2.8 Managing network connections
With the proliferation of wireless LANs and mobile devices, there is a risk of employees or outsiders bringing their personal devices onto company premises and connecting to your company network. Unsecured devices are a potential source of virus infections and a way to remove data without authorization. To avoid these and other issues, you need to have a clear picture of the devices that connect to your network, and manage them proactively.
By using the network monitor feature, you can protect your corporate network by blocking unauthorized devices. You can also use this feature to detect, in real time, attempts by unknown devices to connect to the network.
Note that you cannot block the network connection of a management server, a database server, a site server, or a computer with the network monitor agent installed.
- Organization of this section
-
-
2.8.1 Detecting devices by using the network monitoring function
-
2.8.4 Displaying the operating status of the network monitor
-
2.8.6 Using network monitor settings to control network access
-
2.8.13 Registering devices that are accessible to blocked devices
-
2.8.16 Managing exclusive communication destinations for devices denied network access
-
2.8.18 Network control function by linking with JP1/NETM/NM - Manager
-