Enforced Client Product Guide

Troubleshooting

 

Frequently asked questions (FAQ)

8

How can I stop errors from showing up in my reports when automatic updates fail on systems where no user is logged on?

For certain system configurations, automatic updates do not occur on systems where no user is logged on. You can prevent these failed updates from being reported by configuring a policy setting (see Update computers where no user is logged on on page 55).

Firewall protection

Is there a “learn mode” to help me discover which Internet applications I need to approve? Yes. When you first install the firewall protection service, select Prompt mode, then check the Unrecognized Programs reports frequently to see which applications are detected on client computers (see Learn mode on page 116). After you add the ones you need to your list of allowed applications, you can change to Protect or Report mode.

Is it okay to run the Windows firewall and the firewall protection service at the same time? We recommend that you disable the Windows firewall when the firewall protection service is running. (It is disabled automatically when the firewall protection service is installed.)

If both firewalls are enabled, the firewall protection service lists only a subset of the blocked IP addresses in its Inbound Events Blocked by the Firewall report. The Windows firewall blocks some of these addresses; however, it does not report them because event logging is disabled in the Windows firewall by default. If both firewalls are enabled, you must enable Windows firewall logging to be able to view a list of all blocked IP addresses. The default Windows firewall log is C:\Windows\pfirewall.log. In addition, there will be some duplication of status and alert messaging.

How do I keep the firewall protection service from blocking certain Internet applications? The policy management feature allows you to specify allowed Internet applications that will not be blocked (see Set up allowed Internet applications on page 121). Users can also specify allowed Internet applications on their own computers if their policy allows.

I blocked Internet Explorer on a client computer, and then temporarily disabled the firewall protection service. When I re-enabled the service, why was Internet Explorer no longer blocked?

The firewall protection service uses Internet Explorer to update product components. Whenever you enable the service, Internet Explorer is given Full Access in order to check for updates.

Why does the firewall protection service ignore user settings, such as allowed Internet applications? It did not ignore them last week.

If the previous policy allowed users to configure settings and the current policy does not, user settings are ignored. However, user settings are saved on client computers. If the policy is later updated to allow users to configure settings, their firewall protection service again recognizes their settings, such as allowed Internet applications.

Why does the firewall protection service ignore settings configured by the administrator?

If the administrator configures Prompt mode, user settings take precedence over administrator settings. The administrator can always add to the list of Allowed Applications.

150

Page 150
Image 150
SonicWALL 4.5 manual Firewall protection

4.5 specifications

SonicWALL 4.5 is a robust network security solution designed to address the evolving challenges in threat protection and data security. This release brings a suite of advanced features, cutting-edge technologies, and characteristics tailored to enhance system performance and resilience against cyber threats.

One of the highlight features of SonicWALL 4.5 is its Integrated Intrusion Prevention System (IPS). This system provides real-time threat detection and response by monitoring network traffic for potential vulnerabilities and malicious activities. With continuously updated signature-based detection, it ensures that organizations are protected against the latest exploits and attack vectors.

Another key component is the Next-Generation Firewall (NGFW) capabilities, which combine traditional firewall functions with advanced features such as application awareness, user identity control, and content filtering. The NGFW allows organizations to enforce detailed policies based on user roles, thereby enhancing the security posture while maintaining user productivity.

SonicWALL 4.5 also incorporates advanced malware protection through its Capture Advanced Threat Protection (ATP) service. This multi-engine sandboxing technology analyzes suspicious files and URLs in a secure environment, providing organizations with in-depth insights into potential threats before they reach the network.

Furthermore, the solution includes enhancements to Secure Mobile Access, enabling secure remote connections while ensuring that sensitive data remains protected. With features like SSL VPN, SonicWALL 4.5 allows users to securely access private networks from anywhere while maintaining compliance with data protection regulations.

In terms of management, SonicWALL 4.5 introduces an intuitive interface for centralized management, enabling IT administrators to configure and monitor multiple devices effortlessly. The reporting and logging capabilities are enhanced, providing detailed insights into network activity, which is crucial for compliance and forensic analysis.

SonicWALL 4.5 also prioritizes user experience and performance with its optimized hardware, ensuring faster processing speeds and reduced latency. Features like high availability and load balancing further enhance system reliability.

In summary, SonicWALL 4.5 stands out with its integrated IPS, NGFW capabilities, advanced malware protection through Capture ATP, secure mobile access, intuitive management interface, and optimized performance. This comprehensive suite of features positions SonicWALL 4.5 as a formidable player in the realm of network security, making it an appealing choice for organizations seeking robust protection against an ever-evolving threat landscape.