to
Auto and set manual program permissions only when SmartDefense Advisor does not
recommend a policy.
4. If desired, specify Internet access permissions for periods when the lock is engaged.
Allow pass-lock programs to access the Allows programs with pass-lock permission to
Internet access the Internet. Programs without
pass-lock permission have no access. This is
the default behavior when the lock is
engaged.
Block all Internet access Prevents all programs, regardless of pass-lock
status, from accessing the Internet when the
lock is engaged.
5. Click OK.
Field Explanation
Field Explanation
Type Type of program alert that occurred. Possible values for this
column include:
• Program Access
• Repeat Program
• New Program
Program The program (displayed as the application file) that requested
access. If a program name is unavailable, refer to the Descrip-
tion field of the Entry Details window.
Source IP The IP address of the computer sending the request. If the
source IP cannot be determined, this field may be left blank.
Destination IP The IP address of the computer receiving the request. If the
destination IP cannot be determined, this field may be left
blank.
Direction Specifies whether the request that caused the event was
incoming, outgoing, or occurred as a result of internal traffic
on your computer (data).
Action Taken Specifies whether the request was Allowed or Blocked. Action
is followed by /
Count The number of times this action was taken.
Source DNS The domain name server of the computer that is sending the
request.
Destination DNS The domain name server of the computer that is receiving the
request.
Field Explanation
Rating Event rating based on the Protection Level of the security option.
Date/Time Date and time the event occurred.
Type Type of OSFirewall alert that occurred. Possible values for this
column include:
• Process
• Message
• Module
• Registry
• File
• Execution
• Driver
• Physical memory
Subtype The specific event that initiated the Type of access requested
(for example, OpenThread would be a subtype of Process).
Data The path to the file that was attempting to be modified.
Program Displays the path to the program that performed the behavior.
Action Taken Specifies whether the request was Allowed or Blocked. Action is
followed by /manual or /auto to indicate whether the action was
performed by you or by SmartDefense Advisor.
Count The number of times this action was taken.
4. Click OK.
2. Click Advanced.
3. In the Connection Attempts area, specify your preferences for each Zone.
Always allow access Allows all new programs access to the specified Zone.
Always deny access Denies programs access to the specified Zone.
Always ask for permission Displays an alert asking for permission for the program to
access the specified Zone.
After you manually set permissions for a program, the permissions for that
program will not change even if you later set the SmartDefense Advisor level to
Auto. To benefit from automatic program advice, remove the program from the
Programs List, then set the SmartDefense Advisor level to Auto.
level actions like changing TCP/IP parameters, loading or installing drivers, or changing
your browser’s default settings.
status indicator
Active
Indicates the current status of a program. A green circle indicates that the program is
currently running.
Programs
The name of the program.
SmartDefense Advisor
The SmartDefense Advisor column indicates where the program policy comes from.
The column may contain any of the following designations:
! Auto—SmartDefense Advisor determines the program policy, unless a
recommendation is not available. (Note that, if SmartDefense Advisor is turned on,
and you select Remember this setting when responding to a Program alert, the
SmartDefense Advisor column will still say Auto, since the permissions will still
change to conform to any SmartDefense Advisor recommendations that come out
later.)
! Custom—You determined the program policy manually. If you change a program’s
permissions (by changing a value in any of the columns in the program’s row, for
example), the SmartDefense Advisor column displays “Custom” for that program.
Manually changing the policy for “System” programs could interfere with the
normal functions of your computer.
Trust Level
The Trust Level determines the actions that a program is allowed to perform. The Trust
Levels are Super, Trusted, Restricted, Ask, Kill, and No Enforcement.
A program’s Trust Level setting is determined by its policy. Zone Labs security software
assigns policies to known programs automatically. The SmartDefense Advisor security
team constantly monitors programs for changes in behavior and trustworthiness and
updates the programs permissions accordingly. A program with a Trust Level setting of
Super today, might have a Trust Level of Restricted tomorrow, if security experts
determine that the program could pose a risk to your computer. Once a program’s
policy setting has been changed from Auto to Custom, however, it will no longer be
monitored for changes in Trust Level. For this reason, it is recommended that you keep
the default settings for your programs. Refer to the table below for a description the
symbols used in this list.
Access
The Access column refers to a program’s right to retrieve information from the Internet
or networks in the Trusted Zone.
Server
Allows a program to passively listen for contact from the Internet or network. Few
programs require server rights.
Send Mail
Allows a program to send and receive e-mail.
Refer to the table below for a description of the symbols used in this list..
Symbol Meaning
For more information about what program actions are considered suspicious, see
Appendix D,“Program behavior,” starting on page 251.
Built-in rules ensure a consistent security policy for each program. Programs
with access to the Internet Zone also have access to the Trusted Zone, and
programs with server permission in a Zone also have access permission for that
Zone. This is why (for example) selecting Allow under Trusted Zone/Server
automatically sets all of the program’s other permissions to Allow.
You also can access the Program Options dialog by right-clicking a program
name and selecting Options.
4. Click OK.
4. Clear the check box labeled Enable Outbound MailSafe Protection for this
program.
This check box will not appear unless the SendMail permission for this program
is set to Allow.
4. Under Authentication, select the check box beside the option you want, then click
OK.
2. Select a component from the list, then click in the Access column.
3. Select Allow from the shortcut menu.
If you created port rules for Programs in a version of Zone Labs security software,
prior to 4.0, those port rules will be automatically converted to expert rules and
visible in the Expert tab of the Program Options dialog. To access the Expert tab,
select Program Control|Programs, then click Options.
For tips on setting up expert rules for your programs, visit the Zone Labs User
Forum (http://www.zonelabs.com/forum) and search for “program rules”.
The Add rule dialog contains the same fields and options that are available when
you create Expert Firewall rules. Note, however, that IGMP and Custom protocols
cannot be applied to expert rules for Programs. See “Creating expert firewall
rules,” on page 55.
4. Click OK.
Topics:
89
Chapter 6: Spyware and Virus protection Spyware and Virus Protection
The Zone Labs Anti-virus protection feature is incompatible with other virus
protection software. Before you turn on the Anti-virus protection feature, you
must uninstall any other anti-virus software from your computer, including suite
products that include virus protection among their features. Zone Labs security
software can automatically uninstall some anti-virus applications for you. If you
are using a program that cannot be uninstalled automatically, you can uninstall
it using Add/Remove Programs, accessible from the Windows Control Panel.
Scheduling a scan
Scanning your computer for viruses and spyware is one of the most important things
you can do to protect the integrity of your data and computing environment. Since
scanning is most effective when performed at regular intervals, it often makes sense to
schedule it as a task to run automatically. If your computer is not on when the scheduled
scan is set to occur, the scan will occur fifteen minutes after your computer is restarted.
To schedule a scan:
1. Select Anti-virus/Anti-spyware|Main.
2. In the Anti-virus area, click Advanced Options.
The Advanced Options dialog appears.
located on the Main tab of the Anti-virus / Anti-spyware panel displays the status of
your definition files.
By enabling the automatic update feature, you will always receive the latest definition
files when they are available.
Table 6-2 below provides an explanation of the icons shown in the Scan Targets dialog
box.
Icon Explanation
Icon Explanation
On-Access scanning
On-Access scanning protects your computer from viruses by detecting and treating
viruses that may be dormant on your computer. On-Access scanning is enabled by
default. On-Access scanning supplies the most active form of virus protection. Files are
scanned for viruses as they are moved, opened, executed, or closed, thereby allowing
immediate detection and treatment of viruses. (Note that archive files, such as .zip files,
are scanned only when you open them.)
E-mail Scanning
E-mail scanning builds on the protection offered by MailSafe, by scanning for viruses in
the body and attachments of e-mail messages and removing them before they can do
damage. Where MailSafe scans for potentially harmful attachments based on file
extension, the E-mail scanning feature scans for harmful files by comparing the
attachments to the signature files of known viruses. If an infected attachment is
detected, the attachment is removed from the e-mail message and replaced with a text
file log that provides details about the removed file. For details about performing an e-
mail scan, see “Anti-virus protection for e-mail,” on page 133. E-mail scanning is on by
default.
4. Click OK.
5. Click OK.
detected as spyware during a scan. If you are using one of these applications, for
example, voice recognition software, you can exclude it from spyware scans by adding it
to the exceptions list. You can add spyware to the exceptions list by right-clicking the
item in the Scan Results list and choosing Ignore Always from the menu.
Once spyware is on the exceptions list, it no longer will be detected during spyware
scans. If spyware was added to the exceptions list accidentally, you can remove it
manually.
During scans, Zone Labs security software displays a special system tray icon ( ) and
provides a system tray menu option for viewing scan status. Right-click the system tray
icon and choose View Scan to check on scan status.
Clicking Pause in the Scan dialog while a scan is being performed will stop the
current scan only. On-access scanning will not be disabled. Click Pause again to
resume the current scan.
The Active Items area of the Scan details dialog lists infections found during the scan
that could not be treated automatically. To accept the suggested treatments in the
Treatment column, click Apply. The items listed under Auto Treatment have already
been treated, you do not need to take further action.
Name
The name of the virus that caused the infection.
Treatment
Specifies the treatment applied to the infection. Possible values are Quarantined or
Deleted.
Security Risk
Indicates the risk level of the infection. All viruses are considered High risk.
Path
The location of the virus that caused the infection.
Type
Specifies whether the infection was caused by a virus, worm, or trojan.
Status
Tells you whether the file has been repaired, deleted, or remains infected. If Zone Labs
security software was unable to treat the item, a What to do next link may appear here.
This link will direct you to further information and instructions.
Information
Provides more detail about the infection. To get more information about a virus or
spyware, click the Learn more link.
Detail
This field remains empty for virus scans. For information about its use in spyware scans,
see “Understanding spyware scan results,” on page 105.
For help with creating a password protected archive, refer to the Help for WinZip.
2. Send the .zip file to [email protected]
Use this e-mail address only for sending malware to the Zone Labs Security Team.
Please do not send malware files if you feel you cannot do so safely or if it would
increase the risk of infection or damage to your system. Do not e-mail suspected
malware files to others as they could be malicious.
Field Information
During scans, Zone Labs security software displays a special system tray icon ( ) and
provides a system tray menu option for viewing scan status. Right-click the system tray
icon and choose View Scan to check on scan status.
Clicking Pause in the Scan dialog while a scan is being performed will stop the
current scan. Click Pause again to resume the current scan.
The Active Items area of the Scan Results dialog lists infections found during the scan
that could not be treated automatically. To accept the suggested treatments in the
Treatment column, click Apply. The items listed under Auto Treatment have already
been treated, you do not need to take further action.
Name
The spyware name.
Treatment
Specifies the treatment applied to the infection. Possible values are Quarantined or
Deleted.
Security Risk
Indicates the risk level of the infection. Possible values for this column include:
! Low - Adware or other annoying but benign software.
Field Information
Monitoring Coverage
Anti-virus Monitoring currently detects anti-virus software from these popular
manufacturers:
! Symantec
! McAfee
! Computer Associates
! Trend Micro
If you use a different anti-virus product, Anti-virus Monitoring will not recognize it at
this time. This does not mean that your ZoneAlarm product is malfunctioning; your
security remains as strong as ever. Zone Labs security software will be adding the ability
to recognize more products over time. If your anti-virus product is not currently
supported, you may simply turn off the Anti-virus Monitoring feature. Do not worry--
Anti-virus Monitoring is monitoring only and has no affect on the firewall and no direct
affect on security.
