Blue Coat Security First Steps Solution for Recording and Reporting Employee Web Activity
|
|
- Rudolph McKenzie
- 7 years ago
- Views:
Transcription
1 Solution for Recording and Reporting Employee Web Activity SGOS 6.5
2 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE, CROSSBEAM, K9, DRTR, MACH5, PACKETWISE, POLICYCENTER, PROXYAV, PROXYCLIENT, SGOS, WEBPULSE, SOLERA NETWORKS, DEEPSEE, DS APPLIANCE, SEE EVERYTHING. KNOW EVERYTHING., SECURITY EMPOWERS BUSINESS, BLUETOUCH, the Blue Coat shield, K9, and Solera Networks logos and other Blue Coat logos are registered trademarks or trademarks of Blue Coat Systems, Inc. or its affiliates in the U.S. and certain other countries. This list may not be complete, and the absence of a trademark from this list does not mean it is not a trademark of Blue Coat or that Blue Coat has stopped using the trademark. All other trademarks mentioned in this document owned by third parties are the property of their respective owners. This document is for informational purposes only. BLUE COAT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. BLUE COAT PRODUCTS, TECHNICAL SERVICES, AND ANY OTHER TECHNICAL DATA REFERENCED IN THIS DOCUMENT ARE SUBJECT TO U.S. EXPORT CONTROL AND SANCTIONS LAWS, REGULATIONS AND REQUIREMENTS, AND MAY BE SUBJECT TO EXPORT OR IMPORT REGULATIONS IN OTHER COUNTRIES. YOU AGREE TO COMPLY STRICTLY WITH THESE LAWS, REGULATIONS AND REQUIREMENTS, AND ACKNOWLEDGE THAT YOU HAVE THE RESPONSIBILITY TO OBTAIN ANY LICENSES, PERMITS OR OTHER APPROVALS THAT MAY BE REQUIRED IN ORDER TO EXPORT, RE-EXPORT, TRANSFER IN COUNTRY OR IMPORT AFTER DELIVERY TO YOU. Americas: Blue Coat Systems, Inc. 420 N. Mary Ave. Sunnyvale, CA Rest of the World: Blue Coat Systems International SARL 3a Route des Arsenaux 1700 Fribourg, Switzerland
3 Contents Solution: Record and Report Employee Web Activity 4 Configure FileZilla FTP Server 4 Enable Access Logging 5 Upload Access Logs to the Reporter Server 6 Create a Reporter Log Source 9 View User Web Activity Reports 12 User Behavior 13 Security 13 Web Application Reports 14 Access Logging Troubleshooting 15 Why is the ProxySG uploading logs so frequently? 15 3
4 Record and Report Employee Web Activity Solution: Record and Report Employee Web Activity As employees browse the Web, the ProxySG appliance records and stores browse activity data in Access Logs. These logs can be sent to a reporting application, such as Blue Coat Reporter, which provides graphical representations of Web use in your enterprise. Your IT and Human Resource personnel can analyze these reports and adjust Web use, application, and network policies accordingly. This solution provides steps to configure the ProxySG to upload (FTP) two Access Log formats (HTTP/S and streaming) for use with Blue Coat Reporter. This procedure assumes that you have a supported and dedicated Windows or Linux server configured and ready to receive uploaded Access Logs. If you require information about additional or custom formats, consult the Access Logging chapters in the Blue Coat SGOS Administration Guide for your SGOS version. 1. Verify that you have the Reporter location information recorded. Element Value Staging Server Type Windows IP Address Username Password Folder Linux Dedicated, stand-alone server? Yes No (requires FTP software) 2. Configure FileZilla FTP Server Only required if you do not have an FTP access log staging server; for example, you installed Reporter on the same server that receives the logs. 3. Enable Access Logging. 4. Upload Access Logs to the Reporter Server. 5. Create a Reporter Log Source. 6. View User Web Activity Reports. Configure FileZilla FTP Server If you do not have an FTP server that can serve as the staging server for the Access Logs, you can install open source FTP server software on the same server on which Reporter is installed. You can use any similar software, but for demonstration purposes, this section describes the FileZilla FTP server software. 4
5 1. Download the Filezilla FTP server from Note: This link is valid as of the date this document was published. The URLs are subject to change without notice. If the link doesn't work, use your preferred search engine to find the FileZilla FTP server. 2. Install the Filezilla FTP server software. Accept the application defaults. 3. Create a directory to stage Access Logs. For this example, the files are staged in the D:\ftp\proxysg\ directory. 4. In the Filezilla server window, click Edit > Users. This displays the current users (none), setup, and configure new users. 5. On the General page (left-side area), click Add under Users. In the pop-up dialog, enter the FTP account name. This example uses proxysg as the account name. Because the group is optional, you are not required to make that user a member of a group. 6. Perform the following. a. In the Account Settings area, verify that Enable Account is enabled. b. Select Password and enter a password for the newly-created proxysg. For security purposes, make the password complex. This example uses bluecoat as the password. 