SlideShare a Scribd company logo
1 of 14
Download to read offline
ProteMac NetMine




        Support: support@protemac.com
        Website: http://www.protemac.com
          Sales: sales@protemac.com




      USER GUIDE






















































Copyright Notice
ProteMac NetMine User Guide copyright © 2009 - 2011 by Geovid, Ltd. All rights reserved. This document may not, in
whole or in part, be copied, photocopied, reproduced, translated, or reduced to any electronic medium or machine-readable form
without written consent from Geovid, Ltd.


Acknowledgments
Throughout this manual reference is made to several trademarks: NetMine is a trademark of ProteMac. All other
brand and product names are trademarks or registered trademarks of their respective holders.





                                                                                                                                2

Table of Contents
Introducing ProteMac NetMine .......................................................................................... 4
   About NetMine ............................................................................................................... 4
   NetMine’s Features......................................................................................................... 5
   Minimum System Requirements..................................................................................... 5
   NetMine installation........................................................................................................ 5
   Overview of the NetMine Interface ................................................................................ 6
Using NetMine................................................................................................................... 9
  Rule-set generation ......................................................................................................... 9
  Manual Rules ................................................................................................................ 10
  Default Settings............................................................................................................. 12
  System Applications ..................................................................................................... 13
Technical Support ............................................................................................................. 14










































                                                                                                                               3

CHAPTER 1:



Introducing ProteMac NetMine


             Welcome to the ProteMac NetMine User Guide. This chapter introduces NetMine and
             provides a brief overview of its features and capabilities. It also provides information on
             how to download and install NetMine.

             This chapter contains the following sections:

                    About ProteMac NetMine
                    NetMine’s Features
                    Minimum System Requirements
                    ProteMac NetMine installation
                    Overwiew the ProteMac NetMine Interface




About NetMine
             ProteMac NetMine is a powerful firewall for Mac OS X that allows to control Internet
             and network activity of all applications on your Mac. NetMine enables you to set up rules
             for selected programs by allowing or denying potential application connections. Using
             these rules you may control network access, which relieves you from the need to enter
             them manually every time a new program accesses the network.


             NetMine firewall is a new generation of information security technology designed to
             protect Mac OS X computers from outside network and your computer’s software attacks.
             NetMine monitors for and blocks sophisticated hacking techniques used to endanger or to
             steal data. By analyzing threats and displaying connection alerts, you will be able to
             exclude unauthorized activities and improve protection of business or private data.





                                                                                                     4

NetMine Features

                  Filters all incoming and outgoing network traffic
                  Enables to allow or deny network and Internet access for selected applications
                  Blocks addresses and ports to prevent unwanted connection attempts
                  Stops threats at point of entry with an undetectable firewall
                  Protects against viruses, spy ware, trojan horses, worms, bots and root kits
                  Improves protection of business or private data against hacker attacks
                  Helps secure your privacy




Minimum System Requirements
            To run ProteMac NetMine effectively, you should meet or exceed the following
            minimum system requirements:

                  Mac OS X version 10.5 Leopard or better
                  Intel-based Mac
                  100 MB hard drive space



    NetMine installation
            To install ProteMac NetMine:

            1. Open ProteMac home page (www.protemac.com) and download NetMine.

            2. After the download is complete, double-click the protemac-netmine.dmg file, then
            double-click install in the NetMine dialog.

            3. Follow the instructions in the Install ProteMac NetMine window.





                                                                                                   5

Overview of the NetMine Interface
        Before attempting to use NetMine, we encourage you to familiarize yourself with its
        interface, which includes the NetMine dialog and the NetMine Notification window.

        The Notification window
        As soon as you have restarted your computer after NetMine installation, the program
        immediately reacts to any application connections. When a program attempts to get a
        network access a NetMine Notification window will appear and ask user to allow or deny
        this connection during 20 seconds. Thus the Notification window enables to set the first
        rules for NetMine control. To get detailed information about the potential connection,
        including the application, technical information such as: IP Address, Unix PID and User
        ID, simply click learn near the application icon.

        Note: the default access rule for the new application is “Deny” set in the Preferences
        window.




        In the notification window you may set the time limitations for NetMine’s activity:

              Once – activates NetMine rules only for the current connection.

              Until Quit - NetMine activates its rules till the end of the application session.

              Forever – select to activate NetMine rules whenever the network connection is
           established.

