Enforced Client Product Guide

User Interface Definitions

A

Item Description

Advanced Spyware Protection Select potentially unwanted program threats to detect. If no threats

 

Settings

 

are selected, the virus and spyware protection service does not detect

 

 

 

any potentially unwanted programs.

 

 

 

„ Jokes: Programs designed to be mistaken for a virus. They may

 

 

 

alarm or annoy users but do not harm files or data. They are

 

 

 

intended to waste time and resources.

 

 

 

„ Remote admin tools: Programs that can be used from a remote

 

 

 

location to access a computer. Some remote administration tools

 

 

 

serve useful purposes, such as allowing users to access their files

 

 

 

from home, but others can be used by unauthorized persons to

 

 

 

monitor user activities and take control of a computer.

 

 

 

„ Spyware: Programs that covertly gathers user information

 

 

 

through the user’s Internet connection without the user’s

 

 

 

knowledge. Once installed, spyware monitors user activity on the

 

 

 

Internet and transmits that information in the background to

 

 

 

someone else. Spyware can gather information such as email

 

 

 

addresses, websites visited, passwords, and credit card numbers.

 

 

 

„ Dialers: Programs that hijack a user’s modem and dial

 

 

 

premium-rate phone numbers, such as those required to access

 

 

 

pornographic websites.

 

 

 

„ Password crackers: Programs that find passwords or encryption

 

 

 

keys by trying every possible combination of characters until the

 

 

 

code is broken.

 

 

 

„ Adware: Programs that display unsolicited advertisements.

 

 

 

Adware often includes code that tracks a user's personal

 

 

 

information and transmits it to someone else, without the user's

 

 

 

knowledge.

 

 

 

„ Potentially unwanted applications: Programs that perform

 

 

 

some unauthorized (and often harmful or undesirable) act such as

 

 

 

viruses, worms, and Trojan horses.

 

 

 

„ Key loggers: Programs that record every keystroke a user

 

 

 

makes. They can be used to steal passwords and other

 

 

 

confidential information.

 

 

 

 

 

 

 

Save

 

Click to update the policy and return to the Groups + Policies page.

 

 

 

 

 

 

Cancel

 

Click to return to the Groups + Policies page without changing the

 

 

 

policy.

 

 

 

 

 

Reset to Defaults

 

Click to assign the original SonicWALL Default settings to this

 

 

 

policy.

 

 

 

Note: This resets all settings on all tabs. Settings will not take effect

 

 

 

until you click Save.

 

 

 

 

 

 

Add Policy: Virus Protection Settings

Policies are made up of security settings for all of your protection services. These settings define how your services operate on client computers.

Use this page to create a policy and configure its virus protection settings. Changes do not take effect until you click Save.

„Set basic virus protection options

„Assign a policy to a group

202

Page 200
Image 200
SonicWALL 4.5 manual Add Policy Virus Protection Settings, 202, Any potentially unwanted programs

4.5 specifications

SonicWALL 4.5 is a robust network security solution designed to address the evolving challenges in threat protection and data security. This release brings a suite of advanced features, cutting-edge technologies, and characteristics tailored to enhance system performance and resilience against cyber threats.

One of the highlight features of SonicWALL 4.5 is its Integrated Intrusion Prevention System (IPS). This system provides real-time threat detection and response by monitoring network traffic for potential vulnerabilities and malicious activities. With continuously updated signature-based detection, it ensures that organizations are protected against the latest exploits and attack vectors.

Another key component is the Next-Generation Firewall (NGFW) capabilities, which combine traditional firewall functions with advanced features such as application awareness, user identity control, and content filtering. The NGFW allows organizations to enforce detailed policies based on user roles, thereby enhancing the security posture while maintaining user productivity.

SonicWALL 4.5 also incorporates advanced malware protection through its Capture Advanced Threat Protection (ATP) service. This multi-engine sandboxing technology analyzes suspicious files and URLs in a secure environment, providing organizations with in-depth insights into potential threats before they reach the network.

Furthermore, the solution includes enhancements to Secure Mobile Access, enabling secure remote connections while ensuring that sensitive data remains protected. With features like SSL VPN, SonicWALL 4.5 allows users to securely access private networks from anywhere while maintaining compliance with data protection regulations.

In terms of management, SonicWALL 4.5 introduces an intuitive interface for centralized management, enabling IT administrators to configure and monitor multiple devices effortlessly. The reporting and logging capabilities are enhanced, providing detailed insights into network activity, which is crucial for compliance and forensic analysis.

SonicWALL 4.5 also prioritizes user experience and performance with its optimized hardware, ensuring faster processing speeds and reduced latency. Features like high availability and load balancing further enhance system reliability.

In summary, SonicWALL 4.5 stands out with its integrated IPS, NGFW capabilities, advanced malware protection through Capture ATP, secure mobile access, intuitive management interface, and optimized performance. This comprehensive suite of features positions SonicWALL 4.5 as a formidable player in the realm of network security, making it an appealing choice for organizations seeking robust protection against an ever-evolving threat landscape.