Workflow Guide. Configuring Web Protection. For Customers with Sophos Firewall Document Date: November November 2015 Page 1 of 44
|
|
- Melissa Malone
- 7 years ago
- Views:
Transcription
1 Workflow Guide Configuring Web Protection For Customers with Sophos Firewall Document Date: November 2015 November 2015 Page 1 of 44
2 Contents Overview... 3 Implementing Web Anti Virus (Web AV)... 3 Use Case Use Case Use Case Use Case Use Case Implementing Application Control Use Case Use Case Use Case Implementing URL Filtering Use Case Use Case Use Case Use Case November 2015 Page 2 of 44
3 Overview Sophos Firewall (SF) provides complete protection over the web via its Web Protection Module which includes the features: Web Anti Virus (Web AV), URL Filtering and Application Control. Web AV: The Web AV enables malware scanning of all HTTP, HTTPS and FTP traffic. It also facilitates Safe Search, Pharming Protection and Caching. URL Filtering: URL Filtering or Web Filtering controls user's web access. It specifies which user has access to which sites and allows defining powerful security policies. Application Control: Application Control allows administrator to prioritize application access based on user identity, time, applications and bandwidth. Implementing Web Anti Virus (Web AV) The Web AV primarily scans all HTTP, HTTPS and FTP based traffic for malware. Any infected or suspicious files are dropped ensuring clean traffic in and out of the network. Some of the Use Cases for which Web AV is configured are: Use Case 1: Admin wants Dual AV Scanning for Maximum Security. Use Case 2: Configure Device to NOT scan files with size above 2048 KB. Use Case 3: Enable scanning of Audio and Video files. Use Case 4: Bypass Malware Scanning of traffic between IP Hosts and Use Case 5: Bypass HTTPS Scanning of Financial Services Web Category. Use Case 1 Requirement Admin wants Dual AV Scanning of Web Traffic for Maximum Security Prerequisites - Web Protection Module should be subscribed. - Applicable to Sophos UTM Models SG105 and above - Applicable to Cyberoam Models CR1000iNG and above Configuration In this case, we set the AV scanning method as Dual Scan and enable HTTP and HTTPS Scanning in relevant Security Policy(s). All configurations are to be done from Admin Console using Appliance Access Profile having read/write administrative rights over relevant features. Step 1: Enable Dual Anti-Virus Scanning Navigate to System > System Services > Web Content Filter and, under General Configuration, select Scanning as Dual Anti-Virus (Maximum Security). November 2015 Page 3 of 44
4 Click Apply to save settings. Step 2: Enable HTTP and HTTPS Scanning in relevant Security Policy Security Policies are security rule-sets to implement control over users, applications or network objects in an organization. Using Security Policies, you can create blanket or specialized traffic transit rules based on the requirement. Policies provide centralized management for the entire set of device security policies. Security Policies are based on two configurable templates to define the policy rules: 1. Business Application Rule 2. User/Network Rule You can implement Web Protection on the relevant User/Network Rule. Here, as an example, we have enabled scanning of HTTP and HTTPS traffic on a Rule. Navigate to Policies and select the relevant Rule. Click to edit the Rule. Under Malware Scanning section, enable Scan HTTP and Decrypt & Scan HTTPS by clicking the toggle switches. November 2015 Page 4 of 44
5 Click Save to save the settings. Use Case 2 Requirement Configure Device to NOT scan files with size above 2048 KB Prerequisites Web Protection Module should be subscribed. Configuration In this case, we set the threshold size of file scanning as 2048 KB and enable HTTP and HTTPS Scanning in relevant Security Policy(s). All configurations are to be done from Admin Console using Appliance Access Profile having read/write administrative rights over relevant features. Step 1: Set File Size Threshold as 2048 KB Navigate to System > System Services > Web Content Filter and, under HTTP/HTTPS Configurations, set File Size Threshold as 2048 KB. November 2015 Page 5 of 44
6 Click Apply to save settings. Step 2: Enable HTTP and HTTPS Scanning in relevant Security Policy Security Policies are security rule-sets to implement control over users, applications or network objects in an organization. Using Security Policies, you can create blanket or specialized traffic transit rules based on the requirement. Policies provide centralized management for the entire set of device security policies. Security Policies are based on two configurable templates to define the policy rules: 1. Business Application Rule 2. User/Network Rule You can implement Web Protection on the relevant User/Network Rule. Here, as an example, we have enabled scanning of HTTP and HTTPS traffic on a Rule. Navigate to Policies and select the relevant Rule. Click to edit the Rule. Under Malware Scanning section, enable Scan HTTP and Decrypt & Scan HTTPS by clicking the toggle switches. November 2015 Page 6 of 44
7 Click Save to save the settings. Use Case 3 Requirement Enable scanning of Audio and Video files. Prerequisites Web Protection Module should be subscribed. Configuration In this case, we enable audio and video scanning in Web Content Filter configuration and then enable HTTP and HTTPS Scanning in relevant Security Policy(s). All configurations are to be done from Admin Console using Appliance Access Profile having read/write administrative rights over relevant features. Step 1: Enable Audio and Video Scanning Navigate to System > System Services > Web Content Filter and, under HTTP/HTTPS Configurations, enable Audio & Video File Scanning. November 2015 Page 7 of 44
8 Click Apply to save settings. Step 2: Enable HTTP and HTTPS Scanning in relevant Security Policy Security Policies are security rule-sets to implement control over users, applications or network objects in an organization. Using Security Policies, you can create blanket or specialized traffic transit rules based on the requirement. Policies provide centralized management for the entire set of device security policies. Security Policies are based on two configurable templates to define the policy rules: 1. Business Application Rule 2. User/Network Rule You can implement Web Protection on the relevant User/Network Rule. Here, as an example, we have enabled scanning of HTTP and HTTPS traffic on a Rule. Navigate to Policies and select the relevant Rule. Click to edit the Rule. Under Malware Scanning section, enable Scan HTTP and Decrypt & Scan HTTPS by clicking the toggle switches. November 2015 Page 8 of 44