        Whenever an application tries to get an access to the network, the notification window
        appears offering you to prevent or accept the connection attempt. To indicate whether you
        want to allow or deny any connection or the connection with the particular port, address
        or both address and port, check the corresponding option in the box below.

              Any Connection - allow or deny any connection for this application.

              This Port – choose to accept or permit a connection with this port.

              This Address - select to enable or prohibit a connection with this address.





                                                                                                  6

   Address and port - choose to allow or deny a connection with this address and
       this port.

    To enable or prohibit this connection select one of the following options:

          Allow – network communication is allowed.

          Deny – network communication is denied.



    The ProteMac NetMine Dialog
    When you launch NetMine, the main dialog window opens requiring that you type your
    admin password. It displays all rules you have set for the particular applications. The
    initial NetMine window shows what addresses and ports of potential network connections
    the user allowed or denied and for what period of time. The ProteMac NetMine dialog
    enables you to add desired access rules for selected applications.




    Applications – displays the list of applications, utilities, etc, which have accessed (or
    attempted to access) the network.

       “ + button” – click to add an application to the Application list.

       “ - button” - click to delete an application from the Application list.





                                                                                          7

The ProteMac NetMine dialog displays the list of rules selected for each application. It
    shows all addresses and ports of the application connections that the user wants to allow
    or deny for a definite period of time. You may use the following buttons to add or delete
    access rules for potential network connections.


       “ + button” – click to add an access rule for the selected application connection.

       “ - button” - click to delete an access rule for the selected application connection.

    You may specify the Action for every application connection that attempts to
    communicate with the network:

          Allow – instructs NetMine to grant permission to access the network to the
       selected application that attempts to do this.

         Deny – instructs NetMine to deny permission to access the network to the selected
       application that attempts to do this.

    Note: Before you add the rules for the selected applications, NetMine control will be
    regulated according to the default access rules set in the Preferences window.

    Limitation allows to set the time period for NetMine’s control:

          Until Quit – NetMine activates till the end of the Internet or network connection.

         Forever - select to activate NetMine every time the Internet or Network
       connection is established.


    Apply Rules - click to confirm new settings.





                                                                                              8

CHAPTER 2:


Using NetMine


             This chapter discusses in detail how to configure ProteMac NetMine in order to regulate
             its control.

             This chapter contains the following sections:

                   Rules and Applications
                   Manual Rules for Applications
                   Specifying default settings




Rule-set generation


             NetMine enables users to control application connections mainly via the Notification
             window. The Notification Window asks for user input every time the program attempts to
             get a network access. Thus the user can setup rules for the potential network connection
             allowing or denying any connection or the connection with the particular port, address or
             both address and port.




             Before you launch the program, NetMine control will be regulated according to the
             default access rules set in the Preferences window. The NetMine dialog allows you to add
             access rules for the particular application. In the corresponding fields you can specify the
             address and port for every application that communicates with the network. Select one of
             the offered options to allow or deny its access and to limit the time period for NetMine
             control.





                                                                                                      9

Manual Rules


       NetMine enables you easily to add or remove applications from the Application list in the
       NetMine window. You may then specify whether to allow or deny their network and
       Internet access.




       Adding an Application
       1. Open the Applications folder on your Mac and click NetMine’s icon. The main
       NetMine window opens requiring that you type your admin password.

       2. To add an application to the list, click the “ + button”, then navigate to and select the
       application via the Open dialog that displays.

       3. Scroll down and select the application you want to add, then click the Open button.
       The Open dialog closes. The application you added is now displayed in the Applications
       list in the main NetMine window.

       Note: the default access rule for the new application is “Deny” set in the Preferences
       window.



       Adding Rules for Applications
       1. After you have selected the applications that you want to filter as instructed before, you
       may specify rules for particular applications, by telling NetMine how to handle them.

       2. Select an application from the list and the ProteMac NetMine dialog displays the list of
       rules selected for each application. It shows all addresses and ports of the potential
       network connections that the user wants to allow or deny for a definite period of time.





                                                                                               10

3. In case you want to add another access rule for the selected application, select address
    and port of an application connection you would like to control and click the “ + button”.

    4. To set the desired access rule for an application connection with this address and port,
    select the action “Allow” or “Deny”.

