Web Application Classification Feature
|
|
|
- Calvin Singleton
- 9 years ago
- Views:
Transcription
1 Web Application Classification Feature PacketShaper 11.5
2 Third Party Copyright Notices 2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE, CROSSBEAM, K9, DRTR, MACH5, PACKETWISE, POLICYCENTER, PROXYAV, PROXYCLIENT, SGOS, WEBPULSE, SOLERA NETWORKS, DEEPSEE, DS APPLIANCE, SEE EVERYTHING. KNOW EVERYTHING., SECURITY EMPOWERS BUSINESS, BLUETOUCH, the Blue Coat shield, K9, and Solera Networks logos and other Blue Coat logos are registered trademarks or trademarks of Blue Coat Systems, Inc. or its affiliates in the U.S. and certain other countries. This list may not be complete, and the absence of a trademark from this list does not mean it is not a trademark of Blue Coat or that Blue Coat has stopped using the trademark. All other trademarks mentioned in this document owned by third parties are the property of their respective owners. This document is for informational purposes only. BLUE COAT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. BLUE COAT PRODUCTS, TECHNICAL SERVICES, AND ANY OTHER TECHNICAL DATA REFERENCED IN THIS DOCUMENT ARE SUBJECT TO U.S. EXPORT CONTROL AND SANCTIONS LAWS, REGULATIONS AND REQUIREMENTS, AND MAY BE SUBJECT TO EXPORT OR IMPORT REGULATIONS IN OTHER COUNTRIES. YOU AGREE TO COMPLY STRICTLY WITH THESE LAWS, REGULATIONS AND REQUIREMENTS, AND ACKNOWLEDGE THAT YOU HAVE THE RESPONSIBILITY TO OBTAIN ANY LICENSES, PERMITS OR OTHER APPROVALS THAT MAY BE REQUIRED IN ORDER TO EXPORT, RE-EXPORT, TRANSFER IN COUNTRY OR IMPORT AFTER DELIVERY TO YOU. Americas: Blue Coat Systems, Inc. 384 Santa Trinita Ave. Sunnyvale, CA Rest of the World: Blue Coat Systems International SARL 3a Route des Arsenaux 1700 Fribourg, Switzerland 1/25/2016
3 Web Application Classification Overview In addition to identifying the category of a URL, the WebPulse cloud service is able to inspect a URL and identify the type of web application and operation. PacketShaper can then use this information to classify the traffic into classes based on the web app or operation. By using the WebPulse cloud service, PacketShaper can expand its classification capabilities to include over 100 web applications, such as Facebook, Gmail, LinkedIn, Twitter, and Flickr and almost 20 different web operations (such as Download Attachment, Play Video, and Send ). Thus, you can create the following types of classes: A specific web application for any operation (Service=Facebook, Operation=any) A specific operation for any web application (Operation=Upload Pictures, Service=any) A specific web application for a specific operation (Service=Facebook, Operation=Upload Pictures) To see current lists of the supported web applications and operations, go to: If traffic discovery is turned on and WebPulse is enabled, PacketShaper will automatically discover web applications, just as it discovers other services. The web application classes appear in the traffic tree, mixed in with other service-based classes. Operations are not auto-discovered; these classes must be manually created. As you can with any type of class, you can use PacketShaper s control capabilities to assign policies based on the application or operation. For example, you can create a policy to block the playing of Netflix or YouTube streaming videos. The following steps and illustration describe PacketShaper's process for identifying web applications and operations of URLs. 3
4 1. When a user requests a web page, PacketShaper first looks in its in-memory URL cache to see if it has already identified the URL. If it finds the URL in the cache, it jumps to step 4. If not, it proceeds to step PacketShaper sends the URL to WebPulse, a cloud-based service provided by Blue Coat that (a) receives web application/operation identification requests and (b) responds with the IDs of the application and operation associated with the URL. 3. This URL and its web application and operation IDs are then stored in the cache in the PacketShaper system memory. 4. PacketShaper looks in the WebPulse map file for the service name associated with the URL s application ID. It also looks up the operation ID to determine the action type. 5. PacketShaper classifies the traffic into the appropriate class, and applies any policy that might be assigned to the class. Note: In addition to the web application and operation for a URL, WebPulse looks up the URL category. See WebPulse Overview for a description of the complete process. WebPulse Express With WebPulse Express, the URL database is stored locally (available on the PS-S500 appliance only). The following steps and illustration describe the process for identifying web applications and operations of URLs when the URL database is on box. 4
