Creating Notification Policies: Coaching, Splash, and Compliance
|
|
- Barrie Goodman
- 8 years ago
- Views:
Transcription
1 SGOS 5 Series Creating Notification Policies: Coaching, Splash, and Compliance What is a Notification Policy? Many organizations implement content filtering in order to control employee Web access; however, some blocked URLs need to be allowed for certain users. Additionally, organizations may want to inform employees of the Corporate Internet Usage policy before their first access to the Internet, and/or occasionally send announcements to employees. The Blue Coat ProxySG allows you to create notification policies for a user, group, time, and/or URL to handle all these needs. Notification policies consist of an HTML page that is displayed when triggered; these are described in three ways: Coaching pages advise users about corporate policies regarding the access of a particular Web site and then offer the option to proceed. The policy can ensure that all URLs accessed that way are intentionally requested. The policy can also act as a soft deny and provide a link to, or text of, the Corporate Internet Usage policy. Splash pages differ slightly in that they are used for announcements, such as maintenance schedules, or requirements (technical, usage, and so forth) of a Web site, rather than to advise users about a specific URL or URL category. Typically, a link to the originally requested URL is provided for the user, or the page can be set to automatically open the requested URL after a delay. Compliance pages inform the user of corporate Internet access requirements. They are often used to show users, upon first Internet access attempt per day, a Corporate Internet Usage page that requires an affirmative user-click to proceed. After the Corporate Internet Usage page has been viewed once, it may or may not splash future Internet access attempts. How it Works All of these notification policies are implemented by launching the Visual Policy Manager (VPM), configuring a Web Access layer, and then specifying a Destination (the notification trigger), and an Action; optionally, you can also specify a Source, (for a specific user or group) or a Time setting. All of the notification policies described in this document use the Notify User action object. You can change the HTML message for that object; example HTML messages that you can use are included in this document. To launch the VPM, go to Configuration > Policy > Visual Policy Manager and click Launch. To add a Web Access Layer, click Policy in the VPM and select Add Web Access Layer. The HTTP proxy service must be set to intercept traffic. To do this, go to Services > Proxy Services, select the HTTP service, set it to Intercept, and click Apply. For the policies to trigger on HTTPS (SSL) traffic as well, also set the HTTPS proxy service to Intercept. In order to record the user reaction to the notification, access logging must be enabled. To do this, go to the Configuration > General > Access Logging page, select Enable Access Logging, and click Apply.
2 About the Default Proxy Policy On the Management Console Configuration > Policy > Policy Options page you can set the default policy option to Deny or Allow. The two options provide two different approaches; however, as the Notify User action object does not modify the Allow or Deny state, the examples provided will function as expected within existing policy allow/deny settings. For more details on developing effective policies, see the Policy Best Practices tech brief. About the Variables The HTML code examples for the Notify User action in the policies described in this document use a few common variables, defined below. For a full list of variables that may be used in policy messages, see the CPL Guide, Appendix D. Variable $(exception.details) $(exception.contact) $(client.address) $(user) $(url.host) $(categories) Creates A link to the requested URL The name of the originator of the policy The IP Address of the requesting machine The name of the requestor The requested URL The category of the requested URL This document describes the following: Creating Notification Policies How to use a Web access layer policy with the Notify User action to create custom Notification policies and pages. Example Custom Notification Pages Provides the HTML code and the VPM procedure for creating notification policies. Creating Notification Policies This section describes how to create a notification policy to display a coaching, splash, or compliance page for a specific URL, a custom URL category, a URL filtering list category, or all Internet access. How to use the Notify User action object to either allow access to the requested (or an alternate) URL, to invisibly auto-request the URL (to prevent the policy being re-triggered) without requiring any user-interaction, or to auto-redirect to the requested (or an alternate) URL, is described. How to specify the policy for a user, a group, a time of day, or first-time (or any) Internet use is described. There are three parts to defining a notification policy with a Web Access Layer: 1 Defining the notification trigger 2 Optionally, specifying a user, group, and/or time period for the policy 3 Defining the Notify User action setting
3 Defining Notification Triggers The most common conditions used for triggering notification rules are URL based: A custom URL category. When a user attempts to access one of those URLs, they receive the associated coaching page. The page informs the user of the corporate policy for accessing the Web site in question and may include a link allowing access; if the user clicks on the link and proceeds to the Web site, the access is logged. This method is useful for specific instances of coaching, such as allowing or denying access to a list of specific sites. How to define a coaching URL category is described. An installed URL filtering list category (Blue Coat WebFilter, Websense, SmartFilter, etc.). When used this way, a user attempting to access any Web site that falls in the trigger category gets the associated coaching page. Again, the user may or may not be given a link to the trigger Web site. To install a URL filtering list, see the Blue Coat Tech Brief page for specific instructions. A URL condition matching all Internet accesses. This method is useful for bringing up a Corporate Internet Usage compliance page when an employee first attempts to access the Internet through the corporate network. This method is also useful for displaying splash pages, such as maintenance schedules, when any Internet access is attempted. The method described below configures a trigger for any Internet address but exempts internal addresses. Defining a Custom URL Category To define a custom URL category object for use in a coaching policy: 1 Launch the VPM; click Policy > Add Web Access Layer. Name the layer WebAccess_ShopURLs; for example. NOTE: To help maintain scalability, Blue Coat recommends giving relevant names to layers and objects.
