Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

266 total results found

Integration with Active Directory

4.2. Setup - Users Integration with Active Directory

SafeUTM provides the possibility of one-way synchronization with a domain based on Microsoft Active Directory. Only accounts are imported, excluding passwords. When the user undergoes the authorization procedure, verification is carried out by means of Acti...

Active Directory User Authorization

4.2. Setup - Users Integration with Active Directory

Import accounts from Active Directory, see Import of Users for details. Setting up user authorization For users imported from Active Directory, all types of user authorization are available. The most commonly used user authorization options are Single Si...

Entering Server into Domain

4.2. Setup - Users Integration with Active Directory

Go to the tab Users -> Active Directory. Click Add. Fill in the following fields: Domain: enter the full domain name (domain DNS name, i.e., domain name, not domain controller). Maximum 64 characters. For example, mydomain.example AD DNS server...

Automatic Authorization and De-authorization Scripts

4.2. Setup - Users Integration with Active Directory

Authorization and de-authorization of users are possible in fully automatic mode. For that, you need to configure scripts executed when users log on and log out of the system. For example, it can be done using domain group policies (GPOs). For these scripts ...

Import of Users

4.2. Setup - Users Integration with Active Directory

Import of Accounts from LDAP SafeUTM implements the possibility to import accounts from the Active Directory LDAP directory (hereinafter referred to as AD). Import is carried out by LDAP/LDAPS protocols (LDAPS protocol does not require additional settings f...

Netscan

4.2. Setup - Users

Automatic creation of a user with authorization by IP address for a device trying to access the internet via SafeUTM. Netscan creates MAC authorization for local addresses on a single Ethernet segment. If the device is located on a local network behind a ro...

Wi-Fi Networks

4.2. Setup - Users

Configuring access point and router modes. In the current version, SafeUTM does not support Wi-Fi adapters. For wireless clients to work, it is necessary to use special wireless access points or Wi-Fi routers. To access the internet, users connected via Wi...

Authorized users and VPN users

4.3. Setup - Monitoring

This section contains data about users authorized on the server, interfaces, and CPU utilization, as well as traffic data in real-time. Authenticated users The full list of users authenticated in UTM can be viewed as a table in the section Monitoring -> ...

System Monitoring

4.3. Setup - Monitoring

Contains general statistics on authorized users, the number of VPN connections, CPU and disk usage, etc. This module allows you to view graphs about the state of UTM in real-time. The horizontal scale of the graph is always time (depending on the selected i...

Traffic Monitor

4.3. Setup - Monitoring

The section Monitoring -> Traffic Monitor displays data about traffic (inbound/outbound, speed, number of sessions) passing through SafeUTM in real-time. In order to enable traffic monitoring, you need to launch the Application Control module. By nodes of ...

SNMP

4.3. Setup - Monitoring

To switch the section to working mode, switch the slider to the On position. This module allows you to monitor the operation of SafeUTM using the SNMP protocol versions 1/2c and 3. To do this, you need to configure the login, password, and encryption key. ...

Syslog

4.3. Setup - Monitoring

Enabling this module makes it possible to transfer all SafeUTM system messages (Syslog) to third-party collectors (Syslog Collector) or to SIEM systems. Forwarding System Messages Any private (local) or public (external) IP address can be specified as a co...

Zabbix

4.3. Setup - Monitoring

Zabbix is an open-source enterprise-class distributed monitoring solution. You can find information about Zabbix on the official Zabbix page. You can also try Zabbix as a ready-made solution or install it using Zabbix documentation. Integration with Zab...

Application Control

4.4. Setup - Traffic Rules

The module implements in-depth traffic analysis (Deep Packet Inspection - DPI) to reveal protocols of popular apps (layer-7 filtering). App control works only in the Enterprise edition for users with an active subscription to updates and technical support, ...

Content Filter

4.4. Setup - Traffic Rules Content Filter

Setting up content filtering and troubleshooting. Content filtering on the SafeUTM server is implemented based on web traffic data received from the web traffic proxying module. Thus, the content filter allows you to efficiently block access to various inte...

Description of Content Filter Categories

4.4. Setup - Traffic Rules Content Filter

The article describes in detail the categories of queries to web resources. Special categories All queries - all queries to web resources fall under this category. All categorized queries - all queries to web resources categorized by built-in or custom ...

Setting up HTTPS Filtering

4.4. Setup - Traffic Rules Content Filter

HTTPS traffic filtering provides the possibility for further processing of websites accessible via HTTPS. Filtering is implemented by several methods: Analysis of Server Name Indication (SNI) headings. Thanks to this method, it is possible to analyze the...

Traffic Shaping

4.4. Setup - Traffic Rules

This service is designed to limit the external incoming traffic speed for network users. Intrusion prevention, Application control rules, and Traffic Shaping do not handle traffic between local networks and branch networks. Setting up Traffic Shaping To...

Antivirus

4.4. Setup - Traffic Rules

For ease of administration, the optimal performance settings of the antivirus module and antivirus filtering settings are pre-configured in the product and do not require manual configuration. If necessary, the settings are optimized in SafeUTM version updat...

Intrusion Prevention System

4.4. Setup - Traffic Rules

Intrusion detection and prevention system The intrusion detection and prevention system is only available in the Enterprise edition of SafeUTM for users with an active subscription to updates.Intrusion prevention system, Application control rules, and Traff...