    5. To activate NetMine for a limited time period, select “Until Quit” and NetMine
    activates till the end of the network connection. To activate NetMine every time the
    network connection is established, select “Forever”.

    6. To save the changes you have made, click the “Apply Rules” button, and then close the
    dialog. Next time the specified application attempts to access the network, NetMine will
    either allow or deny its access to the network, depending on the option you selected.




    Deleting Rules for Applications

    To delete rules for applications:

    1. Choose one of the applications from the list and select one of the rules form the table
        displayed in the main NetMine dialog.

    2. Click the “ - button” to delete the rule for the selected application.



    Deleting an Application
    The application may be easily removed for the Application list any time.

    1. Open the Applications folder on your Mac and click NetMine’s icon. The main
    NetMine window displays.

    2. Select one of the enlisted applications you want to remove, then click the “ - button”
    below.

    3. Click the Apply Rules button to save the changes, and then close the dialog.

    Note: As soon as you have deleted an application, all access rules for this application
    will be removed.





                                                                                             11

Default Settings
            In addition to the rules for individual applications, NetMine allows you to specify rules
            for all application connections by default.

            1. Click Preferences from the NetMine menu. The NetMine Preferences window allows
            you to specify default access rules so that whenever a new application tries to access the
            network, NetMine will respond with the default settings.

            2. Specify the desired rules by default. The following are available:




                  Allow – Instructs NetMine to grant permission to access the network to any new
                application that attempts to do this.

                  Deny – Instructs NetMine to deny permission to access the network to any new
                application that attempts to do this.

                   Ask From User – Instructs NetMine to prompt the user for permission to access
                the network whenever a new application attempts to do this. The user may then allow
                or deny access to the network.

                   Enable Firewall checkbox– if it is checked, NetMine firewall will be enabled by
                dafault. To disable it, clear the checkbox.

            3.To save the changes you have made, click “OK”. Next time an application that is not on
            the Rules for Applications tab attempts to access the network, NetMine will either allow
            or deny it access, depending on the option you selected.

            .





                                                                                                 12

System Applications


        In the main NetMine dialog you may also view the list of system applications the user
        can’t manage rules for. To view this list you should:

        1. Click View from the NetMine menubar above and choose show system applications.

        2. The main NetMine window will display the applications the user can’t manage rules
        for and mark them with a warning icon.





                                                                                        13

CHAPTER 3:



Technical Support
             ProteMac website contains NetMine tutorials and FAQ to give you quick exposure to our
             software using. If you are unable to find an answer to your question, you may request
             help by contacting us directly. There are several ways you may do so. You can submit a
             Technical Support request via the Contacts page of our website
             (http://www.protemac.com/support/)or        you     may     send    an    email     to
             support@protemac.com.

             In an urgent case, you can call our Technical Support. Below you will find the contact
             data for our technical support in the United States.

             Phone: +1.408.228.4945

             Fax: +1.270.398.3202

             Your satisfaction is important to us, and we will do everything we can to resolve your
             issue in a timely and professional manner.




Conclusion
             This concludes the ProteMac NetMine User Guide. We hope you have found it helpful.
             If you have any comments about NetMine, or any suggestions such as how to improved
             it, we encourage you to forward them to us. We welcome any suggestions you may have.
             Thank you for using NetMine.





                                                                                                     14


More Related Content

Similar to ProteMac NetMine UserGuide

How to Join Computers from different Pertino Networks
How to Join Computers from different Pertino NetworksHow to Join Computers from different Pertino Networks
How to Join Computers from different Pertino Networksddnoriega
 
Project onesample
Project onesampleProject onesample
Project onesampletcassa
 
Writing sample
Writing sampleWriting sample
Writing sampletcassa
 
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSymantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSree Harsha Boyapati
 
Advanced internetfinal
Advanced internetfinalAdvanced internetfinal
Advanced internetfinalmordannon
 
Sec285 final presentation_joshua_brown
Sec285 final presentation_joshua_brownSec285 final presentation_joshua_brown
Sec285 final presentation_joshua_brownJoshuaBrown233
 
110006_perils_of_aging_emul_wp
110006_perils_of_aging_emul_wp110006_perils_of_aging_emul_wp
110006_perils_of_aging_emul_wpJessica Hirst
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?Faith Zeller
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewallskkkseld
 
