McAfee FIREWALL 2.1-GETTING STARTED Instrukcja Użytkownika Strona 6

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 8
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 5
Data Sheet McAfee Firewall Management
changesinrisksoyoucanquicklytakeactionand
itdynamicallyadjustsriskratingsaccordingto
assetvalue,applicationrisk,andidentiedthreats.
Prolerpresentseventscorrelatedagainstrewall
policyinthecontextofallrewallactions.To
speedassessment,youseedetailsforeachevent,
includingusers,geographiclocation,andsource
anddestinationIPaddressesandports.Thedisplay
letsyoudrilldowntoshowspecicuserswithin
theusergroupandlookattheruleandthereason
fora“deny”action.Toverifythatprotective
measuresareworking,youcanseeareport
thatshowssecuritycountermeasuresapplied
byapplication.
Geo-locationcanbeastrongindicatorofrisk.
Prolercantellyouthelocationsandsources
oftrafcandthreats.AreyougettingBitTorrent
trafcfromcountriesorregionswhereyoudonot
dobusiness?Areyourhostsconnectingtorisky
neighborhoodsontheweb?Youcandetermine
boththesourceandthedestinationoftrafc—
internal,external,orthroughapartner—searching
byapplicationandusergroup.Youcandrillinto
usagebubblestoseerules,IPaddresses,users,
andmoreanddetermineiftrafcisbusiness-or
non-business-related.
Rapidly diagnose outages
Duringanapplicationoutage,ltershelpyou
quicklyidentifyandscopetheproblem,digging
intotherootcausewithoutleavingtherewall
environment.Youcandrilldownwithinbubble
chartstounderstandwhatusersorspecic
applicationsareinvolved,forexampleTeamViewer
orWebEx,andclickthroughdirectlyto
investigatefurther.
Drilldownsshowusers,countriesinvolved,
applications,usagelevels,andtherewallrules
thatareallowingorblockingtheparticular
applications.Asyouimplementxes,thereal-
timemonitoringallowsyoutovalidateinstantly
thattherulesetchangehadthedesiredeffecton
trafc,applications,orusers.
Quick and direct reporting
Proler’sgraphicalreportsandreusablereporting
objectshelpyouconveyinformationtoothers
withinyourorganizationtoguideactionsand
explaineventsornewrequirements.Built-in
reportscoverpre-denedapplicationanduser-
basedtopics,whichletyoudocumenteventsand
activitieswithoutgoingintoanothertool.Reports
canreectanylevelandanylteredorspecic
viewinProler.Youcanprint,save,orexport
reportsintoPDForCSVformats.
Proactive support to validate changes
Visibilityintousers,applications,andtrendsmakes
itpossibletoproletheimpactofinfrastructure
changes.Prolerletsyouconrmthatsystems
andtrafcarebacktonormalandusershave
appropriateaccesstoapplications.
Broad, exhaustive reporting
Application and identity-based
reports
Reports identify the top applications going through the firewall and spotlight the
individuals who are using those applications
Global Threat Intelligence
reputation report
Graphically see the spam that has been dropped at the network edge using reputation-
based filtering
Protocol and web usage
Provides a clear picture of protocol and web usage by user, department, and/or device.
Identifies inappropriate usage including user activity associated with security appliance
URL filtering.
Bandwidth usage
View bandwidth utilization by department, client, and application
Regulatory compliance
Report templates take the pain out of regulatory compliance for Sarbanes-Oxley, Payment
Card Industry (PCI), Health Insurance Portability and Accountability Act (HIPAA), Gramm-
Leach-Bliley Act (GLBA), and the Federal Information Security Management Act (FISMA).
Configuration management
Document configuration change detail to prove that corporate networks are configured
to government requirements
Use Proler to discover the applica-
tions your users are accessing and
visualize the risk and network impact.
Available as a virtual or
dedicatedappliance
A virtual Firewall Enterprise Proler is
included with every McAfee Firewall
Enterprise product. In addition, many
customers choose to purchase our
dedicated Proler appliance running
on McAfee Linux. By operating
on a dedicated appliance, out of
band, the Proler can handle larger
data sets, display real-time events,
run troubleshooting queries, and
let you explore rule sets without
affecting on-going rewall or
networkperformance.
Przeglądanie stron 5
1 2 3 4 5 6 7 8

Komentarze do niniejszej Instrukcji

Brak uwag