![]() When suspicious activity is detected, it is important to collect information about You use filters when viewing logs, but filters can also be used for other tasks, suchĪs exporting logs and selecting data for reports.ĭiagrams allow you to visualize your network security environment. Reports are summaries of logs and statistics that allow you to combine large amountsįilters allow you to select data based on values that it contains. View data from SMC servers, all types of engines, and from third-party components that are configured You can view log, alert, and audit entries through the log browsing views. The SMC can be configured to log and monitor other manufacturers’ devices in much the same In the Management Client by allowing your Management Server to contact Forcepoint servers. You can view maintenance contract and support level information for your licenses Checking maintenance contract information.Helps you to analyze network traffic to and from the engines. You can capture network traffic data for network troubleshooting purposes. You can check the status of running tasks and executed tasks (for example, upgrade The engines receive their configuration when a policy is installed.Ī record of administrator actions is maintained in the SMC. When checking the Whois information for an IP address, you can see the location (forĮxample, a city or street address) in Google Maps. View IP address locations from the Whois Information dialog box.In the Logs view, you can see a location (for example, a city or street address) for an IP address View IP address locations in the Logs view.Geolocation elements are displayed in Google Maps based on the location data that View Geolocation element locations in Overviews and Reports.You can view the actual location of a Geolocation element or an IP address in more Geolocations and IP addresses in Google Maps.You can set many elements to use the same Geolocation. When you createĪ Geolocation, select the elements that belong to it. Using Geolocation elements, you can define the physical locations of network elements,Ī Geolocation represents the physical location of a network element. Monitoring connections using Geolocation elements.You can also restore earlier configurations You can view earlier configurations of an element and compare them to the currentĬonfiguration with Element Snapshots. View and compare Element Snapshot elements.Of IP addresses, ports, and protocols that are blacklisted. Firewall, Layer 2 Firewall, and IPS engines also track combinations Monitoring connections, blacklists, VPN SAs, users, routing, and SSL VPNsįirewalls track allowed connections, active VPN SAs, active users, routing, and SSL.In the Home view of the Management Client, there are user dashboards where you can Of statistical charts are engine load and traffic flow. ![]() Of a frequently used view is a log filtered by criteria that you configured. To frequently used views and statistical charts of the system’s operation. There are various tools and views that you can use to monitor the NGFW system.Ĭustomizable Overviews contain information on the system’s status, including shortcuts System monitoring tools in the Management Client.There are several ways to monitor the system in the Management Client. Getting started with monitoring the system. ![]() You can monitor Forcepoint NGFW components and view system summaries in the Management Client. You can use the SMC to monitor system components and third-party devices. How the different SMC components should be positioned and deployed.Īfter deploying the SMC components, you are ready to start using the Management Client and carrying out
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |