Discover how Network Enforcer works. See how Network Enforcer's architecture works to protect your network security at the workplace.
The Architecture - Client and Management Program
Network Enforcer is separated into two components - the client and the management program - and utilizes a client/server architecture.
The client is the workhorse of the Network Enforcer system. It watches for and enforces filter violations that you have configured. It keeps track of all behavior filter violations, handles the alerts and responses, logs the events, and handles remote commands. The client runs invisibly and cannot be configured or accessed other than from the management program.
The management program is where you specify what computers you want to use Network Enforcer on. It allows you to create and configure filters, perform remote installations, issue remote commands to the computers running the client, create reports, view logs, and more. The client computers can only be configured and accessed from the management program.
Central Viewing, Configuring, Installing, & Monitoring
Network Enforcer's architecture allows you to view all computer filter event logs from one central computer. It also allows you to distribute settings and filters to all computers at once, or to specific computers one at a time. Remote commands and real time filter alert responses are sent to each computer from the central computer running the management program. A dedicated server is NOT needed or necessary for Network Enforcer's management program to run on.
Customizable, Flexible Behavior Activity Filters
Network Enforcer enforces behavior filters you create, allowing you to limit and control what happens on your network, or more specifically, what should NOT happen on your network. Utilizing three levels of security, each with their own thresholds, filters can be created to alert you immediately when specific events happen, or only after they have happened a set number of times. Network Enforcer allows you to be a little more lenient on the employee playing solitaire on their lunch break, while being extremely proactive and reactive on the employee that copies a sensitive file to a thumb drive. You can configure Network Enforcer to monitor all the behaviors below for unwanted events.
|
Below, you'll find all of our Network Enforcer resources.
Network Enforcer
Network Enforcer Features
Network Supervision
Employee Restriction
Respond to Security Alerts
Network Usage Reports
Purchase Network Enforcer
Related Navigation
Network Enforcer Explained
Network Security Benefits
Enforcer Problem Solving
How Enforcer Works
Network Enforcer Uses
Buy Network Enforcer
Help Documentation
Support Center
Network Enforcer FAQ's
Ordering Questions
Licensing Questions
Enforcer Used As
Network Security Software
Intellectual Property
Network Behavior Analysis
Employee Supervising
Network Behavior Controls
Enterprise Network Security
Network Activity Logging
User Testimonials
"Hi Scott. Thanks for all of your support. I wanted to let you know I got Network Enforcer installed last week. Enforcer is powerful! I think we finally know who has been violating our employee policies and snooping around our network. I can't thank you enough! - George Hutcheson" |