Enforced Client Anti-Virus and Anti-Spyware 4.5 Product Guide

Glossary

email security service

A web-based service that safeguards small business computers by automatically routing

 

email messages through SonicWALL’s servers and scanning for dangerous and

 

inappropriate content before delivering the messages to the local network.

 

Compare to browser protection service, firewall protection service, and virus and spyware

 

protection service.

event

See inbound event.

firewall protection service

A web-based service that safeguards small business computers by automatically monitoring

 

communications from other computers and Internet applications to check for suspicious

 

activity, then generating reports.

 

Compare to browser protection service, email security service, and virus and spyware

 

protection service.

group

One or more client computers defined by a system administrator for managing security

 

settings and analyzing report data. Groups can be determined by geographic location,

 

department, computer type, or anything meaningful to your organization.

group administrator

A user account with permissions to monitor one or more assigned groups of computers. The

 

account administrator sets up a group administrator account, assigns a password for

 

accessing the SecurityCenter website, and specifies an access level that determines which

 

tasks the group administrator is authorized to perform. Access levels are Read Only and

 

Read & Modify Reports.

 

Compare to administrator and user.

inbound event

An attempt by another computer to send data to a client computer. The firewall protection

 

service running on the client computer intercepts this attempt and responds according to

 

policy settings.

installation

Installing the Enforced Client client software on computers.

 

See also push installation, silent installation, and URL installation.

installation URL

A company-specific URL for installing Enforced Client software on client computers.

 

See also URL installation.

Internet application

An application that communicates with both the Internet and a client computer.

Internet Independent

A method that allows computers not connected to the Internet to use Enforced Client. At

Updating (IIU)

least one computer on the subnet needs to have an Internet connection to be able to

 

communicate with the SonicWALL update site. This computer is configured as a relay

 

server, and other computers communicate with the update site through it.

 

See also relay server, rumor technology, and update site.

license

An agreement to install SonicWALL software on a single client computer. When you

 

purchase a subscription for SonicWALL protection services, you designate a specific

 

number of licenses for the computers where the software using those services will be

 

installed. You can also add and renew licenses for your subscription.

 

Compare to subscription.

mail exchange record

MX record; a software entry in your email domain name database that controls where email

 

is routed.

MX record

See mail exchange record.

notification preferences

Information designating which automatically generated account emails, such as status

 

emails and notices of account expiration, should be sent by the service provider.

 

Administrators can configure notification preferences on the My Account page of the

 

SecurityCenter website.

163

Page 161
Image 161
SonicWALL 4.5 manual 163, Read & Modify Reports

4.5 specifications

SonicWALL 4.5 is a robust network security solution designed to address the evolving challenges in threat protection and data security. This release brings a suite of advanced features, cutting-edge technologies, and characteristics tailored to enhance system performance and resilience against cyber threats.

One of the highlight features of SonicWALL 4.5 is its Integrated Intrusion Prevention System (IPS). This system provides real-time threat detection and response by monitoring network traffic for potential vulnerabilities and malicious activities. With continuously updated signature-based detection, it ensures that organizations are protected against the latest exploits and attack vectors.

Another key component is the Next-Generation Firewall (NGFW) capabilities, which combine traditional firewall functions with advanced features such as application awareness, user identity control, and content filtering. The NGFW allows organizations to enforce detailed policies based on user roles, thereby enhancing the security posture while maintaining user productivity.

SonicWALL 4.5 also incorporates advanced malware protection through its Capture Advanced Threat Protection (ATP) service. This multi-engine sandboxing technology analyzes suspicious files and URLs in a secure environment, providing organizations with in-depth insights into potential threats before they reach the network.

Furthermore, the solution includes enhancements to Secure Mobile Access, enabling secure remote connections while ensuring that sensitive data remains protected. With features like SSL VPN, SonicWALL 4.5 allows users to securely access private networks from anywhere while maintaining compliance with data protection regulations.

In terms of management, SonicWALL 4.5 introduces an intuitive interface for centralized management, enabling IT administrators to configure and monitor multiple devices effortlessly. The reporting and logging capabilities are enhanced, providing detailed insights into network activity, which is crucial for compliance and forensic analysis.

SonicWALL 4.5 also prioritizes user experience and performance with its optimized hardware, ensuring faster processing speeds and reduced latency. Features like high availability and load balancing further enhance system reliability.

In summary, SonicWALL 4.5 stands out with its integrated IPS, NGFW capabilities, advanced malware protection through Capture ATP, secure mobile access, intuitive management interface, and optimized performance. This comprehensive suite of features positions SonicWALL 4.5 as a formidable player in the realm of network security, making it an appealing choice for organizations seeking robust protection against an ever-evolving threat landscape.