2
Dell SonicWALL Scrutinizer 11.5.2 Release Notes
P/N 232-002504-00 Rev A
Release Notes
Scrutinizer Base Product
The base Scrutinizer product includes many great features such as:
Administration
• Customizable Dashboards
• Group Based User Permissions
• Unique Dashboards per login
With Scrutinizer’s suite of built-in administrative tools, customizing specific user logins and dashboards is a breeze.
Administrators can create specific permissions based upon a particular user identity or create group based user
permissions for entire departments. The Dashboard can be customized on a per-user basis to provide the
information that is most relevant to each user.
Alerting
• Support for on-demand email reporting
• Ability to batch schedule and email reports to administrators
Scrutinizer was built with ease of use in mind. With Scrutinizer’s alerting features administrators have “set it and
forget it” flexibility when it comes to reporting. Reports can be run based upon a specific schedule or triggered when
event thresholds are exceeded. Once configured, reports can be automatically batched and emailed to
administrator in several formats.
Flexible Reporting
• In the Free version, data can be archived for up to 24 hours. Data can be saved longer if a commercial
version is purchased.
• Extensive Flexible NetFlow template support
• Granularly defined reports down to the second which can include / exclude data filters
• Create and save templates to easily reuse for future reporting
• Create application group reports based upon specific ports or subnets
• Display data by number of bits, bytes, packets or as a percentage of total traffic
• Per interface, host, protocol, application, or conversation reporting
• Trend data in, out, or bi-directionally
Granular, flexible reporting is the heart of the Scrutinizer product. Administrators have endless possibilities for
generating reports based upon general or very specific criteria. Want to know which users are consuming the most
bandwidth? Would you like that done per bit, byte or packet? What about which protocols are being most heavily
utilized on a particular subnet?
Security
• Easily configure DNS caching time limits
• See all traffic ‘Host to Host’ or ‘Subnet to Subnet’
• Easily filter and display traffic based upon TCP flags
• Track flow sequence numbers to trend traffic patterns
• Quickly identify MITM servers on the network (DNS, DHCP, SMB, etc.)