4. Click OK.
appear, it will provide information and instructions for making your Anti-virus product
secure.
When running Windows 98, the Anti-virus E-mail scanning feature renames MailSafe to
isafe.exe rather than the name of the computer’s e-mail program.
Topics:
115
Chapter 7: E-mail protection Understanding e-mail protection
Inbound MailSafe protection is designed for local access only. If you have
configured your POP3 client for remote access, inbound MailSafe protection
may not be available.
For best security, you should never open an e-mail attachment that Zone Labs
security software has quarantined unless the sender is someone you know and
trust, and you have confirmed the sender sent the message intentionally and the
sender is sure that the attachment is harmless.
2. In the Display Outbound MailSafe Protection Alerts When area, choose your
settings.
Too many e- An Outbound MailSafe protection alert appears when your computer
mails are sent attempts to send more than the specified number of e-mails within the
at once specified time interval.
A message has An Outbound MailSafe protection alert appears when your computer
too many attempts to send an e-mail message with more than the specified num-
recipients ber of recipients.
If the sender’s An Outbound MailSafe protection alert appears when your computer
address is not attempts to send an e-mail whose originating address (i.e., the address
in this list in the From: field) does not appear on the list. To prevent Zone Labs
security software from blocking all outgoing e-mail, make sure that your
valid e-mail address appears on this list.
3. Click OK.
If you have installed Zone Labs security software but the junk e-mail filter
toolbar does not appear in your Outlook toolbar, right-click in your Outlook
toolbar and choose ZoneAlarmOutlookAddin.
The junk e-mail filter also adds three special folders to your Outlook folder list:
ZoneAlarm Challenged Mail, ZoneAlarm Junk Mail, and ZoneAlarm Fraudulent Mail.
When Zone Labs security software identifies an e-mail message as junk, fraudulent, or
challenged, it puts the message in one of these folders. If you are using Outlook to
access Hotmail, you must use the junk e-mail filter’s spam blocking features and special
folders instead of Hotmail’s.
4. Type the e-mail address of the distribution list into the text entry area, then click OK.
The junk e-mail filter adds the distribution list’s e-mail address to the list of allowed
addresses.
5. Click Close to save your changes and close the Lists tab.
To restore e-mail that was incorrectly identified as junk, select the e-mail in the
ZoneAlarm Junk Mail folder, and click Unjunk. The e-mail will be restored to
your Outlook Inbox.
for analysis. If you choose Yes, all future fraudulent messages will be sent without
prompting you for confirmation. If you choose No, your choice will be reflected in the
Configure Preferences dialog box.
The junk e-mail filter never sends e-mail of any type from your computer without your
permission. When you report fraudulent e-mail, the junk e-mail filter forwards the
complete and original message to Zone Labs.
Zone Labs never divulges your e-mail address, name or other personal information
contained in a fraudulent e-mail except as required to investigate and prosecute the
originator of the fraudulent message.
Zone Labs forwards selected portions of the reported message to government and law
enforcement agencies with jurisdiction over e-mail fraud. These agencies are required by
law to protect the confidentiality of the information contained in the message. Zone
Labs separately informs individuals or institutions threatened by forwarding to them
only the information required to alert them.
3. Click Close.
filter to move the e-mail from the special Outlook folder ZoneAlarm Challenged
Mail folder to your Outlook Inbox.
For messages from an unknown sender, you can choose whether to always send a
challenge e-mail, to send a challenge only when the incoming message appears to be
junk e-mail, or to never send a challenge. In addition you can customize the challenge
e-mail that is sent to users.
4. To add a personal message to the standard challenge e-mail, click Personalize, type
your name and your personal message, then click OK.
5. Click Close.
The junk e-mail filter moves the message to the ZoneAlarm Challenged Mail.
folder
While waiting for the response to a challenge message, the junk e-mail filter
stores your e-mail address. As soon as the challenge has been completely
processed, the junk e-mail filter discards the address. If you experience
problems sending challenge e-mails, see “Specifying your outbound e-mail
server,” on page 129.
4. Type the name of your outbound e-mail server, then click OK.
5. Click Close.
4. Click Close.
This feature is supported for Outlook 2000, 2002 (XP), and 2003 only and is
enabled by default.
Infected attachments are renamed with a .zl6 file extension so that they can no longer be
opened.
If you are a Eudora user and you have multiple Infection reports in your inbox,
the name of the infection report may contain a numeral before the .txt extension.
When running Windows 98, the E-mail scanning feature renames MailSafe to isafe.exe
rather than the name of the computer’s e-mail program.
For more information about protecting your computer from viruses, see Chapter
6,“Spyware and Virus protection,” starting on page 89.
Topics:
135
Chapter 8: Privacy protection Understanding privacy protection
3. In the Ad Blocking area, click the slider and drag it to the desired setting.
High Blocks all ads. Blocks all pop-up/pop-under and animated ads.
Med Blocks all pop-up/pop-under and animated ads. Allows banner ads.
Off Allows all ads.
4. In the Filter Options area, select the check box labeled Enable Privacy for this
program.
The Privacy group of features that includes Privacy Advisor is available in Zone Alarm
Pro and ZoneAlarm Security Suite.To prevent Privacy Advisor from appearing each
time Web page elements are blocked, select the check box labeled Turn Off Privacy
Advisor.
Although the Site Verification is displayed in the same alert window as the
Privacy Advisor, the two are enabled and disabled independently. If you disable
Privacy Advisor, the Site Verification alert will appear on its own and vice versa.
For more information about Site Verification, see “Licensing, registration, and
support,” on page 27.
To see details or to change privacy settings immediately, click the link labeled
Click here for details. Zone Labs security software opens to the Privacy panel.
A pencil icon in the Edited column indicates that you have customized privacy settings
for that site, and that the site will remain in your list.
Using third-party ad blocking software at the same time as Zone Labs security
software may prevent the privacy site list from being populated properly.
If you are using AOL with ZoneAlarm Pro and have enabled Privacy protection,
the site ie3.proxy.aol.com is added to the Privacy Site List when you visit any
site during an AOL session. For example, if during your AOL session you visit the
site www.cnn.com, only the AOL proxy site, ie3.proxy.aol.com is added to the
Privacy Site List. The privacy settings for the ie3.proxy.aol.com site affect all
sites visited within AOL. If you manually add a site to the site list, the privacy
settings for that site will be ignored, and only the security settings for the AOL
proxy site, ie3.proxy.aol.com, are in effect.
Customizing ad blocking
Ad blocking is disabled by default. You can customize ad blocking to block all ads or
block only specific types of ads. In addition, you can specify what Zone Labs security
software displays in place of blocked ads.
The Privacy group of features that includes ad blocking is available in Zone Alarm Pro
and ZoneAlarm Security Suite.
4. Click OK.
A box I can mouse over to get Displays a window containing the ad that appears only
the ad to appear when you activate the window using your mouse.
4. Click OK.
3. In the Internet Explorer/MSN cleaning options area, specify the areas to be cleaned.
Clean cache Cleans the Internet Explorer browser cache.
Selected by default.
Clean URL history Cleans the URLs list in the Address field.
Clean AutoComplete forms Cleans the previous entries you've made for Web
forms, including passwords.
Note: If you do not want your passwords to be
cleaned, clear the “Clean AutoComplete forms”
check box.
Clean AutoComplete passwords Cleans passwords for which you selected “Remem-
ber password.”
Clean locked Index.dat files Cleans index.dat files that are currently in use by
your computer. Selected by default.
Clean typed URL history Cleans the URLs you have typed into the Address
field.
4. To remove cookies, select the Clean IE/MSN cookies check box, then click
Select.
The Select IE/MSN cookies to keep dialog appears. The list on the left shows the
sites for which the browser currently has cookies. The list on the right shows the
sites whose cookies you do not want to clean.
5. To retain a cookie source, select the cookie source, then click Keep.
6. To remove remaining cookies, click Remove, then click OK.
4. To remove cookies, select the Clean Netscape cookies check box and then click
Select.
The Select Netscape cookies to keep dialog appears. The list on the left shows the
sites for which the browser currently has cookies. The list on the right shows the
sites whose cookies you do not want to clean.
5. To retain a cookie source, select the cookie source, then click Keep.
6. To remove remaining cookies, click Remove, then click OK.
Topics:
151
Chapter 9: Alerts and Logs Understanding alerts and logs
To learn about the types of alerts that appear and how to respond to them, see
Appendix A,“Alert reference,” starting on page 203.
Informational alerts
Informational alerts tell you that Zone Labs security software has blocked a
communication that did not fit your security settings. The most common type of
informational alert is the Firewall alert.
Informational alerts don’t require a decision from you. You can close the alert by
clicking OK at the bottom of the alert. By doing this you are not allowing any traffic to
access your computer.
Program alerts
Program alerts ask you if you want to allow a program to access the Internet or local
network, or to act as a server. Program alerts require an Allow or Deny response. The
most common types of Program alerts are the New Program alert and Repeat Program
alert.
By clicking Allow, you grant permission to the program. By clicking Deny, you deny
permission to the program. If SmartDefense Advisor is set to “Auto,” Zone Labs
security software issues Program alerts only if no automatic setting is available. If you
choose Remember this setting in a Program alert when allowing or denying program
access, Zone Labs security software keeps your setting unless SmartDefense Advisor
comes out with a different setting, or until you change the setting manually in the
Programs tab. If you do not choose Remember this setting, Zone Labs security
software will issue another Program alert the next time the program attempts the same
action.
ID Lock alerts
If they have enabled the ID Lock feature, users of ZoneAlarm Pro and ZoneAlarm
Security Suite may see ID Lock alerts if the personal information stored in myVAULT is
sent to a destination that is not listed on their Trusted Sites list.
By clicking the Yes button, you grant permission to send the information to the
requesting IP address. If you do not want to be alerted the next time myVAULT data is
sent to this destination, select the “Do you want to remember...” check box to add the
destination to your Trusted Sites list.
OSFirewall alerts
There are three types of OSFirewall alerts that you may see: High-rated Suspicious alert,
Medium-rated Suspicious alert, and Malicious alert. These alerts inform you that
A description of the
detected behavior.
The filename of the appli-
cation attempting the
behavior.
Medium-rated Suspicious Behavior alerts inform you that a trusted program is trying to
perform an action that may change the default behavior of a program. For example, if a
program were to modify your browser’s home page, you would see a Medium-rated
Suspicious Behavior alert. High-rated Suspicious Behavior alerts, in contrast, inform
you that an unknown program is attempting behavior that may cause programs or your
operating system to stop functioning normally, or which could be spyware trying to
monitor your activity. Because even legitimate programs may sometimes need to
perform High-rated Suspicious behavior, you will need to base your decision to allow or
deny the action on your knowledge of the program. If the program is one you use
frequently, and the action seems reasonable given the functionality of the program, it
may be safe to allow it. If you are unsure, click More Info, to submit the program
information to SmartDefense Advisor.
A description of the
detected behavior.
For more information about OSFirewall alerts and the types of behavior detected, see
Appendix D,“Program behavior,” starting on page 251.
