SlideShare a Scribd company logo
ManageEngine
Firewall Analyzer
Log analytics and configuration management software for network
security devices
 How to add the device in Firewall analyzer.
 Traffic Statistic.
 Security Statistic.
 Device Management
 Rule Management
Agenda
 configure terminal
 logging enable logging timestamp
 logging trap informational logging device-id {context-name |
hostname | ipaddress interface_name | string text}
 logging host interface_name syslog_ip [udp/<syslog_port>]
Sample configuration of Cisco ASA.
 Live Traffic
 URL monitoring (Allowed and denied URL's)
 Web Usage(Http,Https).
 Admin Reports (logged in logged out,command execution)
 Intranet monitoring
 Internet monitoring
Traffic Statistic.
Live Traffic Report(user based traffic)
URL monitoring(Allowed and Denied)
Web Usage (http and https)
Admin Reports (logged in logged
out,commands execution)
Intranet monitoring & Internet
monitoring
 Virus Report
 Spam Report
 Attacks Report
 Security Report
Security Statistic
Virus Report
Spam Report
Attacks Report
Security Report
VPN Report
o Device rule (change management and Policy fetching).
Device Management
Rule fetching
Change Management
• Configuration changes are
recorded and time stamped
• User responsible for the change
is recorded
• Total number and type of
changes are listed
• The changes in configurations
like modified, added and deleted
are highlighted
Change Management
o Compliance policies
o Rule Management
o Policy Optimization.
Compliance
• Supports different compliance
formats such as PCI, ISO, SANS,
NIST, NERC.
• Continuously monitors your firewall
rule changes.
• Reports instantly on any rule
misconfiguration.
• Automatically schedules 'Security
Audit Reports’.
Compliance Reports
Improve your firewall performance by analyzing the firewall policy
anomaly reports. Firewall Analyzer provides a detailed reports on the
following anomalies:
• Correlation
• Generalization
• Redundancy
• Shadow
• Grouping
Policy Optimization
Shadow anomaly:
In this case, second rule will never get hit. It is shadowed. Also, action is different for
both the Rules.
2. Redundancy anomaly:
Shadow and Redundant Rules are more or less similar. If Action differs it is shadow,
otherwise it is redundant.
Case 1 (R1 is subset/equal of R2): Administrator can remove R1
Case 2 (R2 is subset of R1): Administrator can remove R2
Set alert notification on the following alert profiles:
• Normal alert
• Anomaly alert
• Bandwidth alert
Alert Profiles
• Search the raw logs of
Firewall to pinpoint the exact
log entry which caused the
security activity.
• Mine the security incidents
using the advanced search
of Raw Firewall logs.
Forensic Analysis
Scheduling Reports
Report Profiles:
• Set up and automate report profiles for any number of devices on which
Firewall Analyzer is reporting.
Log Filters:
• Log filters let you define filters for the log data that is reported on.
Customized Reporting with Protocol Groups:
• Firewall Analyzer groups protocols into Protocol Groups based on their
function.
• Audits & analyzes the complete
firewall security and
configuration.
• Provides a security audit report
with rating.
• Assess the best way to fix the
issue.
• Recommends best practices
based on the report.
Security Audit
Premium Edition
• Supports up to 60
devices
• For small and medium
scale network
Editions
Distributed Edition
Supports up to 1200 devices
For large scale network
Support for more than 50 vendors
Firewall Analyzer is a technology partner with :
Technology partnerships
What our partner has to say about us:
"This integration offers administrators an incredible amount of visibility into firewall systems. Application control goes
deeper with detailed usage reports, while change management, security reporting, event trends, and a detailed
compliance report for firewall configuration creates an immediate ROI for customers to present back to their
stakeholders." — Ben Oster, WatchGuard
Some of our Customers
ManageEngine Support:
OpManager:support@opmanager.com
Appmanger:support@appmanager.com
NCM:ncm-support@manageengine.com
NFA:support@netflowanalyzer.com
FWA:support@fwanalyzer.com
Get Certified and be a ITOM
professional
https://bit.ly/2pu9ZRc