7. Perform the following. a. Click the Shared Folders page. b. Click Add. c. Walk the file system directory tree to D:\ftp\proxysg\ and click OK. d. For files and directories, give that user all file rights (Read, Write, Delete, Append) and all directory rights (Create, Delete, List, + Subdirs) to D:\ftp\proxysg\. Verify that D:\ftp\proxysg\ has a capital H next to it. If not, highlight the directory and click Set as home dir to make that is the home directory for that user. When the proxysg FTP user logs into the FTP server, the root directory for that user is D:\ftp\proxysg\ and that user cannot go any higher in the directory tree. e. Click OK to save the user. Note: The Speed Limits and IP Filter pages are optional and not discussed in this section. You can implement them at your own discretion; however, Blue Coat recommends that you not implement any speed limits or IP filters until after everything else is configured and running correctly. Next Step: Enable Access Logging Enable Access Logging When you enable Access Logging, the ProxySG appliance begins to record all employee-initiated web activity into a series of compressed files. The bcreportermain_v1 Access Log format is for HTTP/S traffic and the bcreporterstreaming_v1 format is for streaming media traffic. These formats contain, among others, the fields that provide user identification, date/time, web content category, and actions taken (such as policy verdict). 1. Log in to the ProxySG Management Console. 2. Verify that the main log defaults to the bcreportermain_v1 format. 5
6 Record and Report Employee Web Activity a. Select Configuration > Access Logging > Logs > General Settings. b. Select main as the Log type. c. Verify that the Log Format defaults to bcreportermain_v1. d. If it does not, select main and click Apply. 3. If you require reports for streaming media traffic, repeat Step 2. Select streaming as the Log and verify that the default is bcreporterstreaming_v1. 4. Begin Access Log recording. a. Select Configuration > Access Logging > General > Default Logging. b. Select Enable Access Logging and click Apply. Next Step: Upload Access Logs to the Reporter Server Upload Access Logs to the Reporter Server Configure the ProxySG appliance to upload the Access Log files to the server that you have dedicated for Blue Coat Reporter. Tip Consult your planning form if you have one, or if someone in your organization provided you with one. 6
7 1. Log in to the ProxySG Management Console. 2. Select Configuration > Access Logging > Logs > Upload Client. 3. Configure the FTP upload client for the main (bcreportermain_v1) access log. a. From the Log drop-down, select main. b. In the Upload Client field, select FTP Client. Note: Do not select Blue Coat Reporter Client. This client is for direct stream of data into Reporter, which does not retain the raw access logs. For more information, consult the Blue Coat Reporter Initial Configuration Guide. c. Click Settings. The Management Console displays the FTP Client Settings dialog. 4. Enter the access credentials to the FTP server that stages the Reporter logs. 7
8 Record and Report Employee Web Activity a. Enter the Host server's IP address. Only change the Port if it uses a different one. b. Enter the Path, which is the destination of the log files. For example, create a folder that indicates where this gateway ProxySG is located or what set of users it includes. This helps you with folder management on the server. c. Enter the username required to access the server. d. If a password is also required, click Change Primary Password. In the Change Primary Password dialog, enter the credentials and click OK. e. Click OK. 5. If you have a backup staging server configured, repeat Steps 3 and 4; in Step 4, select Alternate FTP Server. 6. In the Transmission Parameters area, select the Save the log file as: gzip file option. Blue Coat recommends this option, as most deployments process multiple gigabytes (Gb) of data. 7. Click Apply. 8. Test the FTP connection. a. In the Upload Client area, click Test Upload. b. In the Management Console, select Statistics > Access Logging > Upload Status. c. Verify upload client connection or troubleshoot the connection as necessary. d. After you verify the connection, delete the test file. 9. To begin uploading the log files to the Reporter staging server, select Configuration > Access Logging > Logs > Upload Schedule. 8
9 a. From the Log drop-down list, select main. b. (Optional) If employee-generated traffic has already occurred, click Upload Now to FTP the logs that are currently stored to the Reporter server. This allows you to immediately set up and test the Reporter log source. c. Select to upload the logs periodically. d. Specify when the ProxySG appliance initiates the FTP upload. Blue Coat recommends once per day during a time when employees are least likely to be generating traffic. e. Click Apply. 10. If you are also sending streaming media access logs, repeat Steps 3 through 9. In Step 3a, select streaming as the Log. Next Step: Create a Reporter Log Source. Create a Reporter Log Source This topic is a sub-set of the initial Blue Coat Reporter initial configuration process. It demonstrates how to configure a database and log source, which reads access logs uploaded from a gateway ProxySG appliance to the Reporter staging server. 9