Game Mode
Game Mode temporarily suppresses most Zone Labs security software scans, product
updates, and alerts, so that you can play games on your computer with fewer
interruptions. Game Mode lets you temporarily allow or deny all program permission
requests, so that Zone Labs security software can answer such requests automatically
without displaying alerts. Automatic scans and product updates are postponed until you
deactivate Game Mode. Game Mode remains active until you turn it off, or until you
turn off Zone Labs security software or your computer.
Game Mode suppresses all Informational alerts and all alerts in which you are prompted
to make a decision. This includes alerts caused by Ask settings in the Programs List,
such as permission alerts triggered by programs trying to send mail or act as servers. It
also includes OSFirewall alerts, which prompt you to allow or deny behavior considered
unusual or suspicious. ID Lock alerts and Outbound Mailsafe alerts are also suppressed.
Game Mode settings do not override Block or Allow settings in your Programs List. If
you have configured Zone Labs security software to always block a specific program, it
continues to block that program even if you activate Game Mode with a setting of
Allow.
The use of Game Mode may reduce the security of your system. If you choose to allow
all permission requests, you may increase the chances of a malicious program harming
your computer or gaining access to your data. If, on the other hand, you choose to deny
all requests, you may interrupt the functions of a legitimate program. You should
therefore activate Game Mode only for the duration of your game.
If you close the Activate Game Mode dialog, you turn Game Mode off.
While Game Mode is on, Zone Labs security software displays a special icon in the
system tray ( ).
Note that Game Mode is automatically deactivated if you turn off your computer or if
you turn off Zone Labs security software.
Anti-spyware Displays the Date, Type, Spyware name, Filename, Action, and Actor
columns.
Anti-virus Displays the Date/Time, Type, Virus Name, File Name, Action Taken,
Mode, and E-mail Info columns.
Firewall Displays the Rating, Date/Time, Type, Protocol, Program, Source IP,
Destination IP, Direction, Action Taken, Count, Source DNS, and Des-
tination DNS columns.
IM Security Displays the Date/Time, Type, Source, Program, Local User, Remote
User, and Action columns.
OSFirewall Displays the Rating, Date/Time, Type, Subtype, Data, Program, Direc-
tion, Action Taken, and Count columns.
Program Displays the Rating, Date/Time, Type, Program, Source IP, Destination
IP, Direction, Action Taken, Count, Source DNS, and Destination DNS
columns.
Spy Site Displays the Date/Time and the site that was blocked.
Blocking
The Log Viewer shows security events that have been recorded in the Zone Labs
security software log. To view details of Log Viewer fields for each alert type,
refer to the Firewall, Program Control, Anti-virus, and IM Security chapters.
Field Information
File name The name of the file that caused the event. iloveyou.exe
This field only appears for Anti-virus events.
Action How the event was handled. The value for Anti-virus: Renamed
this field will depend on the type of event IM Security: Encrypted
that occurred.
MailSafe: Quarantined
ID Lock: Blocked
If the Log Archive Frequency check box is not selected, Zone Labs security
software continues to log events for display in the Log Viewer tab, but does not
archive them to the ZAlog.txt file.
4. In the Log Frequency area, specify the log frequency (between 1 and 60 days), then
click Apply.
Specifying the archive location
The ZAlog.txt file and all archived log files are stored in the same directory.
If you are a frequent visitor to eBay, and you have received an ID Lock alert
blocking your eBay password, you can use SmartDefense Advisor to submit a
fraud report to eBay. To learn more about how Zone Labs security software
protects your eBay identity, see “Creating an online fraud protection profile,” on
page 26.
One or two years of access to updates, support, and services is included with the
purchase of ZoneAlarm Anti-virus, ZoneAlarm Pro, or ZoneAlarm Security Suite;
annual maintenance contract required for subsequent access. Zone Labs
reserves the right to remove the features and services available through
ZoneAlarm at any time.
Topics:
171
Chapter 10: Identity protection Understanding the ID Lock feature
Web transmission
When transmitting myVAULT data on the Web, Zone Labs security software allows or
blocks the transmission according to the permission for the domain in the Trusted Sites
list. As with e-mail transmission of myVAULT contents, if you choose to remember
your response to an ID Lock alert for a particular Web site, that Web site will be added
to the Trusted Sites list automatically with the permission set accordingly.
IM transmission
When transmitting myVAULT data in an Instant Messaging conversation, Zone Labs
security software prevents the information from being received.
Figure 10-1 shows an instant messaging conversation in which information that is
stored in myVAULT is transmitted. The description of the item stored in myVAULT (in
this example, My Visa Card) appears in brackets.
Figure 10-2 shows how the transmitted information is displayed to the recipient. The
protected information is replaced with asterisks so that it is unreadable.
About myVAULT
The myVAULT feature provides a secure area for entering your critical personal data—
data that you want to protect from hackers and identity thieves. When it detects an
attempt to send data stored in myVAULT to a destination, Zone Labs security software
determines whether the information should be blocked or allowed. By default, Zone
Labs security software encrypts myVAULT data as it is entered, storing only the hash
value of the data rather than the data itself. Encrypting the data keeps your information
secure, as data cannot be retrieved using the hash value.
If you’re unsure of the type of information that should be entered into myVAULT,
refer to the pre-defined categories for guidance. To access the list of categories,
select Identity Protection | myVAULT, then click Add.
Zone Labs security software displays the item description in ID Lock alerts. Be
sure that the description you enter is different from the value of the item to be
protected. If the information to be protected and the description contain some or
all of the data, you may receive multiple ID Lock alerts.
American Express card For added security, Zone Labs security software does not
record the last 5 digits of your American Express card
number.
Bank account Maximum 14 characters.
Credit card For added security, Zone Labs security software does not
record the last 4 digits of your credit card number.
Driver’s license Maximum 15 characters.
eBay password The password you use to access the eBay Web site. Your
eBay password can only be sent to eBay. Maximum 20
characters.
E-mail Address Maximum 60 characters.
International tax ID Maximum 15 characters.
Mother’s maiden name Maximum 30 characters.
Name Maximum 30 characters.
Passport number US passport number or other International ID number.
Maximum 30 characters.
Password Enter the password to be protected. Maximum 20 charac-
ters.
Phone Separators such as parentheses and dashes are not
allowed. Maximum 13 characters.
US Social Security number Requires 9 digits.
Other Use this field to enter items that either do not correspond
to any of the pre-configured categories, or which exceed
the character limit for the corresponding category. Maxi-
mum 30 characters.
Data encryption is enabled by default. If you do not want to encrypt your data,
clear the Use one-way encryption... check box. Because of the sensitive nature of
the data, PIN numbers, passwords, the last four digits of your social security
number, and the last four digits of your credit card numbers will always be
displayed as asterisks, whether or not you choose to encrypt them.
To disable the encryption confirmation that appears by default, select Identity
Protection | myVAULT, then click Options. Clear the Show encryption confirmation
check box.
Asterisks will appear in place of the data you entered and an encrypted form of your
data will be stored in myVAULT. Zone Labs security software will compare the
encrypted data with your outgoing messages.
6. Specify whether you want the information to be protected when using Web, E-mail,
and Instant Messengers (ZoneAlarm Security Suite only).
If you remove the last item in myVAULT, the ID Lock protection level will be set
to Off. If you later add items to myVAULT, the protection level will be reset to the
default Medium setting.
Access permission
Specifies whether Zone Labs security software will allow, block, or alert you before
sending myVAULT contents to the listed destinations. To modify the permission for a
site, click beside the site in the Access column and choose Allow, Block, or Ask.
Site
Displays the domain of the site.
Type
Specifies whether the site is a Security Alliance partner or a Custom site.
Clear Text password
Specifies whether Zone Labs security software will allow, block, or alert you before
sending your password as clear text to the listed destinations. To modify the permission
for a site, click beside the site in the Clear Text password column and choose Allow,
Block, or Ask.
Site Entry Details
In addition to the site name and type, the Entry Details box displays the site IP Address
and the date and time you last accessed the site.
Topics:
181
Chapter 11: Parental Control Understanding Parental Control
To prevent your children from changing your Parental Control settings, set a Zone
Labs security software password. See “Setting your password,” on page 22.
3. Click OK.
If When rating unavailable is set to allow the site, setting the timeout options to
very low numbers might cause undesirable sites to be allowed. We recommend
keeping the default timeout options.
To block all site categories, click Check All. To allow all site categories, click
Clear All. To revert to default settings, click the Reset to Defaults link.
Default
Category Definition
Setting
Default
Category Definition
Setting
Adult: Sex Edu- Sites that provide information on reproduction, sex- Allowed
cation ual development, sexually transmitted disease,
contraception, safe sex practices, sexuality and
sexual orientation. This does not include sites
offering suggestions or tips on how to have better
sex.
Alcohol/Tobacco Sites that promote or offer for sale alcohol/tobacco Blocked
products or provide the means to create them. Also
may include sites that glorify, tout or otherwise
encourage the consumption of alcohol/tobacco.
Chat Room / Sites that provide chat and Instant Messaging Allowed
Instant Messen- capability.
ger
Criminal Skills / Sites that advocate or give advice on performing Blocked
Illegal Skills / illegal acts such as service theft, evading law
Cheating enforcement, fraud, burglary techniques and pla-
giarism. Sites that provide instructions about or
promote crime, unethical/dishonest behavior or
evasion of prosecution thereof.
Cult / Occult Prominent organized modern religious groups that Allowed
are identified as "cults" by three or more authorita-
tive sources. Sites that promote or offer methods,
means of instruction, or other resources to affect or
influence real events through the use of spells,
curses, magic powers or supernatural beings.
Dating and Per- Sites that promote interpersonal relationships. Allowed
sonals Does not include those pertaining to gay or lesbian
appeal.
Drugs: Illegal Sites that promote, offer, sell, supply, encourage or Blocked
Drugs otherwise advocate the illegal use, cultivation,
manufacture, or distribution of drugs, pharmaceu-
ticals, intoxicating plants or chemicals and their
related paraphernalia.
E-mail Sites offering Web-based E-mail services. Allowed
Freeware / Soft- Sites that promote or offer free software or prod- Allowed
ware Downloads ucts for general download or trial purposes.
Gambling Sites where a user can place a bet or participate in Blocked
a betting pool (including lotteries) online; obtain
information, assistance or recommendations for
placing a bet; receive instructions, assistance or
training on participating in games of chance. Does
not include sites that sell gambling related prod-
ucts or machines.
Default
Category Definition
Setting
Gay and Lesbian Sites that provide information on or cater to gay Allowed
and lesbian lifestyles. Does not include sites that
are sexually oriented.
Glamour / Life- Sites that emphasize or provide information or Allowed
style news on how the user can achieve physical attrac-
tiveness, allure, charm, beauty, or style with
respect to personal appearance.
Government: Mil- Sites that promote or provide information on mili- Allowed
itary tary branches or armed services.
Hacking / Proxy Sites providing information on illegal or question- Blocked
Avoidance Sys- able access to or the use of communications equip-
tems ment/software, or provide information on how to
bypass proxy server features or gain access to URLs
in any way that bypasses the proxy server.
Humor / Jokes Sites that primarily focus on comedy, jokes, fun, Allowed
etc. Does not include sites containing jokes of
adult or mature nature.
