Enforced Client Product Guide

User Interface Definitions

A

 

Item

 

Description

 

 

 

 

 

 

 

Connection Type

 

Select the environment where a client computer is used:

 

 

 

„ Untrusted network: The computer connects to a network that

 

 

 

might not be secure, such as an airport or hotel network. The

 

 

 

firewall protection service should block communications from IP

 

 

 

addresses on that network.

 

 

 

„ Trusted network: The computer connects to a network that is

 

 

 

protected from the Internet by a hardware firewall or router. The

 

 

 

firewall protection service should allow communications from IP

 

 

 

addresses on the same subnet.

 

 

 

„ Custom settings: The computer should communicate only with

 

 

 

specified ports and IP addresses. Click Edit to configure the

 

 

 

settings.

 

Allowed Internet Applications

 

Lists previously detected Internet applications that you have

 

 

 

approved to run on computers using this policy. If you have not

 

 

 

specified any allowed applications, no list appears here.

 

 

 

Only Internet applications that you know are safe should appear

 

 

 

here.

 

 

 

 

 

 

 

Detected Application

 

Select an application that you want to approve from the list. The list

 

 

 

 

 

 

 

 

shows all the Internet applications detected on client computers by

 

 

 

the firewall protection service.

 

 

 

 

 

 

 

Add Application

 

Click to allow the specified application on computers using this

 

 

 

policy. Once it is added, it appears in the list on this tab.

 

 

 

 

 

remove

 

Click to delete the application from the list. If this application

 

 

 

attempts to contact the Internet in the future, it is treated as a new

 

 

 

detection on computers using this policy. At that time, the firewall

 

 

 

protection service responds according to the Firewall Protection

 

 

 

Mode selected.

 

Save

 

Click to update the policy and return to the Groups + Policies page.

 

 

 

 

 

 

 

 

 

 

Cancel

 

Click to return to the Groups + Policies page without changing the

 

 

 

 

 

 

 

 

policy.

 

 

 

 

 

Reset to Defaults

 

Click to assign the original SonicWALL Default policy settings to

 

 

 

this policy.

 

 

 

Note: This resets all settings on all tabs. Settings will not take effect

 

 

 

until you click Save.

 

 

 

 

 

 

Add Policy: Browser Protection Settings

Policies are made up of security settings for all of your protection services. These settings define how your services operate on client computers.

Use this page to create a new policy and configure its settings for the browser protection service. Changes do not take effect until you click Save.

„Configuring browser protection from the SecurityCenter

„Assign a policy to a group

 

Item

 

Description

 

 

 

 

 

 

 

Policy name

 

Type a new name for the policy if you want to rename it.

 

 

 

 

 

 

Automatically install browser

 

Select this option to install the browser protection service

 

protection service on all

 

automatically whenever client computers check for an updated

 

computers using this policy

 

policy.

 

 

 

 

 

Save

 

Click to update the policy and return to the Groups + Policies page.

 

 

 

 

 

 

 

 

 

 

 

206

Page 204
Image 204
SonicWALL 4.5 manual Add Policy Browser Protection Settings, 206, Detected Application

4.5 specifications

SonicWALL 4.5 is a robust network security solution designed to address the evolving challenges in threat protection and data security. This release brings a suite of advanced features, cutting-edge technologies, and characteristics tailored to enhance system performance and resilience against cyber threats.

One of the highlight features of SonicWALL 4.5 is its Integrated Intrusion Prevention System (IPS). This system provides real-time threat detection and response by monitoring network traffic for potential vulnerabilities and malicious activities. With continuously updated signature-based detection, it ensures that organizations are protected against the latest exploits and attack vectors.

Another key component is the Next-Generation Firewall (NGFW) capabilities, which combine traditional firewall functions with advanced features such as application awareness, user identity control, and content filtering. The NGFW allows organizations to enforce detailed policies based on user roles, thereby enhancing the security posture while maintaining user productivity.

SonicWALL 4.5 also incorporates advanced malware protection through its Capture Advanced Threat Protection (ATP) service. This multi-engine sandboxing technology analyzes suspicious files and URLs in a secure environment, providing organizations with in-depth insights into potential threats before they reach the network.

Furthermore, the solution includes enhancements to Secure Mobile Access, enabling secure remote connections while ensuring that sensitive data remains protected. With features like SSL VPN, SonicWALL 4.5 allows users to securely access private networks from anywhere while maintaining compliance with data protection regulations.

In terms of management, SonicWALL 4.5 introduces an intuitive interface for centralized management, enabling IT administrators to configure and monitor multiple devices effortlessly. The reporting and logging capabilities are enhanced, providing detailed insights into network activity, which is crucial for compliance and forensic analysis.

SonicWALL 4.5 also prioritizes user experience and performance with its optimized hardware, ensuring faster processing speeds and reduced latency. Features like high availability and load balancing further enhance system reliability.

In summary, SonicWALL 4.5 stands out with its integrated IPS, NGFW capabilities, advanced malware protection through Capture ATP, secure mobile access, intuitive management interface, and optimized performance. This comprehensive suite of features positions SonicWALL 4.5 as a formidable player in the realm of network security, making it an appealing choice for organizations seeking robust protection against an ever-evolving threat landscape.