10 Record and Report Employee Web Activity This procedure assumes that you have installed the Reporter application and have admin privileges. If you require the full installation procedure, consult the Blue Coat Reporter 9.4 Initial Configuration Guide. 1. Log in to the Blue Coat Reporter application. 2. On the General Settings page, select Data Settings > Databases. 3. Click New. Reporter displays the Create New Database wizard. 4. On the initial Set Type screen, select ProxySG (main); click Next. 5. Enter a Database Name. A meaningful name aids with account management. For example, if this database will build from Access Logs from a specific region or location, enter a related name. Click Next. 6. Specify the Log Sources. a. Click New Log Source. The wizard switches to the Create New Log Source page. b. The Set Type log source option depends on where you installed the Reporter application. If you installed Reporter on the same server as the staging server, select Local File Source. If you installed Reporter on a separate machine, select FTP Server Source. Click Next. c. Enter a Log Source Name. Again, a meaningful name helps with management. d. The Set Location page varies depending on whether you selected Local or FTP source. For the Local File Source, browse to the folder location. For the FTP File Source, enter the FTP server information. 10
11 Click Next. d.1. Enter the Hostname or IP address of the server and the Port number. d.2 Enter the Username and Password required to access the server. d.3 Enter the Directory Path where the Access Log folder(s) exist. e. On the Set Log File Check Frequency page, specify how often Reporter checks for Access Log files that it has not yet processed. Select Custom Schedule. Use the drop-down to select a periodic time frame. If you are performing a test, select the Once option and set a time for a few minutes from now; or, select Periodic and set for every few minutes. When you are satisfied with testing, you can return to this log source and edit the schedule. Otherwise, select how often the check occurs. For example, set Reporter to check every day during non-use hours. 11
12 Record and Report Employee Web Activity If you leave the Default option selected, you can configure a global schedule for all sources in the database. Step 7 below describes what occurs; for now, click Next. f. On the Set Post Processing Action page, specify what happens to the Access Log files after Reporter processes them. Rename: Append '.done' to filename After Reporter processes a log file, it adds.done to the existing.log or.gz suffix. When you browse the directories with a file viewer, this is how you know when files have been processed. Be advised, if you delete the.done suffix, Reporter will reprocess the log file. Move to folder After Reporter processes a log file, the file moves to the specified directory (or subdirectory tree if Process Subdirectories was selected on the Set Location wizard page). Should you ever require a reprocessing of log files, you can copy the files back to the directory. Remove: Delete log file After Reporter processes a log file, the file is deleted. Select this option if you are certain you will never have the need to process those log files again. Click Done. 7. The wizard returns to the Set Log Sources wizard screen and displays the new log source. At this time, you can add another log source; for example, you also configured the ProxySG appliance to upload a streaming media data Access Log and you want the data from those logs to be added to this database. Click New Log Source and repeat Step 6. Click Next. Note: Notice the Default check for new log files option. If you do not specify a custom schedule for how often Reporter checks for new logs to this specific log source (Step 6.e), the check occurs according to this default schedule. The per-log source schedules override this default. 8. To force Reporter to stop generating report data for dates beyond a specified time frame, select Expire database data older than, specify when data expires, and select the Frequency (when Reporter checks the database). For example, if the database contains log files processed with March 1st as the earliest date, the setting is 30 days, and the current date is April 1st, Reporter no longer generates and displays report data for March 1st. (Reporter deletes the data from the database.) Click Next. 9. For the Set Directory options, the defaults are sufficient. Click Done. Reporter displays the new database and log source information and begins to build the database (assuming that you have uploaded, unprocessed Access Log files in the specified directories. Next Step: View User Web Activity Reports View User Web Activity Reports After you configure the ProxySG appliance to record and send Access Logs to the Reporter server and configure the Reporter log source, you can view various reports (following a period of browsing by users and after the first scheduled Access Log transfer). 12
13 You can click the Help (?) button on the Reports page to display brief descriptions of each report. The following are of interest. User Behavior Web Browsing per Category When an employee requests (browses) to a website, that site is rated and matched to a category (for example, news/media, business/economy, mature, and so on). This report lists all of the website categories that were browsed by employees, sorted by the highest Page Views per category. Intended audience: HR; persons who are interested in viewing individual user Web browsing activity. Use Case You review the report and notice that the Shopping category results are large, which indicates that employees are consuming too much time on non work-related websites. The person who manages Web access policy can adjust the policy or provide a coaching mechanism for employees. Web Browsing per User This report displays every user reported in the processed access logs who requested Web content, sorted by the total number of requested pages. Security Intended audience: HR; persons who are interested in viewing individual user Web browsing activity. Use Case In reviewing this page, you