Internet Auctions Sites that support the offering and purchasing of Allowed
goods between individuals.
MP3 / Streaming Sites that support and or allow users to download Allowed
music and media files such as MP3, MPG, MOV,
etc. Also includes sites that provide streaming
media (radio, movie, TV).
News Groups Sites that offer access to Usenet New Groups or Allowed
other like sites.
News and Media Sites that primarily report, information, or com- Allowed
ments, on current events or contemporary issues of
the day. Items like weather, editorials, and human
interest are considered target within the context of
major news sites.
Online Games Sites that provide information and support game Allowed
playing or downloading, video games, computer
games, electronic games, tips and advice on games
or how to obtain cheat codes, journals and maga-
zines dedicated to game playing, online games, as
well as sites that support or host online games
including sweepstakes and giveaways.
Pay to Surf Sites Sites that pay users money for clicking on specific Blocked
links or locations.
Default
Category Definition
Setting
Political /Activist Sites that are sponsored by and contain informa- Allowed
/ Advocacy tion about specific political parties or groups. Sites
that are sponsored by or devoted to organizations
that promote change or reform in public policy,
public opinion, social practice, economic activities
and relationships. Excludes commercially spon-
sored sites dedicated to electoral politics or legisla-
tion.
Religion Sites that promote and provide information on Allowed
Buddhism, Baha'I, Christianity, Christian Science,
Hinduism, Islam, Judaism, Mormonism, Shinto,
Sikhism, Atheism, other conventional or unconven-
tional religious or quasi-religious subjects, as well
as churches, synagogues, other houses of worship,
any faith or religious beliefs including “alternative”
religions such as Wicca and witchcraft.
Search Engines / Sites that support searching the Web, indices and Allowed
Portals directories.
Shopping Sites that provide the means to obtain products Allowed
and services that satisfy human wants and or
needs. This does not include products or services
that are principally marketed to satisfy industrial or
commercial needs.
Sports / Recre- Sites that promote or provide information about Allowed
ation / Hobbies spectator sports.
Violence / Hate / Sites which advocate or provide instructions for Blocked
Racism causing physical harm to people or property
through use of weapons, explosives, pranks, or
other types of violence. Sites that advocate hostility
or aggression toward an individual or group on the
basis of race, religion, gender, nationality, ethnic
origin, or other involuntary characteristics; a site
which denigrates others on the basis of those char-
acteristics or justifies inequality on the basis of
those characteristics; a site which purports to use
scientific or other commonly accredited methods to
justify said aggression, hostility or denigration.
Weapons Sites that sell, review, or describe weapons such as Blocked
guns, knives, or martial arts devices, or provide
information on their use, accessories, or other
modifications.
Web Communica- Sites that allow or offer Web based communication Allowed
tion / Message using any of the following mediums: E-mail (Web
Boards based), Chat, Instant Messaging, Message Boards,
etc.
Default
Category Definition
Setting
If you are using ZoneAlarm Security Suite and you choose to block new
categories, you may want to clean your browser cache to remove pages from
newly blocked sites that may be stored there. Otherwise, anyone using your
computer will have access to blocked content that has been stored in your
browser’s cache.
Topics:
191
Chapter 12: Instant Messaging Security IM Security Overview
IM Security Overview
Zone Labs security software provides comprehensive instant messaging (IM) security
for the most popular instant messaging services, including MSN Messenger, Yahoo!
Messenger, AOL Instant Messenger, and ICQ. IM Security also supports third-party
programs that run on these services, such as Trillian. IM Security keeps instant
messaging conversations private and protects computers from IM spammers, identity
thieves, hackers and predators who exploit vulnerable IM connections.
IM Security includes the following features:
! Access Control - Controls which IM services can be accessed using your computer.
! Spam Blocker- Blocks messages sent by people not on your contact lists.
! Feature Control - Determines which IM features are allowed on your computer.
! Inbound threat protection - Guards your computer against attacks by filtering
invalid messages, dangerous scripts, and executable URLs.
! Message Encryption - Protects your IM traffic from being intercepted and read by
others.
Access
Access control lets you allow or block traffic for a particular instant messaging service.
Blocking spam
Spam Blocker filters out unsolicited communications from senders who are not on your
contact list. By default, Spam Blocker is enabled only when the IM Security level is set to
High. However, you can customize your settings to enable Spam Blocker for a particular
service regardless of the protection level.
You will not see visual confirmation that Zone Labs security software blocked an
incoming message, however, you can refer to the log to determine the sender’s
identity. If you want to receive future messages from the sender, be sure to add
the sender’s ID to the contact list for each of your instant messaging programs.
Blocked messages appear in the Log Viewer with “A message from someone not
on your contact list was blocked” in the Type column.
Feature Control
Feature Control settings allow you to restrict the types of media that you can receive
during an instant messaging session. Because inappropriate content can be sent in many
forms, Zone Labs security software allows parents to protect their children by blocking
specific types of media from instant messaging sessions, including audio, video, and
voice transmissions.
When a message is blocked, the sender is notified, as shown in Figure 12-1.
Inbound protection
Inbound protection settings let you specify which instant messaging services are allowed
to transmit active links and formatting tags, such as JavaScript, in incoming messages.
Active links and formatting tags can contain viruses that can attack your computer when
you click on a link in a message.
The Inbound “Tags” setting removes extra formatting that could contain scripts and
other potentially harmful code. The Tags setting also removes innocuous formatting,
such as bold, underline, italic, etc.
The “Active” setting blocks links that, if clicked, could execute code or download
dangerous files onto your computer.
When you send an active link to a contact, it appears as shown in Figure 12-3.
When an active link is filtered from a message, the receiver is notified as shown in
Figure 12-4 shows.
not have encryption enabled, you will see the word unencrypted after the contact’s
instant messaging ID.
Figure 12-5 shows an encrypted conversation.
Here is the same conversation as shown in Figure 12-5, but in unencrypted mode.
If you start an IM program before starting Zone Labs security software, the IM
program will not appear in the History log. To accurately reflect all IM program
activity, start IM programs after starting Zone Labs security software.
Notify me about encryption status of each IM Zone Labs security software marks the
session beginning of each IM session with the
default “encrypted” or “unencrypted”
label.
Label encrypted messages with Attaches the specified label to encrypted
incoming messages. The default label is
“encrypted.”
Label unencrypted messages with Attaches the specified label to unen-
crypted incoming messages. The default
label is “unencrypted.”
Notify me when harmful content is filtered Zone Labs security software will display a
message in your IM window when poten-
tially harmful content is filtered from an
IM conversation.
Block IRC In the event your computer becomes
compromised, this feature blocks
attempts to establish a connection with
IRC channels. This prevents infected
computers from establishing malicious
connections.
If you are an IRC user and require use of
IRC applications, clear this option.
Block all links Filters all URLs, which can be used to
spread worms.
Field Explanation
Topics:
203
Appendix A: Alert reference Informational alerts
Informational alerts
Informational alerts tell you that Zone Labs security software has blocked a
communication that did not fit your security settings. They do not require a decision
from you.
Firewall alerts/Protected
Firewall alerts are the most common type of informational alert. Firewall alerts inform
you that the Zone Labs security software firewall has blocked traffic based on port and
protocol restrictions or other firewall rules.
Why these alerts occur
Firewall alerts with a red band at the top indicate high-rated alerts. High-rated alerts
often occur as a result of hacker activity.
Firewall alerts with an orange band at the top indicate medium-rated alerts. Medium-
rated alerts are likely the result of harmless network traffic, for example, if your ISP is
using ping to verify that you’re still connected. However, they also can be caused by a
hacker trying to find unprotected ports on your computer.
What you should do
If you’re on a home or business network, and your Trusted Zone security is set to High,
normal LAN traffic such as NetBIOS broadcasts may generate firewall alerts. Try
lowering Trusted Zone security to Med.
By default, Zone Labs security software only displays high-rated firewall alerts. If your
defaults have been changed, you may see a lot of medium-rated alerts. Try setting your
alert display settings to medium.
If you are receiving a large number of firewall alerts, and you are working on a home
network or business LAN, it is possible that normal network communications are being
blocked. If this is happening, you can eliminate the alerts by placing your network in the
Trusted Zone.
How to see fewer of these alerts
Repeated alerts may indicate that a resource you want to trust is trying repeatedly to
contact you. If you are receiving a lot of firewall alerts, but you don’t suspect you’re
under attack, try the following troubleshooting steps:
! Determine if the source of the alerts should be trusted.
# Submit repeated alerts to SmartDefense Advisor to determine the source IP
address that caused the alerts.
# If the alerts were caused by a source you want to trust, add it to the Trusted Zone.
! Determine if your Internet Service Provider is sending you “heartbeat” messages.
# Try the procedures suggested for managing ISP heartbeat. See “Allowing ISP
Heartbeat messages,” on page 239.
MailSafe alert
MailSafe alerts let you know that Zone Labs security software has quarantined a
potentially dangerous attachment to an incoming e-mail message. By clicking OK,
you’re not letting anything into your computer.
Why these alerts occur
MailSafe alerts can occur due to violations of Inbound or Outbound MailSafe
protection settings. For example, an Inbound violation occurs when you open an e-mail
that has an attachment whose filename extension is on the list of extensions to be
quarantined in the Attachments tab of the E-mail Protection panel. In such a case, the
alert informs you that Zone Labs security software has changed the extension to
prevent the attachment from being opened without warning. A violation of Outbound
MailSafe protection settings, such as an e-mail that has too many recipients, or too many
e-mails within a short time, can cause a MailSafe alert to occur.
What you should do
How you respond to MailSafe alerts depends upon whether the alert was caused by a
violation of Inbound or Outbound MailSafe protection settings.
If the alert was caused by an Inbound MailSafe violation, do the following:
! Examine the e-mail message carefully. Are you sure it’s from someone you know and
trust? Remember, hackers can fake e-mail messages so that they look like they are
from a friend. Also, if a friend has accidentally opened a file containing an e-mail
worm, that worm may have sent itself to you, using your friend’s e-mail program.
! Contact the sender by telephone or e-mail before opening the attachment to make
sure the message is genuine.
! Open the attachment only if you are certain the attachment is harmless. You can
open the attachment by clicking the quarantine icon (which replaces the normal file
icon).
When you try to open a quarantined attachment, Zone Labs security software will
display a warning dialog box to remind you that the attachment is potentially
dangerous.
Turning off Blocked Program alerts does not affect your level of security.
Remote alert
Remote alerts are displayed on an ICS client machine when Zone Labs security software
blocked traffic at the ICS gateway. If you are not on a machine that is a client in an ICS
network, you will never see this alert.
Why these alerts occur
Remote alerts occur when:
! Zone Labs security software starts up on the ICS gateway. The alert displays the
message “The remote firewall has started.”
! Zone Labs security software shuts down on the ICS gateway. The alert displays the
message “The remote firewall has stopped.”
! The Internet Lock has engaged on the ICS gateway. This may prevent the client
machine from performing some tasks. The alert displays the message “The remote
firewall has engaged the Internet Lock.”
! The Internet Lock is opened on the ICS gateway. The alert displays the message “The
remote firewall has disengaged the Internet Lock.”
