CN202424769U - Intranet safety management system - Google Patents

Intranet safety management system Download PDF

Info

Publication number
CN202424769U
CN202424769U CN 201120502486 CN201120502486U CN202424769U CN 202424769 U CN202424769 U CN 202424769U CN 201120502486 CN201120502486 CN 201120502486 CN 201120502486 U CN201120502486 U CN 201120502486U CN 202424769 U CN202424769 U CN 202424769U
Authority
CN
China
Prior art keywords
module
computer
local area
client
area network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN 201120502486
Other languages
Chinese (zh)
Inventor
向生建
章锦鑫
杨旭东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Fornew Technologies Co Ltd
Original Assignee
Sichuan Fornew Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Fornew Technologies Co Ltd filed Critical Sichuan Fornew Technologies Co Ltd
Priority to CN 201120502486 priority Critical patent/CN202424769U/en
Application granted granted Critical
Publication of CN202424769U publication Critical patent/CN202424769U/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Abstract

The utility model discloses an intranet safety management system. The system comprises at least one client, a control console and a server, the client, the control console and the server are mutually connected in a communication mode through an intranet to form first stage local area networks, a plurality of the first stage local area networks are connected in the communication mode through a first stage switchboard to form a second stage local area network, and the second stage local area network is connected with an outer network through a second switchboard and a firewall sequentially. The intranet safety management system has the advantages that functions such as management, checking, filing and searching of history records are convenient and flexible, a controlled computer is monitored in real time, data can be effectively protected, illegal data intercept can be prevented, and the system is good in expandability, safe, stable and capable of effectively reducing business management costs.

