Table 57 Fields of the report export task list

Field

Description

 

Report Task

Name of the report export task

 

 

Creation Time

Time when the task was created

 

 

Period

Reports export interval specified in the export task

 

 

Send Mail

Whether the report export file is to be sent to the specified mail box.

 

 

 

Generate Report

Click the

icon of a task to display all generated report files of the task and

the file creation time. These files have the same suffix, which is xls. Click a

 

report file’s name link to export the file.

 

 

 

 

 

Click the

icon of a task to enter the task modification page, where you

 

 

can modify the task.

Operation

Click the

icon of a task to test whether the task can function. If the test

 

 

 

succeeds, the system generates a report file based on data of the current

 

 

day. The filename starts with test.

 

Table 58 Report export task management functions

 

 

 

Function

 

Description

Report export file list

 

Allows you to view the detailed information of all report export tasks, and

 

modify and test a report export task.

 

 

 

 

 

Adding a report export task

 

Allows you to add a report export task.

 

 

 

 

 

Allows you to delete report export tasks.

Deleting report export tasks

Follow these steps:

1.

Select the check boxes before the tasks to be deleted.

 

 

2.

Click Delete.

 

 

 

Report export file list

From the navigation tree of the firewall management component, select Event Export Tasks under Event

Analysis to enter the report export task management page, as shown in Figure 48. Click the icon of a task to display all generated report files of the task and the file creation time. These files have the same suffix, which is xls. Click a report file’s name link to export the file.

Figure 49 Report export file list

Table 59 Fields of the report export file list

Field

Description

Filename

Name of the report export file

 

 

Creation Time

Time when the report export file was created

 

 

 

50

Page 54
Image 54
HP Firewall manual Report export file list, Fields of the report export task list, Report export task management functions

Firewall specifications

HP Firewall, often positioned as a key component in enterprise network security, is designed to protect sensitive data and maintain secure communications across various environments. The primary role of a firewall is to monitor incoming and outgoing network traffic and make decisions based on a set of security rules. HP Firewalls utilize a combination of hardware and software to create a robust security framework that helps organizations manage their network perimeter effectively.

One of the main features of HP Firewall is its advanced security protocols that provide deep packet inspection. This technology scrutinizes packet contents beyond the header information, analyzing data flows for signs of malicious activity. By employing Stateful Inspection, HP Firewalls maintain a state table that logs active connections, allowing the firewall to evaluate packets in the context of established sessions. This helps optimize resource usage while delivering high-performance security.

Another characteristic of HP Firewall is its integration with HP's broader security ecosystem. By working seamlessly with other HP security products, such as HP Secure Access and HP Advanced Malware Protection, organizations can deploy a multi-layered security strategy. This integration enables centralized management, streamlining security policies and improving response times against threats.

HP Firewalls also feature next-generation capabilities. This includes intrusion prevention systems (IPS) that actively monitor network traffic for suspected threats and automatically take action to block potential breaches. Additionally, these firewalls come with application awareness features, allowing organizations to enforce policies based on specific applications rather than simply based on port or protocol. This granularity enhances control over minimal use of bandwidth while simultaneously mitigating risks from unwanted applications.

Furthermore, HP Firewall models are equipped with user identity management, allowing organizations to apply security policies based on user roles and the specific needs of the business. This significantly improves the overall security posture as it adds another layer of control.

Scalability is a notable characteristic of HP Firewalls, making them suitable for both small businesses and large enterprises. Organizations can expand their security infrastructure as needed while maintaining efficiency.

In summary, HP Firewalls deliver advanced security features, scalability, and seamless integration within the HP security ecosystem. Their emphasis on deep packet inspection, real-time monitoring, and user identity management make them a powerful asset in the defense against cyber threats, ensuring that organizations can protect their critical data and maintain the integrity of their network environments.