More Related Content

PPTX
Understanding firewall policies and their effectiveness in defending against ...
PPTX
ManageEngine Firewall Analyzer training
PPTX
Virtual Firewall Management
PPTX
New OpManager v12
PPTX
Copy of learn_the_art_of_firewall_security(1)
PPTX
How to Audit Firewall, what are the standard Practices for Firewall Audit
PDF
DEF CON 23 - NSM 101 for ICS
PPTX
Understanding firewall policies and their effectiveness in defending against ...
ManageEngine Firewall Analyzer training
Virtual Firewall Management
New OpManager v12
Copy of learn_the_art_of_firewall_security(1)
How to Audit Firewall, what are the standard Practices for Firewall Audit
DEF CON 23 - NSM 101 for ICS

What's hot (20)

PPTX
Blackhat USA 2016 - What's the DFIRence for ICS?
PPT
DHS ICS Security Presentation
PPTX
Fingerprinting healthcare institutions
PDF
The journey to ICS - Extended
PPTX
Opmanager technical overview
PPT
Proof of Concept Guide for ManageEngine OpManager
PDF
PT-DTS SCADA Security using MaxPatrol
PPTX
ICS Security 101 by Sandeep Singh
PDF
Taking a closer look at level 0 and level 1 security
PPTX
BSidesAugusta ICS SCADA Defense
PPTX
Dashboards, widgets, business views &amp; 3D-data centre
PPTX
Further improvements
PDF
DTS Solution - SCADA Security Solutions
PDF
S4x16 europe krotofil_granular_dataflowsics
PDF
Industrial Control System Security Overview
PPTX
SCADA Presentation
PPTX
Best Network Performance Monitoring Tool
PDF
Defcon through the_eyes_of_the_attacker_2018_slides
PDF
BruCON 2015 - Pentesting ICS 101
PDF
Rubén Santamarta - SCADA Trojans: Attacking the Grid [Rooted CON 2011]
Blackhat USA 2016 - What's the DFIRence for ICS?
DHS ICS Security Presentation
Fingerprinting healthcare institutions
The journey to ICS - Extended
Opmanager technical overview
Proof of Concept Guide for ManageEngine OpManager
PT-DTS SCADA Security using MaxPatrol
ICS Security 101 by Sandeep Singh
Taking a closer look at level 0 and level 1 security
BSidesAugusta ICS SCADA Defense
Dashboards, widgets, business views &amp; 3D-data centre
Further improvements
DTS Solution - SCADA Security Solutions
S4x16 europe krotofil_granular_dataflowsics
Industrial Control System Security Overview
SCADA Presentation
Best Network Performance Monitoring Tool
Defcon through the_eyes_of_the_attacker_2018_slides
BruCON 2015 - Pentesting ICS 101
Rubén Santamarta - SCADA Trojans: Attacking the Grid [Rooted CON 2011]
Ad

Similar to Firewall Analyzer - Middle East Workshop (20)

