Enforced Client Product Guide

Using Enforced Client

 

Creating groups to manage your site

3

Block computers from receiving updates

Use this feature to prevent unauthorized computers that are connecting to your network (sometimes called rogue systems) from receiving service updates.

To block computers:

On the Computers page, select the computers you want to block, then click Block.

To unblock computers:

On the Computers page, select Blocked to list all blocked computers, then select the computers you want to unblock and click Unblock.

Delete computers from your reports

Use this feature to remove obsolete computers and duplicate computers from your listings. Duplicates typically appear when the Enforced Client client software has been installed more than once on a single computer or when users install it on their new computers without uninstalling it from their previous computers.

Deleting a computer does not uninstall the Enforced Client client software. If you mistakenly delete a computer with working client software from the report, it automatically reappears in your listing the next time its report data is uploaded. However, you will no longer be able to view the historical detection data for that computer.

To delete computers:

On the Computers page, select the computers you want to delete, then click Delete.

See View duplicate computers on page 80 for information on displaying a complete listing of duplicate computers in a report.

Move computers into a group

Every client computer is part of a group (see Creating groups to manage your site on page 71 for more information). Initially, you assign computers to a group when installing Enforced Client. If no group is specified, computers are placed in the Default group.

You can move computers into a different group at any time.

To move computers:

1On the Computers page, select the computers you want to move.

2From the Move to list, select the group you want to move the computers to.

You must create the group before you can move computers into it. See Create or edit a group on page 72.

3Click Move.

Creating groups to manage your site

A group consists of one or more computers that use the same policy of security settings. You can base groups on geographic location, department, computer type, the tasks performed by the users, or anything meaningful to your organization.

70

Page 70
Image 70
SonicWALL 4.5 Creating groups to manage your site, Block computers from receiving updates, Move computers into a group

4.5 specifications

SonicWALL 4.5 is a robust network security solution designed to address the evolving challenges in threat protection and data security. This release brings a suite of advanced features, cutting-edge technologies, and characteristics tailored to enhance system performance and resilience against cyber threats.

One of the highlight features of SonicWALL 4.5 is its Integrated Intrusion Prevention System (IPS). This system provides real-time threat detection and response by monitoring network traffic for potential vulnerabilities and malicious activities. With continuously updated signature-based detection, it ensures that organizations are protected against the latest exploits and attack vectors.

Another key component is the Next-Generation Firewall (NGFW) capabilities, which combine traditional firewall functions with advanced features such as application awareness, user identity control, and content filtering. The NGFW allows organizations to enforce detailed policies based on user roles, thereby enhancing the security posture while maintaining user productivity.

SonicWALL 4.5 also incorporates advanced malware protection through its Capture Advanced Threat Protection (ATP) service. This multi-engine sandboxing technology analyzes suspicious files and URLs in a secure environment, providing organizations with in-depth insights into potential threats before they reach the network.

Furthermore, the solution includes enhancements to Secure Mobile Access, enabling secure remote connections while ensuring that sensitive data remains protected. With features like SSL VPN, SonicWALL 4.5 allows users to securely access private networks from anywhere while maintaining compliance with data protection regulations.

In terms of management, SonicWALL 4.5 introduces an intuitive interface for centralized management, enabling IT administrators to configure and monitor multiple devices effortlessly. The reporting and logging capabilities are enhanced, providing detailed insights into network activity, which is crucial for compliance and forensic analysis.

SonicWALL 4.5 also prioritizes user experience and performance with its optimized hardware, ensuring faster processing speeds and reduced latency. Features like high availability and load balancing further enhance system reliability.

In summary, SonicWALL 4.5 stands out with its integrated IPS, NGFW capabilities, advanced malware protection through Capture ATP, secure mobile access, intuitive management interface, and optimized performance. This comprehensive suite of features positions SonicWALL 4.5 as a formidable player in the realm of network security, making it an appealing choice for organizations seeking robust protection against an ever-evolving threat landscape.