Control network communications with easy-to-adopt policy based on parameters of network address, port and traffic directions; prevent illegal external access with intrusion detection and blocking functions.
Today, for most companies, confidential and sensitive data are archived in computers. However, some companies do not have standard management to safeguard information security and give intruders a chance to access internal computers to steal data and spread virus. Therefore, information security is facing a great challenge. As an administrator, you may wonder:
SurveilStar Network Monitoring feature enables you to control the communication direction and block malicious network ports in order to keep away from risks and threats. Unauthorized computers have no ways to access internal computers and connect to the internal network by blocking specific access permissions. Therefore, you can protect your computers before they expose to risks.
SurveilStar records a full list of shared files with operation type, remote host, source file and shared file path.
You can decide whether to enable remote control or remote file transfer, or ask for authorization if enabled.
Create a bandwidth policy to enable or disable IP range and/or port range for download and upload speed, this helps to prevent a lag network.
Create a network policy to block IP range and/or port range for communications between internal computers and other invalid computers. Thie help to prevent virus attack and protect internal network safety.
You can use upload control policy to disable uploading files to website or FTP, or limit file upload size.
Policy Example 1
To protect the internal network security, enterprises need to block malicious ports or download ports, and this can be achieved by setting network control policy.
Network Policy Property Settings:
Choose "Block" mode property, and specify the "IP Range" and "Port Range" that need to block. e.g. 80-port, 20-port, etc. If you set port range property to 80, then the agent computer cannot access web page; if you set it to port 20, then he agent computer cannot use FTP to download.
Policy Example 2
Throughout an enterprise, some departments' computer may be very important, not allowed to be accessed by outsiders. Network control policy can be a good solution to this problem.
Step 1: Set a network policy targeted to the whole department:
first set a "Block" policy with "IP Range" specified to "Lan";
Step 2: Then set an "Allow" policy with "Remote host has Agent installed" + "Belong to the same group" options checked.