150 Micros of t ® Window s® X P Feat uresw w w . d e l l . c o m | s u p p o r t . d e l l . c o m The checklist leads you through the steps necessary to set up a homeor small office network and provides extensive references for each step.When you have completed the necessary connections andpreparations, return to the Network Setup Wizard.4 Select the Internet connection method and click Next>.5 Select the Internet connection and click Next>.6 Type a description of the computer and a computer name, and thenclick Next>.7 Review the network settings and click Next> to finish the setup.8 When the setup process is complete, click Finish to close the wizard.Internet Connection FirewallToday's always-on cable modem and DSL Internet access connections offerunprecedented bandwidth to the home, but also leave the connectedcomputer or home network vulnerable to hacker attacks. The nature ofthese attacks varies, but the goal is to gain access to individual computersattached to the Internet. With this access, a hacker can browse the harddrive and add or delete files, discover passwords and credit card numbers,and set the system up to launch attacks on other systems or websites. As aresult, firewall protection from these attacks is increasingly required oncomputers. Recognizing this need, Microsoft provides an integrated firewallin Windows XP to provide immediate protection from outside accessattempts. When enabled, the Internet Connection Firewall provides basicprotection suitable for most home and small office users.NOTE: Enabling theInternet ConnectionFirewall does not reducethe need for virus-checking software.The firewall is automatically enabled when you run the Network SetupWizard. When the firewall is enabled for a network connection, its iconappears with a red background in the Network Connections portion of theControl Panel. The Internet Connection Firewall can be applied to eachInternet connection on the computer. The firewall also provides basiclogging capabilities. Not all events that appear in the log are hacker attacks.Many different types of harmless events can appear in the log, such asroutine checks by an Internet Service Provider to verify the presence of yourcomputer (pings).