McAfee FWE-C2050 FWEC2050M Fiche De Données

Codes de produits
FWEC2050M
Page de 8
quickly take action and it dynamically adjusts risk 
ratings according to asset value, application risk, 
and identified threats.
McAfee Firewall Enterprise Profiler presents events 
correlated against firewall policy in the context 
of all firewall actions. To speed assessment, 
you see details for each event, including users, 
geographic location, and source and destination 
IP addresses and ports. The display lets you drill 
down to show specific users within the user group 
and look at the rule and the reason for a “deny” 
action. To verify that protective measures are 
working, you can see a report that shows security 
countermeasures applied by application. 
Geo-location can be a strong indicator of risk. 
McAfee Firewall Enterprise Profiler can tell you the 
locations and sources of traffic and threats. Are 
you getting BitTorrent traffic from countries or 
regions where you do not do business? Are your 
hosts connecting to risky neighborhoods on the 
web? You can determine both the source and 
the destination of traffic—internal, external, or 
through a partner—searching by application and 
user group. You can drill into usage bubbles to see 
rules, IP addresses, users, and more and determine 
if traffic is business- or non-business-related.
Rapidly diagnose outages
During an application outage, filters help you 
quickly identify and scope the problem, digging 
into the root cause without leaving the firewall 
environment. You can drill down within bubble 
charts to understand what users or specific 
applications are involved, for example TeamViewer 
or WebEx, and click through directly to 
investigate further. 
Drill downs show users, countries involved, 
applications, usage levels, and the firewall rules 
that are allowing or blocking the particular 
applications. As you implement fixes, the real-
time monitoring allows you to validate instantly 
that the rule set change had the desired effect on 
traffic, applications, or users. 
Quick and direct reporting
McAfee Firewall Enterprise Profiler’s graphical 
reports and reusable reporting objects help 
you convey information to others within your 
organization to guide actions and explain events 
or new requirements. Built-in reports cover pre-
defined application and user-based topics, which 
let you document events and activities without 
going into another tool. Reports can reflect any 
level and any filtered or specific view in McAfee 
Firewall Enterprise Profiler. You can print, save, or 
export reports into PDF or CSV formats. 
Proactive support to validate changes
Visibility into users, applications, and trends makes 
it possible to profile the impact of infrastructure 
changes. McAfee Firewall Enterprise Profiler lets 
you confirm that systems and traffic are back 
to normal and users have appropriate access 
to applications. 
Figure 4. Use Profiler to discover 
the applications your users are 
accessing and visualize the risk 
and network impact.
Available as a Virtual or 
Dedicated Appliance 
A virtual Firewall Enterprise 
Profiler is included with every 
McAfee Firewall Enterprise 
product. In addition, many 
customers choose to purchase 
our dedicated Profiler appliance 
running on McAfee Linux. 
By operating on a dedicated 
appliance, out of band, the 
McAfee Firewall Enterprise 
Profiler can handle larger data 
sets, display real-time events, run 
troubleshooting queries, and let 
you explore rule sets without 
affecting on-going firewall or 
network performance.
Broad, Exhaustive Reporting
Application and identity-based reports
Reports identify the top applications going through the firewall and spotlight the 
individuals who are using those applications.
Global threat intelligence 
reputation report
Graphically see the spam that has been dropped at the network edge using reputation-
based filtering.
Protocol and web usage
Provides a clear picture of protocol and web usage by user, department, and/or device. 
Identifies inappropriate usage including user activity associated with security appliance 
URL filtering.
Bandwidth usage
View bandwidth utilization by department, client, and application.
Regulatory compliance
Report templates take the pain out of regulatory compliance for Sarbanes-Oxley, PCI, 
Health Insurance Portability and Accountability Act (HIPAA), Gramm-Leach-Bliley Act 
(GLBA), and the Federal Information Security Management Act (FISMA).
Configuration management
Document configuration change detail to prove that corporate networks are configured to 
government requirements.