notice two users brian.underwater and christopher.lewis requested a noticeable higher number of websites than other users. Their position within the enterprise might warrant such activity, but they might also need to be coached on company Web use policy. Blocked Web Sites This report lists the websites that users attempted to access but were denied by Web-use policies. By default, Reporter lists each site ranked by the highest number of requested Web pages. Intended audience: IT; persons who are responsible for creating policy that enforces the company's Web use policies. Use Case If you have created and installed policies that block questionable website categories that are not deemed appropriate for your particular enterprise, you might on occasion generate this report to review what specific sites are constantly requested by users (and subsequently denied). The constant presence of specific inappropriate website requests might require a severe coaching mechanism or other communicated bulletin to the employees. Potential Malware Infected Clients This report lists all client IP addresses that might be infected by malicious content. This data is derived by the URLs requested by each client. By default, Reporter lists each IP address, sorted by the number of requests to possible URLs that are known sources of malware/spyware. Intended audience: IT; security team members can use this report as a to-do list to visit infected machines and run anti-malware cleaners. Use Case You have discovered that user browsing activity is allowing malware to infiltrate your network and you want to see how many users are responsible. For example, one user may be responsible for 33% of the malware invasion. For further analysis, you apply a filter to review the sites that contained the potential malware. The filtered report displays the top malware-source sites, ranked by HTTP requests. 13
14 Record and Report Employee Web Activity Web Application Reports Web Application Detailed Report The data in this report displays detailed information on Web applications (social networking, blogging, tagging) sites based on the page view count. You can change the number of records to be displayed by changing the filter conditions in Report Options. Intended audience: IT; persons who are responsible for creating policy that enforces the company's Web use policies. Use Case Web applications are critical for successful business, but can also introduce many time-wasting elements, potential security risks, and excessive bandwidth use. IT wants to monitor who is using what applications and adjust policies accordingly, such as allow an application but block file downloads or games. 14
15 Access Logging Troubleshooting Why is the ProxySG uploading logs so frequently? 15 Why is the ProxySG uploading logs so frequently? Problem: The ProxySG appliance is uploading logs more frequently than expected. Resolution: Access Logs accrue on the ProxySG appliance hard drive and eventually reach storage capacity. For the Access Logging solution in this WebGuide, Blue Coat recommends configuring the ProxySG appliance to trigger an upload ahead of schedule when data reaches a specified amount of megabytes. 1. Select Configuration > Access Logging > General > Global Settings. 2. The default Global Log File Limits values will vary depending on the capacity of each gateway ProxySG model. Consult the sizing guide for information. To trigger a log upload rather than halt all logging, the second value must be lower than the first value. 3. Click Apply. Tip To prevent the Access Logs that do not have a configured upload client from triggering an early upload threshold, edit the default logs for each protocol that do not require uploading. Set them to <None> from the Configuration > Access Logging > Logs > Upload Client tab. 15
Blue Coat Security First Steps. Solution for HTTP Object Caching
Solution for HTTP Object Caching Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE, CROSSBEAM,
More informationDecrypt Inbound SSL Traffic for Passive Security Device (D-H)
Decrypt Inbound SSL Traffic for Passive Security Device (D-H) SSL Visibility Appliance First Steps Guide Third Party Copyright Notices 2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG,
More informationBlue Coat Security First Steps Solution for Deploying an Explicit Proxy
Blue Coat Security First Steps Solution for Deploying an Explicit Proxy SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,
More informationBlue Coat Security First Steps Solution for Controlling HTTPS
Solution for Controlling HTTPS SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE,
More informationBlue Coat Security First Steps Solution for Controlling Web Applications
Blue Coat Security First Steps Solution for Controlling Web Applications SGOS 6.5 Third Party Copyright Notices 2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,
More informationBlue Coat Security First Steps Transparent Proxy Deployments
Transparent Proxy Deployments SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE,
More informationWeb Application Classification Feature
Web Application Classification Feature PacketShaper 11.5 Third Party Copyright Notices 2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
More informationBlue Coat ICS PROTECTION Scanner Station Version
Blue Coat ICS PROTECTION Scanner Station Version USB Malware Defense for Industrial Computers User Guide, version 5.3.1 Contents Contents 1. ABOUT... 3 1.1. About this Guide... 3 1.2. System Requirements...
