• 网络与数据中心管理
  • 服务器与应用性能管理
  • IT服务管理
  • Windows AD域管理
  • 终端管理
  • IT安全
  • MSP
  • IT运维平台
 
 
应用性能管理(APM)
保证物理、虚拟、云环境的应用性能
 
 
简化终端设备管理
全面管控PC计算机、智能手机以及平板电脑,确保网络安全
 
 
IT运维外包服务工具
多租户模式,为您的客户提供更好的服务
IT运维管理平台
统一监控、集中运维
 

Firewall Log and Configuration Analysis

Firewall Analysis : Security, Traffic Log Analysis and Configurations, Policies, Rules Analysis

Firewall Analysis can be split broadly in to two categories. One is, the operation of the Firewall captured in security and event logs. The other is, the administration of Firewall captured in configurations, policies and rules files.

Firewall Analysis: Security and Event Logs

Firewall log analysis provides insight in to the security threats and traffic behavior.

In depth analysis of the security logs provides critical network intelligence about attempts to breach security and attacks like virus, trojan, denial of service, etc. These network security threats pose a grave risk to the critical resources in the network. From the security log reports of firewall analysis, security administrators will be able to visualize network threat scenario and plan their strategy to protect from those threats.

Analysis of traffic logs provides valuable information about bandwidth usage, employee internet usage, bandwidth guzzling web sites, and interface wise traffic. From the traffic log reports of firewall analysis, network/security administrators will be to monitor fair usage of the bandwidth for business purposes and plan for the future requirements of bandwidth capacity.

Firewall Analysis: Configurations, Policies, and Rules

Firewall configuration analysis provides information to optimize the performance of firewalls.

Deeper analysis of the policies/rules provides information about the frequency of usage or non-usage of the rules. This information can be used by the security / network administrators to find out the adequacy of the rules, requirement of a particular rule, rule usage resulting in security policy implementation. From the rules / policy reports of firewall analysis, the administrator can decide whether to delete unused rules, modify the moderately used rules and add new rules to meet the security policy requirements.

Analysis of firewall configuration provides information about wrong configurations, sub-optimal configurations, etc. With this information, the administrator will be able to correct / fine tune the configurations for optimum firewall performance.

展开