Enforced Client Product Guide

Using Enforced Client

 

Viewing reports

Why use reports?

Reports provide valuable tools for managing your security strategy. Only the reports available for the installed protection services appear on this page.

Use this report...

To view...

 

 

Detections

The types of potentially malicious code or unwanted programs that have

 

been found on your network.

 

Use this report to manage detections of viruses and potentially unwanted

 

programs.

 

See View detections on page 103 for instructions.

 

 

Unrecognized

Programs that your spyware protection or firewall protection detected on

Programs

your network.

 

Use this report to manage your potentially unwanted program detections and

 

Internet applications blocked by the firewall protection service.

 

See View unrecognized programs on page 105 and View unrecognized

 

Internet applications on page 123 for instructions.

 

 

Inbound Events

Computers where inbound or outbound communications were blocked by

Blocked by Firewall

the firewall protection service.

 

Use this report to manage blocked communications.

 

See View inbound events blocked by the firewall on page 124 for

 

instructions.

 

 

Duplicate Computers

Computers that appear more than once in administrative reports.

 

Use this report to track down obsolete computers and those where Enforced

 

Client has been incorrectly overinstalled and tracked as multiple

 

installations.

 

See View duplicate computers on page 80 for detailed instructions.

 

 

Computer Profiles

The version of the Windows operating system and the Internet Explorer web

 

browser running on each client computer.

 

Use this report to locate computers where you need to install software

 

patches for a specific browser or operating system.

 

See View computer profiles on page 81 for detailed instructions.

 

 

Detection History

A graphical summary of the number of detections and the number of

 

computers where detections occurred on your network over the past year.

 

Use this report to evaluate the effectiveness of your security strategy.

 

See View your detection history on page 107 for instructions.

 

 

Email Security Reports

A page on the email security service’s portal, where you can access reports

 

on your site’s mailflow and detections.

 

Use these reports to monitor email activity and detections.

 

See Viewing reports for the email security service on page 141 for

 

instructions.

 

 

3

Can I customize reports?

„Select the data to display (see Customize listings and reports on page 60).

„Print a report, save it, or send it to users (see Make the most of your online data on page 59).

„Add a customized logo (see Add your logo to reports on page 82).

79

Page 79
Image 79
SonicWALL 4.5 manual Detections, Unrecognized, Programs, Inbound Events, Blocked by Firewall, Duplicate Computers

4.5 specifications

SonicWALL 4.5 is a robust network security solution designed to address the evolving challenges in threat protection and data security. This release brings a suite of advanced features, cutting-edge technologies, and characteristics tailored to enhance system performance and resilience against cyber threats.

One of the highlight features of SonicWALL 4.5 is its Integrated Intrusion Prevention System (IPS). This system provides real-time threat detection and response by monitoring network traffic for potential vulnerabilities and malicious activities. With continuously updated signature-based detection, it ensures that organizations are protected against the latest exploits and attack vectors.

Another key component is the Next-Generation Firewall (NGFW) capabilities, which combine traditional firewall functions with advanced features such as application awareness, user identity control, and content filtering. The NGFW allows organizations to enforce detailed policies based on user roles, thereby enhancing the security posture while maintaining user productivity.

SonicWALL 4.5 also incorporates advanced malware protection through its Capture Advanced Threat Protection (ATP) service. This multi-engine sandboxing technology analyzes suspicious files and URLs in a secure environment, providing organizations with in-depth insights into potential threats before they reach the network.

Furthermore, the solution includes enhancements to Secure Mobile Access, enabling secure remote connections while ensuring that sensitive data remains protected. With features like SSL VPN, SonicWALL 4.5 allows users to securely access private networks from anywhere while maintaining compliance with data protection regulations.

In terms of management, SonicWALL 4.5 introduces an intuitive interface for centralized management, enabling IT administrators to configure and monitor multiple devices effortlessly. The reporting and logging capabilities are enhanced, providing detailed insights into network activity, which is crucial for compliance and forensic analysis.

SonicWALL 4.5 also prioritizes user experience and performance with its optimized hardware, ensuring faster processing speeds and reduced latency. Features like high availability and load balancing further enhance system reliability.

In summary, SonicWALL 4.5 stands out with its integrated IPS, NGFW capabilities, advanced malware protection through Capture ATP, secure mobile access, intuitive management interface, and optimized performance. This comprehensive suite of features positions SonicWALL 4.5 as a formidable player in the realm of network security, making it an appealing choice for organizations seeking robust protection against an ever-evolving threat landscape.