PPTX
Firewall log and network security management - Mumbai Seminar
PPTX
5 ways you can strengthen and secure your network infrastructure with Firewal...
PPTX
Understanding firewall-policies-their-effectiveness-in-defending-against-netw...
PPT
Firewall Analyzer 6 - Highlights
PPTX
Firewall Analyzer 8.2 - Firewall Policy Optimization Reports
PPTX
IT Security: Eliminating threats with effective network & log analysis
PDF
Threat intelligence solution
PDF
intra-trans-firewall-analysis, explanation of intera trans firewall
PPT
Firewall Penetration Testing
PPTX
Event log analyzer by me
PPTX
Intrusion detection system IDS
PPT
Logs for Information Assurance and Forensics @ USMA
PPT
Day4
ODP
Nagios Conference 2013 - Sam Lansing - Getting Started With Incident Manager ...
PDF
CNIT 152: 3 Pre-Incident Preparation
PDF
CNIT 152: 9 Network Evidence
PDF
CNIT 121: 3 Pre-Incident Preparation
PDF
Coporate Espionage
PDF
Key Policy Considerations When Implementing Next-Generation Firewalls
PPTX
Intrusion detection system
Firewall log and network security management - Mumbai Seminar
5 ways you can strengthen and secure your network infrastructure with Firewal...
Understanding firewall-policies-their-effectiveness-in-defending-against-netw...
Firewall Analyzer 6 - Highlights
Firewall Analyzer 8.2 - Firewall Policy Optimization Reports
IT Security: Eliminating threats with effective network & log analysis
Threat intelligence solution
intra-trans-firewall-analysis, explanation of intera trans firewall
Firewall Penetration Testing
Event log analyzer by me
Intrusion detection system IDS
Logs for Information Assurance and Forensics @ USMA
Day4
Nagios Conference 2013 - Sam Lansing - Getting Started With Incident Manager ...
CNIT 152: 3 Pre-Incident Preparation
CNIT 152: 9 Network Evidence
CNIT 121: 3 Pre-Incident Preparation
Coporate Espionage
Key Policy Considerations When Implementing Next-Generation Firewalls
Intrusion detection system
Ad

More from ManageEngine, Zoho Corporation (20)

PPTX
Create seamless customer experiences
PDF
From web interface to database: Monitor what matters
PDF
NetFlow Analyzer Free Training Series Part I - May 2020
PDF
Overcome real-time server and VM monitoring challenges
PPTX
Modernizing Cloud and Hyperconverged Infrastructure monitoring
PPTX
Deliver seamless digital experience
PDF
Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020
PPTX
From web interface to the database:Monitor all that matters
PDF
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - EST
PDF
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMT
PDF
NetFlow Analyzer Product Overview
PPTX
Monitoring cloud applications and hyperconverged infrastructure
PPTX
Building the right website monitoring strategy
PPTX
Unlock the value of your big data infrastructure
PPTX
Key to optimal end user experience
PPTX
Monitoring cloud applications and containers
PPTX
implementing the right website monitoring strategy
PPTX
Big data and non relational database
PPTX
Visibility-from web application interface to the database
PPTX
Free OpManager training Part 4 - Monitoring Network Performance and Network Maps
Create seamless customer experiences
From web interface to database: Monitor what matters
NetFlow Analyzer Free Training Series Part I - May 2020
Overcome real-time server and VM monitoring challenges
Modernizing Cloud and Hyperconverged Infrastructure monitoring
Deliver seamless digital experience
Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020
From web interface to the database:Monitor all that matters
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - EST
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMT
NetFlow Analyzer Product Overview
Monitoring cloud applications and hyperconverged infrastructure
Building the right website monitoring strategy
Unlock the value of your big data infrastructure
Key to optimal end user experience
Monitoring cloud applications and containers
implementing the right website monitoring strategy
Big data and non relational database
Visibility-from web application interface to the database
Free OpManager training Part 4 - Monitoring Network Performance and Network Maps

Recently uploaded (20)

PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Big Data Technologies - Introduction.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
Cloud computing and distributed systems.
PDF
cuic standard and advanced reporting.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Empathic Computing: Creating Shared Understanding
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Machine Learning_overview_presentation.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Network Security Unit 5.pdf for BCA BBA.
“AI and Expert System Decision Support & Business Intelligence Systems”
Per capita expenditure prediction using model stacking based on satellite ima...
Big Data Technologies - Introduction.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Digital-Transformation-Roadmap-for-Companies.pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
20250228 LYD VKU AI Blended-Learning.pptx
A comparative analysis of optical character recognition models for extracting...
Cloud computing and distributed systems.
cuic standard and advanced reporting.pdf
Unlocking AI with Model Context Protocol (MCP)
Review of recent advances in non-invasive hemoglobin estimation
Empathic Computing: Creating Shared Understanding
Chapter 3 Spatial Domain Image Processing.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Machine Learning_overview_presentation.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Machine learning based COVID-19 study performance prediction
Network Security Unit 5.pdf for BCA BBA.

Firewall Analyzer - Middle East Workshop

  • 1. ManageEngine Firewall Analyzer Log analytics and configuration management software for network security devices
  • 2.  How to add the device in Firewall analyzer.  Traffic Statistic.  Security Statistic.  Device Management  Rule Management Agenda
  • 3.  configure terminal  logging enable logging timestamp  logging trap informational logging device-id {context-name | hostname | ipaddress interface_name | string text}  logging host interface_name syslog_ip [udp/<syslog_port>] Sample configuration of Cisco ASA.
  • 4.  Live Traffic  URL monitoring (Allowed and denied URL's)  Web Usage(Http,Https).  Admin Reports (logged in logged out,command execution)  Intranet monitoring  Internet monitoring Traffic Statistic.
  • 5. Live Traffic Report(user based traffic)
  • 7. Web Usage (http and https)
  • 8. Admin Reports (logged in logged out,commands execution)
  • 9. Intranet monitoring & Internet monitoring
  • 10.  Virus Report  Spam Report  Attacks Report  Security Report Security Statistic
  • 16. o Device rule (change management and Policy fetching). Device Management
  • 19. • Configuration changes are recorded and time stamped • User responsible for the change is recorded • Total number and type of changes are listed • The changes in configurations like modified, added and deleted are highlighted Change Management
  • 20. o Compliance policies o Rule Management o Policy Optimization. Compliance
  • 21. • Supports different compliance formats such as PCI, ISO, SANS, NIST, NERC. • Continuously monitors your firewall rule changes. • Reports instantly on any rule misconfiguration. • Automatically schedules 'Security Audit Reports’. Compliance Reports
  • 22. Improve your firewall performance by analyzing the firewall policy anomaly reports. Firewall Analyzer provides a detailed reports on the following anomalies: • Correlation • Generalization • Redundancy • Shadow • Grouping Policy Optimization
  • 23. Shadow anomaly: In this case, second rule will never get hit. It is shadowed. Also, action is different for both the Rules.
  • 24. 2. Redundancy anomaly: Shadow and Redundant Rules are more or less similar. If Action differs it is shadow, otherwise it is redundant. Case 1 (R1 is subset/equal of R2): Administrator can remove R1 Case 2 (R2 is subset of R1): Administrator can remove R2
  • 25. Set alert notification on the following alert profiles: • Normal alert • Anomaly alert • Bandwidth alert Alert Profiles
  • 26. • Search the raw logs of Firewall to pinpoint the exact log entry which caused the security activity. • Mine the security incidents using the advanced search of Raw Firewall logs. Forensic Analysis
  • 27. Scheduling Reports Report Profiles: • Set up and automate report profiles for any number of devices on which Firewall Analyzer is reporting. Log Filters: • Log filters let you define filters for the log data that is reported on. Customized Reporting with Protocol Groups: • Firewall Analyzer groups protocols into Protocol Groups based on their function.
  • 28. • Audits & analyzes the complete firewall security and configuration. • Provides a security audit report with rating. • Assess the best way to fix the issue. • Recommends best practices based on the report. Security Audit
  • 29. Premium Edition • Supports up to 60 devices • For small and medium scale network Editions Distributed Edition Supports up to 1200 devices For large scale network
  • 30. Support for more than 50 vendors
  • 31. Firewall Analyzer is a technology partner with : Technology partnerships What our partner has to say about us: "This integration offers administrators an incredible amount of visibility into firewall systems. Application control goes deeper with detailed usage reports, while change management, security reporting, event trends, and a detailed compliance report for firewall configuration creates an immediate ROI for customers to present back to their stakeholders." — Ben Oster, WatchGuard
  • 32. Some of our Customers
  • 34. Get Certified and be a ITOM professional https://bit.ly/2pu9ZRc