5 1. When a user requests a web page, PacketShaper first looks in its on-box URL database for the URL. 2. If it finds the URL in the database, it jumps to step 4. If not, it proceeds to step PacketShaper looks in its in-memory URL caches to see if it has already identified the URL. If it finds the URL in the cache, it proceeds to step 4. If not, PacketShaper sends the URL to the WebPulse cloud to identify the web application and operation associated with the URL.The URL and its IDs for web app and operation are stored in the URL cache in the PacketShaper system memory. 4. PacketShaper looks in the WebPulse map file for the service name associated with the URL s application ID. It also looks up the operation ID to determine the action type. 5. PacketShaper classifies the traffic into the appropriate class, and applies any policy that might be assigned to the class. URL Cache After WebPulse has looked up the web application and operation IDs for a URL, PacketShaper stores the results in the URL cache in its system memory. Since serving from the cache is faster and more efficient than querying WebPulse, PacketShaper will always check the cache first before sending a query to WebPulse. WebPulse provides a time to live (TTL) for each URL response. The PacketShaper scales this TTL by a multiple of seven to improve its cache efficiency. For instance, if the WebPulse service returns a TTL of one day for a particular URL, the PacketShaper will cache that URL and its associated web application and operation IDs for seven days. The maximum cache size and number of entries in the cache varies by PacketShaper model. See Configuration Limits in PacketGuide. The URL cache is stored in system memory, so the contents will be removed if the PacketShaper is reset or loses power. To preserve the cache contents, PacketShaper automatically backs up the cache to the /urlcat/cache/ folder every 24 hours (replacing the previous backup). After a PacketShaper reboot, the most recent cache backup is automatically copied into system memory. Legacy Built-In Web Applications Previous versions of PacketShaper contained built-in services to classify a number of web applications, such as Facebook, YouTube, and WebEx. Starting in v9.2, these built-in web application services are replaced by those that WebPulse can 5
6 identify when WebPulse is enabled. In addition, some of these web apps now have enhanced classification so that they can be further sub-classified into Operations (for example, Facebook/Upload_Pictures). If you turn WebPulse off, PacketShaper returns to using the legacy built-in web application services for classification, as it had done in previous versions. Feature Requirements The web application classification feature has the following requirements: WebPulse must be enabled on the PacketShaper. PacketShaper must have access to the Internet. WebPulse Express requires a PS-S500 with more than 32 GB of RAM and a WebPulse Express subscription. Feature Limitations The web application/operation classification feature has the following limitations: Because the PacketShaper gives higher priority to flow delivery than to classification, it will never hold up flows to wait for a response from WebPulse. Therefore, the first few packets of a flow may get classified into a web or default class until WebPulse sends the web application/operation IDs to the PacketShaper. Packet processing takes precedence over web application identification. If the PacketShaper is under load, URL queries may get queued, and some requests may be dropped. Behavior for asymmetrically applied redirect policies is non-deterministic for web-application classes since this identification is done out of path. Therefore, when applying never-admit policies with the redirect option, be sure to apply the policy to the web application classes in both directions (Inbound and Outbound). Web operation classification is not supported for application traffic that is encrypted by SSL. 6
7 WebPulse Overview Blue Coat products such as PacketShaper are able to send URLs to the WebPulse cloud service or an on-box URL database so that it can identify the URL category (social networking, gambling, pornography, news media, shopping, etc.), web application (such as Facebook, Gmail, LinkedIn, Twitter, and Flickr), and operation (such as Download Attachment, Play Video, and Send ). PacketShaper can then use this information to classify the traffic into classes based on the URL category, web application, or operation. By using WebPulse, PacketShaper can expand its classification capabilities to include over 85 categories, 170 web applications, and 20 different web operations. WebPulse contains a database of over 15 million entries and is growing every day. It provides URL identification to the PacketShaper via requests to WebPulse service points located across the globe. Each service point is periodically pinged in order to ensure that category, application, and operation IDs are provided from the fastest service point. The following steps and illustration describe PacketShaper's process for identifying categories, web applications, and web operations of URLs. 1. When a user requests a web page, PacketShaper first looks in its in-memory URL caches to see if it has already identified the URL. If it finds the URL in the cache, it jumps to step 4. If not, it proceeds to step PacketShaper sends the URL to WebPulse to identify the category, web application, and operation associated with the URL. 3. The URL and its IDs for category, web app, and operation are stored in the URL cache in the PacketShaper system memory. 