What you should do
Click OK to close the alert box. You do not have to do anything else to ensure your
security.
How to see fewer of these alerts
If you do not want to see Remote alerts on the ICS client machine:
1. Select Firewall|Main, then click Advanced.
2. In the Internet Connection Sharing area, clear the check box labeled Forward alerts
from gateway to this computer.
Program alerts
Most of the time, you’re likely to see program alerts when you’re actually using a
program. For example, if you’ve just installed Zone Labs security software, and you
immediately open Microsoft Outlook and try to send an e-mail message, you’ll get a
program alert asking if you want Outlook to have Internet access. However, program
alerts can also occur if a Trojan horse or worm on your computer is trying to spread, or
if a program on your computer is trying to modify your operating system.
If your browser does not have permission to access the Internet, you will be re-
routed to this help file. To access SmartDefense Advisor, give your browser
permission to access the Internet.
! If you’re really not sure what to do, it’s best to click Deny. You can always grant
permission later by going to the Programs tab. “Setting access permissions for new
programs,” on page 74.
How to see fewer of these alerts
It's normal to see several New Program alerts soon after installing Zone Labs security
software. As you assign permissions to each new program, the number of alerts you see
will decrease. To keep from seeing Repeat Program alerts, select Remember this
setting before clicking Allow or Deny.
If SmartDefense Advisor is set to “Auto,” Zone Labs security software issues Program
alerts only if no automatic setting is available. If you choose Remember this setting in
a Program alert when allowing or denying program access, Zone Labs security software
keeps your setting unless SmartDefense Advisor comes out with a different setting, or
until you change the setting manually in the Programs tab.
If you're not sure, it's safest to click Deny. You can always grant permission later
by going to the Programs tab. See “Setting permissions for specific programs,”
on page 76.
# Someone else (for example, a systems administrator at your workplace) may have
updated a program on your computer without your knowledge.
! Are you actively using the application that loaded the component?
If you can answer “yes” to both questions, it is likely that Zone Labs security software
has detected legitimate components that your browser or other programs need to use. It
is probably safe to answer Allow to the Program Component alert.
By clicking Allow, you allow the program to access the Internet while using the new or
changed components. If you cannot answer yes both questions, or if you feel unsure
about the component for any reason, it is safest to click Deny.
By clicking Deny, you prevent the program from accessing the Internet while using
those components.
If you're not sure what to do, or if you decide to click Deny, investigate the
component to determine if it is safe.
If your browser does not have permission to access the Internet, you will be re-
routed to the online help. To access SmartDefense Advisor, give your browser
permission to access the Internet. See “Granting a program permission to access
the Internet,” on page 80.
If you have created an expert firewall rule that blocks VPN traffic, you will need
to modify the expert rule to allow VPN traffic. See “Creating expert firewall
rules,” on page 55.
! If you are running VPN software on your computer and you want to configure the
connection, select either:
Configure Zone Labs security software to support this VPN connection, or
I am running VPN software and would like to configure Zone Labs security
software to support it
! If are running VPN software but do not want Zone Labs security software to
configure your connection, select Do not configure Zone Labs security software
to support this VPN connection.
! If you are not running VPN software, select I am not running VPN software.
How to see fewer of these alerts
If you are running VPN software, the only way to see fewer of these alerts is to properly
configure your Zone Labs security software to allow your VPN software and its
required resources. See “Configuring your VPN connection manually,” on page 36.
OSFirewall alerts
OSFirewall alerts are alerts that appear when programs or processes on your computer
are attempting to modify your computer’s settings or programs.
There are three types of OSFirewall alerts, two of which require a response from you:
Medium-rated Suspicious and High-rated Suspicious. Malicious alerts do not require a
response from you.
OSFirewall protection is not available in ZoneAlarm.
Selecting Remember this setting before clicking Allow or Deny causes Zone Labs
security software to remember your setting and apply it automatically when the
program attempts another similar action. If SmartDefense Advisor is set to Auto,
and you select Remember this setting in an OSFirewall alert, your setting will
remain effective unless SmartDefense Advisor comes out with a different setting,
or until you change the setting manually in the Programs tab.
Selecting Remember this setting before clicking Allow or Deny causes Zone Labs
security software to remember your setting and apply it automatically when the
program attempts another similar action. If SmartDefense Advisor is set to Auto,
and you select Remember this setting in an OSFirewall alert, your setting will
remain effective unless SmartDefense Advisor comes out with a different setting,
or until you change the setting manually in the Programs tab.
ID Lock alert
An ID Lock alert informs you that information stored in myVAULT is about to be sent
to a destination that is not on the Trusted Sites list.
Why these alerts occur
An ID lock alert occurs when information stored in myVAULT is either entered into a
Web page or e-mail message, or when your password is being sent to a destination in
clear text (unencrypted) form without your authorization.
What you should do
You should determine whether the site requesting the information is one that you trust.
Whether you should allow or block the information depends upon the sensitivity of the
information, the legitimacy of the request, and the authenticity of the site. If you are in
the process of making an online purchase with a trustworthy vendor when you see the
alert, it’s probably safe to let the information go through. If you see an alert requesting
your information when you are not performing such a transaction, it’s safest to block
the transmission.
Additionally, a few sites transmit passwords in clear text format. If you were to block
clear text passwords for a site, then visit that site and enter your password, you would
see an ID Lock alert.
How to see fewer of these alerts
You may see frequent ID lock alerts if you frequently submit myVAULT contents to
sites that you have not entered on the Trusted Sites list, or if you have blocked clear text
passwords for a site that uses clear text passwords. You can minimize the number of ID
Lock alerts by adding sites to the Trusted Sites list with which you frequently share your
personal information, and by allowing clear text passwords for those sites that use them.
If you are not certain what network Zone Labs security software has detected,
write down the IP address displayed in the alert box. Then consult your home
network documentation, systems administrator, or ISP to determine what
network it is.
Use caution if Zone Labs security software detects a wireless network. It is
possible for your wireless network adapter to pick up a network other than your
own. Be sure that the IP address displayed in the New Network alert is your
network’s IP address before you add it to the Trusted Zone.
If you are connected to the Internet through a standard modem and dial-up connection,
a Digital Subscriber Line (DSL), or a cable modem, click OK in the New Network alert
pop-up.
If you click Cancel, Zone Labs security software will block your Internet
connection. Do not add your ISP network to the Trusted Zone.
Session not encrypted because [contact's IM This alert appears when you have encryption
ID] disabled encryption enabled, but your contact has disabled
encryption.
Session not encrypted because [contact's IM This alert appears in your instant messaging
ID] is not protected by ZoneAlarm Security window when you are having a conversation
Suite with a contact who is not using ZoneAlarm
Security Suite
Information about [description] was removed This alert appears when you attempt to
from your previous message in compliance transmit information that is stored in
with your ID Lock settings myVAULT. The description of the item as it
appears in myVAULT is displayed between
brackets.
Link removed This alert appears in the message recipi-
ents’s window in place of a removed link.
Session encrypted This alert appears at the beginning of an
encrypted instant messaging conversation.
Potentially harmful content was removed This alert is appended to the filtered mes-
from this message sage.
Your message was blocked because you are This alert appears when you attempt to send
not on [contact's IM ID]'s contact list a message to someone who has Spam
Blocker enabled, but who does not have you
on his or her contact list.
A file transfer on [contact's IM ID]'s PC was This alert appears when you attempt to send
blocked a file to a contact, but the contact has
blocked file transfers in ZoneAlarm Security
Suite.
Video transmission on [contact's IM ID]'s PC This alert appears when a you attempt to
was blocked transmit video to a contact, but the contact
has blocked video transmission.
Potentially harmful formatting or scripting This alert appears when your contact set the
was removed from your last message Inbound protection option for Tags to Block,
and you attempt to send a message to a con-
tact that includes formatting or scripting.
A potentially harmful link was removed from This alert appears when your contact set the
your last message Inbound protection option for Active to
Block, and you attempt to send a message to
a contact that includes an executable link.
225
Appendix B: Keyboard shortcuts Navigation shortcuts
Navigation shortcuts
Use these keystrokes to navigate through Zone Labs security software's panels, Tabs,
and dialog boxes. Use F6 to reach the navigation element you want. Then use UP,
DOWN, LEFT, and RIGHT arrows to reach the selection you want within that group.
For example:
Keystroke Function
Keystroke Function
Keystroke Function
Keystroke Function
Button shortcuts
Use the keystrokes below to click available buttons in an active window.
Topics:
233
Appendix C: Troubleshooting VPN
VPN
If you are having difficulty using VPN software with Zone Labs security software, refer
to the table for troubleshooting tips provided in this section.
If... See...
You can't connect to your Virtual Private Net- “Configuring Zone Labs security software for
work (VPN) VPN traffic,” on page 234
You have created expert firewall rules “VPN auto-configuration and expert rules,”
on page 234
You are using a supported VPN client and “Automatic VPN detection delay,” on
Zone Labs security software does not detect page 234
it automatically the first time you connect
automatically, you can wait ten minutes then, try connecting again. If you prefer to
connect right away, you can configure your connection manually. See “Configuring your
VPN connection,” on page 35.
Networking
If you are having difficulty connecting to your network or using networking services,
refer to the table for troubleshooting tips provided in this section.
If ... See...
You can’t see the other computers in your “Making your computer visible on your local
Network Neighborhood, or if they can’t see network,” on page 236
you
You can’t share files or printers over your “Sharing files and printers across a local net-
home or local network work,” on page 236
Your computer is on a Local Area Network “Resolving a slow start up,” on page 237
(LAN) and takes a long time to start up when
Zone Labs security software is installed
Zone Labs security software will detect your network automatically and display
the New Network alert. You can use the alert to add your network subnet to the
Trusted Zone. For more information, see “New Network alert,” on page 221.
Internet Connection
If you are having difficulty connecting to the Internet, refer to the table for
troubleshooting tips provided in this section.
If... See...
You cannot connect to the Internet “Connecting to the Internet fails after instal-
lation,” on page 238
You can connect to the Internet but are dis- “Allowing ISP Heartbeat messages,” on
connected after a short time page 239
Your computer is an Internet Connection “Connecting through an ICS client,” on
Sharing (ICS) client and you can’t connect to page 239
the Internet
Your computer uses a proxy server to connect “Connecting through a proxy server,” on
to the Internet and you can’t connect to the page 240
Internet
You see the message “Could not contact “Unable to connect to program advice
automatic program server” in a program server,” on page 240
alert.
that Zone Labs security software is properly configured for the client and gateway
machines. See “Enabling Internet Connection Sharing,” on page 34.
Do not configure Zone Labs security software for Internet Connection Sharing if you
use hardware such as a server or router, rather than a host PC.
IM Security
If you are having difficulty with the IM Security feature, refer to the table for
troubleshooting tips provided in this section.
If... See...
An active IM program does not appear in the “IM programs not appearing in status,” on
Protection Status table page 241
Anti-virus
If you are having difficulty connecting using anti-virus software refer to the table for
troubleshooting tips provided in this section.
If... See...
them automatically, or if they must be uninstalled manually. If the products listed cannot
be uninstalled automatically, refer to the individual vendor’s documentation for
instructions for uninstalling the products.
Third-party software
Many of your most commonly used programs can be configured automatically for
Internet access. Although, in some cases, Internet access can be configured
automatically, many programs also require server access rights.
