Network Security
Last updated
Last updated
1. Network Security provides agents to secure the end-point devices. The end-point agents enable the blocking of any malicious traffic and enable zero-trust access by only allowing trusted and categorized connections.
2. The first step to activate the Network Security module is configuring a policy. The policy enables the tracking of Internet traffic from the endpoints. The default policy can be edited, or a new policy can be created from the "Policy Management" menu. The initially created policy is named "DNS Security Default Policy" and tracks access to Malware/Virus, Spam Sites, Hacking, Phishing, Botnet, and Proxy traffic. Adding additional categories like Firstly Seen, Newly Up, DGA Domain, and Domain Parking, stricter access control rules can be applied.
Figure 1. Policy Settings
Figure 2. Alert Settings
3. Once the policy is configured, the agents can be downloaded from the Settings & Reporting --> Download Components menu. For each module, the basic configuration can be performed, and the agent can be downloaded. For automated agent deployments, silent deployments can be performed. More information is available in the administration guide.
Figure 3. Agent Download
4. The end-user can be notified for installing the agents manually. The notification system enables end-users to deploy the agents to their devices as well. To inform the end-users, please access the deployment wizard from Awareness Training -> 3-S Deployment menu and choose the “Protect Your Devices from Cyber Threats” deployment type. The wizard will request recipient information and then summarize the message to be sent to the end-users.
Figure 4. Self Deployment Instructions
5. After installing an agent, it registers itself to the portal, and you can access details of the machine on which agent is installed under the Network Security --> Device Management menu. The system automatically monitors activities and reports in the Detailed Analysis menu under the Network Security menu. Once Policy conditions match with the logs, the system automatically generates action defined in the policy alert section.
Figure 5. Agent Management
Figure 6. Detailed Analysis