a. Firewall configuration analytics
Keep an eye on the changes being made to the network security infrastructure. Administrators may make some intentional or unintentional error or carry out an improper change while acting on a firewall configuration change request, giving room for breaches. This Firewall Change Management report precisely helps in detecting such events. It helps find out ‘who’ made ‘what’ changes, ‘when’ and ‘why’. Not only that, it alerts you in real-time on your mobile phone when changes happen.
Firewall change management can generate alerts for firewall device configuration changes in real-time, and it notifies via email and HTTP alerts.
b. Rules created / modified in a particular time span
Administrators create a lot of rules on a need basis and forget to remove them if not required. After a certain period of time, we will have a huge set of rules in the firewall that may not even be executing for a long period of time. This report would help to find such rules that can be removed from the system and can help the administrator manage the system more efficiently.
C. Rules not executed in a particular time span
Administrators create a lot of rules on a need basis and forget to remove them if not required. After a certain period of time, we will have a huge set of rules in the firewall that may not even be executing for a long period of time. This report would help to find such rules that can be removed from the system and can help the administrator manage the system more efficiently.