4 2 Right-click the Destination setting and select Set. The Set Destination Object dialog displays. 3 Click New and select Request URL Category. The Add Request URL Category Object dialog displays. Name the object RequestURLCategory_ExCoShopUrls; for example. 4 Click the default Policy category. The Add button becomes active. 5 Click Add. An Object Name dialog displays. Name the object ShopURLs; for example, and click OK. The new category displays under the Policy branch. 6 Select the new category and click Edit URLs. The Edit Locally defined category Object dialog displays.
5 7 Enter URLs for the ShopURLs category, one per line. Once all the URLs for this category have been entered, click OK to dismiss the dialog. This custom URL category object is now available for use in any policy. 8 To set the custom URL category object in your policy, select it and click OK to add this Request URL Category object and dismiss the Add Request URL Category Object dialog. The Set Destination dialog re-displays with the custom Request URL Category object that you defined. 9 To use the object in a policy, select it and click OK. Using an Installed URL Filtering List To use an installed URL filtering list in a coaching policy: 1 Launch the VPM; click Policy > Add Web Access Layer. Name the layer WebAccess_WebFilter; for example. 2 Right-click the Destination setting and select Set. The Set Destination Object dialog displays. 3 Click New and select Request URL Category. The Add Request URL Category Object dialog displays. Name the object RequestURLCategory_BlueCoat; for example. 4 Select the installed URL filtering list that you want to use. A list of URL categories displays.
6 5 Select all of the categories that you want for triggers for this policy and click OK to add this Request URL Category object and dismiss the Add Request URL Category Object dialog. The Set Destination dialog re-displays with the Request URL Category object that you defined. 6 To use the object in a policy, select it and click OK. Note: You can use a custom URL category and an installed URL filtering list together. Defining Internet Access To identify Internet access for use in a splash or compliance policy: 1 Launch the VPM; click Policy > Add Web Access Layer. Name the layer; for example, WebAccess_InternetSplash. 2 Right-click the Destination setting and select Set. The Set Destination Object dialog displays. 3 Click New and select Destination IP Address/Subnet. The Add Destination Address Object dialog displays. 4 Enter a subnet pattern to match all internal (non-internet) addresses. Click Add. Click Close to dismiss the dialog. The Set Destination Object dialog re-displays with the newly-defined object.
7 5 Select the new destination object and click OK to set it and dismiss the dialog. 6 Right-Click the newly defined Destination Address object and select Negate to match not IP addresses in the defined internal subnet. In this way, all IP addresses except internal ones trigger the policy.
8 Specifying a User or Group (Optional) For notifications to a specific user or group: Along with the Notify User action described above, configure a Source setting for the particular user or group. Note: If you click New, many additional options display, including the following (most likely to be of use for a notification policy): User: An individual user in the form of a verifiable username or login name. Group: A verifiable group name. Attribute: An LDAP or Radius realm-specific attribute. Note: Some options for this setting require a configured authentication realm in order for the user/group to be identified. Scheduling Notifications (Optional) For scheduled notifications: Along with the Notify User action described above, configure a Time setting. This is used for regular notifications, such as maintenance schedules.
9 Defining the Notify User Action Three ways to define the Notify User action are described: Notify and require acceptance: When triggered, a notification page with a link to the requested URL displays. The user must click the link to satisfy the notification policy. Notify and auto-request: When triggered, a notification page displays; no click is required, the request is made invisibly to the user so the notification page is no longer triggered on future accesses. Notify and auto-redirect: When triggered, a notification page displays; an auto-request occurs and, after a set time period, the requested or an alternate URL automatically proceeds. Notify and Require Acceptance 1 In the Web Access layer previously defined, right-click the Action setting and select Set. The Set Action Object dialog displays. 2 Click New and select Notify User. The Add Notify User Object dialog displays. 3 Name the object CoachSports; for example. Modify the Body text as needed. (examples are provided below) 4 Select a Notify mode: Notify once for all hosts: The notification page is displayed only once for that user; this is often used for configuring compliance pages. This option uses a Virtual Notify URL. You do not need to change this URL; it simply works with the policy to display your notification page. If you must change the URL from the default value, please read the limitation section provided in the online help.