9 Click Save to save the settings. Use Case 4 Requirement Bypass Malware Scanning of traffic between IP Hosts and Prerequisites Web Protection Module should be subscribed. Configuration In this case, create relevant HTTP Scanning Rule and then enable HTTP and HTTPS Scanning in relevant Security Policy(s). All configurations are to be done from Admin Console using Appliance Access Profile having read/write administrative rights over relevant features. Step 1: Create HTTP Scanning Rule Navigate to System > System Services > Web Content Filter and click Add under HTTP Scanning Rule section. Specify details as shown in screen. November 2015 Page 9 of 44
10 Click Save to save the settings. Step 2: Enable HTTP and HTTPS Scanning in relevant Security Policy Security Policies are security rule-sets to implement control over users, applications or network objects in an organization. Using Security Policies, you can create blanket or specialized traffic transit rules based on the requirement. Policies provide centralized management for the entire set of device security policies. Security Policies are based on two configurable templates to define the policy rules: 1. Business Application Rule 2. User/Network Rule You can implement Web Protection on the relevant User/Network Rule. Here, as an example, we have enabled scanning of HTTP and HTTPS traffic on a Rule. Navigate to Policies and select the relevant Rule. Click to edit the Rule. Under Malware Scanning section, enable Scan HTTP and Decrypt & Scan HTTPS by clicking the toggle switches. November 2015 Page 10 of 44
11 Click Save to save the settings. Use Case 5 Requirement Bypass HTTPS Scanning of Financial Services Web Category. Prerequisites Web Protection Module should be subscribed. Configuration In this case, create relevant HTTPS Scanning Exception and then enable HTTP and HTTPS Scanning in relevant Security Policy(s). All configurations are to be done from Admin Console using Appliance Access Profile having read/write administrative rights over relevant features. Step 1: Create HTTPS Scanning Exceptions Navigate to System > System Services > Web Content Filter and click Add under HTTPS Scanning Exception section. Specify details as shown in screen. November 2015 Page 11 of 44
12 Click Save to save the settings. Step 2: Enable HTTP and HTTPS Scanning in relevant Security Policy Security Policies are security rule-sets to implement control over users, applications or network objects in an organization. Using Security Policies, you can create blanket or specialized traffic transit rules based on the requirement. Policies provide centralized management for the entire set of device security policies. Security Policies are based on two configurable templates to define the policy rules: 1. Business Application Rule 2. User/Network Rule You can implement Web Protection on the relevant User/Network Rule. Here, as an example, we have enabled scanning of HTTP and HTTPS traffic on a Rule. Navigate to Policies and select the relevant Rule. Click to edit the Rule. Under Malware Scanning section, enable Scan HTTP and Decrypt & Scan HTTPS by clicking the toggle switches. November 2015 Page 12 of 44
13 Click Save to save the settings. Implementing Application Control Application Control allows administrator to monitor and control user s application access. It specifies which user has access to which applications by configuring custom policies to define different levels of access for different users to meet organizations' requirements. SF employs a Proactive Protection Model in its Application Control by automatically categorizing any newly launched or upgraded application into the following groups. Category: Such as Streaming Media, P2P, Proxy and Tunneling, Social Networking, etc. Risk: Very Low, Low, Medium, High, Very High. Characteristics: Such as Loss of productivity, Excessive Bandwidth, Transfer Files, Vulnerabilities, etc. Technology: Browser Based, Client Server, P2P, Network Protocol. The administrator can simply create policies using categories given above without worrying about individual applications. This saves the administrator the hassle of updating application filter policies each time a new application is introduced in the market or an existing one is upgraded, in other words, each time a new application pattern is introduced. Some of the Use Cases for which Application Control is configured are: Use Case 1: Block access to P2P applications Use Case 2: Block access to all High Risk Applications Use Case 3: Allow FacebookGames for QA group only, while blocking all games for all others. Use Case 1 Requirement Block access to P2P applications. Prerequisite Web Protection Module should be subscribed. November 2015 Page 13 of 44
14 Configuration In this case, we create an Application Filter called BlockP2P, add relevant rules to the policy and implement the policy in the relevant Security Policy(s). All configurations are to be done from Admin Console using Appliance Access Profile having read/write administrative rights over relevant features. Step 1: Create App Filter Policy to block P2P Applications Navigate to Objects > Policies > Application Group and click Add to add an Application Filter Policy. Specify Name as BlockP2P and Template as Allow All. Click Save to create the policy. November 2015 Page 14 of 44
15 Note: Appliance is shipped with the following predefined policies for applications: Allow All and Deny All. These two predefined policies are immediately available for use until configured otherwise. You can also define custom policies to define different levels of access for different users to meet your organization s requirements. Step 2: Add Rules to Policy Select BlockP2P policy created in step 1 and click Add to add rules in the policy according to parameters given below. November 2015 Page 15 of 44
16 Parameters Value Description Application Filter Criteria Category: P2P Select the category of applications that are to be selected List of Matching Applications Select All Based on the Application Filter Criteria, applications are listed. Application <All P2P Applications> Select one or more applications to be blocked. Action Deny Select the Action: Allow OR Deny. Schedule All the time Select the Schedule from the list of Schedules available Click Save to add rule to BlockP2P policy. November 2015 Page 16 of 44
17 Click Save to save the policy. Step 3: Apply App Filter Policy to relevant Security Policy Security Policies are security rule-sets to implement control over users, applications or network objects in an organization. Using Security Policies, you can create blanket or specialized traffic transit rules based on the requirement. Policies provide centralized management for the entire set of device security policies. Security Policies are based on two configurable templates to define the policy rules: 1. Business Application Rule 2. User/Network Rule You can implement Web Protection on the relevant User/Network Rule. Here, as an example, we have applied the App Filter Policy created in step 1 to User Application policy for Marketing Department of an organization. Navigate to Policies and select the relevant Rule. Click to edit the Rule. Under Policy for User Applications, select App Filter as BlockP2P, as shown below. November 2015 Page 17 of 44
