Network Security Auditing & Reporting vs. Access Control

Powertech Network Security is actually two different products in one package. In addition to controlling network access, it also includes powerful auditing and reporting features.

Auditing and Reporting

Network Security's auditing and reporting options allow you to collect audit information and to print reports about who is doing what on your system through the network interfaces. Network Security can report on all network accesses, so you can easily see potential security exposures initiated by tools such as FTP, ODBC, data transfer, and so on. This information can be used to implement Access Control Rules.

Controlling Network Access

Access Control Rules can be used to allow or reject specific Users, Locations (e.g ip addresses) , or transactions. The information you acquire from reports can be used to define a robust security policy based on the nuances of your network activity. For example, using the report information, Rules can be configured to allow authorized activity, then Network Security's default public rule (*PUBLIC) can be set to *REJECT in order to refuse all other access attempts.

 

Copyright © HelpSystems, LLC.
All trademarks and registered trademarks are the property of their respective owners.
7.17 | 201803210423