10 Notify only once for related domains: The notify page reappears each time the user visits a new Web site; this is used for configuring coaching pages. Notify on every host: The notify page reappears each time the user visits a new Web host. Note: Blue Coat recommends that only highly experienced administrators employ this option; on some Internet Web sites this option might cause JavaScript errors that impair the functionality of the site. 5 Select a Notify users again time interval: At next browser session: The notification page does not reappear until the next browser session (when a user reboots, logs out, or closes all Web browser windows). After <time interval>: Notification recurs after the specified elapsed time (minutes or hours). After <specified time>: Notification recurs at a specified time and day. NOTE: The time is referenced from the local workstation. If a compliance page is configured, verify the workstations and ProxySG appliance clocks are synchronized. 6 Click OK to add the object. Click OK to set the object. Click Install Policy to finish. Note: The Notify User action generates CPL that might interfere with other policy or cause undesired behavior. Please consider the following: Notifications will conflict with policy that modifies the Cookie request header. Notifications will conflict with policy that modifies the Set-Cookie and P3P response headers. Notification pages exist in the browser history. Therefore, if you click the provided link and are taken to the requested page, and then click Back, you get the notification page again. If you have a chain of SG appliances, with different notification pages configured on each appliance in the chain, then each notification page must have a different object name. Notify and Auto-Request You may want to further discourage access to the requested URL by removing the requested link from the page. In order to do this and not have the notification policy triggered every time access to the page is attempted, modify the code in the Body option of the Notify User object as follows: Replace the Body tag in the Notify User object HTML (Body text option) with: <body onload="accept();var notify_img=new Image(1,1);notify_img.src='$(exception. details)';"> Use the Notify Mode options (described above) to specify how often the policy is triggered. Now, when the notification page displays on a JavaScript enabled browser, there is no need for the user to click a link. The notification policy is not re-triggered because an auto-request was made behind-the-scenes. Notify and Auto-Redirect You can use the same modification described above (for notifications with auto-request) along with a Meta Refresh tag to auto-redirect the splash page to the requested URL. To do this, insert a Meta Refresh tag before the Body tag in the Body text option of the Notify User object, after making the modification described in Notifications with Auto-Request, above. An example specifying a redirect after 10 seconds would be this:
11 <meta http-equiv="refresh" content="10;url=$(url)">. Use the Notify Mode options (described above) to specify how often the policy is triggered. Now, when the notification page displays, there is no need for a link to the requested URL; the browser will automatically proceed after the set time (10 seconds in the example above). The notification policy will not be re-triggered. Note: To auto-direct to an alternate link rather than the requested link, simply replace the $(exception.details) variable in the Meta Refresh tag with the URL that you want to provide. Custom Notification Page Examples This section offers examples of custom notification pages that you can create by copying the HTML provided directly into the Body option of the Notify User object. Four example custom notification pages are provided: Notify and Require Acceptance Coaching Page Example: A coaching page including the requested link. Notify and Auto-Request Splash Page Example: A maintenance schedule splash page with no link. Notify and Auto-Request/Auto-Redirect Splash Page Example: A maintenance schedule splash page with no link but including an auto-redirect to the requested URL. Notify and Require Acceptance Compliance Page Example: A compliance page with an auto-redirect to the requested URL. Note: In the HTML code examples given in this section, the HTML and Head tags are automatically inserted by the policy. Notify and Require Acceptance Coaching Page Example The following illustration depicts a custom coaching page informing the user that the requested site is generally blocked; however, users that have a legitimate reason for accessing the site may click the here link, being forewarned that their activity is being logged. If the user clicks the provided link, they are given access. The HTML source used to define this page is provided below.
12 <body> <p align=center><text align=center><b><span style='color:red'><h2>attention!</h2></ span></b></p> <p><b>access to this website has been barred under company Internet usage policy or to prevent excessive demand conflicting with core business activities. </b></p> <p><b>note:</b> Internet usage is routinely monitored and logged.</p> <p>your IP address: $(client.address)<br> Your username: $(user) <br> The requested URL host is: $(url.host) <br> Which has been categorized as: $(categories) </p> <p>if you have a legitimate reason to access this site please click <a href="$(exception. details)" onclick="accept();">here </a>,<br> or <a href="mailto:support@example.com?subject="barred Web Page" $(url.host) category: $(categories), IP address: $(client.address), User ID: $(user)">employee Services </a> to request a permanent exception.</p> <p><b>warning:</b> Those who ignore this message and persist in repeated attempts to access barred sites are traced and reported to their manager for disciplinary action.</p> </body> To implement this coaching policy with a Web access layer in the VPM: 1 Use either a Request URL or Request URL Category destination object (see Defining Notification Triggers for details). 2 Use the Notify User action object and do the following: a. Paste into the Body option the HTML code given above, modified appropriately. b. Select the Notify only once for related domains option. c. Leave the Notify users again option at the default. To specify a user or group for the policy, add a Source object. To specify a time of day restriction for the policy, add a Time object. Notify and Auto-Request Splash Page Example The following illustration depicts a custom splash page informing the user of significant interrupting events. No link is provided; the user must re-enter the requested link in order to get access. The auto-request ensures that this page displays only once per policy trigger. Note the modified BODY tag at the top. The HTML source used to define this page is provided below.
