Controlling network access

This protection is used to control access to incoming and outgoing networks by specific applications.

Access can be filtered by:

  • Network events such as "bind", "accept" (server rule) and "connect" (client rule),
  • TCP and UDP protocols,
  • Specific ports,
  • Specific IPv4 or IPv6 addresses.

It is not necessary to explicitly open communications between the SES Evolution server and the agents. Indeed, the agent's self-protection mechanism ensures that no security rule whatsoever can block these communications.

EXAMPLE
Network rules make it possible to:
  • Protect a server by controlling access to the host,
  • Force users of a service in the company to use a specific application to access a given network resource.