Datasheet

quickly take action and it dynamically adjusts risk
ratings according to asset value, application risk,
and identied threats.
McAfee Firewall Enterprise Proler presents events
correlated against rewall policy in the context
of all rewall actions. To speed assessment,
you see details for each event, including users,
geographic location, and source and destination
IP addresses and ports. The display lets you drill
down to show specic users within the user group
and look at the rule and the reason for a “deny”
action. To verify that protective measures are
working, you can see a report that shows security
countermeasures applied byapplication.
Geo-location can be a strong indicator of risk.
McAfee Firewall Enterprise Proler can tell you the
locations and sources of trafc and threats. Are
you getting BitTorrent trafc from countries or
regions where you do not do business? Are your
hosts connecting to risky neighborhoods on the
web? You can determine both the source and
the destination of trafc—internal, external, or
through a partner—searching by application and
user group. You can drill into usage bubbles to see
rules, IP addresses, users, and more and determine
if trafc is business- or non-business-related.
Rapidly diagnose outages
During an application outage, lters help you
quickly identify and scope the problem, digging
into the root cause without leaving the rewall
environment. You can drill down within bubble
charts to understand what users or specic
applications are involved, for example TeamViewer
or WebEx, and click through directly to
investigatefurther.
Drill downs show users, countries involved,
applications, usage levels, and the rewall rules
that are allowing or blocking the particular
applications. As you implement xes, the real-
time monitoring allows you to validate instantly
that the rule set change had the desired effect on
trafc, applications, or users.
Quick and direct reporting
McAfee Firewall Enterprise Proler’s graphical
reports and reusable reporting objects help
you convey information to others within your
organization to guide actions and explain events
or new requirements. Built-in reports cover pre-
dened application and user-based topics, which
let you document events and activities without
going into another tool. Reports can reect any
level and any ltered or specic view in McAfee
Firewall Enterprise Proler. You can print, save, or
export reports into PDF or CSV formats.
Proactive support to validate changes
Visibility into users, applications, and trends makes
it possible to prole the impact of infrastructure
changes. McAfee Firewall Enterprise Proler lets
you conrm that systems and trafc are back
to normal and users have appropriate access
toapplications.
Figure 4. Use Proler to discover
the applications your users are
accessing and visualize the risk
andnetworkimpact.
Available as a Virtual or
Dedicated Appliance
A virtual Firewall Enterprise
Proler is included with every
McAfee Firewall Enterprise
product. In addition, many
customers choose to purchase
our dedicated Proler appliance
running on McAfee Linux.
By operating on a dedicated
appliance, out of band, the
McAfee Firewall Enterprise
Proler can handle larger data
sets, display real-time events, run
troubleshooting queries, and let
you explore rule sets without
affecting on-going rewall or
networkperformance.
Broad, Exhaustive Reporting
Application and identity-based reports Reports identify the top applications going through the rewall and spotlight the
individuals who are using those applications.
Global threat intelligence
reputationreport
Graphically see the spam that has been dropped at the network edge using reputation-
based ltering.
Protocol and web usage Provides a clear picture of protocol and web usage by user, department, and/or device.
Identies inappropriate usage including user activity associated with security appliance
URL ltering.
Bandwidth usage View bandwidth utilization by department, client, and application.
Regulatory compliance Report templates take the pain out of regulatory compliance for Sarbanes-Oxley, PCI,
Health Insurance Portability and Accountability Act (HIPAA), Gramm-Leach-Bliley Act
(GLBA), and the Federal Information Security Management Act (FISMA).
Conguration management Document conguration change detail to prove that corporate networks are congured to
government requirements.