13 <body onload="accept();var notify_img=new Image(1,1);notify_img.src='$(exception. details)';"> <p align=center><text align=center><b><span style='color:red'><h2>important Notice!</ h2></span></b></p> <p><b>system maintenance is scheduled for Sunday July 17, 2:00-4:00 am EST.</b></p> <p><b>to report any conflicts with the scheduled maintenance, see $(exception.contact)</ b></p> <p><b>please NOTE:</b> Internet usage is routinely monitored and logged.</p> <p>your IP address: $(client.address)<br> Your username: $(user)<br></p> </body> To implement this splash policy with a Web access layer in the VPM: 1 Use a Destination IP Address/Subnet destination object or other appropriate destination object (see Defining Notification Triggers for details). 2 Use the Notify User action object and do the following: a. Paste into the Body option the HTML code given above, modified appropriately. b. Select the Notify once for all hosts option. c. Set the Notify users again option appropriately. To specify a user or group for the policy, add a Source object. To specify a time of day restriction for the policy, add a Time object. Notify, Auto-Request and Auto-Redirect Splash Page Example Here is a similar splash page that auto-redirects the user to the requested URL after a set time period. No link needs to be provided if the browser supports JavaScript. This page may be used as a splash on any Internet access attempt by following the Defining Internet Access procedure. The auto-request ensures that this page displays only once per time period. Note the Meta Refresh tag within the Head tag as well as the modified Body tag. The HTML source used to define this page is provided below. Note: The HTML and Head tags are automatically inserted by the policy; to use the Meta Refresh tag, place it at the top as shown below and the policy will insert it within the Head tags.
14 <meta http-equiv="refresh" content="15;url='$(exception.details)'> <body onload="accept();var notify_img=new Image(1,1);notify_img.src='$(exception. details)';"> <p align=center><text align=center><b><span style='color:red'><h2>important Notice!</ h2></span></b></p> <p><b>system maintenance is scheduled for Sunday July 17, 2:00-4:00 am EST.</b></p> <p><b>to report any conflicts with the scheduled maintenance, see $(exception.contact)</ b></p> <p><b>please NOTE:</b> Internet usage is routinely monitored and logged.</p> <p>your IP address: $(client.address)<br> Your username: $(user)</p> <p>you will be connected in 15 seconds.</p> </body> To implement this splash policy with a Web access layer in the VPM: 1 Use a negated Destination IP Address/Subnet destination object to match the entire Internet; see Defining Internet Access for details. 2 Use the Notify User action object and do the following: a. Paste into the Body option the HTML code given above, modified appropriately. b. Select the Notify once for all hosts option. c. Set the Notify users again option appropriately. To specify a user or group for the policy, add a Source object. To specify a time of day restriction for the policy, add a Time object. Notify and Require Acceptance Compliance Page Example The following illustration depicts a custom compliance page. The link provided connects the user to the requested URL, but requires them to agree to the Corporate Internet Use policy to do so. The HTML source used to define this page is provided below.
15 <body> <p align=center><text align=center><b><span style='color:red'><h2>attention!</h2></ span></b></p> <p><b>you are about to access the Internet from the Example Company Network.</b></p> <p>your IP address: $(client.address)<br> Your username: $(user)<br></p> <p>you must agree to the Example Company Corporate Internet Use policy before accessing the Internet. <br> We have a common-sense Internet use policy. <br> Obscene, foul, or pornographic sites are not to be visited while at work.<br> Personal shopping, browsing, or communications are discouraged.<br> Any abuse of this professional, common sense policy may result in disciplinary action, up to and including termination.<br> Please read the entire policy in the Company Handbook.</p> <p>if you agree to the Corporate Internet Use policy, please click <a href="$(exception.details)" onclick="accept();">i agree</a>, to be connected.<br> <p>for any comments <a href="mailto:support@example.com?subject=corporate Internet Use Policy">Employee Services</a></p> <p><b>please NOTE:</b> Internet usage is routinely monitored and logged.<br> Content filtering and virus scanning are applied. </p> </body> To implement this compliance policy with a Web access layer in the VPM: 1 Use a negated Destination IP Address/Subnet destination object to match the entire Internet; see Defining Internet Access for details. 