Industrial Defender Automation Systems Manager

Create an overview of the security status at your site.

Event management

Health and security is essential for maintaining reliable computer systems. Health is important to ensure that existing functionality is not impacted by deviations in software or hardware conditions.

Security is essential to ensure that functionality is not impacted by internal or external influences. Whilst these influences can occur at any time, keeping a vigilant eye out for these conditions 24/7 is unrealistic. Having a monitoring system in place is becoming an essential aspect of maintaining computer systems.

Host intrusion detection systems alert system administrators of a variety of conditions that indicate a security breach is present. This allows the administrators to become proactive in eliminating the breach in the system.

Essential to the effectiveness of the detection system is to ensure that the administrator is not overwhelmed with information that relates to typical interaction with the system by authorized users.

サポート或いは製品の購買情報をお探しですか?

Configuration Change Management

One of the important aspects of maintaining a computer system is have control of the computers in the network and how they are configured. Without an alerting mechanism for the addition of devices on the network, the number of unmanaged computers could increase uncontrollably. Secondary to knowing that the computers are on the network is the control of their configuration.

Lockheed Martin's Industrial Defender ASM

Industrial Defender ASM provides a base level of Windows monitoring through the monitoring of Windows event logs, and also extends this to monitoring registry changes, file changes, process changes and socket changes.

Detecting changes in the normal behavior of a computer is a strong indication that there is a potential threat. For example, a process that has never communicated over the network is starting to do so indicates the potential for a hacker running malicious code.

After computer nodes have been added, the nodes appear in the ASM. Initially, the new nodes appear as Newly Discovered Devices. Once the nodes have been approved and promoted, the asset information is retrieved from the nodes. The asset information on a node monitored for changes in the node.

With Industrial Defender Manage, the ASM also provides the ability to setup policies which can be used to check the level of compliance, and produce baseline compliance reports.

Recommended links

ドキュメントをロードしています
  • お問い合わせ

    ご質問内容などをご入力の上、お送りください。 担当者より折り返しご連絡いたします。

    お問い合わせ
Select region / language