
Data Sheet McAfee Firewall Management
changesinrisksoyoucanquicklytakeactionand
itdynamicallyadjustsriskratingsaccordingto
assetvalue,applicationrisk,andidentiedthreats.
Prolerpresentseventscorrelatedagainstrewall
policyinthecontextofallrewallactions.To
speedassessment,youseedetailsforeachevent,
includingusers,geographiclocation,andsource
anddestinationIPaddressesandports.Thedisplay
letsyoudrilldowntoshowspecicuserswithin
theusergroupandlookattheruleandthereason
fora“deny”action.Toverifythatprotective
measuresareworking,youcanseeareport
thatshowssecuritycountermeasuresapplied
byapplication.
Geo-locationcanbeastrongindicatorofrisk.
Prolercantellyouthelocationsandsources
oftrafcandthreats.AreyougettingBitTorrent
trafcfromcountriesorregionswhereyoudonot
dobusiness?Areyourhostsconnectingtorisky
neighborhoodsontheweb?Youcandetermine
boththesourceandthedestinationoftrafc—
internal,external,orthroughapartner—searching
byapplicationandusergroup.Youcandrillinto
usagebubblestoseerules,IPaddresses,users,
andmoreanddetermineiftrafcisbusiness-or
non-business-related.
Rapidly diagnose outages
Duringanapplicationoutage,ltershelpyou
quicklyidentifyandscopetheproblem,digging
intotherootcausewithoutleavingtherewall
environment.Youcandrilldownwithinbubble
chartstounderstandwhatusersorspecic
applicationsareinvolved,forexampleTeamViewer
orWebEx,andclickthroughdirectlyto
investigatefurther.
Drilldownsshowusers,countriesinvolved,
applications,usagelevels,andtherewallrules
thatareallowingorblockingtheparticular
applications.Asyouimplementxes,thereal-
timemonitoringallowsyoutovalidateinstantly
thattherulesetchangehadthedesiredeffecton
trafc,applications,orusers.
Quick and direct reporting
Proler’sgraphicalreportsandreusablereporting
objectshelpyouconveyinformationtoothers
withinyourorganizationtoguideactionsand
explaineventsornewrequirements.Built-in
reportscoverpre-denedapplicationanduser-
basedtopics,whichletyoudocumenteventsand
activitieswithoutgoingintoanothertool.Reports
canreectanylevelandanylteredorspecic
viewinProler.Youcanprint,save,orexport
reportsintoPDForCSVformats.
Proactive support to validate changes
Visibilityintousers,applications,andtrendsmakes
itpossibletoproletheimpactofinfrastructure
changes.Prolerletsyouconrmthatsystems
andtrafcarebacktonormalandusershave
appropriateaccesstoapplications.
Broad, exhaustive reporting
Application and identity-based
reports
Reports identify the top applications going through the firewall and spotlight the
individuals who are using those applications
Global Threat Intelligence
reputation report
Graphically see the spam that has been dropped at the network edge using reputation-
based filtering
Protocol and web usage
Provides a clear picture of protocol and web usage by user, department, and/or device.
Identifies inappropriate usage including user activity associated with security appliance
URL filtering.
Bandwidth usage
View bandwidth utilization by department, client, and application
Regulatory compliance
Report templates take the pain out of regulatory compliance for Sarbanes-Oxley, Payment
Card Industry (PCI), Health Insurance Portability and Accountability Act (HIPAA), Gramm-
Leach-Bliley Act (GLBA), and the Federal Information Security Management Act (FISMA).
Configuration management
Document configuration change detail to prove that corporate networks are configured
to government requirements
Use Proler to discover the applica-
tions your users are accessing and
visualize the risk and network impact.
Available as a virtual or
dedicatedappliance
A virtual Firewall Enterprise Proler is
included with every McAfee Firewall
Enterprise product. In addition, many
customers choose to purchase our
dedicated Proler appliance running
on McAfee Linux. By operating
on a dedicated appliance, out of
band, the Proler can handle larger
data sets, display real-time events,
run troubleshooting queries, and
let you explore rule sets without
affecting on-going rewall or
networkperformance.
Comentarios a estos manuales