4. PacketShaper looks in the WebPulse map files for further information. For example, the category map file contains the category name associated with the URL s category ID. 5. PacketShaper classifies the traffic into the appropriate class, and applies any policy that might be assigned to the class. WebPulse Express Caution: This feature is available only on PS-S500 appliances with 64GB of memory. See setup webpulse express. With WebPulse Express, the URL database is stored locally (available on the PS-S500 appliance only). The following steps and illustration describe the process for identifying categories, web applications, and operations of URLs when the URL database is on box. 7
8 1. When a user requests a web page, PacketShaper first looks in its on-box URL database for the URL. 2. If it finds the URL in the database, it jumps to step 4. If not, it proceeds to step PacketShaper looks in its in-memory URL caches to see if it has already identified the URL. If it finds the URL in the cache, it proceeds to step 4. If not, PacketShaper sends the URL to the WebPulse cloud to identify the category, web application, and operation associated with the URL.The URL and its IDs for category, web app, and operation are stored in the URL cache in the PacketShaper system memory. 4. PacketShaper looks in the WebPulse map files for further information. For example, the category map file contains the category name associated with the URL s category ID. 5. PacketShaper classifies the traffic into the appropriate class, and applies any policy that might be assigned to the class. URL Cache After WebPulse has looked up a URL in its database in the cloud, PacketShaper stores the results in a URL cache in its system memory. The URL and its category, web application, and operation IDs are stored in this cache. Since serving from the cache is faster and more efficient than querying WebPulse, PacketShaper will always check the cache first before sending a query to WebPulse. WebPulse provides a time to live (TTL) for each URL response. The PacketShaper scales this TTL by a multiple of seven to improve its cache efficiency. For instance, if the WebPulse service returns a TTL of one day for a particular URL, the PacketShaper will cache that URL and its associated IDs for seven days. The maximum cache size and number of entries in the cache varies by PacketShaper model. See Configuration Limits in PacketGuide. The URL cache is stored in system memory, so the contents will be removed if the PacketShaper is reset or loses power. To preserve the cache contents, PacketShaper automatically backs up the cache to the /urlcat/cache/ folder every 24 hours (replacing the previous backup). After a PacketShaper reboot, the most recent URL cache backup is automatically copied into system memory. If WebPulse is disabled, PacketShaper does not look up URLs in the WebPulse cloud or in the URL cache. With WebPulse Express, the cache is used only if a URL is not in the on-box database and the URL needs to be looked up in the WebPulse cloud. 8
9 Monitoring WebPulse-Related Traffic If you want to monitor or control WebPulse query traffic, you can create a class based on the WebPulse service. There are two ways to do this: Manually create a WebPulse child class of the Localhost classes. or Turn on class discovery for the Localhost classes. (Localhost represents PacketShaper management traffic.) Note: If there are other Blue Coat products on your network that are using the WebPulse service (such as ProxySG or ProxyClient), these WebPulse queries are classified into a WebPulse class at the root (not Localhost). The Localhost/WebPulse class classifies only PacketShaper queries to WebPulse. WebPulse Deployment Requirements WebPulse has the following deployment requirements: The PacketShaper must have Internet access to connect to the WebPulse service. A DNS server must be configured on the PacketShaper. If you want to secure access to the outside interface, do not use the secure option because WebPulse requires access to a number of outside web servers. Instead, use the list security option and add the IP addresses of the following servers to the exception list: WebPulse service points (Use the setup webpulse show service CLI command to see the IP addresses of the servers; add the one or two fastest servers.) WebPulse map update server (sitereview.bluecoat.com) support update server (updates.bluecoat.com) heartbeat server (hb.bluecoat.com) Note: To find the IP address associated with each of these servers, use the nslookup command (such as the dns lookup CLI command). WebPulse Express requires a PS-S500 with 64 GB of RAM and a WebPulse Express subscription. 9
