- Preventive - to stop unauthorized or unwanted activity from occurring
- Detective - to discover / detect unauthorized or unwanted activity
- Corrective - to restore systems back to normal after unauthorized or unwanted activity has occurred.
- Deterrent - to discourage attackers from violating security policies or take an unwanted action
- Recovery - to repair or restore resources and capabilities after a security policy violation
- Directive - to direct, confine or control the action of subjects to force or encourage compliance with security policy
- Compensation - to provide alternatives to existing controls to aid enforcement and support of a security policy
Be it a Network Operations Manager, Security Architect or a Security Auditor, the people up the hierarchy always harangue the Security Engineers to compile the list of firewall objects or rules or policies or the traffic statistics and so on.. This can turn out to be quite hectic especially if there are no built in features to systematically provide the output in a "layman-readable" format. Come, Checkpoint's "Object Explorer..." which not only provides the output in the "layman-readable" format, but also provides in-built filtering mechanisms, thereby ensuring that the Security Engineer doesn't have to rely on Google for building his scarce Microsoft Excel data filtering skills. The following screenshots will show how easy it is, with Checkpoint R80.10 to generate the firewall configuration inventory. On the SmartConsole Unified Portal, navigate to Menu >> Open Object Explorer... Select the Categories you wish to see in your output: Click o
Comments
Post a Comment