Advanced Search
Search Results
266 total results found
Integration with Active Directory
SafeUTM provides the possibility of one-way synchronization with a domain based on Microsoft Active Directory. Only accounts are imported, excluding passwords. When the user undergoes the authorization procedure, verification is carried out by means of Acti...
Active Directory User Authorization
Import accounts from Active Directory, see Import of Users for details. Setting up user authorization For users imported from Active Directory, all types of user authorization are available. The most commonly used user authorization options are Single Si...
Entering Server into Domain
Go to the tab Users -> Active Directory. Click Add. Fill in the following fields: Domain: enter the full domain name (domain DNS name, i.e., domain name, not domain controller). Maximum 64 characters. For example, mydomain.example AD DNS server...
Automatic Authorization and De-authorization Scripts
Authorization and de-authorization of users are possible in fully automatic mode. For that, you need to configure scripts executed when users log on and log out of the system. For example, it can be done using domain group policies (GPOs). For these scripts ...
Import of Users
Import of Accounts from LDAP SafeUTM implements the possibility to import accounts from the Active Directory LDAP directory (hereinafter referred to as AD). Import is carried out by LDAP/LDAPS protocols (LDAPS protocol does not require additional settings f...
Netscan
Automatic creation of a user with authorization by IP address for a device trying to access the internet via SafeUTM. Netscan creates MAC authorization for local addresses on a single Ethernet segment. If the device is located on a local network behind a ro...
Wi-Fi Networks
Configuring access point and router modes. In the current version, SafeUTM does not support Wi-Fi adapters. For wireless clients to work, it is necessary to use special wireless access points or Wi-Fi routers. To access the internet, users connected via Wi...
Authorized users and VPN users
This section contains data about users authorized on the server, interfaces, and CPU utilization, as well as traffic data in real-time. Authenticated users The full list of users authenticated in UTM can be viewed as a table in the section Monitoring -> ...
System Monitoring
Contains general statistics on authorized users, the number of VPN connections, CPU and disk usage, etc. This module allows you to view graphs about the state of UTM in real-time. The horizontal scale of the graph is always time (depending on the selected i...
Traffic Monitor
The section Monitoring -> Traffic Monitor displays data about traffic (inbound/outbound, speed, number of sessions) passing through SafeUTM in real-time. In order to enable traffic monitoring, you need to launch the Application Control module. By nodes of ...
SNMP
To switch the section to working mode, switch the slider to the On position. This module allows you to monitor the operation of SafeUTM using the SNMP protocol versions 1/2c and 3. To do this, you need to configure the login, password, and encryption key. ...
Syslog
Enabling this module makes it possible to transfer all SafeUTM system messages (Syslog) to third-party collectors (Syslog Collector) or to SIEM systems. Forwarding System Messages Any private (local) or public (external) IP address can be specified as a co...
Zabbix
Zabbix is an open-source enterprise-class distributed monitoring solution. You can find information about Zabbix on the official Zabbix page. You can also try Zabbix as a ready-made solution or install it using Zabbix documentation. Integration with Zab...
Application Control
The module implements in-depth traffic analysis (Deep Packet Inspection - DPI) to reveal protocols of popular apps (layer-7 filtering). App control works only in the Enterprise edition for users with an active subscription to updates and technical support, ...
Content Filter
Setting up content filtering and troubleshooting. Content filtering on the SafeUTM server is implemented based on web traffic data received from the web traffic proxying module. Thus, the content filter allows you to efficiently block access to various inte...
Description of Content Filter Categories
The article describes in detail the categories of queries to web resources. Special categories All queries - all queries to web resources fall under this category. All categorized queries - all queries to web resources categorized by built-in or custom ...
Setting up HTTPS Filtering
HTTPS traffic filtering provides the possibility for further processing of websites accessible via HTTPS. Filtering is implemented by several methods: Analysis of Server Name Indication (SNI) headings. Thanks to this method, it is possible to analyze the...
Traffic Shaping
This service is designed to limit the external incoming traffic speed for network users. Intrusion prevention, Application control rules, and Traffic Shaping do not handle traffic between local networks and branch networks. Setting up Traffic Shaping To...
Antivirus
For ease of administration, the optimal performance settings of the antivirus module and antivirus filtering settings are pre-configured in the product and do not require manual configuration. If necessary, the settings are optimized in SafeUTM version updat...
Intrusion Prevention System
Intrusion detection and prevention system The intrusion detection and prevention system is only available in the Enterprise edition of SafeUTM for users with an active subscription to updates.Intrusion prevention system, Application control rules, and Traff...