More informationBlue Coat Security First Steps Solution for Streaming Media
Blue Coat Security First Steps Solution for Streaming Media SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
More informationBlue Coat Security First Steps Solution for Integrating Authentication Using LDAP
Solution for Integrating Authentication Using LDAP SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
More informationBlue Coat Security First Steps Solution for Integrating Authentication
Solution for Integrating Authentication using IWA Direct SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
More informationInitial Configuration Guide
Initial Configuration Guide For Virtual Appliances Management Center 1.3.2.1 Version 1.3.2.1 Third Party Copyright Notices Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER,
More informationBlue Coat Cloud Data Protection Server Administration Guide
Blue Coat Cloud Data Protection Server Administration Guide Software version 4.5.x September 16, 2015 2015 Blue Coat Systems, Inc. All rights reserved. Blue Coat, the Blue Coat logos, ProxySG, PacketShaper,
More informationSECURE WEB GATEWAY DEPLOYMENT METHODOLOGIES
WHITEPAPER In today s complex network architectures it seems there are limitless ways to deploy networking equipment. This may be the case for some networking gear, but for web gateways there are only
More informationBlue Coat Systems Reporter 9.x
Blue Coat Systems Reporter 9.x Initial Configuration Guide Reporter Versions 9.4.x Blue Coat Reporter 9.x Initial Configuration Guide Contact Information Americas: Blue Coat Systems Inc. 420 North Mary
More informationBlue Coat Systems. Client Manager Redundancy for ProxyClient Deployments
Blue Coat Systems Client Manager Redundancy for ProxyClient Deployments Copyright 1999-2013 Blue Coat Systems, Inc. All rights reserved worldwide. No part of this document may be reproduced by any means
More informationSecure Web Gateway Virtual Appliance Initial Configuration Guide Platform: VMware vsphere Hypervisor
Secure Web Gateway Virtual Appliance Initial Configuration Guide Platform: VMware vsphere Hypervisor SGOS 6.5.x and later i Secure Web Gateway Virtual Appliance Contact Information Americas: Blue Coat
More informationPolicy Guide. Version 6.8.2/Doc Revision: 10/23/15
Policy Guide Version 6.8.2/Doc Revision: 10/23/15 Blue Coat Web Security Service Copyrights 2015 Blue Coat Systems, Inc.All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
More informationContent Analysis System Guide
Content Analysis System Guide Version 1.1.4.1 - 2 - Content Analysis System Administration Guide Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER,
More informationReverse Proxy Deployment Guide
Reverse Proxy Deployment Guide PDF of the Online WebGuide SGOS 6.5.x and Later Third Party Copyright Notices 2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,
More informationWAN OPTIMIZATION FOR MICROSOFT SHAREPOINT BPOS
WHITEPAPER EXECUTIVE SUMMARY Microsoft SharePoint is a web-based collaboration and information-sharing platform designed as a centralized replacement for multiple web applications. SharePoint leverages
More informationBlue Coat ProxySG Authentication Guide. SGOS 6.5.x
Blue Coat ProxySG Authentication Guide SGOS 6.5.x 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE, CROSSBEAM, K9,
More informationSECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION
SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION How ThreatBLADES add real-time threat scanning and alerting to the Analytics Platform INTRODUCTION: analytics solutions have become an essential weapon
More informationIntegrating the ProxySG and ProxyAV Appliances. For SGOS 6.5 and later and AVOS 3.5 and later
Integrating the ProxySG and ProxyAV Appliances For SGOS 6.5 and later and AVOS 3.5 and later i Contact Information Americas: Blue Coat Systems Inc. 410 North Mary Ave Sunnyvale, CA 94085-4121 Rest of the
More informationBOOSTING INTERNET ACCESS LINK PERFORMANCE WITH BLUE COAT WAN OPTIMIZATION TECHNOLOGIES
PERFORMANCE WITH BLUE COAT WHITEPAPER EXECUTIVE SUMMARY Gateways to Internet traffic are facing unprecedented loads and growth rates in all types of industries and organizations due to the growth of mobile
More informationA TECHNICAL REVIEW OF CACHING TECHNOLOGIES
WHITEPAPER Over the past 10 years, the use of applications to enable business processes has evolved drastically. What was once a nice-to-have is now a mainstream staple that exists at the core of business,
More informationSetting up VMware ESXi for 2X VirtualDesktopServer Manual
Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples
More informationProxy Forwarding Access Method
Proxy Forwarding Access Method Version 6.8.5/Doc Revision: 02/26/16 Blue Coat Web Security Service/Page 2 Proxy Fowarding Access Method/Page 3 Copyrights 2016 Blue Coat Systems, Inc.All rights reserved.
