• Active Directory
  • Application
  • Desktop & Mobile
  • Help Desk
  • Network
  • Server
  • IT Security
  • MSP
  • On-Demand
 
 
Device Management, made easy
Manage control and secure your workstations, mobile
devices and tablets
 
 
Help Desk for Everyone
IT Help Desk Software and Customer Support Software
 
 
Protect Your IT. Save Your Business
Build a secure fortress with our security management solutions
 
 
MSP
Manage services faster, with multi-tenanted, ITIL-ready, and unified RMM solutions
 
 
On-Demand Solutions
IT Help Desk, Active Directory, and Operations Management from the Cloud
 

Firewall Unused and Used Rules Monitoring

Firewall Used Rules Monitoring

Firewall Analyzer monitors and reports the Firewall rules / policies / ACLs usage. Firewall Analyzer fetches all the rules of the Firewalls and provides rule wise usage reports. With the help of the reports, you can analyze the usage and effectiveness of the Firewall rules and fine tune the Firewall rules for optimal performance.

Top Used Rules

Top Used Rules report provides the list of rules/ policies/ ACLs used by the traffic of your enterprise network through the firewall. This list enables you to ascertain the Firewall rules which were heavily used and modify the heavily used rules to use them optimally. The number of events triggered the rule are listed for the specific rule.

Top Rules - Protocol group based

Top Rules - Protocol Group Based report provides the number of events triggered for each rule based on protocol groups. The report is displayed as graphs and listed in table. This will give you an idea of the rules being used or over-used by each protocol group.

Top Rules - Host based

Top Rules - Protocol Group Based report provides the number of events triggered for each rule based on protocol groups. The report is displayed as graphs and listed in table. This will give you an idea of the rules being used or over-used by each protocol group.

Top Rules - Destination based

Top Rules - Destination Based report provides the number of events triggered each rule based on destinations. The report is displayed as graphs and listed in table. This will give you an idea of the rules being used or over-used by each destination.

Firewall Unused Rules Monitoring

Top Unused Rules

Top Unused Rules report provides the list of rules/ policies/ ACLs not used by the traffic of your enterprise network through the firewall. This list enables you to modify or remove the unused rules or create new rules to use them optimally.

Customer Speaks
 
"The implementation was so easy and the Firewall Analyzer immediately started showing me how much inbound and outbound traffic was passing through our firewalls.I now use Firewall Analyzer daily !"
-Phil Avella,
Manager,Information Systems,
Thunder Bay District Health Unit
 
A single platter for comprehensive Network Security Device Management