If you are using programs that Zone Labs security software is unable to recognize and
configure automatically, you may need to configure permissions manually. Refer to the
sections that follow to learn how to configure your programs for use with Zone Labs
security software.
Anti-virus
In order for your anti-virus software to receive updates it must have access permission
for the Trusted Zone.
Automatic updates
In order to receive automatic updates from your anti-virus software vendor, add the
domain that contains the updates (e.g., update.avsupdate.com) to your Trusted Zone.
See “Adding to the Trusted Zone,” on page 47.
E-mail protection
In some cases, Zone Labs security software’s MailSafe feature may conflict with the e-
mail protection features of anti-virus software. If this occurs, you can adjust Zone Labs
security software and anti-virus settings so that you benefit from both anti-virus and
Zone Labs security software protection.
Browsers
In order for your browser to work properly, it must have access permission for the
Internet Zone and Trusted Zone. Before granting permission, make sure that you
understand how to configure your browser’s security for optimal protection and have
the latest service packs installed for the browser you are using.
To grant your browser access permission, do any of the following:
! Grant access to the program directly. See “Granting a program permission to access
the Internet,” on page 80.
! Select Allow when a Program alert for the browser appears.
Internet Explorer
If you are using Windows 2000, you may need to allow Internet access rights to the
Services and Controller App (the file name is typically services.exe).
We strongly recommend that you set your chat software to refuse file transfers
without prompting first. File transfer within chat programs is a means to
distribute malware such as worms, viruses, and Trojan horses. Refer to your chat
software vendor's help files to learn how to configure your program for maximum
security. If you are using ZoneAlarm Security Suite, set the IM Security level to
High to block file transfers.
E-mail programs
In order for your e-mail program (for example, Microsoft Outlook) to send and receive
mail, it must have access permission for the Zone the mail server is in. In addition, some
e-mail client software may have more than one component requiring server permission.
For example, Microsoft Outlook requires that both the base application
(OUTLOOK.EXE) and the Messaging Subsystem Spooler (MAPISP32.exe) to have
server permission.
While you can give your e-mail program access to the Internet Zone, and leave the mail
server there, it’s safer to place the mail server in the Trusted Zone, and limit the
program's access to that Zone only. Once your e-mail client has access to the Trusted
Zone, add the remote mail server (host) to the Trusted Zone.
To learn how to give a program permission to access or act as a server to the Trusted
Zone, see “Setting program permissions manually,” on page 65.
To learn how to add a host to the Trusted Zone, see “Managing traffic sources,” on
page 46.
FTP programs
To use FTP (File Transfer Protocol) programs, you may need to make the following
settings adjustments in your FTP client program and in Zone Labs security software:
! Enable passive or PASV mode in your FTP client
This tells the client to use the same port for communication in both directions. If
PASV is not enabled, Zone Labs security software may block the FTP server's
attempt to contact a new port for data transfer.
Games
In order to play games over the Internet while using Zone Labs security software, you
may have to adjust the settings listed below.
Note that you can configure Zone Labs security software to suppress most alerts
while you are playing a game. For details, see “Game Mode,” on page 162.
Program permission
In order to function, many Internet games require access permission and/or server
permission for the Internet Zone.
The easiest way to grant access is to answer “Allow” to the program alert caused by the
game program. However, many games run in “exclusive” full screen mode, which will
prevent you from seeing the alert. Use any of the methods below to solve this problem.
! Set the game to run in a window
This will allow you to see the alert, if the game is running at a resolution lower than
that of your desktop. If the alert appears but you cannot respond to it because your
mouse is locked to the game, press the Windows logo key on your keyboard.
After granting the game program Internet access, reset the game to run full-screen.
! Use software rendering mode
By changing your rendering mode to “Software Rendering,” you can allow Windows
to display the alert on top of your game screen. After allowing the game Internet
access, you can change back to your preferred rendering device.
! Use Alt+Tab
Press Alt+Tab to toggle back into Windows. This leaves the game running, but
allows you to respond to the alert. Once you have allowed Internet access, press
Alt+Tab again to restore your game.
The last method may cause some applications to crash, especially if you are
using Glide or OpenGL; however, the problem should be corrected the next time
you run the game. Sometimes you can use Alt-Enter in the place of Alt-Tab.
Security level/Zone
Some Internet games, particularly those that use Java, applets, or other Web-based
portal functionality, may not work properly when your Internet Zone security level is set
to High. High security will also prevent remote game servers from “seeing” your
computer. To solve these problems, you can:
! Change your Internet Zone security level to Medium, or
! Add the IP address of the game server you’re connecting to the Trusted Zone. The
game manufacturer’s documentation should indicate the IP address or host name of
the server.
To learn how to add a host or IP address to the Trusted Zone, see “Adding to the
Trusted Zone,” on page 47.
Trusting game servers means trusting the other players in the game. Zone Labs
security software does not protect you from attacks instigated by fellow gamers
in a trusted environment. Make sure that you understand how to configure your
browser's security for optimal protection and have the latest service packs
installed for the browser you are using.
If your remote control client or host is on a network not under your control (for
example on a business or university LAN), perimeter firewalls or other features of
the network may prevent you from connecting. If you still have problems
connecting after following the instructions above, contact your network
administrator for assistance.
VNC programs
In order for VNC and Zone Labs security software to work together, follow the steps
below.
1. On both the server and viewer (client) machine, do one of the following:
# If you know the IP address or subnet of the viewer (client) you will be using for
remote access, and it will always be the same, add that IP or subnet to the Trusted
Zone. See “Adding to the Trusted Zone,” on page 47.
If you do not know the IP address of the viewer, or if it will change, then give the
program access permission and server permission for the Trusted and Internet
Zones. See “Setting access permissions for new programs,” on page 74.
When prompted by VNC Viewer on the viewer machine, enter the name or IP
address of the server machine, followed by the password when prompted. You
should be able to connect.
If you enable VNC access by giving it server permission and access permission,
be sure to set and use your VNC password in order to maintain security. We
recommend adding the server and viewer IP addresses to the Trusted Zone,
rather than giving the application Internet Zone permission, if possible.
2. On the viewer (client) machine, run VNC Viewer to connect to the server machine.
Do not run in “listen mode.”
Telnet
To access a remote server via Telnet, add the IP address of that server to your Trusted Zone.
251
Appendix D: Program behavior Medium-rated suspicious behavior
Modifications of the startup A program is setting itself to Unless you are installing a
directory run each time your computer program, you should deny
is started. this action, as it could be
spyware.
Modification of browser Your default browser search is Unless you are currently
search defaults being modified. modifying your browser’s
search function, you should
deny this action.
Modification of browser page Your default browser home Unless you are changing
defaults page is being modified. your home page, you should
deny this action.
Unloading of driver A program is trying to trying There are no legitimate rea-
to unload another program’s sons for this behavior. You
driver. should deny this action.
3DES
Short for Triple Data Encryption Standard, a standards-based symmetric-key
encryption method using a 168-bit key. 3DES is a more robust variation of the
older 56-bit DES encryption standard.
ACCESS PERMISSION
Access permission allows a program on your computer to initiate
communications with another computer. This is distinct from server
permission, which allows a program to “listen” for connection requests from
other computers. You can give a program access permission for the Trusted
Zone, the Internet Zone, or both.
ACT AS A SERVER
A program acts as a server when it “listens” for connection requests from other
computers. Several common types of applications, such as chat programs, e-
mail clients, and Internet Call Waiting programs, may need to act as servers to
operate properly. However, some hacker programs act as servers to listen for
instructions from their creators. Zone Labs security software prevents
programs on your computer from acting as servers unless you grant server
permission.
ACTIVEX CONTROLS
A set of technologies developed by Microsoft that can be automatically
downloaded and executed by a Web browser. Because ActiveX controls have
full access to the Windows operating system, they have the potential to damage
software or data on a user’s machine.
AD BLOCKING
A Zone Labs security software feature that enables you to block banner, pop-
up and other types of advertisements.
ANIMATED AD
An advertisement that incorporates moving images.
BANNER AD
An ad that appears in a horizontal banner across a Web page.
BLOCKED ZONE
The Blocked Zone contains computers you want no contact with. Zone Labs
security software prevents any communication between your computer and the
machines in this Zone.
BLUE COAT
Blue Coat is a software development and application services company that
filters, monitors and reports on Internet use and activity. ZoneAlarm Pro’s
Parental Control feature uses Blue Coat content categories to determine
whether access to Web sites you visit will be allowed or blocked.
CACHE CLEANER
Privacy feature that enables you to remove unwanted files and cookies from
your computer on demand, or on a scheduled basis.
CLEAR TEXT
Clear text, also referred to as “plain text,” is data that is being transmitted in
textual form and is not encrypted. Because the data is not encrypted, it could
be intercepted and read by others during transmission.
COLLABORATIVE FILTER
A feature of Zone Labs security software’s junk e-mail filter. Collaborative
filtering uses information extracted from junk e-mail reported by you and other
Zone Labs security software users to determine the probability that new
messages from unknown senders are spam.
COMPONENT
A small program or set of functions that larger programs call on to perform
specific tasks. Some components may be used by several different programs
simultaneously. Windows operating systems provide many component DLLs
(Dynamic Link Libraries) for use by a variety of Windows applications.
COOKIE
A small data file used by a Web site to customize content, remember you from
one visit to the next, and/or track your Internet activity. While there are many
benign uses of cookies, some cookies can be used to divulge information about
you without your consent.
COOKIE CONTROL
Privacy feature that allows you to prevent cookies from being stored on your
computer.
DES
Short for Data Encryption Standard, a popular symmetric-key encryption
method using a 56-bit key. DES has been supplanted by 3DES, a more robust
variation of DES.
DESTRUCTIVENESS
Refers to the extent of the damage caused by a virus. The Destructiveness
rating refers to the degree to which the damage can be reversed. A low
Destructiveness rating would indicate that the scale of the interruption was
small, and that any damage done could be reversed. A Medium or High
Destructiveness rating would indicate that the damage caused may be
irreversible, or that it caused a widespread interruption.
DIAL-UP CONNECTION
Connection to the Internet using a modem and an analog telephone line. The
modem connects to the Internet by dialing a telephone number at the Internet
Service Provider’s site. This is in distinction to other connection methods, such
as Digital Subscriber Lines, that do not use analog modems and do not dial
telephone numbers.
a Windows application.
DRIVER
A program that controls a device. In Windows environments, drivers often
have a.DRV extension. A driver acts like a translator between the device and
programs that use the device. Each device has its own set of specialized
commands that only its driver knows. In contrast, most programs access
devices by using generic commands. The driver accepts generic commands
from a program and then translates them into specialized commands for the
device.
EMBEDDED OBJECT
An object such as a sound file or an image file that is embedded in a Web page.
ENCRYPTION
The process of transmitting scrambled data so that only authorized recipients
can unscramble it. For instance, encryption is used to scramble credit card
information when purchases are made over the Internet.
GAME MODE
Game Mode temporarily suppresses most Zone Labs security software scans,
product updates, and alerts, so that you can play games on your computer with
fewer interruptions. Game Mode lets you temporarily allow or deny all
program permission requests, so that Zone Labs security software can answer
such requests automatically without displaying alerts.