10 Configure WebPulse WebPulse is a service provided by Blue Coat that receives URL identification requests and responds with the IDs of the category, application, and/or operation associated with the URL. When WebPulse is enabled, you will have the ability to: create classes based on specific URL categories, and PacketShaper will then classify web traffic that corresponds to each of these categories into the appropriate class auto-discover category classes (you must first create an "all categories" class and enable class discovery) create classes based on specific web applications and operations auto-discover web application classes The WebPulse URL database is either in the cloud or stored locally on the appliance. Note that the option for a locally stored database is available only on PS-S500 appliances using WebPulse Express (see setup webpulse express). To configure WebPulse: 1. Click the Setup tab. 2. Choose the WebPulse setup page. 3. For WebPulse, select on. 4. (Optional). Select which categories you want to auto-discover. 5. Click apply changes. Additional Information By default, PacketShaper auto-discovers category classes after it sees one flow for the category in a one-minute time interval. This threshold is user configurable via the URL Categories system variable. 10
11 If you have secured the PacketShaper's outside interface, the WebPulse feature requires that you add the following servers to the exception list: the fastest WebPulse service points (use the setup webpulse show service CLI command to find the IP addresses), the WebPulse map update server (sitereview.bluecoat.com), and the support update server (updates.bluecoat.com). Although you can create URL category and web application classes when WebPulse is disabled, there won't be any classification into these classes until you enable WebPulse. If WebPulse is disabled, PacketShaper does not look up URLs in the WebPulse cloud, in the URL cache, or in the WebPulse Express local database. 11
12 Manually Update the WebPulse Maps PacketShaper uses mapping files to integrate with WebPulse, to identify URL category names, web application names, and operation names. The WebPulse maps support the following features: URL categorization: The category map associates URL category names with numeric IDs. PacketShaper refers to the map to look up the category name after WebPulse has assigned a category ID to a flow. Web application identification: The web application map associates web application names with numeric IDs, and lists the operation IDs applicable to the application. PacketShaper refers to the map to look up the application name after WebPulse has assigned an application ID to a flow. In addition, PacketShaper uses the map to determine which operations are applicable to an application, for example, to create a class for a specific operation for a web application (such as Facebook-Post_Messages, Gmail-Upload_Attachment). When you enable WebPulse, the latest maps are automatically downloaded to your PacketShaper. Thereafter, PacketShaper automatically downloads the map files every day and after a device reset, regardless of whether the files have changed or not. If you want to make sure your PacketShaper has the latest WebPulse maps, you can use the update now button on the WebPulse setup page. To manually update the WebPulse maps: 1. Click the Setup tab. 2. Choose the WebPulse setup page. The version of the WebPulse maps are displayed, as well as the date of the last download. For example: URL Categories Map: Version 8, Oct 10, :49:10 Web Application Map: Oct 10, :49:10 3. Click update now. 12
13 The map files are downloaded, replacing the current files (even if the files haven't changed). The version number will change if applicable and the time stamp will reflect the date and time the file was updated. Note: The Categories map version is incremented when a category has been added, renamed, or deleted. 13
14 View Lists of Web Applications and Operations To determine which web applications and operations WebPulse can identify, go to the WebPulse setup screen. You can create traffic classes for any of these applications and operations, or if traffic discovery and WebPulse are both enabled, PacketShaper will auto-discover these applications. 1. Click the Setup tab. 2. From the list of setup pages, select WebPulse. The WebPulse setup page appears. 3. Click the next to View Web Applications & Operations. The Web Applications are listed. 14