18 Use Case 2 Requirement Block access to all high risk applications. Prerequisite Web Protection Module should be subscribed. Configuration In this case, we create an Application Filter called BlockHighRisk, add relevant rules to the policy and implement the policy in the relevant Security Policy(s). All configurations are to be done from Admin Console using Appliance Access Profile having read/write administrative rights over relevant features. Step 1: Create App Filter Policy to block P2P Applications Navigate to Objects > Policies > Application Group and click Add to add an Application Filter Policy. Specify Name as BlockHighRisk and Template as Allow All. November 2015 Page 18 of 44
19 Click Save to create the policy. Note: Appliance is shipped with the following predefined policies for applications: Allow All and Deny All. These two predefined policies are immediately available for use until configured otherwise. You can also define custom policies to define different levels of access for different users to meet your organization s requirements. Step 2: Add Rules to Policy Select BlockHighRisk policy created in step 1 and click Add to add rules in the policy according to parameters given below. November 2015 Page 19 of 44
20 Parameters Value Description Application Filter Criteria Risk: 4-High & 5-Very high Select the category of applications that are to be selected List of Matching Applications Select All Based on the Application Filter Criteria, applications are listed. Application <P2P Applications> Select one or more applications to be blocked. Action Deny Select the Action: Allow OR Deny. Schedule All the time Select the Schedule from the list of Schedules available November 2015 Page 20 of 44
21 Click Save to add rule to BlockHighRisk policy. Step 3: Apply App Filter Policy to relevant Security Policy Security Policies are security rule-sets to implement control over users, applications or network objects in an organization. Using Security Policies, you can create blanket or specialized traffic transit rules based on the requirement. Policies provide centralized management for the entire set of device security policies. Security Policies are based on two configurable templates to define the policy rules: 1. Business Application Rule 2. User/Network Rule You can implement Web Protection on the relevant User/Network Rule. Here, as an example, we have applied the App Filter Policy created in step 1 to User Application policy for Marketing Department of an organization. Navigate to Policies and select the relevant Rule. Click to edit the Rule. Under Policy for User Applications, select App Filter as BlockHighRisk, as shown below. November 2015 Page 21 of 44
22 Use Case 3 Requirement Allow FacebookGames for QA group only, while blocking all games for all others. Prerequisite Web Protection Module should be subscribed. Configuration In this case, we create a Web Filter Policy to block all Games websites and an Application Filter Policy to allow Facebook Games. We create a Security Policy to apply the Web Filter Policy on all traffic. We create another Security Policy to apply App Filter Policy only on QA Group. Place the QA policy above the general policy. All configurations are to be done from Admin Console using Appliance Access Profile having read/write administrative rights over relevant features. Step 1: Create a Web Filter Policy to block all Games Refer to Use Case 1 of Implementing URL Filtering section for instructions on this. Step 2: Create App Filter Policy to allow Facebook games Navigate to Objects > Policies > Application Group and click Add to add an Application Filter Policy. Specify Name as AllowFBGames and Template as Allow All. November 2015 Page 22 of 44
23 Click Save to create the policy. Note: Appliance is shipped with the following predefined policies for applications: Allow All and Deny All. These two predefined policies are immediately available for use until configured otherwise. You can also define custom policies to define different levels of access for different users to meet your organization s requirements. Step 3: Add Rules to Policy Select AllowFBGames policy created in step 1 and click Add to add rules in the policy according to parameters given below. November 2015 Page 23 of 44
24 Parameters Value Description List of Matching Applications Select Individual Application: Facebook Based on the Application Filter Criteria, applications are listed. Application Facebook Games Select one or more applications to be blocked. Action Allow Select the Action: Allow OR Deny. Schedule All the time Select the Schedule from the list of Schedules available November 2015 Page 24 of 44
25 Click Save to add rule to AllowFBGames policy. November 2015 Page 25 of 44
26 Click Save to save the policy. Step 4: Create Relevant Security Policies Security Policies are security rule-sets to implement control over users, applications or network objects in an organization. Using Security Policies, you can create blanket or specialized traffic transit rules based on the requirement. Policies provide centralized management for the entire set of device security policies. Security Policies are based on two configurable templates to define the policy rules: 1. Business Application Rule 2. User/Network Rule You can implement Web Protection on the relevant User/Network Rule. Here, as an example, we have applied the Web Filter and App Filter Policy created in step 1 and 2 respectively to the Rule. Navigate to Policies and click +Add Firewall Rule followed by User/Network Rule. Create a Rule BlockGamesForAll with Source Zone as LAN and Destination Zone as WAN. Apply the Web Filter Policy to this Rule. Create a LAN to WAN Rule AllowFBGamesForQA with Identity enabled and selected as QA Group. Apply the Application Filter Policy to this Rule. Make sure AllowFBGamesforQA is above BlockGamesForAll. November 2015 Page 26 of 44