More informationProxy Forwarding Access Method
Proxy Forwarding Access Method Version 6.8.3/Doc Revision: 12/17/15 Blue Coat Web Security Service Proxy Fowarding Access Method Copyrights 2015 Blue Coat Systems, Inc.All rights reserved. BLUE COAT, PROXYSG,
More informationNEXT GENERATION SECURE WEB GATEWAY: THE CORNERSTONE OF YOUR SECURITY ARCHITECTURE
: THE CORNERSTONE OF YOUR SECURITY ARCHITECTURE A CLOSER LOOK REVEALS WHY PROXY-BASED ARCHITECTURE IS UNIQUELY EFFECTIVE IN DEFENDING AGAINST WEB-BASED THREATS. The web is central to the way we work, live,
More informationIWA AUTHENTICATION FUNDAMENTALS AND DEPLOYMENT GUIDELINES
IWA AUTHENTICATION FUNDAMENTALS AND DEPLOYMENT GUIDELINES TECHNICAL BRIEF INTRODUCTION The purpose of this document is to explain how Integrated Windows Authentication (IWA) works with the ProxySG appliance,
More informationSSL Proxy Deployment Guide
SSL Proxy Deployment Guide SGOS 6.5 and later Version: 02-07.14.15 - 2 - Copyrights 2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS,
More informationInstalling and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationIIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
More informationProxySG 510/810 Series. Hard Disk Drive Installation
Blue Coat 510/810 Series Disk Drive Installation Blue Coat ProxySG 510/810 Series Hard Disk Drive Installation Section A: Before You Begin About this Document This document describes how to replace disk
More informationDownloading and Configuring WebFilter
Downloading and Configuring WebFilter What is URL Filtering? URL filtering is a type of transaction content filtering that limits a user s Web site access through a policy that is associated with a specific
More informationFTP Server Configuration
FTP Server Configuration For HP customers who need to configure an IIS or FileZilla FTP server before using HP Device Manager Technical white paper 2 Copyright 2012 Hewlett-Packard Development Company,
More informationProxySG TechBrief Downloading & Configuring Web Filter
ProxySG TechBrief Downloading & Configuring Web Filter What is Content Filtering? URL filtering is the process of limiting a user s Web site access through a policy that is associated with a specific URL
More informationUse QNAP NAS for Backup
Use QNAP NAS for Backup BACKUP EXEC 12.5 WITH QNAP NAS Copyright 2010. QNAP Systems, Inc. All Rights Reserved. V1.0 Document revision history: Date Version Changes Apr 2010 1.0 Initial release Note: Information
More informationAdministration Guide. Content Analysis 1.3.6.x
Administration Guide Content Analysis 1.3.6.x Third Party Copyright Notices 2016 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE,
More informationNovaBACKUP xsp Version 15.0 Upgrade Guide
NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject
More informationSecurity Report. Security Empowers Business DO NOT ENTER. Blue Coat Research Maps the Web s Shadiest Neighborhoods. September 2015
Security Report Security Empowers Business DO NOT ENTER Blue Coat Research Maps the Web s Shadiest Neighborhoods September 2015 The Web s Shadiest Neighborhoods KEY FINDINGS There has been an explosion
More informationAXIS 70U - Using Scan-to-File
AXIS 70U - Using Scan-to-File Introduction This document describes the Scan-to-File feature in the AXIS 70U. The step-by-step instructions describe the process of configuring the AXIS 70U and an FTP server.
More informationHP Device Manager 4.6
Technical white paper HP Device Manager 4.6 FTP Server Configuration Table of contents Overview... 2 IIS FTP server configuration... 2 Installing FTP v7.5 for IIS... 2 Creating an FTP site with basic authentication...
More informationSage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013
Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012 October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright
More informationhttp://docs.trendmicro.com/en-us/enterprise/safesync-for-enterprise.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationUnified Agent Access Method
Unified Agent Access Method Version 6.8.5/Doc Revision: 04/21/16 Blue Coat Web Security Service/Page 2 Page 3 Copyrights 2016 Blue Coat Systems, Inc.All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER,
More informationContent Filtering Client Policy & Reporting Administrator s Guide
Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
More informationAvaya Network Configuration Manager User Guide
Avaya Network Configuration Manager User Guide May 2004 Avaya Network Configuration Manager User Guide Copyright Avaya Inc. 2004 ALL RIGHTS RESERVED The products, specifications, and other technical information
More informationNovell ZENworks 10 Configuration Management SP3
AUTHORIZED DOCUMENTATION Software Distribution Reference Novell ZENworks 10 Configuration Management SP3 10.3 November 17, 2011 www.novell.com Legal Notices Novell, Inc., makes no representations or warranties
More informationInstalling and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationHow To Enable A Websphere To Communicate With Ssl On An Ipad From Aaya One X Portal 1.1.3 On A Pc Or Macbook Or Ipad (For Acedo) On A Network With A Password Protected (
Avaya one X Portal 1.1.3 Lightweight Directory Access Protocol (LDAP) over Secure Socket Layer (SSL) Configuration This document provides configuration steps for Avaya one X Portal s 1.1.3 communication
More informationShadowControl ShadowStream
ShadowControl ShadowStream Revision 1.3 4/12/2012 Table of Contents Introduction... 3 Download ShadowStream Server... 3 Installation... 4 Configuration... 5 Creating Users... 6 Testing the User Rights...
