Enforced Client Product Guide

Troubleshooting

 

Frequently asked questions (FAQ)

8

Adding, renewing, and moving licenses

I purchased licenses for new computers, but the new computers don’t show up on my reports. When you purchase additional services or renew services, use the same email address that you used when purchasing the original services. Also, place your order from the same SecurityCenter website where you purchased your original services. This ensures that your new services have the same company key (CK) as your existing service and show up on the same reports. Contact product support for assistance with merging multiple accounts.

Can I move a license from one computer to another?

Yes. You can uninstall Enforced Client from one computer and install it on a new computer without affecting the total number of licenses you are using. The old computer is automatically subtracted from your total license count on the service’s accounting system, and the new one added, so that your license number remains constant.

1Uninstall the software from the old computer (see Uninstalling protection services on page 145).

2From the SecurityCenter, click the Computers tab.

3For Groups, select All, then select the old computer in the listing and click Delete.

4Install the software on the new computer (see Installing Enforced Client on page 35).

The new computer appears in your reports after it uploads its status information to the

SecurityCenter. This usually takes about 20 minutes.

My computer crashed and I had to reinstall the operating system and start over. Will this affect my license number?

No. The old computer is automatically subtracted from your total license count on the service’s accounting system, and the new one added, so that your license number remains constant.

1From the SecurityCenter, click the Computers tab.

2For Groups, select All, then select the old computer in the listing and click Delete.

3Install the software on the reformatted computer (see for Installing Enforced Client on page 35).

The new computer appears in your reports after it uploads its status information to the

SecurityCenter. This usually takes about 20 minutes.

Configuring and managing policies

How can I prevent popup prompts from appearing when unrecognized programs are detected? The virus and spyware protection service and the firewall protection service prompt users for a response to a potentially unwanted program or Internet application detection when set to Prompt mode. To prevent popups, select Protect or Report mode. For highest protection, select Protect to automatically delete unrecognized programs (virus and spyware protection service) or block unrecognized Internet applications (firewall protection service). For more information, see Select a spyware protection mode on page 100 or Select a firewall protection mode on page 115.

147

Page 147
Image 147
SonicWALL 4.5 manual Adding, renewing, and moving licenses, Configuring and managing policies

4.5 specifications

SonicWALL 4.5 is a robust network security solution designed to address the evolving challenges in threat protection and data security. This release brings a suite of advanced features, cutting-edge technologies, and characteristics tailored to enhance system performance and resilience against cyber threats.

One of the highlight features of SonicWALL 4.5 is its Integrated Intrusion Prevention System (IPS). This system provides real-time threat detection and response by monitoring network traffic for potential vulnerabilities and malicious activities. With continuously updated signature-based detection, it ensures that organizations are protected against the latest exploits and attack vectors.

Another key component is the Next-Generation Firewall (NGFW) capabilities, which combine traditional firewall functions with advanced features such as application awareness, user identity control, and content filtering. The NGFW allows organizations to enforce detailed policies based on user roles, thereby enhancing the security posture while maintaining user productivity.

SonicWALL 4.5 also incorporates advanced malware protection through its Capture Advanced Threat Protection (ATP) service. This multi-engine sandboxing technology analyzes suspicious files and URLs in a secure environment, providing organizations with in-depth insights into potential threats before they reach the network.

Furthermore, the solution includes enhancements to Secure Mobile Access, enabling secure remote connections while ensuring that sensitive data remains protected. With features like SSL VPN, SonicWALL 4.5 allows users to securely access private networks from anywhere while maintaining compliance with data protection regulations.

In terms of management, SonicWALL 4.5 introduces an intuitive interface for centralized management, enabling IT administrators to configure and monitor multiple devices effortlessly. The reporting and logging capabilities are enhanced, providing detailed insights into network activity, which is crucial for compliance and forensic analysis.

SonicWALL 4.5 also prioritizes user experience and performance with its optimized hardware, ensuring faster processing speeds and reduced latency. Features like high availability and load balancing further enhance system reliability.

In summary, SonicWALL 4.5 stands out with its integrated IPS, NGFW capabilities, advanced malware protection through Capture ATP, secure mobile access, intuitive management interface, and optimized performance. This comprehensive suite of features positions SonicWALL 4.5 as a formidable player in the realm of network security, making it an appealing choice for organizations seeking robust protection against an ever-evolving threat landscape.