27 Implementing URL Filtering URL Filtering or Web Filtering allows you to control Internet access of users or groups of users. Using these policies, you can block or allow specific URLs or an entire category of websites. The SF Web Categorization Database contains millions of websites grouped into categories like Games, Personals & Dating, CriminalActivity, etc. Allowing or blocking any particular category allows/blocks all websites falling under that particular category. This reduces the effort on part of the administrator to create policies for each individual website. Some of the Use Cases for which URL Filtering is configured are: Use Case 1: Block access to "Games" Web Category Use Case 2: Block only and from Social Networking Category Use Case 3: Block all websites of "JobSearch" category except of Use Case 4: Allow access to all Social Networking websites with exception of upload/download of Images and Videos. Use Case 1 Requirement Block access to "Games" Web Category. Prerequisite Web Protection Module should be subscribed. Configuration In this case, we create a Web Filter Policy called "Games', add relevant rules to the policy and implement the policy in the relevant Security Policy(s). All configurations are to be done from Admin Console using Appliance Access Profile having read/write administrative rights over relevant features. November 2015 Page 27 of 44
28 Step 1: Create Web Filter Policy to deny Games default web category Navigate to Objects > Policies > Web Filter and click Add to add a Web Filter Policy. Specify Name as Block_Games and Template as Allow All. Click Add to add the Rules. Specify the Rule as per parameters given below. November 2015 Page 28 of 44
29 Click Add to add the Rule. Parameters Value Description Category Type Web Category Category Type for which rule is to be added. Category Games Category for which rule is to be added. Multiple categories can also be selected. HTTP Action Deny Action for HTTP traffic. HTTPS Action Deny Action for HTTPS traffic. Schedule All the Time Access to the Games category will be denied completely. November 2015 Page 29 of 44
30 Click Save to save the policy. Step 2: Apply Web Filter Policy to relevant Security Policy Security Policies are security rule-sets to implement control over users, applications or network objects in an organization. Using Security Policies, you can create blanket or specialized traffic transit rules based on the requirement. Policies provide centralized management for the entire set of device security policies. Security Policies are based on two configurable templates to define the policy rules: 1. Business Application Rule 2. User/Network Rule You can implement Web Protection on the relevant User/Network Rule. Here, as an example, we have applied the Web Filter Policy created in step 1 to Rule for Marketing Department of an organization. Navigate to Policies and select the relevant User/Network Rule. Click to edit the Rule. November 2015 Page 30 of 44
31 Under Policy for User Applications, select Web Filter as Block_Games, as shown below. Use Case 2 Requirement Block only and from Social Networking Category. Configuration In this case, we create a Custom Web Category to include and create corresponding Web Filter Policy, add relevant rules to the policy and implement the policy in the relevant Security Policy(s). All configurations are to be done from Admin Console using Appliance Access Profile having read/write administrative rights over relevant features. Step 1: Create Custom Web Category Navigate to Objects > Content > Custom Web Category and click Add to create a new category. Include Domains and as shown below. November 2015 Page 31 of 44
32 Step 2: Create Web Filter Policy to deny "FacebookandTwitter" custom web category Navigate to Objects > Policies > Web Filter and click Add to add a Web Filter Policy. Specify Name as Block_FacebookAndTwitter and Template as Allow All. Click Add to add the Rules. November 2015 Page 32 of 44
33 Specify the Rule as per parameters given below. Parameters Value Description Category Type Web Category Category Type for which rule is to be added. Category FacebookAndTwitter Category for which rule is to be added. Multiple categories can also be selected. HTTP Action Deny Action for HTTP traffic. HTTPS Action Deny Action for HTTPS traffic. Schedule All the Time Access to the Games category will be denied completely. November 2015 Page 33 of 44
34 Click Add to add the Rule. Click Save to save the policy. November 2015 Page 34 of 44
35 Step 3: Apply Web Filter Policy to a User/Network Rule Security Policies are security rule-sets to implement control over users, applications or network objects in an organization. Using Security Policies, you can create blanket or specialized traffic transit rules based on the requirement. Policies provide centralized management for the entire set of device security policies. Security Policies are based on two configurable templates to define the policy rules: 1. Business Application Rule 2. User/Network Rule You can implement Web Protection on the relevant User/Network Rule. Here, as an example, we have applied the Web Filter Policy created in step 1 to Rule for Marketing Department of an organization. Navigate to Policies and select the relevant User/Network Rule. Click to edit the Rule. Under Policy for User Applications, select Web Filter as Block_FacebookAndTwitter, as shown below. Use Case 3 Requirement Block all websites of "JobSearch" category except of Prerequisite Web Protection Module should be subscribed. Configuration In this case, we create a Custom Web Category to which contains create corresponding Web Filter Policy, add Two (2) rules to the policy (1 to block JobSearch category and 2 to November 2015 Page 35 of 44
36 allow custom category for and implement the policy in the relevant Security Policy(s). All configurations are to be done from Admin Console using Appliance Access Profile having read/write administrative rights over relevant features. Step 1: Create Custom Web Category Navigate to Objects > Content > Custom Web Category and click Add to create a new category. Include Domain as shown below. Step 2: Create Web Filter Policy Navigate to Objects > Policies > Web Filter and click Add to add a Web Filter Policy. Specify Name as BlockJobSearchExceptMonster and Template as Allow All. Click Add to add the Rules. November 2015 Page 36 of 44
37 Rule 1: To block JobSearch Category Specify the Rule as per parameters given below. Parameters Value Description Category Type Web Category Category Type for which rule is to be added. Category JobSearch Category for which rule is to be added. Multiple categories can also be selected. HTTP Action Deny Action for HTTP traffic. HTTPS Action Deny Action for HTTPS traffic. Schedule All the Time Access to the Games category will be denied completely. November 2015 Page 37 of 44
38 Click Add to add the Rule. Rule 2: To allow only or "Monster" Web Category Specify the Rule as per parameters given below. Parameters Value Description Category Type Web Category Category Type for which rule is to be added. Category Monster Category for which rule is to be added. Multiple categories can also be selected. HTTP Action Allow Action for HTTP traffic. HTTPS Action Allow Action for HTTPS traffic. Schedule All the Time Access to the Games category will be denied completely. November 2015 Page 38 of 44
39 Click Add to add the Rule. Click Save to save the policy. November 2015 Page 39 of 44
