Alto MS Series User Manual Page 57

  • Download
  • Add to my manuals
  • Print
  • Page
    / 108
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 56
Getting Started Guide 53
Create the Security Perimeter Set Up Basic Security Policies
In the ACC, review the most used applications and the high-risk applications on your network. The ACC
graphically summarizes the log information to highlight the applications traversing the network, who is using
them (with User-ID enabled), and the potential security impact of the content to help you identify what is
happening on the network in real time. You can then use this information to create appropriate security
policies that block unwanted applications, while allowing and enabling applications in a secure manner.
Determine what updates/modifications are required for your network security rules and implement the
changes. For example:
Evaluate whether to allow content based on schedule, users, or groups
Allow or control certain applications or functions within an application
Decrypt and inspect content
Allow but scan for threats and exploits
For information on refining your security policies and for attaching custom security profiles, see Protect
Your Network Against Threats.
View the traffic and threat logs at Monitor > Logs.
Review the URL filtering logs to scan through alerts, denied categories/URLs. In order to generate a URL
log, you must have a URL profile attached to the security rule and the action must be set to alert, continue,
override or block.
Traffic logs are dependent on how your security policies are defined and setup to log traffic. The
ACC tab, however, records applications and statistics regardless of policy configuration; it shows
all traffic that is allowed on your network, therefore it includes the inter-zone traffic that is allowed
by policy and the intra-zone traffic that is allowed implicitly.
Page view 56
1 2 ... 52 53 54 55 56 57 58 59 60 61 62 ... 107 108

Comments to this Manuals

No comments