ShareTech Next-Gen UTM
ShareTech Next-Gen UTMShareTech Next-Gen UTM
ShareTech Next-Gen UTMsharetech
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewallskkkseld
 

Similar to ProteMac NetMine UserGuide (20)

Readme
ReadmeReadme
Readme
 
How to Join Computers from different Pertino Networks
How to Join Computers from different Pertino NetworksHow to Join Computers from different Pertino Networks
How to Join Computers from different Pertino Networks
 
Project onesample
Project onesampleProject onesample
Project onesample
 
Writing sample
Writing sampleWriting sample
Writing sample
 
Tmote_invent
Tmote_inventTmote_invent
Tmote_invent
 
Secure your LAN
Secure your LANSecure your LAN
Secure your LAN
 
Pace IT - Client Networking (Part 2)
Pace IT - Client Networking (Part 2)Pace IT - Client Networking (Part 2)
Pace IT - Client Networking (Part 2)
 
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSymantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
 
An Openmoko Overview
An Openmoko OverviewAn Openmoko Overview
An Openmoko Overview
 
Advanced internetfinal
Advanced internetfinalAdvanced internetfinal
Advanced internetfinal
 
Sec285 final presentation_joshua_brown
Sec285 final presentation_joshua_brownSec285 final presentation_joshua_brown
Sec285 final presentation_joshua_brown
 
Netdefender
NetdefenderNetdefender
Netdefender
 
110006_perils_of_aging_emul_wp
110006_perils_of_aging_emul_wp110006_perils_of_aging_emul_wp
110006_perils_of_aging_emul_wp
 
Firewall & DMZ.pptx
Firewall & DMZ.pptxFirewall & DMZ.pptx
Firewall & DMZ.pptx
 
Net Defender
Net DefenderNet Defender
Net Defender
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
ShareTech Next-Gen UTM
ShareTech Next-Gen UTMShareTech Next-Gen UTM
ShareTech Next-Gen UTM
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
GPRS_Test_Procedure
GPRS_Test_ProcedureGPRS_Test_Procedure
GPRS_Test_Procedure
 

Recently uploaded

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

ProteMac NetMine UserGuide

  • 1. ProteMac NetMine Support: support@protemac.com Website: http://www.protemac.com Sales: sales@protemac.com USER GUIDE 

  • 2. 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 Copyright Notice ProteMac NetMine User Guide copyright © 2009 - 2011 by Geovid, Ltd. All rights reserved. This document may not, in whole or in part, be copied, photocopied, reproduced, translated, or reduced to any electronic medium or machine-readable form without written consent from Geovid, Ltd. Acknowledgments Throughout this manual reference is made to several trademarks: NetMine is a trademark of ProteMac. All other brand and product names are trademarks or registered trademarks of their respective holders. 
 
 2

  • 3. Table of Contents Introducing ProteMac NetMine .......................................................................................... 4 About NetMine ............................................................................................................... 4 NetMine’s Features......................................................................................................... 5 Minimum System Requirements..................................................................................... 5 NetMine installation........................................................................................................ 5 Overview of the NetMine Interface ................................................................................ 6 Using NetMine................................................................................................................... 9 Rule-set generation ......................................................................................................... 9 Manual Rules ................................................................................................................ 10 Default Settings............................................................................................................. 12 System Applications ..................................................................................................... 13 Technical Support ............................................................................................................. 14 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 3

  • 4. CHAPTER 1: Introducing ProteMac NetMine Welcome to the ProteMac NetMine User Guide. This chapter introduces NetMine and provides a brief overview of its features and capabilities. It also provides information on how to download and install NetMine. This chapter contains the following sections:  About ProteMac NetMine  NetMine’s Features  Minimum System Requirements  ProteMac NetMine installation  Overwiew the ProteMac NetMine Interface About NetMine ProteMac NetMine is a powerful firewall for Mac OS X that allows to control Internet and network activity of all applications on your Mac. NetMine enables you to set up rules for selected programs by allowing or denying potential application connections. Using these rules you may control network access, which relieves you from the need to enter them manually every time a new program accesses the network. NetMine firewall is a new generation of information security technology designed to protect Mac OS X computers from outside network and your computer’s software attacks. NetMine monitors for and blocks sophisticated hacking techniques used to endanger or to steal data. By analyzing threats and displaying connection alerts, you will be able to exclude unauthorized activities and improve protection of business or private data. 
 4

