Enforced Client Product Guide

Using the Virus and Spyware Protection Service

 

Viewing reports for virus and spyware detections

Using the Unrecognized Programs report

When you want to...

Do this...

 

 

 

 

 

Display computers or

Click

 

next to a name:

detections

 

„ Under a computer name, show which detections were found.

 

 

„ Under a detection name, show the computers where it was found.

 

 

 

View details about

On the Unrecognized Programs report, click the name of a potentially

detections

unwanted program to display detailed information from the SonicWALL

 

Avert Labs Threat Library.

 

 

 

View details about a

On the Unrecognized Programs report, click a computer name to display

computer where a

the Computer Details page.

detection occurred

The Computer Details page displays information about the computer, its

 

 

service components, and its detections (see Display details for a computer

 

on page 67).

 

 

 

Approve a program

To add unrecognized programs to the list of approved programs for other

 

users, add them to a new or existing policy (see Specify approved programs

 

on page 101). Approved programs will no longer be detected as a threat by

 

the virus and spyware protection service on computers using the policy.

 

 

 

 

4

105

Page 105
Image 105
SonicWALL 4.5 Using the Unrecognized Programs report, 105, Avert Labs Threat Library, Computer Details, Approve a program

4.5 specifications

SonicWALL 4.5 is a robust network security solution designed to address the evolving challenges in threat protection and data security. This release brings a suite of advanced features, cutting-edge technologies, and characteristics tailored to enhance system performance and resilience against cyber threats.

One of the highlight features of SonicWALL 4.5 is its Integrated Intrusion Prevention System (IPS). This system provides real-time threat detection and response by monitoring network traffic for potential vulnerabilities and malicious activities. With continuously updated signature-based detection, it ensures that organizations are protected against the latest exploits and attack vectors.

Another key component is the Next-Generation Firewall (NGFW) capabilities, which combine traditional firewall functions with advanced features such as application awareness, user identity control, and content filtering. The NGFW allows organizations to enforce detailed policies based on user roles, thereby enhancing the security posture while maintaining user productivity.

SonicWALL 4.5 also incorporates advanced malware protection through its Capture Advanced Threat Protection (ATP) service. This multi-engine sandboxing technology analyzes suspicious files and URLs in a secure environment, providing organizations with in-depth insights into potential threats before they reach the network.

Furthermore, the solution includes enhancements to Secure Mobile Access, enabling secure remote connections while ensuring that sensitive data remains protected. With features like SSL VPN, SonicWALL 4.5 allows users to securely access private networks from anywhere while maintaining compliance with data protection regulations.

In terms of management, SonicWALL 4.5 introduces an intuitive interface for centralized management, enabling IT administrators to configure and monitor multiple devices effortlessly. The reporting and logging capabilities are enhanced, providing detailed insights into network activity, which is crucial for compliance and forensic analysis.

SonicWALL 4.5 also prioritizes user experience and performance with its optimized hardware, ensuring faster processing speeds and reduced latency. Features like high availability and load balancing further enhance system reliability.

In summary, SonicWALL 4.5 stands out with its integrated IPS, NGFW capabilities, advanced malware protection through Capture ATP, secure mobile access, intuitive management interface, and optimized performance. This comprehensive suite of features positions SonicWALL 4.5 as a formidable player in the realm of network security, making it an appealing choice for organizations seeking robust protection against an ever-evolving threat landscape.