2 Use the Notify User action object and do the following: a. Paste into the Body option the HTML code given above, modified appropriately. b. Select the Notify once for all hosts option (for the page to display only once per user). c. Leave the Notify users again option at the default. To specify a user or group for the policy, add a Source object. To specify a time of day restriction for the policy, add a Time object. Conclusion The Blue Coat ProxySG provides a security administrator with the ability to notify their user community about access to various Web sites, system maintenance schedules, and Corporate Internet Use policies. Policies can be designed to display only once; for example, upon first Internet access attempt; or at a set interval. Policies can be triggered for only a particular user, user group, or during specific times of day. Blue Coat Systems, Inc. Corporate Headquarters Sunnyvale, CA USA // EMEA Headquarters Hampshire, UK // APAC Headquarters Hong Kong // Copyright 2009 Blue Coat Systems, Inc. All rights reserved worldwide. No part of this document may be reproduced by any means nor translated to any electronic medium without the written consent of Blue Coat Systems, Inc. Specifications are subject to change without notice. Information contained in this document is believed to be accurate and reliable, however, Blue Coat Systems, Inc. assumes no responsibility for its use. Blue Coat, ProxySG, PacketShaper, ProxyClient and BlueSource are registered trademarks of Blue Coat Systems, Inc. in the U.S. and worldwide. All other trademarks mentioned in this document are the property of their respective owners. v.tb-create_notification_policies-v3-0409
Implementing Exception Pages
Technical Brief: Implementing Exception Pages Implementing Exception Pages SGOS 5 Series Developed using SGOS 5.3.1.4 What are Exception Pages? Exception pages are Web pages (messages sent to users under
More informationReverse Proxy with SSL - ProxySG Technical Brief
SGOS 5 Series Reverse Proxy with SSL - ProxySG Technical Brief What is Reverse Proxy with SSL? The Blue Coat ProxySG includes the functionality for a robust and flexible reverse proxy solution. In addition
More informationDownloading and Configuring WebFilter
Downloading and Configuring WebFilter What is URL Filtering? URL filtering is a type of transaction content filtering that limits a user s Web site access through a policy that is associated with a specific
More informationProxySG ICAP Integration
ProxySG ICAP Integration Blue Coat s proxies can utilize the Internet Content Adaptation Protocol (ICAP) to hand off HTTP requests and/or responses to an external server for configured processing and transformation.
More informationLDAP Authentication and Authorization
LDAP Authentication and Authorization What is LDAP Authentication? Today, the network can include elements such as LANs, WANs, an intranet, and the Internet. Many enterprises have turned to centralized
More informationProxySG TechBrief Enabling Transparent Authentication
ProxySG TechBrief Enabling Transparent Authentication What is Transparent Authentication? Authentication is a key factor when defining a web access policy. When the Blue Coat ProxyxSG is configured for
More informationBlue Coat Security First Steps Solution for Integrating Authentication
Solution for Integrating Authentication using IWA Direct SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
More informationProxySG TechBrief Downloading & Configuring Web Filter
ProxySG TechBrief Downloading & Configuring Web Filter What is Content Filtering? URL filtering is the process of limiting a user s Web site access through a policy that is associated with a specific URL
More informationProxySG TechBrief Implementing a Reverse Proxy
ProxySG TechBrief Implementing a Reverse Proxy What is a reverse proxy? The Blue Coat ProxySG provides the basis for a robust and flexible Web communications solution. In addition to Web policy management,
More informationBlue Coat Security First Steps Solution for Controlling Web Applications
Blue Coat Security First Steps Solution for Controlling Web Applications SGOS 6.5 Third Party Copyright Notices 2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,
More informationBlue Coat Security First Steps Solution for Controlling HTTPS
Solution for Controlling HTTPS SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE,
More informationHTTPS HTTP. ProxySG Web Server. Client. ProxySG TechBrief Reverse Proxy with SSL. 1 Technical Brief
ProxySG TechBrief Reverse Proxy with SSL What is Reverse Proxy with SSL? The Blue Coat ProxySG includes the basis for a robust and flexible reverse proxy solution. In addition to web policy management,
More informationBlue Coat Security First Steps Solution for Integrating Authentication Using LDAP
Solution for Integrating Authentication Using LDAP SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
More informationISA Server Plugins Setup Guide
ISA Server Plugins Setup Guide Secure Web (Webwasher) Version 1.3 Copyright 2008 Secure Computing Corporation. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationContact Information. Document Number: 231-02909 Document Revision: SSL Proxy Deployment Guide SGOS 5.1.4
Contact Information Blue Coat Systems Inc. 420 North Mary Ave Sunnyvale, CA 94085-4121 http://www.bluecoat.com/support/contact.html bcs.info@bluecoat.com http://www.bluecoat.com For concerns or feedback
More informationProxySG TechBrief LDAP Authentication with the ProxySG
ProxySG TechBrief LDAP Authentication with the ProxySG What is LDAP Authentication? Today, the network can include elements such as LANs, WANs, an intranet, and the Internet. Many enterprises have turned
More informationWatchGuard QMS End User Guide
WatchGuard QMS End User Guide WatchGuard QMS Overview The WatchGuard QMS device enables spam messages from the WatchGuard XCS to be directed to a local quarantine area that provides spam storage for each