GATEWAY
In networking, a combination of hardware and software that links two
different types of networks. For example, if you are on a home or business
Local Area Network (LAN), a gateway enables the computers on your network
to communicate with the Internet.
HASH
A hash is a number generated by a formula from a string of text in such a way
that it is unlikely that some other text would produce the same value. Hashes
are used to ensure that transmitted messages have not been tampered with.
HEARTBEAT MESSAGES
Messages sent by an Internet Service Provider (ISP) to make sure that a dial-up
connection is still in use. If it appears a customer is not there, the ISP might
HIGH-RATED ALERTS
An alert that is likely to have been caused by hacker activity. High-rated
Firewall alerts display a red band at the top of the alert pop-up. In the Log
Viewer, you can see if an alert was high-rated by looking in the Rating column.
INDEX.DAT
Index.dat files keep copies of everything that was in your Temporary Internet,
Cookies, and History folders even AFTER these files have been deleted.
INFORMATIONAL ALERTS
The type of alerts that appear when Zone Labs security software blocks a
communication that did not match your security settings. Informational alerts
do not require a response from you.
INTERNET ZONE
The Internet Zone contains all the computers in the world—except those you
have added to the Trusted Zone or Blocked Zone.
Zone Labs security software applies the strictest security to the Internet Zone,
keeping you safe from hackers. Meanwhile, the medium security settings of the
Trusted Zone enable you to communicate easily with the computers or
networks you know and trust—for example, your home network PCs, or your
business network.
IP ADDRESS
The number that identifies your computer on the Internet, as a telephone
number identifies your phone on a telephone network. It is a numeric address,
usually displayed as four numbers between 0 and 255, separated by periods.
Your IP address may always be the same. However, your Internet Service
Provider (ISPs) may use Dynamic Host Configuration Protocol (DHCP) to
assign your computer a different IP address each time you connect to the
Internet.
JAVA APPLET
A small Internet-based program written in Java that is usually embedded in an
HTML page on a Web site and can be executed from within a browser.
JAVASCRIPT
A popular scripting language that enables some of the most common
interactive content on Web sites. Some of the most frequently used JavaScript
functions include Back and History links, changing images on mouse-over, and
opening and closing browser windows. Zone Labs security software default
settings allow JavaScript because it is so common and because most of its uses
are harmless.
KEYLOGGER
A form of spyware that records keystrokes on your computer, often sending
the data to a remote server. Any text input using the keyboard, including credit
card numbers or other sensitive personal information could be gathered by a
keylogging program and used to commit identity theft.
MAIL SERVER
The remote computer from which the e-mail program on your computer
retrieves e-mail messages sent to you.
MD5 SIGNATURE
A digital “fingerprint” used to verify the integrity of a file. If a file has been
changed in any way (for example, if a program has been compromised by a
hacker), its MD5 signature will change as well.
MEDIUM-RATED ALERT
An alert that was probably caused by harmless network activity, rather than by
a hacker attack.
MESSAGE FILTERS
A feature of Zone Labs security software’s junk e-mail filter. Message Filters
use heuristic rules to analyze e-mail for characteristics common to various
MOBILE CODE
Executable content that can be embedded in Web pages or HTML e-mail.
Mobile code helps make Web sites interactive, but malicious mobile code can
be used to modify or steal data, and for other malevolent purposes.
OPENSSL
OpenSSL is an open source security protocol based on the SSL library
developed by Eric A. Young and Tim J. Hudson.
PACKET
A single unit of network traffic. On “packet-switched” networks like the
Internet, outgoing messages are divided into small units, sent and routed to
their destinations, then reassembled on the other end. Each packet includes the
IP address of the sender, and the destination IP address and port number.
PASS-LOCK
When the Internet Lock is engaged, programs given pass-lock permission can
continue accessing the Internet. Access permission and server permission for
all other programs is revoked until the lock is opened.
PERSISTENT COOKIE
A cookie put on your hard drive by a Web site you visit. These cookies can be
retrieved by the Web site the next time you visit. While useful, they create a
vulnerability by storing information about you, your computer, or your
Internet use in a text file.
PERVASIVENESS
Pervasiveness refers to a virus’ potential to spread. A boot sector virus that
spreads through the manual sharing of floppy disks is given a low
Pervasiveness rating, while a worm that has the ability to send itself out to a
PHISHING
The act of sending a deceptive e-mail that falsely claims to be from a legitimate
business or agency. A phishing e-mail attempts to deceive recipients into
providing personal information that can then be used for fraudulent purposes.
PHYSICAL MEMORY
The memory hardware (normally RAM) installed in a computer.
PING
A type of ICMP message (formally “ICMP echo”) used to determine whether
a specific computer is connected to the Internet. A small utility program sends
a simple “echo request” message to the destination IP address, and then waits
for a response. If a computer at that address receives the message, it sends an
“echo” back. Some Internet providers regularly “ping” their customers to see
if they are still connected.
POP-UNDER AD
An ad that appears in a new browser window that opens under the window
you're looking at, so you don't see the ad until you close the original browser
window.
POP-UP AD
An ad that appears in a new browser window that 'pops up' in front of the
window you're looking at.
PORT
A channel associated with the use of TCP or UDP. Some ports are associated
with standard network protocols; for example, HTTP (Hypertext Transfer
Protocol) is traditionally addressed to port 80. Port numbers range from 0 to
65535.
PORT SCAN
A technique hackers use to find unprotected computers on the Internet. Using
automated tools, the hacker systematically scans the ports on all the computers
in a range of IP addresses, looking for unprotected or “open” ports. Once an
open port is located, the hacker can use it as an access point to break in to the
unprotected computer.
PRIVACY ADVISOR
A small display that shows you when Zone Labs security software blocks
cookies or mobile code, and enables you to un-block those elements for a
particular page.
PRIVATE NETWORK
A home or business Local Area Network (LAN). Private networks are placed
PROGRAMS LIST
The list of programs to which you can assign Internet access and server
permissions. The list is shown in the Programs tab of the Program Control
panel. You can add programs to the list, or remove programs from it.
PROTOCOL
A standardized format for sending and receiving data. Different protocols
serve different purposes; for example SMTP (Simple Mail Transfer Protocol)
is used for sending e-mail messages; while FTP (File Transfer Protocol) is used
to send large files of different types. Each protocol is associated with a specific
port, for example, FTP messages are addressed to port 21.
PUBLIC NETWORK
A large network, such as that associated with an ISP. Public networks are
placed in the Internet Zone by default.
QUARANTINE
A method used to render harmless suspicious attachments, viruses, or spyware.
SCRIPT
A series of commands that execute automatically, without the user intervening.
These usually take the form of banners, menus that change when you move
your mouse over them, and pop-up ads.
SECURITY LEVELS
The High, Med., and Off settings that dictate the type of traffic allowed into or
out of your computer.
SELF-SIGNED CERTIFICATE
A public-key certificate for which the public key bound by the certificate and
the private key used to sign the certificate are components of the same key pair,
which belongs to the signer.
SERVER PERMISSION
Server permission allows a program on your computer to “listen” for
connection requests from other computers, in effect giving those computers
the power to initiate communications with yours. This is distinct from access
permission, which allows a program to initiate a communications session with
another computer.
SESSION COOKIE
A cookie stored in your browser’s memory cache that disappears as soon as
you close your browser window. These are the safest cookies because of their
short life-span.
SHA1
An algorithm used for creating a hash of data.
SKYSCRAPER AD
An ad that appears in a vertical column along the side of a Web page.
SMARTDEFENSE ADVISOR
Zone Labs SmartDefense Advisor is an online utility that enables you to
instantly analyze the possible causes of an alert, and helps you decide whether
to respond Allow or Deny to a Program alert. To use SmartDefense Advisor,
click the More Info button in an alert pop-up. Zone Labs security software
sends information about your alert to SmartDefense Advisor. SmartDefense
Advisor returns an article that explains the alert and gives you advice on what,
if anything, you need to do to ensure your security.
SPAM
An inappropriate attempt to use a mailing list or USENET or other networked
communications facility as if it were are broadcast medium by sending
unsolicited messages to a large number of people.
STEALTH MODE
When Zone Labs security software puts your computer in stealth mode, any
uninvited traffic receives no response--not even an acknowledgement that your
computer exists. This renders your computer invisible to other computers on
the Internet, until permitted program on your computer initiates contact.
TROJAN HORSE
A malicious program that masquerades as something useful or harmless, such
as a screen saver. Some Trojan horses operate by setting themselves up as
servers on your computer, listening for connections from the outside. If a
hacker succeeds in contacting the program, he can effectively take control of
your computer. This is why it's important to only give server permission to
programs you know and trust. Other Trojan horses attempt to contact a
remote address automatically.
TrueVector engine that examines Internet traffic and enforces security rules.
TRUSTED ZONE
The Trusted Zone contains computers you trust and want to share resources
with.
For example, if you have three home PCs that are linked together in an
Ethernet network, you can put each individual computer or the entire network
adapter subnet in the Zone Labs security software Trusted Zone. The Trusted
Zone's default medium security settings enable you to safely share files,
printers, and other resources over the home network. Hackers are confined to
the Internet Zone, where high security settings keep you safe.
WEB BUG
An image file, often 1x1 pixel, designed to monitor visits to the page (or HTML
e-mail) containing it. Web bugs are used to find out what advertisements and
Web pages you have viewed. If you have blocked web bugs using Privacy
control, blank boxes will appear in place of the web bugs.
WILD
Refers to a virus that is spreading as a result of normal day-to-day operations
on and between the computers of unsuspecting users. The Wild rating refers
to the number of customer reports about this virus. A low Wild rating will
reflect a low number of customer reports, whereas a Medium or High Wild
rating will reflect a more substantial number of customer reports.
