Enforced Client Product Guide

Using the Virus and Spyware Protection Service

 

Managing detections

4

Managing detections

To effectively manage your strategy for virus and spyware protection, we recommend that you proactively track the types of threats being detected and where they are occurring.

„Manage your protection strategy with best practices

„Manage quarantined files

„Manage potentially unwanted program detections (see Scan for spyware on page 93)

Manage your protection strategy with best practices

1Check your status emails or the SecurityCenter website for an overview of your account’s status. (See Sign up for email notifications on page 62 to request status emails.)

„Ensure that your computers are up-to-date.

„Ensure that protection services are installed on all computers.

2Check the Detections report and Unrecognized Programs report regularly to see what is being detected (see View detections on page 103 and View unrecognized programs on page 105).

3Check the Unrecognized Programs report frequently to monitor the programs that users are allowing on client computers.

4To centralize management and more easily monitor the types of programs allowed on client computers, define client security settings in a policy.

5If particular types of detections are occurring frequently or certain computers appear vulnerable, update the policy to resolve these issues.

„Schedule scans or add exclusions (see Set basic virus protection options on page 95).

„Enable advanced scanning options (see Set advanced virus protection options on page 97).

„Ensure that spyware protection is enabled (see Set basic spyware protection options on page 99).

„For maximum protection, set your spyware protection to Protect mode to automatically clean potentially unwanted programs (see Set basic spyware protection options on page 99).

Protect mode is not the default setting. For maximum protection, create a policy that includes

Protect mode.

„Enable all advanced spyware options (see Set advanced spyware protection options on page 102).

6Use “learn” mode to identify which programs to add to the Approved Programs list, (see Learn mode on page 101). This ensures that no required programs are deleted before you have the opportunity to authorize their use. Then change your protection mode to Protect.

7View the Detection History report periodically to discover trends specific to your network, and verify your strategy’s success in reducing detections.

107

Page 107
Image 107
SonicWALL 4.5 manual Managing detections, Manage your protection strategy with best practices, Protect mode

4.5 specifications

SonicWALL 4.5 is a robust network security solution designed to address the evolving challenges in threat protection and data security. This release brings a suite of advanced features, cutting-edge technologies, and characteristics tailored to enhance system performance and resilience against cyber threats.

One of the highlight features of SonicWALL 4.5 is its Integrated Intrusion Prevention System (IPS). This system provides real-time threat detection and response by monitoring network traffic for potential vulnerabilities and malicious activities. With continuously updated signature-based detection, it ensures that organizations are protected against the latest exploits and attack vectors.

Another key component is the Next-Generation Firewall (NGFW) capabilities, which combine traditional firewall functions with advanced features such as application awareness, user identity control, and content filtering. The NGFW allows organizations to enforce detailed policies based on user roles, thereby enhancing the security posture while maintaining user productivity.

SonicWALL 4.5 also incorporates advanced malware protection through its Capture Advanced Threat Protection (ATP) service. This multi-engine sandboxing technology analyzes suspicious files and URLs in a secure environment, providing organizations with in-depth insights into potential threats before they reach the network.

Furthermore, the solution includes enhancements to Secure Mobile Access, enabling secure remote connections while ensuring that sensitive data remains protected. With features like SSL VPN, SonicWALL 4.5 allows users to securely access private networks from anywhere while maintaining compliance with data protection regulations.

In terms of management, SonicWALL 4.5 introduces an intuitive interface for centralized management, enabling IT administrators to configure and monitor multiple devices effortlessly. The reporting and logging capabilities are enhanced, providing detailed insights into network activity, which is crucial for compliance and forensic analysis.

SonicWALL 4.5 also prioritizes user experience and performance with its optimized hardware, ensuring faster processing speeds and reduced latency. Features like high availability and load balancing further enhance system reliability.

In summary, SonicWALL 4.5 stands out with its integrated IPS, NGFW capabilities, advanced malware protection through Capture ATP, secure mobile access, intuitive management interface, and optimized performance. This comprehensive suite of features positions SonicWALL 4.5 as a formidable player in the realm of network security, making it an appealing choice for organizations seeking robust protection against an ever-evolving threat landscape.