| A Client/Server Architecture: the
                Client and Management Program.
 
 Network Enforcer is separated into two components - the client
              and the management program - and utilizes a client/server architecture.
 
 The client is the workhorse of the Network Enforcer system. It
                watches for and enforces filter violations that you have configured.
          It keeps track of all behavior filter violations, handles the alerts
                and responses, logs the events, and handles remote commands.
                The client runs invisibly and cannot be configured or accessed
                other than from the management program.
 The management program is where you specify what computers you
              want to use Network Enforcer on. It allows you to create and configure
              filters, perform remote installations, issue remote commands to
              the computers running the client, create reports, view logs, and
              more. The client computers can only be configured and accessed
              from the management program.  
 Centralized Viewing,
                Configuring, Installing, and Monitoring.
 Network Enforcer's architecture allows you to view all computer
              filter event logs from one central computer. It also allows you
              to distribute settings and filters to all computers at once, or
              to specific computers one at a time. Remote commands and realtime
              filter alert responses are sent to each computer from the central
              computer running the management program. A dedicated server is
              NOT needed or necessary for Network Enforcer's management program
              to run on.
 
 Customizable, Flexible
                Behavior Activity Filters.
 Network Enforcer enforces behavior filters you create, allowing
              you to limit and control what happens on your network, or more
              specifically, what should NOT happen on your network. Utilizing
              three levels of security, each with their own thresholds, filters
              can be created to alert you immediately when specific events happen,
              or only after they have happened a set number of times. Network
              Enforcer allows you to be a little more lenient on the employee
              playing solitaire on their lunch break, while being extremely proactive
              and reactive on the employee that copies a sensitive file to a
              thumb drive. You can configure Network Enforcer to monitor all
              the behaviors below for unwanted events.
 
 
 back to top
 
 
 |