SYMBOLS alerts
high-rated 204
.zl6 file extension 133
ID Lock 220
Informational 204
A Internet Lock 207
logging of 159
Access control medium-rated 204
about 192 New Network 221
setting options for 200 OSFirewall 218
access permission preferences for 75
and anti-virus software 244 Program
browser software and 244 Advanced Program alert 215
configuring for programs 7 Automatic VPN Configuration alert 35, 215
e-mail programs and 246 Blocked Program 206
for Trusted Zone 19 Changed Program alert 211
FTP programs and 247 MailSafe 116
games and 247 Manual Action Required alert 216
granting to programs 38, 65 New Program 210, 218, 219
password and 74 Repeat Program alert 164
setting for ports 51 Server Program alert 65, 164, 207, 245
act as server 19 reference 203–222
defined 257 responding to 20, 35
Action stopping them while gaming 162–163
in expert rule 55, 61 Alt 59
in Log Viewer 49, 166 Amazon protection profile, creating 26
Active Programs area 14 animated ads
activist sites, blocking 188 blocking 137
ad blocking filling void left by 144
about 136 answering machine programs 246
adding antivirus protection
custom ports 51 status, viewing 109
expert rules to programs 87 antivirus protection feature 89–113
networks to the Trusted Zone 44 anti-virus software
programs to the programs list 79 e-mail protection and 244
to the Blocked Zone 48 antivirus software
to the Trusted Zone 47 e-mail protection and 244
wireless networks to the Internet Zone 45 AOL
Address 59 in expert rules 58
Address Mask Reply and Request 59 Instant Messager, using 245
Address Resolution Protocol, enabling 43 Privacy Site List and 141
adult content, blocking 185 AOL Instant Messenger 192
Advanced Program alert 215 Application Interaction 82
adware 108 Application Interaction Control 68
archive files
viruses and 101
asterisks, use of 176
Attachments List
accessing 118
editing 118
Dynamic Host Configuration Protocol (DHCP) messages file and printer sharing
default port permissions for 50 enabling 33, 221
in Day/Time group 59 network security and 44
remote control programs and 248 server access and 214
Dynamic Real-time rating (DRTR) 184 troubleshooting 246
File event 73
file fragments, removing see Cache Cleaner 148
E file transfer, blocking 223
eBay protection profile, creating 26 filter options, setting 83
EBay, blocking 187 filtering Web content 185
echo request Firewall alert 153
in expert rules 59 determining source of 204
e-mail logging of 164
fraudulent, reporting 126 responding to 204
junk, reporting 125 firewall protection 39–62
E-mail Filter toolbar 123 about 40
e-mail protection 115–122 advanced security options 42–48
about 116 blocking and unblocking ports 50
Attachments List 118 expert rules and 53–54
inbound 116, 117 keeping current 17
outbound 117 setting security level for 41
status of 244 FireWire 43
embedded objects, blocking 146 foreign language filters 126
Encapsulating Security Payload (ESP) protocol formatting log file 164
VPN protocols and 35, 43 forms data, removing from cache see Cache Cleaner
Encryption 192 fragments, blocking 43
about 196 fraudulent e-mail, see junk e-mail filter
enabling and disabling 197 Fraudulent Mail folder 126
examples 196–197 FTP
setting options for 200 programs, using 246
Eudora, infected e-mail and 133 protocols, adding to expert rules 58
event logging full system scan 97
about 159
customizing 164
turning on and off 160 G
Execution event 73 Game Mode 162–163
expert firewall rules games
about 53 online, blocking access to 186
creating 55–56 stopping alerts while playing 162–163
editing 62 using with Zone Labs security software 247–248
enforcement of 53–54 gaming software
for programs 87 suspicious behavior and 254
managing 61–62 gateway
ranking 61 adding to the Trusted Zone 47
tracking options for 62 as Location type 57
expiration date forwarding or suppressing alerts 42
setting for cookies 143 Internet Connection Sharing (ICS) and 34
subscription services and 17 default port permissions 50
security enforcement of 42
Generic Routing Encapsulation (GRE) protocol
F mentioned 43
Feature Control VPN protocols and 35, 38
about 194 glamour and lifestyle sites, blocking 187
mentioned 192 government sites, blocking 187
setting options for 200 groups
adding to expert rules 57–60
H Inbound Protection
about 194–196
Hacker ID
mentioned 192
about 170
setting options for 200
hard drive, cleaning 148
Inbound/Outbound traffic indicator 13
harmful links, removing 223
index.dat files, removing see Cache Cleaner
heartbeat messages
infected files
allowing 239
risk assessment of 100, 105
defined 260
Information reply 59
dial-up connection, troubleshooting 239
Information request 59
High security setting
Informational alerts 153, 204
about 18
installing
ad blocking and 137
ZoneAlarm 4
alert events shown in 160
installing Zone Labs security software 1–5
allowing uncommon protocols 38
Instant Messaging services
cookie control 137
blocking access to 192
default port permissions in 50–51
encrypting traffic 196
file and printer sharing 33
Intelligent quick scan 97
firewall protection and 41
Internet auction sites, blocking 187
for ID Lock 174
Internet Connection Sharing (ICS)
for Internet Zone 41
alert options for 208
for Trusted Zone 41
enabling 34
logging options and 160
setting security options for 42
privacy protection and 137
Internet Control Messaging Protocol (ICMP)
program control and 67
default port permissions for 50
high-rated alerts 204
in expert firewall rules 53
High-rated Suspicious Behavior alert 218
message types 59
home network
troubleshooting Internet connection 239
Firewall alerts and 204
Internet Explorer
host file, locking 43
cache, cleaning 149
host name
granting access permission to 245
adding to Trusted Zone 237
privacy protection and 137
in list of traffic sources 46
setting cleaning options for 148
in Privacy Site list 141
Internet Key Exchange (IKE) protocol
Hotmail, special folders 123, 131
VPN protocols and 35
humor sites, blocking 187
Internet Lock 14, 15
Hypertext Transfer Protocol (HTTP)
icon 15
in expert firewall rules 59
Internet Lock alerts 207
Internet Relay Chat, blocking 201
I Internet Service Provider (ISP)
heartbeat messages from 13, 239
ID Lock 171–179 in alert details 155
overview 172 in list of traffic sources 46
see also myVAULT Internet Zone 14
ID Lock alert 220 adding networks to automatically 44, 45
Identity Protection Center 171, 180 networks, adding to automatically 30
identity theft permissions and 19
protection from 171, 180 IP address
ie3.proxy.aol.com 141 adding to the Trusted Zone 33, 47
IGMP determining network type from 30, 31
default port permissions for 50 hiding in submissions to Zone Labs 25
in expert rules 53, 87 in expert rules 53
IM Security in list of traffic sources 46
overview 192–198 IP Security (IPSec) protocol
IMAP4 VPN protocols and 35
in expert rules 58 isafe.exe 134
J log entries
about 159
Java applets, blocking 146
archiving 169
JavaScript
expert rules and 87
e-mail protection and 116
fields in 168
junk e-mail filter
for Program alerts 164
and privacy 129
for programs 164
automatic reporting option 130
formatting 164
blocking company names 124
options for 164
blocking mailing lists 124
viewing 165, 167
blocking senders 123
Log Viewer
Challenged Mail folder 129
accessing 165
collaborative filter 126
using 201–202
contributing junk e-mail 125
Lookup button 57
foreign language filters 126
loopback adaptor
Fraudulent Mail folder 126
adding to the Trusted Zone 35
Hotmail, and 123, 131
Low security setting
Junk Mail folder 125
Changes Frequently option 80
message filtering options 126
default port permissions for 50–51
message filters 126
file and printer sharing and 41
protecting privacy 125, 126
program control and 67
reporting fraudulent e-mail 125, 126, 130
Zones and 41
reporting junk e-mail 125
lsass.exe 20
reports 132
special Outlook folders 123–132
toolbar 123 M
wireless device support 130
mail servers, connecting to 33
Junk E-mail Filter, see junk e-mail filter 123
mail trash, cleaning see Cache Cleaner
Junk Mail folder 125
MailFrontier 125
MailSafe
K outbound protection
sender’s address, verifying 27
keeping cookies 149
MailSafe alert 116, 205
keyboard and mouse
MD5 Signature 80
monitoring 253
defined 262
keyboard shortcuts 225–232
Medium security setting
keylogger 108
about 18
killing a program 79
ad blocking and 137
alert events 160
L alerts and 204, 213
customizing 19
Layer 2 Tunneling protocol (L2TP) default port permissions for 50–51
VPN protocols and 35 file and printer sharing and 33
license key ID Lock and 174
updating 27 Internet Zone and 41, 239, 246
Lightweight Directory Access protocol (LDAP) logging options and 160
VPN protocols and 35 networking and 33
local servers, blocking 43 port access and 51
Location 57 privacy protection and 137
locations program control and 67, 246
adding to expert firewall rules 56 resource sharing and 237
creating groups of 57 Trusted Zone and 41, 47, 236
lock icon uncommon protocols and 43
in System Tray 15 Medium security setting, defined 199
lock mode, specifying 71 medium-rated alerts 204
message encryption 192
Message event 73
message filters 126
military sites, blocking 187
preferences protocols
for firewall protection 42 creating group of 57
for Parental Control 184 default permissions for 50
for Program Control 75 firewall protection and 43
keyboard shortcut 230 in expert firewall rules 53
load at startup 238 in expert rules 43
preferences, setting 24 mail 33
printers see network resources, sharing VPN 35, 38
Privacy Advisor proxy server
using 139 avoidance systems, blocking access to 187
Privacy Protection troubleshooting Internet Connection 238
ad blocking public network
customizing 144–145 defined 265
setting level for 137 Network Configuration Wizard and 30
Cache Cleaner 147–150
running manually 147
cookie control 142–143 Q
customizing 142–143 quarantine
setting level for 137 icon 205
enabling per program 137 Inbound MailSafe protection and 116
mobile code control opening attachments 120, 244
customizing 146 setting for attachment types, changing 118
enabling and disabling 137
setting levels for 137
Privacy Site List R
accessing 140 range of IP addresses
ad blocking software and 140 adding to the Trusted Zone 47
adding Web sites to 141 in expert firewall rules 55
AOL and 141 ranking expert firewall rules 54, 61
Privacy Site list 140 Real Networks
private network in expert firewall rules 58
defined 264 redirect 59
Network Configuration Wizard and 30 Registry event 73
virtual see Virtual Private Network (VPN) remote access programs
Process event 73 troubleshooting 24
Program alerts 209–215 remote control programs, using 248
responding to 69 remote host computers
Program Component alert 212 VPN configuration and 37
program components Repeat Program alert 211
managing 85–86 logging options and 164
Program Control 63–248 reporting
about 64 fraudulent e-mail 126
Internet Lock and 70 junk e-mail 125
setting level for 67 responding to alerts 20, 35, 152
Zones and 19 restoring default settings 200
program permissions 78 restoring security settings 23
programs restricting program access 79
adding to the programs List 79 risk assessment of infections 100, 105
creating expert rules for 87 router advertisement 59
stopping 79 router solicitation 59
trust level of 79 RTSP 58
programs list
accessing 76
adding and removing programs 79 S
protection level scanning for viruses 99–102
customizing 200 schedule scans 90
setting 199 screenlogger 108
scripts, blocking 146
Z
U Zone Alarm Fraudulent Mail, see junk e-mail filter
UDP Zone Alarm Junk Mail, see junk e-mail filter, special
default port permissions for 50 Outlook folders
in expert firewall rules 53 Zone Labs security software 4
unsecured wireless network about 15
Wireless Network Configuration Wizard and 31 closing the application 15
updating software 22 file sharing programs and 246
URL history, cleaning see Cache Cleaner FTP programs and 246
URLs, blocking 201 installing 1–5
loading at startup 24
updating 17, 22
V ZoneAlarm Challenged Mail, see junk e-mail filter
video software ZoneAlarm, installing 4
suspicious behavior and 254 Zones
video transmission, blocking 200, 223 about 18
violent content, blocking 188 adding to 47–48
Virtual Private Network (VPN) firewall protection and 46
alerts 35, 215 keyboard shortcuts 226
Automatic Configuration alert 215
configuring connection 35–38, 234
Manual Action Required alert 216
troubleshooting connection 234
viruses
and archive files 101
scanning for 99–102
treating 95, 101
updating signature files 91
VNC
suspicious behavior and 254
VNC programs, using 248
voice transmission
blocking 194
example 194
VoIP programs, using 249
W
Web conferencing programs, using 249
web content, filtering 83
Who Is tab see Hacker ID
Windows 98 134
Windows Firewall, disabling 43
Windows Media
clearing history 148
in expert rules 58
winlogon.exe 20
wireless network security options, setting 45