Description

The intranet security management system
Technical field
The utility model relates to a kind of intranet security management system.
Background technology
Under knowledge type economy, can the enterprise information assets particular importance that seems effectively protect seek survival the especially key of success of internal information such as proprietary technology, the basis that business is ensured.The entering information age; The Internet becomes the main channel of enterprise and the communication of other places, native country company, reciprocal exchange of business data and information, and it is no doubt convenient to utilize the Internet to link up, but the AES between existing intranet security management system work station and the server is prone to be cracked; Make the business material of secret be easy to reveal to the rival through open the Internet; The secret business material is once leakage, no matter have a mind to or be not intended to, and all the time can be to the composition of assets loss of enterprise.
The survey showed that for of announcing recently; The employee spends in online getting more and more with the irrelevant time of work in the workplace at present, and existing interior network management system can't be realized monitoring in real time to the online situation of employee's computer, also can't keep watch on the Snipping Tool of employee's computer immediately; The employee thinks that the computer of office belongs to them and owns; They can think What for regard to What for, and the productivity of enterprise receives very big influence, causes a large amount of monetary losses for this reason.
According to the research of Gartner Group and Forrester Research, information system management department is used to computer near the half the operating time and installs and upgrade software, accounts for the very big proportion of the total cost of ownership of computer.Simple line service institute's time spent accounts for the 70-80% of its amount of work to the IT personnel for PC does, and increases the integrated management cost of computer network greatly.If problem is not handled timely and effectively, also can greatly influence the productivity of enterprise.Therefore be necessary to reduce some meaningless operations of IT personnel, promoted their operating efficiency significantly, made the IT personnel pay close attention to management work more, and energy is concentrated in the information system that can promote business administration efficient.
Each computer of enterprises and user's operating position can't monitored and write down to existing intranet security management system; Do not have the Snipping Tool of intercepting work station, the function of record that the computer user uses computer, can't return according to client's needs and broadcast the working condition that these write down the station of reporting.
The utility model content
The purpose of the utility model is to solve the deficiency of existing intranet security management system; A kind of novel intranet security management system is provided; The AES that overcomes between traditional intranet security management system work station and the server is prone to be cracked, and makes the business material of secret see through open the Internet leakage, the composition of assets of enterprise is lost; Can't realize comprehensively real-time monitoring to the working condition of employee's computer, part employee takies the operating time online, influences business productivity; Shortcoming such as poor expandability, poor stability.
The purpose of the utility model realizes through following technical scheme: the intranet security management system, and it comprises client, control desk and server, is connected through the Intranet mutual communication between client, control desk and the server, forms the one-level local area network (LAN); Connect through the one-level switch communication between a plurality of one-level local area network (LAN)s, form the secondary local area network (LAN); The secondary local area network (LAN) is connected with outer net with fire compartment wall through the secondary switch successively.
The described one-level local area network (LAN) of the utility model also comprises front end management equipment; Front end management equipment is connected with server through Intranet, and front end management equipment comprises that workstation computer apparatus for grouping, massage transmission device, essential information check device, file operation supervising device, program running supervising device, system event supervising device, Snipping Tool device, network flow statistic device, monitoring printing device, equipment use supervising device, website browsing supervising device and warning device; Described massage transmission device is message transmitter and message receiver, and essential information checks that device is basic hardware information inspection device and basic software information inspection device, and equipment uses supervising device to comprise that memory device uses watch-dog and peripheral hardware to use watch-dog.
Control desk management system that the described control desk of the utility model is integrated, control desk management system comprise that start-up control platform module, operator's console module, system control module, system maintaining module, application monitoring module, strategy are provided with module, statistical report form module, assets management module, daily record and alarm module and setup menu module.
The described operator's console module of the utility model comprises control desk interface brief introduction module, computer division operation module, removing module and rename module, and computer division operation module comprises newly-built division operation module and designated packet again, changes grouping module.
The described system control module of the utility model comprise the module that sends a notification message, locking/unlocking computer module, logging off users close/restart computer module and the unloading client modules.
The described system maintaining module of the utility model comprises that essential information checks that module, hardware information check module, system process operational module, network state operational module, software information operational module, system service operational module, start an administration module, system user administration module, share directory administration module, remote control module and auxiliary operation module.
The described application monitoring module of the utility model comprises file monitor module, program monitoring module, system event monitoring module, real-time screen monitoring module, historical screen monitoring module, online monitor module and monitoring printing module.
The described strategy of the utility model is provided with module and comprises equipment strategy module, firewall policy module, website policy module, application program policy module, screen monitoring strategies module, warning policy module and software dispatch policy module.
The described statistical report form module of the utility model comprises the application program statistical module, statistical module and network flow statistic module surf the web.
The described assets management module of the utility model comprises hardware assets administration module, software asset management module and system information statistical module.
Described daily record of the utility model and alarm module comprise system journal module and alarm message module, and the setup menu module comprises rules administration module.