15 4. To see which operations are applicable to an application, click the next to the application name. The applicable operations are listed below the application. 5. To list the applications that are assoicated with a particular operation: a. For Search by, select Operation. b. In the text box, type the operation (such as upload). The list is then filtered by the specified operation, displaying only the applications that can be classified by that operation. c. To remove the search filter, click. 6. To search for a specific application: a. For Search by, select Application. b. In the text box, type the application (such as LinkedIn). Only the specified application is displayed in the list. c. To remove the search filter, click. Additional Information 15
16 Web applications that WebPulse can identify are also listed on the Services drop-down on the New Traffic Class page; they are mixed in with other PacketShaper classification services. See "Classify Web Applications" (Advanced UI, Sky). Operations are also listed on the Operations drop-down when creating a class. 16
17 Classify Web Applications By using the WebPulse cloud service, PacketShaper can expand its classification capabilities to include over 100 web applications, such as Facebook, Gmail, LinkedIn, Twitter, and Flickr. In addition to classifying by web application, you can classify by specific web operations (such as Download Attachment, Play Video, and Send ). Thus, you can create the following types of classes: A specific web application for any operation (Service=Facebook, Operation=any) A specific operation for any web application (Operation=Upload Pictures, Service=any) A specific web application for a specific operation (Service=Facebook, Operation=Upload Pictures) You can manually create classes based on web applications and operations, or you can have PacketShaper autodiscover the web applications. Manually Creating Web Application Classes To create a web application class: 1. Click the Manage tab. 2. In the left window pane, select the class or folder (such as Inbound) that will be the parent of the class you are about to define. 3. Click class and select add. 4. In the Name field, type a descriptive name (up to 31 characters; hyphens, underscores, and periods are acceptable). 5. To classify by a particular web application, choose the Service from the drop-down list. 6. (Optional) To classify by a specific web operation (such as Download Attachment), choose the Operation from the drop-down list. If you selected a web application for the Service in the previous step, the Operation drop-down will list only the operations that are applicable to that application. 7. Click add class. 8. Make sure WebPulse is enabled. 17
18 Autodiscovering Web Applications Assuming traffic discovery and WebPulse are both enabled, PacketShaper automatically discovers web applications and creates classes for them in the traffic tree. To autodiscover web applications: 1. Make sure global traffic discovery is enabled. 2. Make sure WebPulse is enabled. Additional Information Although you can create web application classes when WebPulse is disabled, there won't be any classification into these classes until you enable WebPulse. Web operations cannot be autodiscovered. 18
19 Create a Web Application Class in Blue Coat Sky By using the WebPulse cloud service, PacketShaper can expand its classification capabilities to include over 100 web applications, such as Facebook, Gmail, LinkedIn, Twitter, and Flickr. In addition to classifying by web application, you can classify by specific operations (such as Download Attachment, Play Video, and Send ). Thus, you can create the following types of classes: A specific web application for any operation (Service=Facebook, Operation=any) A specific operation for any web application (Operation=Upload Pictures, Service=any) A specific web application for a specific operation (Service=Facebook, Operation=Upload Pictures) To create a web application class: 1. Click the Traffic Management tab. The class tree appears in the upper pane. 2. In the class tree, select the parent class for your new class (such as Root). 3. Click the Policy Manager icon. The Policy Manager appears in the lower pane. 4. Select the Class Operations tab. 5. Click Add Class. 6. In the Name field, type a name for the web application class (up to 31 characters; hyphens, underscores, and periods are acceptable). 7. In the Matching Rule Criteria form, select Service/Group. 8. To classify by a particular web application, choose the Service from the drop-down list. 9. (Optional) To classify by a specific web operation (such as Download Attachment), choose the Operation from the drop-down list. If you selected a web application for the Service in the previous step, the Operation drop-down will list only the operations that are applicable to that application. 10. Click Apply. 11. Make sure WebPulse is enabled. 19