More informationSOA Software: Troubleshooting Guide for Agents
SOA Software: Troubleshooting Guide for Agents SOA Software Troubleshooting Guide for Agents 1.1 October, 2013 Copyright Copyright 2013 SOA Software, Inc. All rights reserved. Trademarks SOA Software,
More informationLivezilla How to Install on Shared Hosting http://www.jonathanmanning.com By: Jon Manning
Livezilla How to Install on Shared Hosting By: Jon Manning This is an easy to follow tutorial on how to install Livezilla 3.2.0.2 live chat program on a linux shared hosting server using cpanel, linux
More informationuh6 efolder BDR Guide for Veeam Page 1 of 36
efolder BDR for Veeam Hyper-V Continuity Cloud Guide Setup Continuity Cloud Import Backup Copy Job Restore Your VM uh6 efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION Thank you for choosing the efolder
More informationBCAAA 6.1 Service Requirements
BCAAA 6.1 Service Requirements Current Version: 6.1.3 Image Location: The current version of BCAAA is available for download with the latest SGOS GA releases SGOS Compatibility: SGOS 5.4, 5.5, 6.x Platform
More informationEnabling Backups for Windows and MAC OS X
Enabling Backups for Windows and MAC OS X TM Trademarks and Copyrights Copyright Storix, Inc. 1999-2005 Storix is a registered trademark of Storix, Inc. SBAdmin is a trademark of Storix, Inc in the USA
More informationAdvantage for Windows Copyright 2012 by The Advantage Software Company, Inc. All rights reserved. Client Portal blue Installation Guide v1.
Advantage for Windows Copyright 2012 by The Advantage Software Company, Inc. All rights reserved Client Portal blue Installation Guide v1.1 Overview This document will walk you through the process of installing
More informationInstalling and Configuring vcenter Support Assistant
Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
More informationDocument Exchange Server 2.5
KOFAX Document Exchange Server 2.5 Administrator s Guide for Fujitsu Network Scanners 10001820-000 2008-2009 Kofax, Inc., 16245 Laguna Canyon Road, Irvine, California 92618, U.S.A. All rights reserved.
More informationDell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide
Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.
More informationUsing PacketShaper to Control Bring Your Own Device Traffic
Blue Coat Systems Using PacketShaper to Control Bring Your Own Device Traffic Tips and Tricks Supporting the BYOD Worldwide Phenomenon Copyright 1999-2013 Blue Coat Systems, Inc. All rights reserved worldwide.
More informationSetting up a Scheduled task to upload pupil records to ParentPay
Setting up a Scheduled task to upload pupil records to ParentPay To ensure that your setup goes ahead without any issues please first check that you are setting the scheduled task up on the SIMS server
More informationConfiguration Backup Restore
Configuration Backup Restore June 2010 2010 Avaya Inc. All Rights Reserved. States and other countries. Adobe and Flash are either trademarks or registered trademarks in the United States and/or other
More informationCopyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationAvailable Update Methods
The Spectralink 84-Series handsets support multiple methods for updating handset software. This document will detail each of those processes in order to give you the greatest flexibility when administering
More informationNovaBACKUP xsp Version 12.2 Upgrade Guide
NovaBACKUP xsp Version 12.2 Upgrade Guide NovaStor / August 2011 Rev 20110815 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications
More informationEventTracker: Configuring DLA Extension for AWStats Report AWStats Reports
EventTracker: Configuring DLA Extension for AWStats Report AWStats Reports Publication Date: Oct 18, 2011 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com About This Guide Abstract
More informationIntroweb Remote Backup Client for Mac OS X User Manual. Version 3.20
Introweb Remote Backup Client for Mac OS X User Manual Version 3.20 1. Contents 1. Contents...2 2. Product Information...4 3. Benefits...4 4. Features...5 5. System Requirements...6 6. Setup...7 6.1. Setup
More informationRMFT Outlook Add-In User Guide
RMFT Outlook Add-In User Guide Software Version 2.5 November 23, 2011 RepliWeb, Inc., 6441 Lyons Road, Coconut Creek, FL 33073 Tel: (954) 946-2274, Fax: (954) 337-6424 E-mail: info@repliweb.com, Support:
More informationIntegrate Cisco IronPort Web Security Appliance (WSA)
Integrate Cisco IronPort Web Security Appliance (WSA) EventTracker v7.x Publication Date: June 2, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide provides
More informationHow To Backup In Cisco Uk Central And Cisco Cusd (Cisco) Cusm (Custodian) (Cusd) (Uk) (Usd).Com) (Ucs) (Cyse
This chapter includes the following sections: Backup and Import in Cisco UCS Central, page 1 Backing up and Restoring Cisco UCS Central, page 4 Backing up and Restoring Cisco UCS Domains, page 8 Import
More informationF-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
More informationFTP Service Reference
IceWarp Server FTP Service Reference Version 10 Printed on 12 August, 2009 i Contents FTP Service 1 V10 New Features... 2 FTP Access Mode... 2 FTP Synchronization... 2 FTP Service Node... 3 FTP Service
More informationDeployment Guide: Transparent Mode
