McAfee FIREWALL 2.1-GETTING STARTED Manual de usuario Pagina 5

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 8
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 4
Data Sheet McAfee Firewall Management
Trending, Visualization, and Analytics
Afteryouhaveconguredyourrewalls,useyour
McAfeeFirewallEnterpriseProlerforsituational
awarenessaboutchangingusageandthreatsand
at-a-glancemonitoringdaytoday.Ithelpsyou
discover,visualize,andmonitorapplicationusage
byusergroupandrisklevel.
WithProler’sgraphicaldisplays,youspend
minutesratherthanhoursplanningchanges,
optimizingrules,andtroubleshootingrewall-
relatednetworkorapplicationoutages.Proler
helpsreplacesubstantialmanualeffortandlog
viewingwithafewsimpleclicks.
Thissoftware,includedwithyourFirewallpurchase
oravailableinadedicatedappliance,takesfeeds
fromtherewall,analyzesthedataforvisibility
intohowtherewallrulesareaffectingthe
network,andhelpsyoudetectchangesinaccess
patternsinrealtime.
Application discovery and real-time
usagevisualization
WhileMcAfeeFirewallEnterprisediscoversthe
applicationstraversingthenetwork,Proler
visualizesthoseapplications,bothinboundand
outbound.Italsoshowsyouhowbandwidthis
beingused,byrisklevelandusergroup.
Dynamicdisplayshighlightchangesonthe
network,comparingtimeframesandprioritizing
eventstohelpyoudetectalterationsinaccess
patternsthatcouldsignalaproblem.Youcan
trackwhathappensforanytimeperiodatthe
rewall,characterizingusersandassetsbasedon
real-timenetworkactivityandvisualizingrewall
deny/allowactionsincontext.Thisclarityletsyou
determinewhichapplicationsarerequiredand
whicharenot,andcreatepoliciesintherewall
thatcontrolaccesstoapplications.Withdatato
backupdecision-making,youcanreducecost
intermsofbandwidthuse,improveproductivity,
andtunerulesoreducateuserstoensureusage
matchesorganizationalpolicies.
Threat and geographic visualization
Sincemanyattacksaretargetedandsubtle,
Prolergivesyoutoolstodetermineifthesystems
protectedbyyourrewallsareunderattack,
identifythreats,conrmcountermeasuresarein
place,andprioritizerisks.Thesystemhighlights
Since crises seem to hit most often when you’re away from the office, you can troubleshoot firewall events from any
web browser
Proler Advantages
•
Proler features a next generation
web UI viewable from any web
enabled device, or from within
Control Center to integrate
monitoring with other workows
and assist incident response
•
McAfee ePO platform integration
allows the opening of tickets and
other actions based on changing
behaviors sent from Proler
•
Visualization of all rewall actions in
terms of who/what/where improves
diagnosis and provides guidance into
needed rule changes
•
Correlates 30 days worth of rewall
actions to network users and roles in
real-time to quickly validate impact
of changes
•
On-demand access to McAfee ePO
platform asset directory conrms
that the right countermeasures are
active on a host, such as AV and
endpoint encryption
•
Identify root cause categorizations
for denied trafc
•
Pulls rewall policy and rule objects
to show the details of the rule and
also provides reports in terms of
rewall policy objects
•
Timeframe comparison and
prioritized visualization for detecting
important changes in access patterns
•
Create reporting objects to improve
or focus analysis in particular areas
of the network
•
Use graphical reports to convey
situational awareness, threats by
geographic location, applications
traversing the rewall, and other
information to those who need
toknow
•
Can be deployed quickly and
leverages existing network devices
and infrastructures
•
Intercepts login authentications
without host agents or additional
inline devices
•
Enables trending and analysis
without manually intensive, after-
the-fact log collection and review
Vista de pagina 4
1 2 3 4 5 6 7 8

Comentarios a estos manuales

Sin comentarios