Enforced Client Product Guide

User Interface Definitions

A

 

Item

 

Description

 

 

 

 

 

 

 

Check for updates every

 

12 hours: Client computers check for updated detection definition

 

 

 

 

 

 

 

 

(DAT) files and product components every 12 hours.

 

 

 

 

 

 

 

Detect ...

 

Enabled: The following threats are detected during scans:

 

 

 

„ Jokes: Programs designed to be mistaken for a virus. They may

 

 

 

alarm or annoy a user but do not harm files or data. They are

 

 

 

intended to waste time and resources.

 

 

 

„ Remote admin tools: Programs that can be used from a remote

 

 

 

location to access a computer. Some remote administration tools

 

 

 

serve useful purposes, such as allowing users to access their files

 

 

 

from home, but others can be used by unauthorized persons to

 

 

 

monitor user activities and take control of a computer.

 

 

 

„ Spyware: Programs that covertly gather user information

 

 

 

through the user’s Internet connection without the user’s

 

 

 

knowledge. Once installed, spyware monitors user activity on the

 

 

 

Internet and transmits that information in the background to

 

 

 

someone else. Spyware can gather information such as email

 

 

 

addresses, websites visited, passwords, and credit card numbers.

 

 

 

„ Dialers: Programs that hijack a user’s modem and dial

 

 

 

premium-rate phone numbers, such as those required to access

 

 

 

pornographic websites.

 

 

 

„ Password crackers: Programs that find passwords or encryption

 

 

 

keys by trying every possible combination of characters until the

 

 

 

code is broken.

 

 

 

„ Adware: Programs that display unsolicited advertisements.

 

 

 

Adware often includes code that tracks a user's personal

 

 

 

information and transmits it to someone else, without the user's

 

 

 

knowledge.

 

 

 

„ Potentially unwanted applications: Programs that perform

 

 

 

some unauthorized (and often harmful or undesirable) act such as

 

 

 

viruses, worms, and Trojan horses.

 

 

 

„ Key loggers: Programs that record every keystroke a user

 

 

 

makes. They can be used to steal passwords and other

 

 

 

confidential information.

 

 

 

 

 

 

Edit Policy: Virus Protection Settings

Policies are made up of security settings for all of your protection services. These settings define how your services operate on client computers.

Use this page to rename a policy or modify its virus protection settings. Changes do not take effect until you click Save.

„Set basic virus protection options

„Assign a policy to a group

 

Item

 

Description

 

 

 

 

 

 

 

Policy name

 

Type a new name for the policy if you want to rename it.

 

 

 

 

 

 

On-Demand Scan

 

„ Select On to schedule an on-demandscan, then select the time

 

 

 

and frequency.

 

 

 

„ Select Off to schedule no on-demand scans.

 

 

 

Regardless of this setting, on-accessscans occur every time users

 

 

 

run, open, or download files.

 

 

 

 

 

 

194

Page 192
Image 192
SonicWALL 4.5 manual Edit Policy Virus Protection Settings, 194

4.5 specifications

SonicWALL 4.5 is a robust network security solution designed to address the evolving challenges in threat protection and data security. This release brings a suite of advanced features, cutting-edge technologies, and characteristics tailored to enhance system performance and resilience against cyber threats.

One of the highlight features of SonicWALL 4.5 is its Integrated Intrusion Prevention System (IPS). This system provides real-time threat detection and response by monitoring network traffic for potential vulnerabilities and malicious activities. With continuously updated signature-based detection, it ensures that organizations are protected against the latest exploits and attack vectors.

Another key component is the Next-Generation Firewall (NGFW) capabilities, which combine traditional firewall functions with advanced features such as application awareness, user identity control, and content filtering. The NGFW allows organizations to enforce detailed policies based on user roles, thereby enhancing the security posture while maintaining user productivity.

SonicWALL 4.5 also incorporates advanced malware protection through its Capture Advanced Threat Protection (ATP) service. This multi-engine sandboxing technology analyzes suspicious files and URLs in a secure environment, providing organizations with in-depth insights into potential threats before they reach the network.

Furthermore, the solution includes enhancements to Secure Mobile Access, enabling secure remote connections while ensuring that sensitive data remains protected. With features like SSL VPN, SonicWALL 4.5 allows users to securely access private networks from anywhere while maintaining compliance with data protection regulations.

In terms of management, SonicWALL 4.5 introduces an intuitive interface for centralized management, enabling IT administrators to configure and monitor multiple devices effortlessly. The reporting and logging capabilities are enhanced, providing detailed insights into network activity, which is crucial for compliance and forensic analysis.

SonicWALL 4.5 also prioritizes user experience and performance with its optimized hardware, ensuring faster processing speeds and reduced latency. Features like high availability and load balancing further enhance system reliability.

In summary, SonicWALL 4.5 stands out with its integrated IPS, NGFW capabilities, advanced malware protection through Capture ATP, secure mobile access, intuitive management interface, and optimized performance. This comprehensive suite of features positions SonicWALL 4.5 as a formidable player in the realm of network security, making it an appealing choice for organizations seeking robust protection against an ever-evolving threat landscape.