Enforced Client Product Guide

User Interface Definitions

A

 

Item

Description

 

 

 

 

 

 

 

 

Computer Details section

 

 

Lists information about the computer and protection services.

 

 

 

System email address

 

Shows the email address used to contact the user. To change the

 

 

 

 

 

 

 

 

address, type a new address.

 

 

 

 

Group

 

Shows the group to which this computer belongs. To move this

 

 

 

 

 

 

 

 

 

computer to another group, select one from the list.

 

 

 

 

(Services)

Shows the status of each protection service. If a service you have

 

 

 

 

subscribed to is not installed, a link appears that allows you to install

 

 

 

 

it.

 

 

 

 

Action Items section

 

Lists security issues that require you to take action. Click an action

 

 

 

 

 

 

 

 

 

item to display instructions for resolving the problem.

 

 

 

 

Computer Properties section

Lists information about software components on this computer,

 

 

 

 

including the protection services, operating system, and web

 

 

 

 

browser. Lists the computer’s IP address.

 

 

 

 

Detections

 

Shows the total number of detections on this computer during

 

 

 

 

 

 

 

 

 

several time periods. Select the quantity to display a list of the

 

 

 

 

detections.

 

 

 

 

User-Approved Applications

Shows the number of detected applications the user approved to run

 

 

 

 

on this computer. Select the quantity to display details about the

 

 

 

 

applications.

 

 

 

 

To approve an application for other users, you need to add it to a

 

 

 

 

policy. When you approve detected programs and Internet

 

 

 

 

applications, they are no longer detected as threats.

 

 

 

 

Save

 

Click to save changes you made to this page and return to the

 

 

 

 

 

 

 

 

 

previous page.

 

 

 

 

Cancel

 

Click to return to the previous page without saving changes.

 

 

 

 

 

 

 

 

 

 

 

 

Detection List

Use this page to view detailed information about detections.

The Computer, Report period, and Detection type selected on the previous page determine the content of this listing.

„View detections for a computer

 

Item

Description

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Detected Object

 

 

Shows the name of the item that contains the detected threat. The

 

 

 

 

 

 

item might be a file, cookie, or registry entry.

 

Detection

 

Select the name of the detected threat to display a detailed

 

 

 

 

 

 

 

 

description from the SonicWALL Avert Threat Labs.

 

 

 

 

 

 

 

 

Date Found

 

Shows when the detection occurred.

 

 

 

 

 

 

Status

 

Shows the current status of the detection. Status can be: Cleaned,

 

 

 

 

 

 

 

 

 

Quarantined, or Buffer Overflow Blocked.

 

 

 

 

 

 

 

User-Approved Application List

Use this page to view detailed information about detected programs and Internet applications that users have approved to run on their computers. These applications are no longer detected as threats on the computers where they are approved.

To approve these applications for use on other computers, you need to add them to a policy. After you approve detected programs and Internet applications, they are no longer detected as threats on any computers using the policy.

180

Page 178
Image 178
SonicWALL 4.5 manual Detection List, User-Approved Application List, 180

4.5 specifications

SonicWALL 4.5 is a robust network security solution designed to address the evolving challenges in threat protection and data security. This release brings a suite of advanced features, cutting-edge technologies, and characteristics tailored to enhance system performance and resilience against cyber threats.

One of the highlight features of SonicWALL 4.5 is its Integrated Intrusion Prevention System (IPS). This system provides real-time threat detection and response by monitoring network traffic for potential vulnerabilities and malicious activities. With continuously updated signature-based detection, it ensures that organizations are protected against the latest exploits and attack vectors.

Another key component is the Next-Generation Firewall (NGFW) capabilities, which combine traditional firewall functions with advanced features such as application awareness, user identity control, and content filtering. The NGFW allows organizations to enforce detailed policies based on user roles, thereby enhancing the security posture while maintaining user productivity.

SonicWALL 4.5 also incorporates advanced malware protection through its Capture Advanced Threat Protection (ATP) service. This multi-engine sandboxing technology analyzes suspicious files and URLs in a secure environment, providing organizations with in-depth insights into potential threats before they reach the network.

Furthermore, the solution includes enhancements to Secure Mobile Access, enabling secure remote connections while ensuring that sensitive data remains protected. With features like SSL VPN, SonicWALL 4.5 allows users to securely access private networks from anywhere while maintaining compliance with data protection regulations.

In terms of management, SonicWALL 4.5 introduces an intuitive interface for centralized management, enabling IT administrators to configure and monitor multiple devices effortlessly. The reporting and logging capabilities are enhanced, providing detailed insights into network activity, which is crucial for compliance and forensic analysis.

SonicWALL 4.5 also prioritizes user experience and performance with its optimized hardware, ensuring faster processing speeds and reduced latency. Features like high availability and load balancing further enhance system reliability.

In summary, SonicWALL 4.5 stands out with its integrated IPS, NGFW capabilities, advanced malware protection through Capture ATP, secure mobile access, intuitive management interface, and optimized performance. This comprehensive suite of features positions SonicWALL 4.5 as a formidable player in the realm of network security, making it an appealing choice for organizations seeking robust protection against an ever-evolving threat landscape.