Enforced Client Product Guide

User Interface Definitions

A

 

Item

 

Description

 

 

 

 

 

 

 

Group by

 

„ Select Originating Computer to list the computers where events

 

 

 

originated.

 

 

 

„ Select Destination Computer to list the computers where events

 

 

 

were targeted.

 

 

 

 

 

 

 

Computer

 

Lists the name of each target computer.

 

 

 

„ Click the arrow next to the event name to display or hide a list of

 

 

 

computers where the event originated.

 

 

 

„ Select a computer name to display details about it.

 

 

 

 

 

 

 

Originating IP Address

 

Lists the IP address of the computer where the event originated.

 

 

 

 

 

 

Events

 

Shows the number of inbound events blocked. Select the quantity to

 

 

 

display a list of the blocked events.

 

 

 

 

 

 

 

Last Event Date

 

Shows the date when the event was last blocked.

 

 

 

 

 

 

 

 

 

 

 

Inbound Event List

Use this page to view detailed information about inbound communications that were blocked by the firewall protection service.

The Computer and Report period selected on the previous page determine the content of this listing.

„View inbound events blocked by the firewall

 

Item

Description

 

 

 

 

 

 

 

 

Attack Type

 

 

Shows the type of event that was blocked.

 

 

 

Event Count

 

Shows the number of times this type of event was blocked.

 

 

 

 

 

 

 

 

Last Event Date

 

Shows the date when the event was last blocked.

 

 

 

 

 

 

 

 

 

 

 

 

Duplicate Computers report

Use this report to investigate computers suspected to be duplicates. Duplicate listings usually result when the Enforced Client client software has been installed more than once on a single computer, or when users install it on their new computers without uninstalling it from their previous computers.

If you delete a computer where a valid service is installed, it will be added back to your listing the next time you log on. However, you will no longer be able to view historical report data for that computer.

„View duplicate computers

„Display details for a computer

„View and resolve action items

„Make the most of your online data

„Customize listings and reports

187

Page 185
Image 185
SonicWALL 4.5 manual Inbound Event List, Duplicate Computers report, 187, Attack Type, Event Count

4.5 specifications

SonicWALL 4.5 is a robust network security solution designed to address the evolving challenges in threat protection and data security. This release brings a suite of advanced features, cutting-edge technologies, and characteristics tailored to enhance system performance and resilience against cyber threats.

One of the highlight features of SonicWALL 4.5 is its Integrated Intrusion Prevention System (IPS). This system provides real-time threat detection and response by monitoring network traffic for potential vulnerabilities and malicious activities. With continuously updated signature-based detection, it ensures that organizations are protected against the latest exploits and attack vectors.

Another key component is the Next-Generation Firewall (NGFW) capabilities, which combine traditional firewall functions with advanced features such as application awareness, user identity control, and content filtering. The NGFW allows organizations to enforce detailed policies based on user roles, thereby enhancing the security posture while maintaining user productivity.

SonicWALL 4.5 also incorporates advanced malware protection through its Capture Advanced Threat Protection (ATP) service. This multi-engine sandboxing technology analyzes suspicious files and URLs in a secure environment, providing organizations with in-depth insights into potential threats before they reach the network.

Furthermore, the solution includes enhancements to Secure Mobile Access, enabling secure remote connections while ensuring that sensitive data remains protected. With features like SSL VPN, SonicWALL 4.5 allows users to securely access private networks from anywhere while maintaining compliance with data protection regulations.

In terms of management, SonicWALL 4.5 introduces an intuitive interface for centralized management, enabling IT administrators to configure and monitor multiple devices effortlessly. The reporting and logging capabilities are enhanced, providing detailed insights into network activity, which is crucial for compliance and forensic analysis.

SonicWALL 4.5 also prioritizes user experience and performance with its optimized hardware, ensuring faster processing speeds and reduced latency. Features like high availability and load balancing further enhance system reliability.

In summary, SonicWALL 4.5 stands out with its integrated IPS, NGFW capabilities, advanced malware protection through Capture ATP, secure mobile access, intuitive management interface, and optimized performance. This comprehensive suite of features positions SonicWALL 4.5 as a formidable player in the realm of network security, making it an appealing choice for organizations seeking robust protection against an ever-evolving threat landscape.