The workstation computer apparatus for grouping is used for workstation computer to be managed is divided into many groups, and it is carried out grouping management; Massage transmission device is used for supervisory computer and treats the message communication between the supervisory computer; Essential information checks that device is used for administrative staff and checks the essential information of treating supervisory computer; The file operation supervising device is used to monitor the operational circumstances of treating file on the supervisory computer, and checks its Operation Log; The program running supervising device is used to monitor the ruuning situation of treating program on the supervisory computer; The system event supervising device is used to monitor " startup ", " cancellation ", " login " and the system events such as " stopping " of treating supervisory computer; The Snipping Tool device is used for regularly taking pictures, and the user mode of supervisory computer is treated in monitoring; The network flow statistic device is used for monitoring and treats employed network traffics on the supervisory computer; The monitoring printing device is used to monitor the history of printing treated on the supervisory computer and current print out task etc.; Equipment use supervising device is used to monitor equipment connection of treating on the supervisory computer and the state that uses; The website browsing supervising device is used to monitor the website browsing record of treating supervisory computer, and monitors in real time; Warning device is set, is used for alarm and treats each item operating state on the supervisory computer.
The beneficial effect of the utility model is:
(1) history management, check, file and function such as search convenient, flexible;
(2) access speed of data information is fast, efficient is high;
(3) can obtain information such as the online situation that receives supervisory computer and Snipping Tool in real time, monitor the employee in real time, reduce employee and irrelevant online or the playtime of work effectively, improve business productivity;
(4) transfer of data between work station and the server utilizes the DES algorithm to encrypt, and can effectively protect data and prevent the illegal material intercepting and capturing, avoids enterprise's secret to reveal the economic loss that causes;
(5) supervision and data management function are strong, and user interface is simple and easy to usefulness, and patterned user interface comes into plain view easy operating by all functions of system;
(6) good, the safety and stability of extensibility and can effectively reduce the business administration cost.
Description of drawings
Fig. 1 is the utility model structural representation block diagram;
Fig. 2 is the utility model front end management device systems annexation schematic block diagram;
Fig. 3 is the utility model control desk management system composition frame chart.
Embodiment
The technical scheme of the utility model is described in further detail: of Fig. 1 below in conjunction with accompanying drawing; The intranet security management system; It comprises client, control desk and server, is connected through the Intranet mutual communication between client, control desk and the server, forms the one-level local area network (LAN); Connect through the one-level switch communication between a plurality of one-level local area network (LAN)s, form the secondary local area network (LAN); The secondary local area network (LAN) is connected with outer net with fire compartment wall through the secondary switch successively.
As shown in Figure 2; The one-level local area network (LAN) also comprises front end management equipment; Front end management equipment is connected with server through Intranet, and front end management equipment comprises that workstation computer apparatus for grouping, massage transmission device, essential information check device, file operation supervising device, program running supervising device, system event supervising device, Snipping Tool device, network flow statistic device, monitoring printing device, equipment use supervising device, website browsing supervising device and warning device; Described massage transmission device is message transmitter and message receiver, and essential information checks that device is basic hardware information inspection device and basic software information inspection device, and equipment uses supervising device to comprise that memory device uses watch-dog and peripheral hardware to use watch-dog.
As shown in Figure 3; Control desk management system that control desk is integrated comprises that start-up control platform module, operator's console module, system control module, system maintaining module, application monitoring module, strategy are provided with module, statistical report form module, assets management module, daily record and alarm module and setup menu module.
Start-up control platform module comprises the startup module and revises crypto module.Necessary runtime server module on network earlier before start-up control platform module, the control desk module can show login window after startup, require the user to import server ip address, and need input manager person's number of the account and password; For the completeness that guarantees to maintain secrecy; The user can revise the password of oneself, signs in to the illegal operation of execution in the system to prevent the user account that other people usurp you, chooses admin user that it is revised password; This number of the account authority is the highest; Cannot delete, number of the account is revised a strong cipher for this reason, also can create one or more number of the account for other keepers.
The operator's console module comprises control desk interface brief introduction module, computer division operation module, removing module and rename module, and computer division operation module comprises newly-built division operation module and designated packet again, changes grouping module.After the control desk login, the user will see the user interface of being made up of menu bar, label hurdle, navigation bar and status bar, and what computer navigation hurdle bottom showed is the logic tree of computer on the network (group), and is Data View on the right; In the software navigation hurdle, be presented at the computer of running client on the network; Management for ease can be set some according to actual conditions and divide into groups, and these computers logically are divided in the different groups; The associative operation that computer through control desk divides into groups; Can manage the computer of all running client proxy modules, can select " showing by the address " and " showing by name " dual mode in the right button, the keeper can become the own user's name of distinguishing easily by manual modification; In the time need specifying the grouping of logic or change when dividing into groups, the selected computer that needs to move, select corresponding target group, computer can move in the group of appointment for computer; Drag operation through mouse is accomplished; Behind the object that selection will be operated, pin left mouse button and do not put, be dragged to it in the target group then and go; Selected like this computer will belong to the group of appointment, supports Shift and Ctrl to operate with sets of computer single simultaneously; The keeper can directly click right button " deletion " and remove to delete computer; The deletion computer can not unload the client of this computer; Just delete information at that time; Automatically connect server after (acquiescence is 15 minutes) after a while, group the inside has the computer cannot the deletion group, only with to empty group name deletion.
System control module comprise the module that sends a notification message, locking/unlocking computer module, logging off users close/restart computer module and the unloading client modules.When needs are notified some information of workstation user or are assigned some order, select corresponding calculated machine or group, select " sending a notification message " to notify, in dialog box, press after the input message and send button notification target computer or group; When the computer of finding client has unusual movement or other reason is arranged, stop the user to continue to use keyboard and mouse to operate in this computer, choice menus " locking computer " locks computer; Blocked computer is put on the state that can show locking at computer graphic; Restart client after the client outage and appoint so and be in the lock state, must also can in " strategy of reporting to the police ", the warning policing rule be set at control desk by the locking that the keeper removes computer; The setting of meeting corresponding strategy after the user breaks the rules; Notifying the user still is direct lock-screen etc., and when needs during to locked computer release, choice menus " release " carries out release; Adding lock icon and will disappear after the release on the computer,, object-computer just can continue to have used keyboard and mouse; Close the computer of operation proxy module when needs; The user can use this function; The user can select " cancellation ", " restarting " and " shutting down computer " of " operation " menu, carry out this operation certainly after this proxy module will withdraw from after logining again next time and just can bring into operation; If confirm that certain computer will no longer need move proxy module; Select " client ", " unloading client " that its proxy module is removed; After this proxy module will not restarted operation, if need on this computer, use client later on, must reinstall.