More informationBlue Coat Security First Steps Transparent Proxy Deployments
Transparent Proxy Deployments SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE,
More informationSuperLumin Nemesis. Administration Guide. February 2011
SuperLumin Nemesis Administration Guide February 2011 SuperLumin Nemesis Legal Notices Information contained in this document is believed to be accurate and reliable. However, SuperLumin assumes no responsibility
More informationBlue Coat Systems. Reference Guide. SSL Proxy. For SGOS 5.3.1
Blue Coat Systems Reference Guide SSL Proxy For SGOS 5.3.1 Contact Information Blue Coat Systems Inc. 420 North Mary Ave Sunnyvale, CA 94085-4121 http://www.bluecoat.com/support/contactsupport http://www.bluecoat.com
More informationBlue Coat Systems. Reference Guide. SSL Proxy. For SGOS 5.5.x and later
Blue Coat Systems Reference Guide SSL Proxy For SGOS 5.5.x and later Contact Information Americas: Blue Coat Systems Inc. 410 North Mary Ave Sunnyvale, CA 94085-4121 Rest of the World: Blue Coat Systems
More informationUsing Device Discovery
2 CHAPTER You can use Active Discovery to scan your network for new monitors (Active Monitors and Performance Monitors) and devices on a regular basis. Newly discovered items are added to the Active Discovery
More informationUser Identification and Authentication
User Identification and Authentication Vital Security 9.2 Copyright Copyright 1996-2008. Finjan Software Inc.and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included
More informationBlue Coat Security First Steps Solution for Deploying an Explicit Proxy
Blue Coat Security First Steps Solution for Deploying an Explicit Proxy SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,
More informationSophos Mobile Control Installation guide. Product version: 3
Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External
More informationAstaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client
Astaro Security Gateway V8 Remote Access via L2TP over IPSec Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If
More informationBest Practices for Controlling Skype within the Enterprise. Whitepaper
Best Practices for Controlling Skype within the Enterprise Whitepaper INTRODUCTION Skype (rhymes with ripe ) is a proprietary peer-to-peer (P2P) voice over Internet protocol (VoIP) network, founded by
More informationDeploying Layered Email Security. What is Layered Email Security?
Deploying Layered Email Security This paper is intended for users of Websense Email Security who want to add Websense Hosted Email Security to deploy a layered email security solution. In this paper: Review
More informationBlue Coat ProxySG Authentication Guide. SGOS 6.5.x
Blue Coat ProxySG Authentication Guide SGOS 6.5.x 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE, CROSSBEAM, K9,
More informationvcloud Director User's Guide
vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
More informationContent Filtering Client Policy & Reporting Administrator s Guide
Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
More informationWebSpy Vantage Ultimate 2.2 Web Module Administrators Guide
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see
More informationCA Technologies SiteMinder
CA Technologies SiteMinder Agent for Microsoft SharePoint r12.0 Second Edition This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to
More informationMadCap Software. Upgrading Guide. Pulse
MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
More informationExecutive Summary. What is Authentication, Authorization, and Accounting? Why should I perform Authentication, Authorization, and Accounting?
Executive Summary As the leader in Wide Area Application Delivery, Blue Coat products accelerate and secure applications within your WAN and across the Internet. Blue Coat provides a robust and flexible
More informationSafeNet Authentication Service
SafeNet Authentication Service All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the sole right to
More informationThreat Containment for Facebook
Threat Containment for Facebook Based on statistics for more than 62M users in 2009, the Blue Coat WebPulse cloud service ranked social networking as the number one most requested web category, surpassing
More informationSonicWALL Email Security Quick Start Guide. Version 4.6
SonicWALL Email Security Quick Start Guide Version 4.6 Quick Start Guide - Introduction This document guides you through the most basic steps to set up and administer SonicWALL Email Security. For more
More informationCloud Director User's Guide
Cloud Director 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
More informationSSL Proxy Deployment Guide
SSL Proxy Deployment Guide SGOS 6.5 and later Version: 02-07.14.15 - 2 - Copyrights 2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS,
More informationDeploying NetScaler Gateway in ICA Proxy Mode
Deploying NetScaler Gateway in ICA Proxy Mode Deployment Guide This deployment guide defines the configuration required for using the NetScaler Gateway in ICA Proxy Mode. Table of Contents Introduction
More informationM86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: 5.0.00 Document Version: 02.01.12
M86 Web Filter USER GUIDE for M86 Mobile Security Client Software Version: 5.0.00 Document Version: 02.01.12 M86 WEB FILTER USER GUIDE FOR M86 MOBILE SECURITY CLIENT 2012 M86 Security All rights reserved.