40 Step 3: Apply Web Filter Policy to a User Application Policy Security Policies are security rule-sets to implement control over users, applications or network objects in an organization. Using Security Policies, you can create blanket or specialized traffic transit rules based on the requirement. Policies provide centralized management for the entire set of device security policies. Security Policies are based on two configurable templates to define the policy rules: 1. Business Application Rule 2. User/Network Rule You can implement Web Protection on the relevant User/Network Rule. Here, as an example, we have applied the Web Filter Policy created in step 1 to Rule for Marketing Department of an organization. Navigate to Policies and select the relevant User/Network Rule. Click to edit the Rule. Under Policy for User Applications, select Web Filter as BlockJobSearchExceptMonster, as shown below. Use Case 4 Requirement Allow access to all Social Networking websites with exception of upload/download of Images and Videos. Prerequisite Web Protection Module should be subscribed. Configuration In this case, we create a Web Filter Policy, add rule to the policy to allow "SocialNetworking" but with exception that Audio and Video files be blocked, and implement the policy in the relevant Security Policy(s). November 2015 Page 40 of 44
41 All configurations are to be done from Admin Console using Appliance Access Profile having read/write administrative rights over relevant features. Step 1: Create Web Filter Policy Navigate to Objects > Policies > Web Filter and click Add to add a Web Filter Policy. Specify Name as Block_ImagesVideos and Template as Allow All. Click Add to add the Rules. Specify the Rule as per parameters given below. November 2015 Page 41 of 44
42 Parameters Value Description Category Type Web Category Category Type for which rule is to be added. Category Social Networking Category for which rule is to be added. Multiple categories can also be selected. HTTP Action Allow Action for HTTP traffic. HTTPS Action Allow Action for HTTPS traffic. Click to add the file type category exception rule for a selected category type and select file type category. Exception: File Type Category Image Files, Video Files For Example: If you want to allow Sport category and deny video file from the Sport category then specify Allow action for Sport category and add Video File in Exception list. Schedule All the Time You can define exception only for Web Category and URL Group. At all times, access to the SocialNetworking" category is accessible but Audio and Video files cannot be downloaded. Click Add to add the Rule. November 2015 Page 42 of 44
43 Click Save to save the policy. Step 2: Apply Web Filter Policy to a User/Network Rule Security Policies are security rule-sets to implement control over users, applications or network objects in an organization. Using Security Policies, you can create blanket or specialized traffic transit rules based on the requirement. Policies provide centralized management for the entire set of device security policies. Security Policies are based on two configurable templates to define the policy rules: 1. Business Application Rule 2. User/Network Rule You can implement Web Protection on the relevant User/Network Rule. Here, as an example, we have applied the Web Filter Policy created in step 1 to Rule for Marketing Department of an organization. Navigate to Policies and select the relevant User/Network Rule. Click to edit the Rule. Under Policy for User Applications, select Web Filter as Block_ImagesVideos, as shown below. November 2015 Page 43 of 44
44 November 2015 Page 44 of 44
How To Block Unauthorized Internet Access through Proxies
How To - Block Unauthorized Internet Access through Proxies How To Block Unauthorized Internet Access through Proxies Applicable Version: 10.00 onwards Overview A Proxy is a tool that attempts to make
More informationHow To - Configure Web Filter Policy
How To - Configure Web Filter Policy Applicable Version: 10.00 onwards Overview Web Filter Policies allow you to control Internet access of users or groups of users. Using these policies, you can block
More informationHow To Configure Syslog over VPN
How To Configure Syslog over VPN Applicable Version: 10.00 onwards Overview Cyberoam provides extensive logging capabilities for traffic, system and network protection functions. Detailed log information
More informationHow To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface
How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface How To Configure load sharing and redirect mail server traffic over preferred Gateway
More informationHow To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN
How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN Applicable Version: 10.6.2 onwards Overview Virtual host implementation is based on the Destination NAT concept. Virtual
More informationHow To Allow and Block Emails using White or Black List
How To Allow and Block Emails using White or Black List Applicable Version: 10.00 onwards Overview Cyberoam s Anti Spam detects Spam mails by checking IP addresses, Domain, Email addresses or RBL (Real-time
More informationHow To - Deploy Cyberoam in Gateway Mode
How To - Deploy Cyberoam in Gateway Mode Cyberoam appliance can be deployed in a network in two modes: Gateway mode. Popularly known as Route mode Bridge mode. Popularly known as Transparent mode Article
More informationHow To Configure SSL VPN in Cyberoam
How To Configure SSL VPN in Cyberoam Applicable Version: 10.00 onwards Overview SSL (Secure Socket Layer) VPN provides simple-to-use, secure access for remote users to the corporate network from anywhere,
More informationCyan Networks Secure Web vs. Websense Security Gateway Battle card
URL Filtering CYAN Secure Web Database - over 30 million web sites organized into 31 categories updated daily, periodically refreshing the data and removing expired domains Updates of the URL database
More informationBitDefender for Microsoft ISA Servers Standard Edition
BitDefender for Microsoft ISA Servers Standard Edition Copyright 2006 SOFTWIN Edition 1. How Does It Work? As content entering or leaving your company must meet security policies, it is crucial to choose
More informationWorkflow Guide. Establish Site-to-Site VPN Connection using RSA Keys. For Customers with Sophos Firewall Document Date: November 2015
Workflow Guide Establish Site-to-Site VPN Connection using RSA Keys For Customers with Sophos Firewall Document Date: November 2015 November 2015 Page 1 of 10 Establish Site-to-Site VPN Connection using
More informationWebsense Web Security Gateway: What to do when a Web site does not load as expected
Websense Web Security Gateway: What to do when a Web site does not load as expected Websense Support Webinar November 2011 web security data security email security Support Webinars 2009 Websense, Inc.