System maintaining module comprises that essential information checks that module, hardware information check module, system process operational module, network state operational module, software information operational module, system service operational module, start an administration module, system user administration module, share directory administration module, remote control module and auxiliary operation module.Essential information the inside display operation system, physical memory, hard drive space, IP address, computer-name, processor, available machine time, client release, client set-up time and client update time are only to carry out checking of essential information to single computer; Hardware information shows the detailed content of all hardware of selected single computer, comprises the concrete model and the configuration of equipment; System process shows the process that selected single computer is moving, and comprises process name, ID number and path, and the keeper can operate it, can delete the process of choosing; Network state shows the current network conditions of the current computer of choosing; The IP and the port numbers that comprise protocol type, process title, PID, local address and remote address; In state, show the current states situation; Be listening state or etc. pending, as required computer is done corresponding operation; Software management capability is checked current all softwares installed on the computer of choosing, and checks the illegal software of whether installing beyond allowing; The service of all operations of system service functions display system is consistent with the computer local service, can manually forbid and start corresponding service; Show and follow the startup project that computer random starts, can delete the project that starts together at random, shorten the start-up time of client; Show all users of computer system, can choose a number of the account, click right button and it is deleted and remodifies password; Share directory shows all share directories hidden and general all disks and the file of sharing, and shows the name of Shared Folders or the drive of disk, the path and the description of file, and the keeper can stop sharing operation to it; Long-distance Control can be controlled client fully, can directly visit through the mode of Long-distance Control, and the selected target computer is clicked right button, selects drop-down menu " Long-distance Control ", and this moment, the keeper had complete operation power to it; File system comprises file management and registration table; File management: can create file on the home server and also be supported in drag function on the server with deleted file (folder) creating file on the client, directly pin left mouse button and do not put and be dragged to the file (folder) on serving on the computer of client; System registry: revise system registry.
Application monitoring module comprises file monitor module, program monitoring module, system event monitoring module, real-time screen monitoring module, historical screen monitoring module, online monitor module and monitoring printing module.When the user operated document, client can write down the operational motion of document, the path of document, the disk at document function place, the employed application program of document function etc.; And regularly data are passed to server; The keeper can check relevant daily record through control desk; Select " file monitor "; The keeper can all document function daily records of viewing client-side; Comprise create file, rename folder, Rename file, visit, move, operations such as modification, copy, deleted file folder and file, type of driver and document title, the document size scope that the keeper also can be through select time and scope, action type, document and open the daily record that the application program self-defined inquiry of document needs, input field support asterisk wildcard; When the user opens application program or closes application program, when perhaps application window being switched, client can be noted, and regularly data is passed to server, and the keeper can check relevant daily record through control desk,
Select " program monitoring ", the keeper can check all application program launchings and halted state, and the keeper also can pass through the daily record that select time and scope, application program or application category and input application name self-defined inquiry need; Select " system event "; The keeper can check startup, cancellation, login and the halted state of All Clients; The prompting of inserting and extracting portable hard drive, the record of interpolation software, the keeper also can pass through select time and scope; The daily record that input message content self-defined inquiry needs, input field is supported asterisk wildcard; Click menu " screen monitoring in real time ", the keeper can real time inspection and is followed the tracks of the Snipping Tool of a certain computer, and real-time tracking is clicked right button and selected " tracking " to get final product; System default does not write down screen history; The manager need create the monitoring screen record through " screen monitoring strategies "; The frequency that simultaneously can regulate Snipping Tool through setting interval; The effective range of time interval attribute is not limit (suggestion was arranged on more than 5 seconds), inside historical Snipping Tool, just can see the snapshot screen of monitoring after Provisioning Policy comes into force, and uploading with interval hourly of data uploaded; Choice menus " online keep watch on " can viewing client-side uses the chat record of immediate communication tool; The immediate communication tool of supporting comprise rise fast QQ, TM, MSN Messenger, Yahoo Messenger, skype, rise fast RTX, the logical AliTalk of trade and Fetion; When the user passes through the browser browsing page; Client can be noted network address and window title; And regularly data are passed to server, and the keeper can check relevant daily record through control desk, the keeper also can pass through the daily record that select time and scope, categories of websites and input window title self-defined inquiry need; Record that also can the viewing client-side receiving and dispatching mail, the email type of support comprises: POP3/SMTP receiving and dispatching mail, Exchange receiving and dispatching mail, Lotus Notes send mail, Http webpage commonly used sends Mail Contents and annex etc.; Select " monitoring printing "; The keeper can all document print log of viewing client-side; Comprise local printer, printer sharing, the network printer and virtual printer; The keeper also can check printed contents through select time and scope, and print record comprises contents such as document title and type, server name, printer name, document number of pages, umber, number of print pages.
Strategy is provided with module and comprises equipment strategy module, firewall policy module, website policy module, application program policy module, screen monitoring strategies module, warning policy module and software dispatch policy module.The Equipment Control strategy mainly is that hardware device is controlled; As forbid or launch equipment; When the state of this equipment of machine manual change of client, client can judge automatically this state whether with strategy matching, if do not match; Client can be forced the state of the equipment of changing, and itself and strategy are complementary.