  • 5. NetMine Features  Filters all incoming and outgoing network traffic  Enables to allow or deny network and Internet access for selected applications  Blocks addresses and ports to prevent unwanted connection attempts  Stops threats at point of entry with an undetectable firewall  Protects against viruses, spy ware, trojan horses, worms, bots and root kits  Improves protection of business or private data against hacker attacks  Helps secure your privacy Minimum System Requirements To run ProteMac NetMine effectively, you should meet or exceed the following minimum system requirements:  Mac OS X version 10.5 Leopard or better  Intel-based Mac  100 MB hard drive space NetMine installation To install ProteMac NetMine: 1. Open ProteMac home page (www.protemac.com) and download NetMine. 2. After the download is complete, double-click the protemac-netmine.dmg file, then double-click install in the NetMine dialog. 3. Follow the instructions in the Install ProteMac NetMine window. 
 5

  • 6. Overview of the NetMine Interface Before attempting to use NetMine, we encourage you to familiarize yourself with its interface, which includes the NetMine dialog and the NetMine Notification window. The Notification window As soon as you have restarted your computer after NetMine installation, the program immediately reacts to any application connections. When a program attempts to get a network access a NetMine Notification window will appear and ask user to allow or deny this connection during 20 seconds. Thus the Notification window enables to set the first rules for NetMine control. To get detailed information about the potential connection, including the application, technical information such as: IP Address, Unix PID and User ID, simply click learn near the application icon. Note: the default access rule for the new application is “Deny” set in the Preferences window. In the notification window you may set the time limitations for NetMine’s activity:  Once – activates NetMine rules only for the current connection.  Until Quit - NetMine activates its rules till the end of the application session.  Forever – select to activate NetMine rules whenever the network connection is established. Whenever an application tries to get an access to the network, the notification window appears offering you to prevent or accept the connection attempt. To indicate whether you want to allow or deny any connection or the connection with the particular port, address or both address and port, check the corresponding option in the box below.  Any Connection - allow or deny any connection for this application.  This Port – choose to accept or permit a connection with this port.  This Address - select to enable or prohibit a connection with this address. 
 6

  • 7. Address and port - choose to allow or deny a connection with this address and this port. To enable or prohibit this connection select one of the following options:  Allow – network communication is allowed.  Deny – network communication is denied. The ProteMac NetMine Dialog When you launch NetMine, the main dialog window opens requiring that you type your admin password. It displays all rules you have set for the particular applications. The initial NetMine window shows what addresses and ports of potential network connections the user allowed or denied and for what period of time. The ProteMac NetMine dialog enables you to add desired access rules for selected applications. Applications – displays the list of applications, utilities, etc, which have accessed (or attempted to access) the network. “ + button” – click to add an application to the Application list. “ - button” - click to delete an application from the Application list. 
 7

  • 8. The ProteMac NetMine dialog displays the list of rules selected for each application. It shows all addresses and ports of the application connections that the user wants to allow or deny for a definite period of time. You may use the following buttons to add or delete access rules for potential network connections. “ + button” – click to add an access rule for the selected application connection. “ - button” - click to delete an access rule for the selected application connection. You may specify the Action for every application connection that attempts to communicate with the network:  Allow – instructs NetMine to grant permission to access the network to the selected application that attempts to do this.  Deny – instructs NetMine to deny permission to access the network to the selected application that attempts to do this. Note: Before you add the rules for the selected applications, NetMine control will be regulated according to the default access rules set in the Preferences window. Limitation allows to set the time period for NetMine’s control:  Until Quit – NetMine activates till the end of the Internet or network connection.  Forever - select to activate NetMine every time the Internet or Network connection is established. Apply Rules - click to confirm new settings. 
 8

  • 9. CHAPTER 2: Using NetMine This chapter discusses in detail how to configure ProteMac NetMine in order to regulate its control. This chapter contains the following sections:  Rules and Applications  Manual Rules for Applications  Specifying default settings Rule-set generation 
 NetMine enables users to control application connections mainly via the Notification window. The Notification Window asks for user input every time the program attempts to get a network access. Thus the user can setup rules for the potential network connection allowing or denying any connection or the connection with the particular port, address or both address and port. Before you launch the program, NetMine control will be regulated according to the default access rules set in the Preferences window. The NetMine dialog allows you to add access rules for the particular application. In the corresponding fields you can specify the address and port for every application that communicates with the network. Select one of the offered options to allow or deny its access and to limit the time period for NetMine control. 
 9