More informationCyberoam Virtual Security Appliance - Installation Guide for VMware ESX/ESXi. Version 10
Cyberoam Virtual Security Appliance - Installation Guide for VMware ESX/ESXi Version 10 Document Version 10.6.2-16/04/2015 Contents Preface... 4 Base Configuration... 4 Installation Procedure... 4 Cyberoam
More informationManaging Qualys Scanners
Q1 Labs Help Build 7.0 Maintenance Release 3 documentation@q1labs.com Managing Qualys Scanners Managing Qualys Scanners A QualysGuard vulnerability scanner runs on a remote web server. QRadar must access
More informationSophos XG Firewall v 15.01.0 Release Notes. Sophos XG Firewall Reports Guide v15.01.0
Sophos XG Firewall v 15.01.0 Release Notes Sophos XG Firewall Reports Guide v15.01.0 For Sophos and Cyberoam Customers Document Date: November 2015 Contents 2 Contents Reports... 4 Basics...4 Reports Navigation...
More informationHosting more than one FortiOS instance on. VLANs. 1. Network topology
Hosting more than one FortiOS instance on a single FortiGate unit using VDOMs and VLANs 1. Network topology Use Virtual domains (VDOMs) to divide the FortiGate unit into two or more virtual instances of
More informationK7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete
More informationIntroduction to the AirWatch Browser Guide
Introduction to the AirWatch Browser Guide The AirWatch Browser application provides a safe, accessible and manageable alternative to Internet browsing using native device browsers. The AirWatch Browser
More information602LAN SUITE 5.0 Groupware
602LAN SUITE 5.0 Groupware Installation Manual 2007 Software602, Inc. 1 Table of Contents Table of Contents...2 Introduction...3 Prerequisites...4 Installation... 5 Server Configuration...7 Console...7
More informationHow To Configure Virtual Host with Load Balancing and Health Checking
How To Configure Virtual Host with Load How To Configure Virtual Host with Load Balancing and Health Checking Balancing and Health Checking Applicable Version: 10.02.0 Build 473 onwards Overview This article
More informationFirewall Defaults and Some Basic Rules
Firewall Defaults and Some Basic Rules ProSecure UTM Quick Start Guide This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSecure Unified
More informationConfiguring Trend Micro Content Security
9 CHAPTER This chapter describes how to configure the CSC SSM using the CSC Setup Wizard in ASDM and the CSC SSM GUI, and includes the following sections: Information About the CSC SSM, page 9-1 Licensing
More informationWorkflow Guide. Establish Site-to-Site VPN Connection using Digital Certificates. For Customers with Sophos Firewall Document Date: November 2015
Workflow Guide Establish Site-to-Site VPN Connection using Digital Certificates For Customers with Sophos Firewall Document Date: November 2015 November 2015 Page 1 of 14 Establish Site-to-Site VPN Connection
More informationCyberoam Virtual Security Appliance - Installation Guide for XenServer. Version 10
Cyberoam Virtual Security Appliance - Installation Guide for XenServer Version 10 Document Version 10.6.1-01/07/2014 Contents Preface... 4 Base Configuration... 4 Installation Procedure... 4 Cyberoam Virtual
More informationUnified Threat Management
Unified Threat Management QUICK START GUIDE CR35iNG Appliance Document Version: PL QSG 35iNG/96000-10.04.5.0.007/250121014 DEFAULTS Default IP addresses Ethernet Port IP Address Zone A 172.16.16.16/255.255.255.0
More informationSteps for Basic Configuration
1. This guide describes how to use the Unified Threat Management appliance (UTM) Basic Setup Wizard to configure the UTM for connection to your network. It also describes how to register the UTM with NETGEAR.
More informationMasters Project Proxy SG
Masters Project Proxy SG Group Members Chris Candilora Cortland Clater Eric Garner Justin Jones Blue Coat Products Proxy SG Series Blue Coat Proxy SG appliances offer a comprehensive foundation for the
More informationSophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
More informationHow To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment
How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable
More informationEnterprise Security Interests Require SSL with telnet server from outside the LAN
Create and Use an SSL on Goals Provide secure and encrypted 5250 data stream conversations with the server (including authentication) use a digital certificate we create with Digital Manager Show a client
More informationThis article describes a detailed configuration example that demonstrates how to configure Cyberoam to provide the access of internal resources.