The equipment of Equipment Control strategy support mainly comprises: memory device (floppy disk, CD, tape, USB memory device etc.); USB memory device (can distinguish USB keyboard, USB mouse, USB CDCOM, USB storage, USB hard disk, USB network interface card etc.) peripheral hardware (serial ports, parallel port, USB, bluetooth, infrared ray etc.); Dial-up connection equipment; The network equipment (wireless network card, PnP network interface card, Microsoft Loopback Adapter), other (comprising operations such as equipment manager, network attribute, task manager, printing, interpolation, deletion printer); Firewall functionality is with restricted internal network access external network with good conditionsi or forbid that all outer nets are movable; Guarantee the safety of employee's computer of network internal; Effectively use network; Launch firewall functionality " fire compartment wall ", click " adding strategy " button and add corresponding firewall policy: " title " of (1) input rule is so that search and read; (2) setting should the pairing agreement of rule; Wherein: " TCP " agreement will be inserted port range of this machine and the other side's port range, if just specify a port, can import this port at the both port of origination place so; End; Import same port, if do not want to specify any port, as long as all import 0 in both port of origination; (3) it is effective, perhaps two-way to the packet or the packet of output that get into selecting this rule; (4) " destination address " is used for confirm selecting packet to come therefrom or where; (5) after a strategy is launched, if any packet giving of satisfying that this strategy will be provided with by this strategy and forbid and the processing of letting pass.The website strategy can limit All Clients all cannot visit the website of forbidding at official hour or whole day; For example forbid the Baidu website: in title, import title, the web site name www.baidu.com of input inhibit in the website also can choose website group (the website group of before having created); Seclected time, section was clicked definite; Launch strategy, launch many rules when simultaneously, rule is from the execution of next bar of surfing the Net.The application program strategy can limit client machine can use some application program, bans use of some application program, as: ban use of QQgame; A sudden peal of thunder, BT etc., the control of application program has dual mode: forbid through the process title (1); The keeper directly imports the title of application program; Like thunder.exe, this moment is tactful in string matching, changes thunder123.exe into if client has been revised application name; Then strategy just can't come into force, and avoid this situation can adopt second method to go to forbid; (2) forbid through set of applications; The application program that the keeper can forbid all is put in this group; Even client has been revised application name; As long as program itself does not change, strategy still comes into force, and the classification of application programs can increase in " set of applications management " and revise.System default does not write down screen history, and the manager need create the monitoring screen record through " screen monitoring strategies ", the frequency that can regulate Snipping Tool through setting interval simultaneously, and the effective range of time interval attribute is 1-999.The keeper can be provided with the variety of event that client is triggered and report to the police; When hardware change being arranged or inserts operation such as USB flash disk such as client machine; The keeper just can be real-time the legitimacy to this action examine and make a response; Console can be provided with whether eject warning window; In " strategy of reporting to the police ", be provided with; Warning message can be checked corresponding alarm log by tactful daily record; System default is not report to the police; Relevant strategy need be set just can report to the police; Alarm rule comprises following change: (1) file operation: can be to the establishment of the file and the file of appointment; Deletion; Share; Duplicate; The operation note alarm logging such as move and rename; Can set the time period or the whole day of appointment; Under pattern, launch strategy, in response policy, can choose the locking computer and notify the user to send message; (2) website visiting: can launch strategy to the website of specified limit and report to the police, when the client-access website, the record alarm logging can be chosen the locking computer and notify the user to send message in response policy; (3) application program: the application program when client is used the warning strategy, the record alarm logging can be chosen the locking computer and notify the user to send message in response policy; (4) software change: after launching software change alarm rule, when client is added and unload application program, the setting of meeting response policy; (5) hardware change: when client increases equipment (like external equipments such as network interface card, insertion u dishes), the setting of meeting response policy." software dispatch strategy " menu, the keeper can be distributed to the working procedure that needs are installed to client on client's the computer through server and control desk.
The statistical report form module comprises the application program statistical module, statistical module and network flow statistic module surf the web.Select " application program statistics " can inquire about application program operating position at a certain section Time Calculation machine (group); The application program operating position that system default is added up the same day, in statistics, acquiescence has program name, access times, All Time and time; The keeper also can pass through the select time scope; Statistical report that self-defined inquiry need generate and chart, convenient assessment employee's operating efficiency, what system default was inquired about is the statistics of the rank top ten on the same day.Select " website visiting statistics " can inquire about the situation that browses web sites at a certain section Time Calculation machine (group); Acquiescence has web site name, access times and time in statistics; The keeper also can pass through select time and scope; The statistical report that the categories of websites self-defined inquiry that surfs the web need generate, convenient assessment employee's operating efficiency, what system default was inquired about is the statistics on the same day.Selection " network flow statistic " can be added up the use network traffics of computer in certain period (group) and check.
Assets management module comprises hardware assets administration module, software asset management module and system information statistical module.The hardware assets management helps the data of enterprise's all client hardwares of express statistic, comprises computer name, the model of the model of CPU, the size of internal memory, hard disk drive, network interface card.The keeper can the statistics group, department, whole hardware statistics of computers.The software asset statistics can be added up installed software on group, all computers of department, the convenient statistics of checking to software asset.The information of the hardware that the system information statistical module counts is all also can be selected the information inquiring record through classification and type in the inquiry on the right.
Daily record and alarm module comprise system journal module and alarm message module, and the setup menu module comprises rules administration module.Select " daily record and warning ", the keeper can check the startup and the halted state of server, and the keeper also can pass through select time and scope, the daily record that input message content self-defined inquiry needs.Input field is supported asterisk wildcard, and system journal comprises ip address, time and the content of type, user name, server.The Realtime Alerts daily record that warning information record All Policies triggers; Can through " warning message " adjust the Realtime Alerts window can display alarm the maximum quantity of record, can inquire about through the right and select concrete time period and concrete inquiry transaction to inquire about.Can be in regulation management to cycle management, the management of website group, set of applications management.Wherein, cycle management: create different time periods; Website group management: can carry out the branch creation to the website that bans use of, can create a group name, the station address at station address the inside input inhibit can add and delete station address; Set of applications management: can carry out the branch creation to the application program that bans use of, can create a group name,, can add and the delete program title in the program name of the inside, program address input inhibit.