20 20 Web Application Classification Feature
Decrypt Inbound SSL Traffic for Passive Security Device (D-H)
Decrypt Inbound SSL Traffic for Passive Security Device (D-H) SSL Visibility Appliance First Steps Guide Third Party Copyright Notices 2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG,
Blue Coat Security First Steps Solution for Controlling Web Applications
Blue Coat Security First Steps Solution for Controlling Web Applications SGOS 6.5 Third Party Copyright Notices 2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,
Blue Coat Security First Steps. Solution for HTTP Object Caching
Solution for HTTP Object Caching Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE, CROSSBEAM,
Blue Coat Security First Steps Solution for Deploying an Explicit Proxy
Blue Coat Security First Steps Solution for Deploying an Explicit Proxy SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,
Blue Coat Security First Steps Solution for Recording and Reporting Employee Web Activity
Solution for Recording and Reporting Employee Web Activity SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
Blue Coat Security First Steps Transparent Proxy Deployments
Transparent Proxy Deployments SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE,
Blue Coat Security First Steps Solution for Controlling HTTPS
Solution for Controlling HTTPS SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE,
Blue Coat ICS PROTECTION Scanner Station Version
Blue Coat ICS PROTECTION Scanner Station Version USB Malware Defense for Industrial Computers User Guide, version 5.3.1 Contents Contents 1. ABOUT... 3 1.1. About this Guide... 3 1.2. System Requirements...
Blue Coat Security First Steps Solution for Streaming Media
Blue Coat Security First Steps Solution for Streaming Media SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
BOOSTING INTERNET ACCESS LINK PERFORMANCE WITH BLUE COAT WAN OPTIMIZATION TECHNOLOGIES
PERFORMANCE WITH BLUE COAT WHITEPAPER EXECUTIVE SUMMARY Gateways to Internet traffic are facing unprecedented loads and growth rates in all types of industries and organizations due to the growth of mobile
Blue Coat Security First Steps Solution for Integrating Authentication Using LDAP
Solution for Integrating Authentication Using LDAP SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
WAN OPTIMIZATION FOR MICROSOFT SHAREPOINT BPOS
WHITEPAPER EXECUTIVE SUMMARY Microsoft SharePoint is a web-based collaboration and information-sharing platform designed as a centralized replacement for multiple web applications. SharePoint leverages
SECURE WEB GATEWAY DEPLOYMENT METHODOLOGIES
WHITEPAPER In today s complex network architectures it seems there are limitless ways to deploy networking equipment. This may be the case for some networking gear, but for web gateways there are only
NEXT GENERATION SECURE WEB GATEWAY: THE CORNERSTONE OF YOUR SECURITY ARCHITECTURE
: THE CORNERSTONE OF YOUR SECURITY ARCHITECTURE A CLOSER LOOK REVEALS WHY PROXY-BASED ARCHITECTURE IS UNIQUELY EFFECTIVE IN DEFENDING AGAINST WEB-BASED THREATS. The web is central to the way we work, live,
Blue Coat Cloud Data Protection Server Administration Guide
Blue Coat Cloud Data Protection Server Administration Guide Software version 4.5.x September 16, 2015 2015 Blue Coat Systems, Inc. All rights reserved. Blue Coat, the Blue Coat logos, ProxySG, PacketShaper,
Blue Coat Security First Steps Solution for Integrating Authentication
Solution for Integrating Authentication using IWA Direct SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
Secure Web Gateway Virtual Appliance Initial Configuration Guide Platform: VMware vsphere Hypervisor
Secure Web Gateway Virtual Appliance Initial Configuration Guide Platform: VMware vsphere Hypervisor SGOS 6.5.x and later i Secure Web Gateway Virtual Appliance Contact Information Americas: Blue Coat
Blue Coat Systems. Client Manager Redundancy for ProxyClient Deployments
Blue Coat Systems Client Manager Redundancy for ProxyClient Deployments Copyright 1999-2013 Blue Coat Systems, Inc. All rights reserved worldwide. No part of this document may be reproduced by any means
Policy Guide. Version 6.8.2/Doc Revision: 10/23/15
Policy Guide Version 6.8.2/Doc Revision: 10/23/15 Blue Coat Web Security Service Copyrights 2015 Blue Coat Systems, Inc.All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
Using PacketShaper to Control Bring Your Own Device Traffic
Blue Coat Systems Using PacketShaper to Control Bring Your Own Device Traffic Tips and Tricks Supporting the BYOD Worldwide Phenomenon Copyright 1999-2013 Blue Coat Systems, Inc. All rights reserved worldwide.
SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION
SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION How ThreatBLADES add real-time threat scanning and alerting to the Analytics Platform INTRODUCTION: analytics solutions have become an essential weapon
Initial Configuration Guide
Initial Configuration Guide For Virtual Appliances Management Center 1.3.2.1 Version 1.3.2.1 Third Party Copyright Notices Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER,
Integrating the ProxySG and ProxyAV Appliances. For SGOS 6.5 and later and AVOS 3.5 and later
Integrating the ProxySG and ProxyAV Appliances For SGOS 6.5 and later and AVOS 3.5 and later i Contact Information Americas: Blue Coat Systems Inc. 410 North Mary Ave Sunnyvale, CA 94085-4121 Rest of the
A TECHNICAL REVIEW OF CACHING TECHNOLOGIES
WHITEPAPER Over the past 10 years, the use of applications to enable business processes has evolved drastically. What was once a nice-to-have is now a mainstream staple that exists at the core of business,
IWA AUTHENTICATION FUNDAMENTALS AND DEPLOYMENT GUIDELINES
IWA AUTHENTICATION FUNDAMENTALS AND DEPLOYMENT GUIDELINES TECHNICAL BRIEF INTRODUCTION The purpose of this document is to explain how Integrated Windows Authentication (IWA) works with the ProxySG appliance,
Security Report. Security Empowers Business DO NOT ENTER. Blue Coat Research Maps the Web s Shadiest Neighborhoods. September 2015
Security Report Security Empowers Business DO NOT ENTER Blue Coat Research Maps the Web s Shadiest Neighborhoods September 2015 The Web s Shadiest Neighborhoods KEY FINDINGS There has been an explosion
Unified Agent Access Method
Unified Agent Access Method Version 6.8.5/Doc Revision: 04/21/16 Blue Coat Web Security Service/Page 2 Page 3 Copyrights 2016 Blue Coat Systems, Inc.All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER,
Reverse Proxy Deployment Guide
Reverse Proxy Deployment Guide PDF of the Online WebGuide SGOS 6.5.x and Later Third Party Copyright Notices 2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,
ProxySG 510/810 Series. Hard Disk Drive Installation
Blue Coat 510/810 Series Disk Drive Installation Blue Coat ProxySG 510/810 Series Hard Disk Drive Installation Section A: Before You Begin About this Document This document describes how to replace disk
First Steps to Using a PacketShaper
First Steps to Using a PacketShaper Table of Contents Table of Contents Overview... 1 Classifying Traffic on the Network... 2 Discover Traffic... 2 View the Class Tree... 3 Problems?... 4 Analyzing Network
VIRTUALIZED SECURITY: THE NEXT GENERATION OF CONSOLIDATION
WHITEPAPER A consolidated security infrastructure is more than just an idea; in today s world of increasingly diversified threats and associated rising costs, it s imperative that organizations adopt a
Blue Coat ProxySG Authentication Guide. SGOS 6.5.x
Blue Coat ProxySG Authentication Guide SGOS 6.5.x 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE, CROSSBEAM, K9,
Content Analysis System Guide
Content Analysis System Guide Version 1.1.4.1 - 2 - Content Analysis System Administration Guide Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER,
Administration Guide. Content Analysis 1.3.6.x
Administration Guide Content Analysis 1.3.6.x Third Party Copyright Notices 2016 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE,
Proxy Forwarding Access Method
Proxy Forwarding Access Method Version 6.8.3/Doc Revision: 12/17/15 Blue Coat Web Security Service Proxy Fowarding Access Method Copyrights 2015 Blue Coat Systems, Inc.All rights reserved. BLUE COAT, PROXYSG,
Blue Coat Systems. PacketShaper Redundant Setup
Blue Coat Systems PacketShaper Redundant Setup Copyright 1999-2013 Blue Coat Systems, Inc. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified, decompiled,
Blue Coat Systems. Reference Guide. WCCP Reference Guide. For SGOS 5.3
Blue Coat Systems Reference Guide WCCP Reference Guide For SGOS 5.3 Contact Information Blue Coat Systems Inc. 420 North Mary Ave Sunnyvale, CA 94085-4121 http://www.bluecoat.com/support/contact.html [email protected]
Proxy Forwarding Access Method
Proxy Forwarding Access Method Version 6.8.5/Doc Revision: 02/26/16 Blue Coat Web Security Service/Page 2 Proxy Fowarding Access Method/Page 3 Copyrights 2016 Blue Coat Systems, Inc.All rights reserved.
