Real-time discovery and disposal of illegal outreach activities and network boundary points
2. Confidentiality and security (cascaded telescopic intranet computer sensitive information monitoring system)
Real-time discovery and disposal of sensitive information files stored and processed on computers.
3. Website security: (cascade Roy intranet website supervision system)
Comprehensive discovery and automatic positioning of intranet websites; Website registration management; Real-time discovery and disposal of website security vulnerabilities.
4. Removable storage media: (Cascaded Roy Intranet Removable Storage Media Registration Management System)
Registration and management of internal network mobile storage media, external network mobile storage media and interactive mobile storage media; Conduct security audit on the reading and writing behavior of files on mobile storage media.
5, the host basic security:
(4) Real-time discovery and disposal of abnormal host accounts (weak password accounts, expired accounts and useless accounts);
ü Find and process system-wide patches in real time;
(4) Real-time detection and processing of uninstalled antivirus software;
④ Real-time discovery and disposal of host resources such as CPU and memory;
④ Real-time discovery and disposal of host risk vulnerabilities;
④ Real-time detection and processing of host hardware changes;
6, resource occupation behavior:
Real-time discovery and disposal of the use of P2P download tools and streaming media tools to occupy network resources;
7, security risks
Real-time detection and disposal of security risks such as viruses, Trojans and hacker attacks on the network;
8. Violation:
Real-time discovery and disposal of illegal behaviors such as using chat tools and running online games.