• Active Directory
  • Application
  • Desktop & Mobile
  • Help Desk
  • Network
  • IT Security
  • MSP
  • On-Demand
 
 
Device Management, made easy
Manage control and secure your workstations, mobile
devices and tablets
 
 
Help Desk for Everyone
IT Help Desk Software and Customer Support Software
 
 
Protect Your IT. Save Your Business
Build a secure fortress with our security management solutions
 
 
MSP
Manage services faster, with multi-tenanted, ITIL-ready, and unified RMM solutions
 
 
On-Demand Solutions
IT Help Desk, Active Directory, and Operations Management from the Cloud
 

Firewall Security Audit and Configuration Analysis

Firewall Compliance Report with Security Audit and Configuration Analysis

Compliance Report for Firewall Devices

Firewall Analyzer provides elaborate compliance report for the Firewall devices. The report helps to configure the Firewall rules, which will prevent potentially dangerous access to network and allow only those network hosts that are required. The report identifies all the Firewall security related issues. The tool audits the complete Firewall security and thoroughly analyzes the configuration of Firewalls. It provides a security audit report with a overall security rating. The reports identify the security issues in the device. The impact of the issues on the device security are rated for their severiyt. The easiness to fix the issue is assessed. Based on the issues, the report recommends security best practices. It categorizes the threats faced to various levels and recommends configuration and other changes to tighten the security of the Firewall.

It rates the issues in five categories. They are: Critical, High, Medium, Low, and Info

 

Check the attached sample compliance report

The issues are assessed and the results are presents as statistics. The report consists of three sections. They are:

Security Audit Report section

This section of the report describes the following: identifying the issue, impact of the issue, ease of exploiting the issue and recommendation and overall rating of the issue.

Security Best Practices Report section

This section of the report describes the security best practices. It consists of overview and recommendation. It covers the following areas:

  • Software
  • Services
  • Interfaces
  • Filtering
  • Authentication
  • Logging
  • Encryption

Device Configuration Report section

This section details the configuration settings of the Firewall device.

Periodic Firewall Compliance Report Generation

The report is generated at periodic intervals and the report link in the UI shows the time, the compliance report was generated.

Instant Firewall Compliance Report Generation

You can instantly generate the Compliance report, any time you want.

Configure credentials / associate device profile to fetch Firewall configuration and rules

Configure the device credential or assign a credential profile to the device. On assigning a device profile or configuring device credentials, the compliance report will get generated automatically.

Customer Speaks
 
"The implementation was so easy and the Firewall Analyzer immediately started showing me how much inbound and outbound traffic was passing through our firewalls.I now use Firewall Analyzer daily !"
-Phil Avella,
Manager,Information Systems,
Thunder Bay District Health Unit
 
A single platter for comprehensive Network Security Device Management