Enforced Client Product Guide

Introduction

 

Getting product information

1

Getting product information

Several types of information are available to meet the specific needs of client computer users and administrators.

Users — Client computer users can access online help from links in the client software.

Online User Help

Access online instructions for performing security tasks in two ways:

 

„ Click help on any window displayed by the client software.

 

„ Click

 

in the system tray and select Help.

 

 

 

 

 

 

 

Note: If the product’s built-in help system displays incorrectly on a client

 

computer, its version of Microsoft Internet Explorer might not be using

 

ActiveX controls properly. These controls are required to display the help

 

file. Make sure the latest version of Internet Explorer is installed with its

 

Internet security settings set to Medium or Medium-high.

 

 

 

Online Installation

Click the help link on any installation dialog box to display instructions for

Instructions

installing Enforced Client using the URL method. Also contains instructions

 

for preparing for installation, testing, uninstalling, and troubleshooting

 

installation issues.

Administrators — Unless otherwise noted, these product documents are Adobe Acrobat .PDF files available on the product CD or the Help page of the SecurityCenter.

Product Guide

Product introduction and features, detailed instructions for configuring the

 

software, information on deployment, recurring tasks, and operating

 

procedures. Recommended for administrators who manage large

 

organizations or multiple accounts, and for hands-on administrators who

 

want to customize security settings and actively monitor client computers.

 

 

Quick Start Guide

A short “getting started” with information on basic product features, routine

 

tasks that you perform often, and critical tasks that you perform

 

occasionally. Recommended for first-time customers who need an overview

 

of the product, and for hands-off administrators who plan to use the default

 

security settings and monitor security status through their weekly status

 

email.

 

 

Release Notes

ReadMe. Product information, resolved issues, known issues, and

 

last-minute additions or changes to the product or its documentation.

 

Available as a text document.

 

 

Online SecurityCenter

For information about any page of your SecurityCenter website, click the

help

help ( ? ) link in the upper-right corner. You can access additional

 

information with the table of contents, index, or search feature.

 

 

Online Push Install help

While running the Push Install utility, click the help link on any dialog box

 

for information about deploying client software remotely to one or more

 

computers without user intervention.

Avert Labs Threat Library

After an update, click Avert Labs Threat Library on the Enforced Client window to access the online SonicWALL Threat Library. This website has detailed information on where threats come from, how they infect your system, and how to remove them.

The Avert Labs Threat Library contains useful information on hoaxes, such as virus warnings that you receive via email. A Virtual Card For You and SULFNBK are two of the best-known hoaxes, but there are many others. Next time you receive a well-meaning warning, view our hoax page before you pass the message on to your friends.

22

Page 22
Image 22
SonicWALL 4.5 manual Getting product information

4.5 specifications

SonicWALL 4.5 is a robust network security solution designed to address the evolving challenges in threat protection and data security. This release brings a suite of advanced features, cutting-edge technologies, and characteristics tailored to enhance system performance and resilience against cyber threats.

One of the highlight features of SonicWALL 4.5 is its Integrated Intrusion Prevention System (IPS). This system provides real-time threat detection and response by monitoring network traffic for potential vulnerabilities and malicious activities. With continuously updated signature-based detection, it ensures that organizations are protected against the latest exploits and attack vectors.

Another key component is the Next-Generation Firewall (NGFW) capabilities, which combine traditional firewall functions with advanced features such as application awareness, user identity control, and content filtering. The NGFW allows organizations to enforce detailed policies based on user roles, thereby enhancing the security posture while maintaining user productivity.

SonicWALL 4.5 also incorporates advanced malware protection through its Capture Advanced Threat Protection (ATP) service. This multi-engine sandboxing technology analyzes suspicious files and URLs in a secure environment, providing organizations with in-depth insights into potential threats before they reach the network.

Furthermore, the solution includes enhancements to Secure Mobile Access, enabling secure remote connections while ensuring that sensitive data remains protected. With features like SSL VPN, SonicWALL 4.5 allows users to securely access private networks from anywhere while maintaining compliance with data protection regulations.

In terms of management, SonicWALL 4.5 introduces an intuitive interface for centralized management, enabling IT administrators to configure and monitor multiple devices effortlessly. The reporting and logging capabilities are enhanced, providing detailed insights into network activity, which is crucial for compliance and forensic analysis.

SonicWALL 4.5 also prioritizes user experience and performance with its optimized hardware, ensuring faster processing speeds and reduced latency. Features like high availability and load balancing further enhance system reliability.

In summary, SonicWALL 4.5 stands out with its integrated IPS, NGFW capabilities, advanced malware protection through Capture ATP, secure mobile access, intuitive management interface, and optimized performance. This comprehensive suite of features positions SonicWALL 4.5 as a formidable player in the realm of network security, making it an appealing choice for organizations seeking robust protection against an ever-evolving threat landscape.