Claims (2)

1. intranet security management system, it is characterized in that: it comprises at least one client, control desk and server, is connected through the Intranet mutual communication between client, control desk and the server, forms the one-level local area network (LAN); Connect through the one-level switch communication between a plurality of one-level local area network (LAN)s, form the secondary local area network (LAN); The secondary local area network (LAN) is connected with outer net with fire compartment wall through the secondary switch successively.
2. intranet security management system according to claim 1; It is characterized in that: described one-level local area network (LAN) also comprises front end management equipment; Front end management equipment is connected with server through Intranet, and front end management equipment comprises that workstation computer apparatus for grouping, massage transmission device, essential information check device, file operation supervising device, program running supervising device, system event supervising device, Snipping Tool device, network flow statistic device, monitoring printing device, equipment use supervising device, website browsing supervising device and warning device; Described massage transmission device is message transmitter and message receiver, and essential information checks that device is basic hardware information inspection device and basic software information inspection device, and equipment uses supervising device to comprise that memory device uses watch-dog and peripheral hardware to use watch-dog.
CN 201120502486 2011-12-06 2011-12-06 Intranet safety management system Expired - Fee Related CN202424769U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201120502486 CN202424769U (en) 2011-12-06 2011-12-06 Intranet safety management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201120502486 CN202424769U (en) 2011-12-06 2011-12-06 Intranet safety management system