Deployment Guide: Transparent Mode March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a transparent-firewall device on your network. This
More informationGlobal TAC Secure FTP Site Customer User Guide
Global TAC Secure FTP Site Customer User Guide Introduction This guide is provided to assist you in using the GTAC Secure FTP site. This site resides in the Houston Remote Services Center (RSC), and is
More informationBlue Coat Systems ProxySG Appliance
Blue Coat Systems ProxySG Appliance SGOS 6.2 Upgrade/Downgrade Feature Change Reference Version SGOS 6.2 Blue Coat SGOS 6.2 Upgrade/Downgrade Feature Change Reference Contact Information Americas: Blue
More informationStorageCraft ShadowStream User Guide StorageCraft Copyright Declaration
StorageCraft Copyright Declaration StorageCraft ImageManager, StorageCraft ShadowProtect, StorageCraft Cloud, and StorageCraft Cloud Services, together with any associated logos, are trademarks of StorageCraft
More informationHow To Manage Storage With Novell Storage Manager 3.X For Active Directory
www.novell.com/documentation Installation Guide Novell Storage Manager 4.1 for Active Directory September 10, 2015 Legal Notices Condrey Corporation makes no representations or warranties with respect
More informationSophos Mobile Control Installation guide. Product version: 3
Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External
More informationNetIQ Sentinel 7.0.1 Quick Start Guide
NetIQ Sentinel 7.0.1 Quick Start Guide April 2012 Getting Started Use the following information to get Sentinel installed and running quickly. Meeting System Requirements on page 1 Installing Sentinel
More informationTrustwave SEG Cloud Customer Guide
Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation
More informationInstallation and Configuration Guide
www.novell.com/documentation Installation and Configuration Guide GroupWise Coexistence Solution for Exchange August 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect
More informationBlue Coat Systems. Reference Guide. WCCP Reference Guide. For SGOS 5.5-6.2
Blue Coat Systems Reference Guide WCCP Reference Guide For SGOS 5.5-6.2 Contact Information Americas: Blue Coat Systems Inc. 410 North Mary Ave Sunnyvale, CA 94085-4121 Rest of the World: Blue Coat Systems
More informationIntegrating LANGuardian with Active Directory
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
More informationFileMaker Server 14. FileMaker Server Help
FileMaker Server 14 FileMaker Server Help 2007 2015 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks
More informationSNMP Critical Resource Monitoring
SNMP Critical Resource Monitoring SGOS 6.5.x and later i SNMP Critical Resource Monitoring Contact Information Americas: Blue Coat Systems Inc. 420 North Mary Ave Sunnyvale, CA 94085-4121 Rest of the World:
More informationCA Unified Infrastructure Management Server
CA Unified Infrastructure Management Server CA UIM Server Configuration Guide 8.0 Document Revision History Version Date Changes 8.0 September 2014 Rebranded for UIM 8.0. 7.6 June 2014 No revisions for
More informationNovell ZENworks Asset Management 7.5
Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...
More informationWeb Application Firewall
Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
More informationUser's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011
User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started
More informationRealPresence Platform Director
RealPresence CloudAXIS Suite Administrators Guide Software 1.3.1 GETTING STARTED GUIDE Software 2.0 June 2015 3725-66012-001B RealPresence Platform Director Polycom, Inc. 1 RealPresence Platform Director
More informationAccessing the FTP Server - User Manual
CENTRAL BANK OF CYPRUS Accessing the FTP Server - User Manual IT Department, CENTRAL BANK OF CYPRUS TABLE OF CONTENTS 1 EXECUTIVE SUMMARY... 1 1.1 AUDIENCE... 1 1.2 SCOPE... 1 2 CHANGES FROM THE OLD FTP
More informationVIRTUALIZED SECURITY: THE NEXT GENERATION OF CONSOLIDATION
WHITEPAPER A consolidated security infrastructure is more than just an idea; in today s world of increasingly diversified threats and associated rising costs, it s imperative that organizations adopt a
More informationEMC ViPR Controller Add-in for Microsoft System Center Virtual Machine Manager
EMC ViPR Controller Add-in for Microsoft System Center Virtual Machine Manager Version 2.3 Installation and Configuration Guide 302-002-080 01 Copyright 2013-2015 EMC Corporation. All rights reserved.
More informationUsing Logon Agent for Transparent User Identification
Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense
More informationMobility Manager 9.5. Installation Guide
Mobility Manager 9.5 Installation Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or
More informationCox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0
Cox Business Premium Online Backup USER'S GUIDE Cox Business VERSION 1.0 Table of Contents ABOUT THIS GUIDE... 4 DOWNLOADING COX BUSINESS PREMIUM ONLINE BACKUP... 5 INSTALLING COX BUSINESS PREMIUM ONLINE
More informationCIFS Permissions Best Practices Nasuni Corporation Natick, MA
Nasuni Corporation Natick, MA Overview You use permissions to control user access to data. There are two basic considerations when using permissions to control user access to data: Which users have access
More information