Enforced Client Product Guide

Installing Enforced Client

 

Installing Enforced Client

After installation is complete, a status for each target computer is displayed.

Figure 2-6 Status for target computers

2

10Click View Log to open a log file in Microsoft Notepad that shows the status of the current session, then save the file.

The dialog box indicates only whether the files were pushed to the target computers. It is important to review the log file to verify that the files were installed and updated successfully. You can also use the log file for troubleshooting. (The contents of the log file are deleted when you close the Push Install utility or perform another push.)

11Optionally, click Back to return to the previous screen and push to more computers.

12If you have installed the firewall protection service, restart the client computers.

If you use a corporate firewall or proxy server

Enforced Client downloads components directly from SonicWALL servers to client computers. If you are behind a corporate firewall, or are connected to the Internet by a proxy server, you might need to provide additional information for your service to work properly.

„Authentication support is limited to anonymous authentication or Windows domain challenge/response authentication. Basic authentication is not supported.

„Advanced installation methods and automatic updating do not support a CHAP or NTLM proxy.

„If you use an authenticating proxy server, disable the policy option Update client computers where users are not logged in on the SecurityCenter’s Advanced Settings tab (see Set advanced virus protection options on page 97).

Contact product support if you have proxy questions while installing or updating Enforced Client.

Enabling relay servers

If any computers on your network do not have a direct connection to the Internet, the Internet Independent Updating (IIU) feature allows them to receive software updates from another local computer. In that case, you must specify at least one computer in your LAN as a relay server.

If all the computers on your network connect to the Internet, you do not need to set up any relay servers. However, you might want to specify relay servers to reduce Internet traffic on your LAN. See Internet Independent Updating (IIU) on page 15 for information on using relay servers.

45

Page 45
Image 45
SonicWALL 4.5 manual If you use a corporate firewall or proxy server, Enabling relay servers

4.5 specifications

SonicWALL 4.5 is a robust network security solution designed to address the evolving challenges in threat protection and data security. This release brings a suite of advanced features, cutting-edge technologies, and characteristics tailored to enhance system performance and resilience against cyber threats.

One of the highlight features of SonicWALL 4.5 is its Integrated Intrusion Prevention System (IPS). This system provides real-time threat detection and response by monitoring network traffic for potential vulnerabilities and malicious activities. With continuously updated signature-based detection, it ensures that organizations are protected against the latest exploits and attack vectors.

Another key component is the Next-Generation Firewall (NGFW) capabilities, which combine traditional firewall functions with advanced features such as application awareness, user identity control, and content filtering. The NGFW allows organizations to enforce detailed policies based on user roles, thereby enhancing the security posture while maintaining user productivity.

SonicWALL 4.5 also incorporates advanced malware protection through its Capture Advanced Threat Protection (ATP) service. This multi-engine sandboxing technology analyzes suspicious files and URLs in a secure environment, providing organizations with in-depth insights into potential threats before they reach the network.

Furthermore, the solution includes enhancements to Secure Mobile Access, enabling secure remote connections while ensuring that sensitive data remains protected. With features like SSL VPN, SonicWALL 4.5 allows users to securely access private networks from anywhere while maintaining compliance with data protection regulations.

In terms of management, SonicWALL 4.5 introduces an intuitive interface for centralized management, enabling IT administrators to configure and monitor multiple devices effortlessly. The reporting and logging capabilities are enhanced, providing detailed insights into network activity, which is crucial for compliance and forensic analysis.

SonicWALL 4.5 also prioritizes user experience and performance with its optimized hardware, ensuring faster processing speeds and reduced latency. Features like high availability and load balancing further enhance system reliability.

In summary, SonicWALL 4.5 stands out with its integrated IPS, NGFW capabilities, advanced malware protection through Capture ATP, secure mobile access, intuitive management interface, and optimized performance. This comprehensive suite of features positions SonicWALL 4.5 as a formidable player in the realm of network security, making it an appealing choice for organizations seeking robust protection against an ever-evolving threat landscape.