R80 includes integrated logs in the policy views. Often, changes happen from inspecting traffic logs. Can we demonstrate how it speeds up policy change management?
Threat Prevention - 1 click!
Simply right-click the log and select "Add Exception". Details of the exception to the threat prevention policy are filled automatically.
Access Control - about 5 clicks!
Because the access control policy is all about order of rules and first-match, the administrator has to choose the desired location of his rules.
After clicking a rule and seeing its logs, right-clicking a log's source or destination IP address opens a context menu with an option to create a host from it.
During the creation of a new rule, when picking source/destination, the recently created objects always show up on the top of the picker and save time from searching for them in the list of network objects.
This is one of the ways in which R80 SmartConsole tries to "understand" the mind of the user and suggest the most suitable common actions and values.
Retrieving data ...