More informationBlue Coat Security First Steps Solution for Recording and Reporting Employee Web Activity
Solution for Recording and Reporting Employee Web Activity SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
More informationSophos Mobile Control as a Service Startup guide. Product version: 3.5
Sophos Mobile Control as a Service Startup guide Product version: 3.5 Document date: August 2013 Contents 1 About this guide...3 2 What are the key steps?...4 3 First login...5 4 Change your administrator
More informationNovell Filr 1.0.x Mobile App Quick Start
Novell Filr 1.0.x Mobile App Quick Start February 2014 Novell Quick Start Novell Filr allows you to easily access all your files and folders from your desktop, browser, or a mobile device. In addition,
More informationGoogle Apps Deployment Guide
CENTRIFY DEPLOYMENT GUIDE Google Apps Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of your corporate
More informationSmartLink for Lotus Notes User Guide
SmartLink for Lotus Notes User Guide Copyright 1998-2006 E-Z Data, Inc. All Rights Reserved No part of this documentation may be copied, reproduced, or translated in any form without the prior written
More informationVirtual Data Centre. User Guide
Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10
More informationNETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationVirtual Web Appliance Setup Guide
Virtual Web Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance This guide describes the procedures for installing a Virtual Web Appliance. If you are installing
More informationSnare for Firefox Snare Agent for the Firefox Browser
Snare Agent for the Firefox Browser InterSect Alliance International Pty Ltd Page 1 of 11 Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect Alliance Pty Ltd shall not be
More informationIWA AUTHENTICATION FUNDAMENTALS AND DEPLOYMENT GUIDELINES
IWA AUTHENTICATION FUNDAMENTALS AND DEPLOYMENT GUIDELINES TECHNICAL BRIEF INTRODUCTION The purpose of this document is to explain how Integrated Windows Authentication (IWA) works with the ProxySG appliance,
More informationwww.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013
www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
More informationSSL VPN. Virtual Appliance Installation Guide. Virtual Private Networks
SSL VPN Virtual Appliance Installation Guide Virtual Private Networks C ONTENTS Introduction... 2 Installing the Virtual Appliance... 2 Configuring Appliance Operating System Settings... 3 Setting up the
More informationSecure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01
Secure Web Service - Hybrid Policy Server Setup Release 9.2.5 Manual Version 1.01 M86 SECURITY WEB SERVICE HYBRID QUICK START USER GUIDE 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange,
More informationDeploying the SSL Proxy
Blue Coat Systems Deployment Guide Deploying the SSL Proxy For SGOS 5.1.4 Contact Information Blue Coat Systems Inc. 420 North Mary Ave Sunnyvale, CA 94085-4121 http://www.bluecoat.com/support/contact.html
More informationCA Unified Infrastructure Management Server
CA Unified Infrastructure Management Server CA UIM Server Configuration Guide 8.0 Document Revision History Version Date Changes 8.0 September 2014 Rebranded for UIM 8.0. 7.6 June 2014 No revisions for
More informationTo begin, visit this URL: http://www.ibm.com/software/rational/products/rdp
Rational Developer for Power (RDp) Trial Download and Installation Instructions Notes You should complete the following instructions using Internet Explorer or Firefox with Java enabled. You should disable
More informationVirtual Managment Appliance Setup Guide
Virtual Managment Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance As an alternative to the hardware-based version of the Sophos Web Appliance, you can deploy
More informationBlackShield ID Agent for Remote Web Workplace
Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,
More informationNovell Identity Manager
AUTHORIZED DOCUMENTATION Manual Task Service Driver Implementation Guide Novell Identity Manager 4.0.1 April 15, 2011 www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with
More informationSophos Mobile Control Installation guide. Product version: 3.5
Sophos Mobile Control Installation guide Product version: 3.5 Document date: July 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...10 4 External
More informationWindows Server Update Services 3.0 SP2 Step By Step Guide
Windows Server Update Services 3.0 SP2 Step By Step Guide Microsoft Corporation Author: Anita Taylor Editor: Theresa Haynie Abstract This guide provides detailed instructions for installing Windows Server
More informationLogLogic Blue Coat ProxySG Syslog Log Configuration Guide
LogLogic Blue Coat ProxySG Syslog Log Configuration Guide Document Release: September 2011 Part Number: LL600070-00ELS100000 This manual supports LogLogic Blue Coat ProxySG Release 1.0 and later, and LogLogic
More informationIntegrated Cloud Environment Box User s Guide
Integrated Cloud Environment Box User s Guide 2012-2015 Ricoh Americas Corporation It is the reader's responsibility when discussing the information contained this document to maintain a level of confidentiality
More informationSetting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
More informationKaseya Server Instal ation User Guide June 6, 2008
Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
More information1 You will need the following items to get started:
QUICKSTART GUIDE 1 Getting Started You will need the following items to get started: A desktop or laptop computer Two ethernet cables (one ethernet cable is shipped with the _ Blocker, and you must provide
More informationSTATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS
Notes: STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS 1. The installation of the STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation
More informationDEPLOYMENT GUIDE Version 1.0. Deploying F5 with the Oracle Fusion Middleware SOA Suite 11gR1
DEPLOYMENT GUIDE Version 1.0 Deploying F5 with the Oracle Fusion Middleware SOA Suite 11gR1 Introducing the F5 and Oracle Fusion Middleware SOA Suite configuration Welcome to the F5 and Oracle Fusion Middleware
More informationHow to Configure a Secure Connection to Microsoft SQL Server
How to Configure a Secure Connection to Microsoft SQL Server 1993-2015 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying,
More informationStep-by-Step Configuration
Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local
More informationSiteminder Integration Guide
Integrating Siteminder with SA SA - Siteminder Integration Guide Abstract The Junos Pulse Secure Access (SA) platform supports the Netegrity Siteminder authentication and authorization server along with
More informationCA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
More informationLogLogic Cisco IPS Log Configuration Guide
LogLogic Cisco IPS Log Configuration Guide Document Release: March 2011 Part Number: LL600072-00ELS090000 This manual supports LogLogic Cisco IPS Release 1.0 and later, and LogLogic Software Release 4.9.1
More informationInstalling and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationSetting Up SSL on IIS6 for MEGA Advisor
Setting Up SSL on IIS6 for MEGA Advisor Revised: July 5, 2012 Created: February 1, 2008 Author: Melinda BODROGI CONTENTS Contents... 2 Principle... 3 Requirements... 4 Install the certification authority
More informationAvalanche Site Edition
Avalanche Site Edition Version 4.8 avse ug 48 20090325 Revised 03/20/2009 ii Copyright 2008 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,
More informationProxy Forwarding Access Method
Proxy Forwarding Access Method Version 6.8.5/Doc Revision: 02/26/16 Blue Coat Web Security Service/Page 2 Proxy Fowarding Access Method/Page 3 Copyrights 2016 Blue Coat Systems, Inc.All rights reserved.