  • 10. Manual Rules 
 NetMine enables you easily to add or remove applications from the Application list in the NetMine window. You may then specify whether to allow or deny their network and Internet access. Adding an Application 1. Open the Applications folder on your Mac and click NetMine’s icon. The main NetMine window opens requiring that you type your admin password. 2. To add an application to the list, click the “ + button”, then navigate to and select the application via the Open dialog that displays. 3. Scroll down and select the application you want to add, then click the Open button. The Open dialog closes. The application you added is now displayed in the Applications list in the main NetMine window. Note: the default access rule for the new application is “Deny” set in the Preferences window. Adding Rules for Applications 1. After you have selected the applications that you want to filter as instructed before, you may specify rules for particular applications, by telling NetMine how to handle them. 2. Select an application from the list and the ProteMac NetMine dialog displays the list of rules selected for each application. It shows all addresses and ports of the potential network connections that the user wants to allow or deny for a definite period of time. 
 10

  • 11. 3. In case you want to add another access rule for the selected application, select address and port of an application connection you would like to control and click the “ + button”. 4. To set the desired access rule for an application connection with this address and port, select the action “Allow” or “Deny”. 5. To activate NetMine for a limited time period, select “Until Quit” and NetMine activates till the end of the network connection. To activate NetMine every time the network connection is established, select “Forever”. 6. To save the changes you have made, click the “Apply Rules” button, and then close the dialog. Next time the specified application attempts to access the network, NetMine will either allow or deny its access to the network, depending on the option you selected. Deleting Rules for Applications To delete rules for applications: 1. Choose one of the applications from the list and select one of the rules form the table displayed in the main NetMine dialog. 2. Click the “ - button” to delete the rule for the selected application. Deleting an Application The application may be easily removed for the Application list any time. 1. Open the Applications folder on your Mac and click NetMine’s icon. The main NetMine window displays. 2. Select one of the enlisted applications you want to remove, then click the “ - button” below. 3. Click the Apply Rules button to save the changes, and then close the dialog. Note: As soon as you have deleted an application, all access rules for this application will be removed. 
 11

  • 12. Default Settings In addition to the rules for individual applications, NetMine allows you to specify rules for all application connections by default. 1. Click Preferences from the NetMine menu. The NetMine Preferences window allows you to specify default access rules so that whenever a new application tries to access the network, NetMine will respond with the default settings. 2. Specify the desired rules by default. The following are available:  Allow – Instructs NetMine to grant permission to access the network to any new application that attempts to do this.  Deny – Instructs NetMine to deny permission to access the network to any new application that attempts to do this.  Ask From User – Instructs NetMine to prompt the user for permission to access the network whenever a new application attempts to do this. The user may then allow or deny access to the network.  Enable Firewall checkbox– if it is checked, NetMine firewall will be enabled by dafault. To disable it, clear the checkbox. 3.To save the changes you have made, click “OK”. Next time an application that is not on the Rules for Applications tab attempts to access the network, NetMine will either allow or deny it access, depending on the option you selected. . 
 12

  • 13. System Applications 
 In the main NetMine dialog you may also view the list of system applications the user can’t manage rules for. To view this list you should: 1. Click View from the NetMine menubar above and choose show system applications. 2. The main NetMine window will display the applications the user can’t manage rules for and mark them with a warning icon. 
 13

  • 14. CHAPTER 3: Technical Support ProteMac website contains NetMine tutorials and FAQ to give you quick exposure to our software using. If you are unable to find an answer to your question, you may request help by contacting us directly. There are several ways you may do so. You can submit a Technical Support request via the Contacts page of our website (http://www.protemac.com/support/)or you may send an email to support@protemac.com. In an urgent case, you can call our Technical Support. Below you will find the contact data for our technical support in the United States. Phone: +1.408.228.4945 Fax: +1.270.398.3202 Your satisfaction is important to us, and we will do everything we can to resolve your issue in a timely and professional manner. Conclusion This concludes the ProteMac NetMine User Guide. We hope you have found it helpful. If you have any comments about NetMine, or any suggestions such as how to improved it, we encourage you to forward them to us. We welcome any suggestions you may have. Thank you for using NetMine. 
 14