Publications (1)

Publication Number Publication Date
CN202424769U true CN202424769U (en) 2012-09-05

Family

ID=46749491

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201120502486 Expired - Fee Related CN202424769U (en) 2011-12-06 2011-12-06 Intranet safety management system

Country Status (1)

Country Link
CN (1) CN202424769U (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103491091A (en) * 2013-09-24 2014-01-01 长沙裕邦软件开发有限公司 Method and system for monitoring user operation based on data bank
CN103778231A (en) * 2014-01-26 2014-05-07 长沙裕邦软件开发有限公司 Method and system for managing operation record information, of databank
CN104219077A (en) * 2013-06-04 2014-12-17 成都睿恒科技有限公司 Information management system for middle and small-sized enterprises
CN107294798A (en) * 2017-08-24 2017-10-24 苏州宏璟创业投资发展有限公司 A kind of local network safety management system
CN107592341A (en) * 2017-08-21 2018-01-16 叶军 A kind of long-range control method based on instant messaging
CN108803547A (en) * 2018-08-16 2018-11-13 珠海市运泰利自动化设备有限公司 A kind of industry spot automation equipment data collection analysis system based on TCP networks
CN109728965A (en) * 2017-10-31 2019-05-07 丹阳百斯特智能系统有限公司 A kind of desktop computer local monitoring system
CN111757058A (en) * 2020-06-18 2020-10-09 浪潮金融信息技术有限公司 Method for monitoring non-existing equipment screen
CN115103014A (en) * 2022-06-16 2022-09-23 宿迁市中旭科技信息咨询有限公司 Enterprise service platform information timely pushing system

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104219077A (en) * 2013-06-04 2014-12-17 成都睿恒科技有限公司 Information management system for middle and small-sized enterprises
CN103491091A (en) * 2013-09-24 2014-01-01 长沙裕邦软件开发有限公司 Method and system for monitoring user operation based on data bank
CN103778231A (en) * 2014-01-26 2014-05-07 长沙裕邦软件开发有限公司 Method and system for managing operation record information, of databank
CN107592341A (en) * 2017-08-21 2018-01-16 叶军 A kind of long-range control method based on instant messaging
CN107294798A (en) * 2017-08-24 2017-10-24 苏州宏璟创业投资发展有限公司 A kind of local network safety management system
CN109728965A (en) * 2017-10-31 2019-05-07 丹阳百斯特智能系统有限公司 A kind of desktop computer local monitoring system
CN108803547A (en) * 2018-08-16 2018-11-13 珠海市运泰利自动化设备有限公司 A kind of industry spot automation equipment data collection analysis system based on TCP networks
CN111757058A (en) * 2020-06-18 2020-10-09 浪潮金融信息技术有限公司 Method for monitoring non-existing equipment screen
CN115103014A (en) * 2022-06-16 2022-09-23 宿迁市中旭科技信息咨询有限公司 Enterprise service platform information timely pushing system

Similar Documents

Publication Publication Date Title
CN202424769U (en) Intranet safety management system
WO2021017279A1 (en) Cluster security management method and apparatus based on kubernetes and network domain, and storage medium
US8307068B2 (en) Supervised access computer network router
US8135838B2 (en) System and method for providing data and application continuity in a computer system
US20130262669A1 (en) Device detection system for monitoring use of removable media in networked computers
CN102724224A (en) Global eye network video monitoring system and realization method thereof
CN101901315A (en) Security isolation and monitoring management method of USB mobile storage media
CN110413485A (en) A kind of one-stop Networked Control and Management System and method for based on Zabbix Open Source Platform
US20110321170A1 (en) Fraudulent manipulation detection method and computer for detecting fraudulent manipulation
CN102457567A (en) Mirror image backup/recovery method and tool of web management mode
CA2510116A1 (en) Distributed content management system
CN103413083A (en) Security defending system for single host
US20040267839A1 (en) Method and system for archiving and restoring data from an operations center in a utility data center
CN103166777A (en) Operation method and device for equipment remote operation and maintenance
CN104239178A (en) Monitoring system and monitoring method
CN113486095A (en) Civil aviation air traffic control cross-network safety data exchange management platform
CN202150865U (en) System suitable for enterprises to carry out network behavior management
CN112738200B (en) Convenient operation and maintenance tool and method based on closed public network system
CN100456705C (en) Monitoring system and method for Internet multimedia communication
JP2000354035A (en) Centralized non-infiltration monitoring system and method for distributed independent data network
CN105245336B (en) A kind of file encryption management system
US10063664B2 (en) Network system and control device
CN102624541A (en) Whole network managing and monitoring system based on virtual private network (VPN) technology
XinXin et al. Research and design of network behavior management system based on B/S architecture
KR101550788B1 (en) Central electronic document management system based on cloud computing with capabilities of management and control of personal information

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120905

Termination date: 20151206

EXPY Termination of patent right or utility model