More informationReverse Proxy Deployment Guide
Reverse Proxy Deployment Guide PDF of the Online WebGuide SGOS 6.5.x and Later Third Party Copyright Notices 2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,
More informationInstalling and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationMultiSite Manager. Setup Guide
MultiSite Manager Setup Guide Contents 1. Introduction... 2 How MultiSite Manager works... 2 How MultiSite Manager is implemented... 2 2. MultiSite Manager requirements... 3 Operating System requirements...
More informationSetting up VMware ESXi for 2X VirtualDesktopServer Manual
Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples
More informationRoomWizard Synchronization Software Manual Installation Instructions
2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System
More informationSage 200 Web Time & Expenses Guide
Sage 200 Web Time & Expenses Guide Sage (UK) Limited Copyright Statement Sage (UK) Limited, 2006. All rights reserved If this documentation includes advice or information relating to any matter other than
More informationHELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE
HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means
More informationIntegrated Cloud Environment Scan to Oracle Cloud User s Guide
Integrated Cloud Environment Scan to Oracle Cloud User s Guide 2012-2015 Ricoh Americas Corporation It is the reader's responsibility when discussing the information contained this document to maintain
More informationSoftware Version 1.0 ConnectKey TM Share to Cloud April 2013. Xerox ConnectKey Share to Cloud User / Administrator s Guide
Software Version 1.0 ConnectKey TM Share to Cloud April 2013 Xerox ConnectKey Share to Cloud User / Administrator s Guide 2013 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, and Xerox
More informationDIGIPASS Authentication for Check Point Security Gateways
DIGIPASS Authentication for Check Point Security Gateways With IDENTIKEY Server 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 38 Disclaimer Disclaimer of Warranties and
More informationProxy Forwarding Access Method
Proxy Forwarding Access Method Version 6.8.3/Doc Revision: 12/17/15 Blue Coat Web Security Service Proxy Fowarding Access Method Copyrights 2015 Blue Coat Systems, Inc.All rights reserved. BLUE COAT, PROXYSG,
More informationCA Spectrum and CA Embedded Entitlements Manager
CA Spectrum and CA Embedded Entitlements Manager Integration Guide CA Spectrum Release 9.4 - CA Embedded Entitlements Manager This Documentation, which includes embedded help systems and electronically
More informationwww.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012
www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,
More informationBlue Coat Systems. Client Manager Redundancy for ProxyClient Deployments
Blue Coat Systems Client Manager Redundancy for ProxyClient Deployments Copyright 1999-2013 Blue Coat Systems, Inc. All rights reserved worldwide. No part of this document may be reproduced by any means
More informationSet Up a VM-Series Firewall on the Citrix SDX Server
Set Up a VM-Series Firewall on the Citrix SDX Server Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa
More informationApp Orchestration 2.5
Configuring NetScaler 10.5 Load Balancing with StoreFront 2.5.2 and NetScaler Gateway for Prepared by: James Richards Last Updated: August 20, 2014 Contents Introduction... 3 Configure the NetScaler load
More informationBlue Coat Security First Steps. Solution for HTTP Object Caching
Solution for HTTP Object Caching Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE, CROSSBEAM,
More informationSecure Web Appliance. SSL Intercept
Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
More informationManufacturing Representative SSL VDM Login User s Guide
June 12 2008 Ver. 1.5 KEMET Corporation Manufacturing Representative SSL VDM Login User s Guide This document is a guide to assist a Manufacturing Representative (MFG REP) to connect and login to the SSL
More informationAventail Connect Client with Smart Tunneling
Aventail Connect Client with Smart Tunneling User s Guide Windows v8.7.0 1996-2006 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,
More informationAgent Configuration Guide
SafeNet Authentication Service Agent Configuration Guide SAS Agent for Microsoft Internet Information Services (IIS) Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright
More information