Network MonitoringControl network communications with easy-to-adopt policy based on parameters of network address, port and traffic directions; prevent illegal external access with intrusion detection and blocking functions. Read more...
SurveilStar Network Monitoring Features
Today, for most companies, confidential and sensitive data are archived in computers. However, some companies do not have standard management to safeguard information security and give intruders a chance to access internal computers to steal data and spread virus. Therefore, information security is facing a great challenge. As an administrator, you may wonder:
- How to protect information security, maintain system stability and keep away from intrusion and virus attack have become a heated question for lots of managers?
- Take Screen Snapshots
- Email Monitoring
- Instant Message Monitoring
- Website Visit Monitoring
- Application Monitoring
- Document Monitoring
- Printing Monitoring
- Network Monitoring
- Computer Maintenance
- Data & User Management
- Complete Online Guides
- Video Tutorials
- SurveilStar Testimonials
- Deploying SurveilStar
- SurveilStar Home Edition
- Free Activity Monitor
- Free Email Recording
- SurveilStar Press Release
- Version Comparison
- Feature Module Comparison
- SurveilStar Blog
SurveilStar Network Monitoring feature enables you to control the communication direction and block malicious network ports in order to keep away from risks and threats. Unauthorized computers have no ways to access internal computers and connect to the internal network by blocking specific access permissions. Therefore, you can protect your computers before they expose to risks.
Powerful Network Control
- Block unauthorized computers from communicating with internal computers
- Block FTP port, download ports and illegal network share
- Immediately pop up alert messages on administrators' computers if any external computer attempts to connect to the internal network
Policy Example 1
To protect the internal network security, enterprises need to block malicious ports or download ports, and this can be achieved by setting network control policy.
Network Policy Property Settings:
Choose "Block" mode property, and specify the "IP Range" and "Port Range" that need to block. e.g. 80-port, 20-port, etc. If you set port range property to 80, then the agent computer cannot access web page; if you set it to port 20, then he agent computer cannot use FTP to download.
Policy Example 2
Throughout an enterprise, some departments' computer may be very important, not allowed to be accessed by outsiders. Network control policy can be a good solution to this problem.
Set a network policy targeted to the whole department:
① first set a "Block" policy with "IP Range" specified to "Lan";
② and then set an "Allow" policy with "Remote host has Agent installed" + "Belong to the same group" options checked.
Intrusion Detection and Blocking
- Detect, warn and prevent any illegal computers from connecting to the internal network
- Prevent outside computers from stealing company data and spreading virus
- Send instant warning message when external computer is connecting to the internal network