![]() A poorly constructed policy can effectively let attackers in, while preventing trusted sources from accessing necessary resources. The Challenge of Configuring the Client Firewallįirewalls are only as good as the policies they enforce. This paper focuses on the network threat protection (or client firewall) component of Symantec™ Endpoint Protection specifically the client firewall’s purpose, elements of a firewall policy, how firewall rules are processed, and a best practice approach for implementing a firewall policy in your network. A successful attack can compromise classified information, halt productivity, and consequently destroy reputations and brand value.įirewalls that are installed on endpoint computers protect against such attacks by creating a barrier between the computers and the external networks, including the Internet. While most connections pose no threat to your computer or your network, others may be an attempt to infiltrate your network through unprotected computers. When computers in a private network connect to the Internet, they physically connect their network to countless unknown networks.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |