McAfee FWE-C3000 FWEC3000M Fiche De Données
Codes de produits
FWEC3000M
quickly take action and it dynamically adjusts risk
ratings according to asset value, application risk,
and identified threats.
ratings according to asset value, application risk,
and identified threats.
McAfee Firewall Enterprise Profiler presents events
correlated against firewall policy in the context
of all firewall actions. To speed assessment,
you see details for each event, including users,
geographic location, and source and destination
IP addresses and ports. The display lets you drill
down to show specific users within the user group
and look at the rule and the reason for a “deny”
action. To verify that protective measures are
working, you can see a report that shows security
countermeasures applied by application.
correlated against firewall policy in the context
of all firewall actions. To speed assessment,
you see details for each event, including users,
geographic location, and source and destination
IP addresses and ports. The display lets you drill
down to show specific users within the user group
and look at the rule and the reason for a “deny”
action. To verify that protective measures are
working, you can see a report that shows security
countermeasures applied by application.
Geo-location can be a strong indicator of risk.
McAfee Firewall Enterprise Profiler can tell you the
McAfee Firewall Enterprise Profiler can tell you the
locations and sources of traffic and threats. Are
you getting BitTorrent traffic from countries or
regions where you do not do business? Are your
hosts connecting to risky neighborhoods on the
web? You can determine both the source and
you getting BitTorrent traffic from countries or
regions where you do not do business? Are your
hosts connecting to risky neighborhoods on the
web? You can determine both the source and
the destination of traffic—internal, external, or
through a partner—searching by application and
user group. You can drill into usage bubbles to see
rules, IP addresses, users, and more and determine
through a partner—searching by application and
user group. You can drill into usage bubbles to see
rules, IP addresses, users, and more and determine
if traffic is business- or non-business-related.
Rapidly diagnose outages
During an application outage, filters help you
quickly identify and scope the problem, digging
into the root cause without leaving the firewall
environment. You can drill down within bubble
During an application outage, filters help you
quickly identify and scope the problem, digging
into the root cause without leaving the firewall
environment. You can drill down within bubble
charts to understand what users or specific
applications are involved, for example TeamViewer
or WebEx, and click through directly to
investigate further.
applications are involved, for example TeamViewer
or WebEx, and click through directly to
investigate further.
Drill downs show users, countries involved,
applications, usage levels, and the firewall rules
that are allowing or blocking the particular
applications. As you implement fixes, the real-
time monitoring allows you to validate instantly
that the rule set change had the desired effect on
traffic, applications, or users.
applications, usage levels, and the firewall rules
that are allowing or blocking the particular
applications. As you implement fixes, the real-
time monitoring allows you to validate instantly
that the rule set change had the desired effect on
traffic, applications, or users.
Quick and direct reporting
McAfee Firewall Enterprise Profiler’s graphical
reports and reusable reporting objects help
you convey information to others within your
organization to guide actions and explain events
or new requirements. Built-in reports cover pre-
McAfee Firewall Enterprise Profiler’s graphical
reports and reusable reporting objects help
you convey information to others within your
organization to guide actions and explain events
or new requirements. Built-in reports cover pre-
defined application and user-based topics, which
let you document events and activities without
going into another tool. Reports can reflect any
level and any filtered or specific view in McAfee
Firewall Enterprise Profiler. You can print, save, or
export reports into PDF or CSV formats.
let you document events and activities without
going into another tool. Reports can reflect any
level and any filtered or specific view in McAfee
Firewall Enterprise Profiler. You can print, save, or
export reports into PDF or CSV formats.
Proactive support to validate changes
Visibility into users, applications, and trends makes
it possible to profile the impact of infrastructure
changes. McAfee Firewall Enterprise Profiler lets
you confirm that systems and traffic are back
changes. McAfee Firewall Enterprise Profiler lets
you confirm that systems and traffic are back
to normal and users have appropriate access
to applications.
to applications.
Figure 4. Use Profiler to discover
the applications your users are
accessing and visualize the risk
and network impact.
the applications your users are
accessing and visualize the risk
and network impact.
Available as a Virtual or
Dedicated Appliance
Dedicated Appliance
A virtual Firewall Enterprise
Profiler is included with every
McAfee Firewall Enterprise
product. In addition, many
customers choose to purchase
our dedicated Profiler appliance
running on McAfee Linux.
By operating on a dedicated
appliance, out of band, the
McAfee Firewall Enterprise
Profiler can handle larger data
sets, display real-time events, run
troubleshooting queries, and let
you explore rule sets without
affecting on-going firewall or
network performance.
Profiler is included with every
McAfee Firewall Enterprise
product. In addition, many
customers choose to purchase
our dedicated Profiler appliance
running on McAfee Linux.
By operating on a dedicated
appliance, out of band, the
McAfee Firewall Enterprise
Profiler can handle larger data
sets, display real-time events, run
troubleshooting queries, and let
you explore rule sets without
affecting on-going firewall or
network performance.
Broad, Exhaustive Reporting
Application and identity-based reports
Reports identify the top applications going through the firewall and spotlight the
individuals who are using those applications.
individuals who are using those applications.
Global threat intelligence
reputation report
reputation report
Graphically see the spam that has been dropped at the network edge using reputation-
based filtering.
based filtering.
Protocol and web usage
Provides a clear picture of protocol and web usage by user, department, and/or device.
Identifies inappropriate usage including user activity associated with security appliance
URL filtering.
Identifies inappropriate usage including user activity associated with security appliance
URL filtering.
Bandwidth usage
View bandwidth utilization by department, client, and application.
Regulatory compliance
Report templates take the pain out of regulatory compliance for Sarbanes-Oxley, PCI,
Health Insurance Portability and Accountability Act (HIPAA), Gramm-Leach-Bliley Act
(GLBA), and the Federal Information Security Management Act (FISMA).
Health Insurance Portability and Accountability Act (HIPAA), Gramm-Leach-Bliley Act
(GLBA), and the Federal Information Security Management Act (FISMA).
Configuration management
Document configuration change detail to prove that corporate networks are configured to
government requirements.
government requirements.