Manage Learn to apply best practices and optimize your operations.

Screencast: How to configure a UTM device

Unified threat management technologies provide protection against various network attacks, but properly configuring UTM boxes can be a whole other battle. In this exclusive screencast, expert David Strom gives an easy-to-follow, on-screen demonstration of the configuration options available in SonicWall's unified threat management product. In simple steps, Strom explains how to set up a SonicWall box, how to interpret its alerts, and how to adjust security policies to ensure that a network has optimum protection.

Can't see the screen?






View in full-screen mode (opens new window).

David Strom
About the author:
David Strom is one of the leading experts on network and Internet technologies and has written extensively on the topic for nearly 20 years. He has held several editorial management positions for both print and online properties, most recently as Editor-in-Chief for . In 1990, Strom created magazine and was the first Editor-in-Chief establishing the magazine's networked laboratories. He is the author of two books: (Prentice Hall 1998) which he co-authored with Marshall T. Rose and (McGrawHill/Osbourne; 2001). Strom is a frequent speaker, panel moderator and instructor and has appeared on Fox TV News Network, NPR's Science Friday radio program, ABC TV's World News Tonight and CBS-TV's Up to the Minute.

Learn more about unified threat management


Watch David Strom's UTM demonstration in a larger window.
In this step-by-step, automated demo, network security expert David Strom demonstrates the configuration options available in SonicWall's unified threat management product.
Tom's HardwareNetwork ComputingInternet MessagingHome Networking Survival Guide
This was last published in June 2007

Dig Deeper on Network device security: Appliances, firewalls and switches

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close