Datasheet
quickly take action and it dynamically adjusts risk
ratings according to asset value, application risk,
and identied threats.
McAfee Firewall Enterprise Proler presents events
correlated against rewall policy in the context
of all rewall actions. To speed assessment,
you see details for each event, including users,
geographic location, and source and destination
IP addresses and ports. The display lets you drill
down to show specic users within the user group
and look at the rule and the reason for a “deny”
action. To verify that protective measures are
working, you can see a report that shows security
countermeasures applied byapplication.
Geo-location can be a strong indicator of risk.
McAfee Firewall Enterprise Proler can tell you the
locations and sources of trafc and threats. Are
you getting BitTorrent trafc from countries or
regions where you do not do business? Are your
hosts connecting to risky neighborhoods on the
web? You can determine both the source and
the destination of trafc—internal, external, or
through a partner—searching by application and
user group. You can drill into usage bubbles to see
rules, IP addresses, users, and more and determine
if trafc is business- or non-business-related.
Rapidly diagnose outages
During an application outage, lters help you
quickly identify and scope the problem, digging
into the root cause without leaving the rewall
environment. You can drill down within bubble
charts to understand what users or specic
applications are involved, for example TeamViewer
or WebEx, and click through directly to
investigatefurther.
Drill downs show users, countries involved,
applications, usage levels, and the rewall rules
that are allowing or blocking the particular
applications. As you implement xes, the real-
time monitoring allows you to validate instantly
that the rule set change had the desired effect on
trafc, applications, or users.
Quick and direct reporting
McAfee Firewall Enterprise Proler’s graphical
reports and reusable reporting objects help
you convey information to others within your
organization to guide actions and explain events
or new requirements. Built-in reports cover pre-
dened application and user-based topics, which
let you document events and activities without
going into another tool. Reports can reect any
level and any ltered or specic view in McAfee
Firewall Enterprise Proler. You can print, save, or
export reports into PDF or CSV formats.
Proactive support to validate changes
Visibility into users, applications, and trends makes
it possible to prole the impact of infrastructure
changes. McAfee Firewall Enterprise Proler lets
you conrm that systems and trafc are back
to normal and users have appropriate access
toapplications.
Figure 4. Use Proler to discover
the applications your users are
accessing and visualize the risk
andnetworkimpact.
Available as a Virtual or
Dedicated Appliance
A virtual Firewall Enterprise
Proler is included with every
McAfee Firewall Enterprise
product. In addition, many
customers choose to purchase
our dedicated Proler appliance
running on McAfee Linux.
By operating on a dedicated
appliance, out of band, the
McAfee Firewall Enterprise
Proler can handle larger data
sets, display real-time events, run
troubleshooting queries, and let
you explore rule sets without
affecting on-going rewall or
networkperformance.
Broad, Exhaustive Reporting
Application and identity-based reports Reports identify the top applications going through the rewall and spotlight the
individuals who are using those applications.
Global threat intelligence
reputationreport
Graphically see the spam that has been dropped at the network edge using reputation-
based ltering.
Protocol and web usage Provides a clear picture of protocol and web usage by user, department, and/or device.
Identies inappropriate usage including user activity associated with security appliance
URL ltering.
Bandwidth usage View bandwidth utilization by department, client, and application.
Regulatory compliance Report templates take the pain out of regulatory compliance for Sarbanes-Oxley, PCI,
Health Insurance Portability and Accountability Act (HIPAA), Gramm-Leach-Bliley Act
(GLBA), and the Federal Information Security Management Act (FISMA).
Conguration management Document conguration change detail to prove that corporate networks are congured to
government requirements.