How To Configure Port Forwarding using Virtual Host to access devices on Internal network Applicable to versions 9.5.3 build 14 or above This article describes a detailed configuration example that demonstrates
More informationInstructions for Activating and Configuring the SAFARI Montage Managed Home Access Software Module
Instructions for Activating and Configuring the SAFARI Montage Managed Home Access Software Module ~ Please read these instructions in their entirety before you begin. ~ These instructions explain how
More informationUsing SonicWALL NetExtender to Access FTP Servers
SSL-VPN Using SonicWALL NetExtender to Access FTP Servers Problem: Using NetExtender to access an FTP Server on the LAN segment of a SonicWALL PRO 4060. Solution: Perform the following setup steps. Step
More informationGetting Started Guide
Getting Started Guide Sophos Firewall Virtual Appliance Document Date: November 2015 November 2015 Page 1 of 20 Contents Preface...3 Minimum Hardware Requirement...3 Installation Procedure...3 Configuring
More informationConfiguring Your Gateman Proxy Server
Configuring Your Gateman Proxy Server A proxy server acts as an intermediary between a workstation users and the Internet to ensure security, administrative control, distribution of bandwidth and caching
More informationA Guide to New Features in Propalms OneGate 4.0
A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously
More informationOwner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Microsoft Forefront TMG How to use TMG network templates Abstract In this article I will show
More informationF-Secure Internet Gatekeeper Virtual Appliance
F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance TOC 2 Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper Virtual Appliance.3 Chapter 2: Deployment...4
More informationSecuraLive ULTIMATE SECURITY
SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security
More informationCyberoam Perspective BFSI Security Guidelines. Overview
Overview The term BFSI stands for Banking, Financial Services and Insurance (BFSI). This term is widely used to address those companies which provide an array of financial products or services. Financial
More informationSecure Web Appliance. Reverse Proxy
Secure Web Appliance Reverse Proxy Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About Reverse Proxy... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
More informationF-SECURE MESSAGING SECURITY GATEWAY
F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE
More informationProtecting the Infrastructure: Symantec Web Gateway
Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options
More informationBalancing and Gateway Failover
How To Add Active How or To Backup Add Gateway Active for Load or Backup Balancing and Gateway for Failover Load Balancing and Gateway Failover Applicable versions: 9.5.3 build 18 onwards Today organizations
More informationSSL VPN Client Installation Guide Version 9
SSL VPN Client Installation Guide Version 9 Document version 96060-1.0-08/10/2009 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing,
More informationGFI Product Manual. Administrator Guide for ISA/TMG
GFI Product Manual Administrator Guide for ISA/TMG The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either
More informationConfiguring SonicWALL TSA on Citrix and Terminal Services Servers
Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,
More informationSonicwall Reporting Server
Sonicwall Reporting Server How to access the reporting server: Navigate to https://swreports.hitechsupport.com.au, and enter your username and password provided. After you have logged in, click on the
More informationApplication Notes. How to Configure Application Control for the UTM
How to Configure Application Control for the UTM T a b l e o f C o n t e n t s Contents...2 Concepts...3 Components...3 Configuration Steps...4 Configuring Global Mode...4 Configuring Profile Mode...10
More informationSetting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
More informationSysAid Remote Discovery Tool
SysAid Remote Discovery Tool SysAid Release 7 Document Updated: 27-Apr-10 SysAid Remote Discovery Tool The SysAid server comes with a built-in discovery service that performs various network discovery
More informationIBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide
IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation
More informationBiznet GIO Cloud Connecting VM via Windows Remote Desktop
Biznet GIO Cloud Connecting VM via Windows Remote Desktop Introduction Connecting to your newly created Windows Virtual Machine (VM) via the Windows Remote Desktop client is easy but you will need to make
More informationStep-by-Step Configuration
Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local
More informationKerio Control. Step-by-Step Guide. Kerio Technologies
Kerio Control Step-by-Step Guide Kerio Technologies 2011 Kerio Technologies s.r.o. All rights reserved. This guide provides detailed description on configuration of the local network which uses the Kerio
More informationBarracuda Link Balancer Administrator s Guide
Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks
More informationSonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
More informationQUICK START GUIDE. Cisco S170 Web Security Appliance. Web Security Appliance
1 0 0 0 1 1 QUICK START GUIDE Web Security Appliance Web Security Appliance Cisco S170 303417 Cisco S170 Web Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation
More informationIf the Domain Controller is running Windows Server 2003, it is strongly advised that the Group Policy Management tool is installed.
BGfL Proxy Servers Slow Internet Following a number of calls to the Link2ICT Service desk reporting slow Internet, Investigations were carried out by the BGfL team who identified that slow internet performance
More informationPreparing for Version 10
Preparing for Version 10 Release Information Release Type: General Availability Compatible versions: 9.6.0.78 for al CRs except CR15i; 9.5.8.68 for CR15i Upgrade prerequisite: 24 x 7 OR 8 x 5 valid Support
More informationHigh Availability Configuration Guide Version 9
High Availability Configuration Guide Version 9 Document version 9402-1.0-08/11/2006 2 HA Configuration Guide IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable
More informationHow To Install & Use Metascan With Policy Patrol
Policy Patrol 9 technical documentation June 16, 2014 How To Install & Use Metascan With Policy Patrol No antivirus engine is perfect. With over 220,000 new threats emerging daily, it would be impossible
More informationDid you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
More informationControlling SSL Decryption. Overview. SSL Variability. Tech Note
Controlling Decryption Tech Note Overview Decryption is a key feature of the PA-4000 Series firewall. With it, -encrypted traffic is decrypted for visibility, control, and granular security. App-ID and
More informationDownloading and Configuring WebFilter
Downloading and Configuring WebFilter What is URL Filtering? URL filtering is a type of transaction content filtering that limits a user s Web site access through a policy that is associated with a specific
More informationEvaluation Guide. iprism Web Security. 800-782-3762 www.edgewave.com V7.000
800-782-3762 www.edgewave.com Welcome to EdgeWave Web Security! This short guide is intended to help administrators set up and test the iprism Web Filtering appliance for evaluation purposes. A more detailed
More informationNetworking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
More informationChapter 3 Security and Firewall Protection
Chapter 3 Security and Firewall Protection This chapter describes how to use the basic firewall features of the ADSL2+ Modem Router to protect your network. Firewall Settings You can set up the ADSL2+
More informationUSER CONFERENCE 2011 SAN FRANCISCO APRIL 26 29. Running MarkLogic in the Cloud DEVELOPER LOUNGE LAB
USER CONFERENCE 2011 SAN FRANCISCO APRIL 26 29 Running MarkLogic in the Cloud DEVELOPER LOUNGE LAB Table of Contents UNIT 1: Lab description... 3 Pre-requisites:... 3 UNIT 2: Launching an instance on EC2...
More informationIntroduction to Endpoint Security
Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user
More informationConfiguring Security for FTP Traffic
2 Configuring Security for FTP Traffic Securing FTP traffic Creating a security profile for FTP traffic Configuring a local traffic FTP profile Assigning an FTP security profile to a local traffic FTP
More informationUser Guide Version 9 Document version 9412-1.0-01/03/2007
User Guide Version 9 Document version 9412-1.0-01/03/2007 2 Cyberoam User Guide IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing,
More informationMcAfee. Firewall Enterprise. Application Note TrustedSource in McAfee. Firewall Enterprise. version 8.1.0 and earlier
Application Note TrustedSource in McAfee Firewall Enterprise McAfee version 8.1.0 and earlier Firewall Enterprise This document uses a question and answer format to explain the TrustedSource reputation
More informationGetting Started Guide
Getting Started Guide Sophos Firewall Software Appliance Document Date: November 2015 November 2015 Page 1 of 14 Contents Preface...3 Minimum Hardware Requirement...3 Recommended Hardware Requirement...3
More informationV Series Rapid Deployment Version 7.5
V Series Rapid Deployment Version 7.5 Table of Contents Module 1: First Boot Module 2: Configure P1 and N interfaces Module 3: Websense Software installation (Reporting Server) Module 4: Post installation
More informationCyberoam Anti Virus Implementation Guide Version 9
Cyberoam Anti Virus Implementation Guide Version 9 Document version 9402-1.0-18/10/2006 2 Cyberoam Anti Virus Implementation Guide IMPORTANT NOTICE Elitecore has supplied this Information believing it
More informationControlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway
Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway Websense Support Webinar January 2010 web security data security email security
More informationHow To Configure L2TP VPN Connection for MAC OS X client
How To Configure L2TP VPN Connection for MAC OS X client How To Configure L2TP VPN Connection for MAC OS X client Applicable Version: 10.00 onwards Overview Layer 2 Tunnelling Protocol (L2TP) can be used
More informationWebsense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications
Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications November, 2010 2010 Websense, Inc. All rights reserved. Websense is a registered
More informationDeploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10
Deploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10 Document version 1.0 10.6.2.378-13/03/2015 Important Notice Cyberoam Technologies Pvt. Ltd. has supplied this Information believing it
More informationGFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide
GFI Product Manual Web security, monitoring and Internet access control Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as
More informationTrend Micro Worry- Free Business Security 8.0. 1 st time setup Tips & Tricks
Trend Micro Worry- Free Business Security 8.0 WFBS installation best practise, preparations and how to Preparation for 2008 Server IIS: Configuring the required Internet Information Services (IIS) roles
More informationApplication Detection
The following topics describe Firepower System application detection : Overview:, page 1 Custom Application Detectors, page 7 Viewing or Downloading Detector Details, page 15 Sorting the Detector List,
More informationApplications erode the secure network How can malware be stopped?
Vulnerabilities will continue to persist Vulnerabilities in the software everyone uses everyday Private Cloud Security It s Human Nature Programmers make mistakes Malware exploits mistakes Joe Gast Recent
More informationez Agent Administrator s Guide
ez Agent Administrator s Guide Copyright This document is protected by the United States copyright laws, and is proprietary to Zscaler Inc. Copying, reproducing, integrating, translating, modifying, enhancing,
More informationTRITON - Web Security Help
TRITON - Web Security Help Websense Web Security Websense Web Filter v7.6 1996 2015, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2015 Printed in the
More informationMulti-Homing Dual WAN Firewall Router
Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet
More informationLab 4.5.2 Diagramming Intranet Traffic Flows
Lab 4.5.2 Diagramming Intranet Traffic Flows Objective Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1
More informationContact Information. Document Number: 231-02909 Document Revision: SSL Proxy Deployment Guide SGOS 5.1.4
Contact Information Blue Coat Systems Inc. 420 North Mary Ave Sunnyvale, CA 94085-4121 http://www.bluecoat.com/support/contact.html bcs.info@bluecoat.com http://www.bluecoat.com For concerns or feedback
More informationChapter 6 Virtual Private Networking Using SSL Connections
Chapter 6 Virtual Private Networking Using SSL Connections The FVS336G ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN provides a hardwarebased SSL VPN solution designed specifically to provide
More informationExternal Device Management - Using SNMP - Enabling the Next Wave of Connectivity
External Device Management - Using SNMP - 1 External Devices A location can comprise of many external devices like Access Points, routers etc. in addition to the PSC This aids in expanding the location
More informationWinning with Check Point Secure Web Gateway. Sales Training. August 2012. [Restricted] ONLY for designated groups and individuals
Winning with Check Point Secure Web Gateway Sales Training August 2012 The Rules of the Game have Changed 2012 2012 Check Check Point Point Software Software Technologies Ltd Ltd. 2 New Tools Are Business
More informationVirtual Web Appliance Setup Guide
Virtual Web Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance This guide describes the procedures for installing a Virtual Web Appliance. If you are installing
More informationRelease Notes. Release Purpose... 1 Platform Compatibility... 1 Upgrading Information... 1 Browser Support... 2 Known Issues... 3 Resolved Issues...
SonicOS SonicOS Contents Release Purpose... 1 Platform Compatibility... 1 Upgrading Information... 1 Browser Support... 2 Known Issues... 3 Resolved Issues... 5 Release Purpose SonicOS 6.1.1.5 is a maintenance
More informationDEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5
DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Microsoft IIS Prerequisites and configuration
More informationBlue Coat Security First Steps Solution for Streaming Media
Blue Coat Security First Steps Solution for Streaming Media SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
More informationProduct Manual. Administration and Configuration Manual
Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with
More informationRelease Notes. Release Purpose... 1 Platform Compatibility... 1 Upgrading Information... 1 Browser Support... 1 Known Issues... 2 Resolved Issues...
SonicOS SonicOS Contents Release Purpose... 1 Platform Compatibility... 1 Upgrading Information... 1 Browser Support... 1 Known Issues... 2 Resolved Issues... 5 Release Purpose SonicOS 6.1.1.3 is a maintenance
More informationNetSpective Global Proxy Configuration Guide
NetSpective Global Proxy Configuration Guide Table of Contents NetSpective Global Proxy Deployment... 3 Configuring NetSpective for Global Proxy... 5 Restrict Admin Access... 5 Networking... 6 Apply a
More informationBlue Coat Security First Steps Solution for Controlling Web Applications
Blue Coat Security First Steps Solution for Controlling Web Applications SGOS 6.5 Third Party Copyright Notices 2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,
More information