Blue Coat Systems. Reference Guide. WCCP Reference Guide. For SGOS 5.5-6.2
Blue Coat Systems Reference Guide WCCP Reference Guide For SGOS 5.5-6.2 Contact Information Americas: Blue Coat Systems Inc. 410 North Mary Ave Sunnyvale, CA 94085-4121 Rest of the World: Blue Coat Systems
SSL Proxy Deployment Guide
SSL Proxy Deployment Guide SGOS 6.5 and later Version: 02-07.14.15 - 2 - Copyrights 2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS,
SNMP Critical Resource Monitoring
SNMP Critical Resource Monitoring SGOS 6.5.x and later i SNMP Critical Resource Monitoring Contact Information Americas: Blue Coat Systems Inc. 420 North Mary Ave Sunnyvale, CA 94085-4121 Rest of the World:
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction
Content Filtering Client Policy & Reporting Administrator s Guide
Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
Blue Coat Systems Cloud Security Service Overview. Blue Coat Cloud Security Service (ThreatPulse)
Blue Coat Systems Cloud Security Service Overview Blue Coat Cloud Security Service (ThreatPulse) Blue Coat Cloud Security Service: Security Statements Contact Information Americas: Blue Coat Systems Inc.
BCAAA 6.1 Service Requirements
BCAAA 6.1 Service Requirements Current Version: 6.1.3 Image Location: The current version of BCAAA is available for download with the latest SGOS GA releases SGOS Compatibility: SGOS 5.4, 5.5, 6.x Platform
Web Application Firewall
Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this
Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
DUBEX CUSTOMER MEETING
DUBEX CUSTOMER MEETING JOHN YUN Director, Product Marketing Feb 4, 2014 1 AGENDA WebPulse Blue Coat Cloud Service Overview Mobile Device Security 2 WEBPULSE 3 GLOBAL THREAT PROTECTION NEGATIVE DAY DEFENSE
Threat Containment for Facebook
Threat Containment for Facebook Based on statistics for more than 62M users in 2009, the Blue Coat WebPulse cloud service ranked social networking as the number one most requested web category, surpassing
Cloud Backup for Joomla
Cloud Backup for Joomla Email: [email protected] Release: January, 2013 Version: 2.1 By - 1 Installation 1. Download the extensions from our website http:// 2. Extract the downloaded archive using your
EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS
EXTENDING THREAT PROTECTION AND WHITEPAPER CLOUD-BASED SECURITY SERVICES PROTECT USERS IN ANY LOCATION ACROSS ANY NETWORK It s a phenomenon and a fact: employees are always on today. They connect to the
Crestron Fusion Cloud Service Enterprise Management Platform
Crestron Fusion Cloud Service Enterprise Management Platform Getting Started Guide Cloud Deployment Crestron Electronics, Inc. Crestron product development software is licensed to Crestron dealers and
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...
Initial Configuration Guide
Blue Coat Systems ProxySG VA Initial Configuration Guide For SGOS 5.5.2 or later Platform: ESX / ESXi Server Contact Information Americas: Blue Coat Systems Inc. 410 North Mary Ave Sunnyvale, CA 94085-4121
WildFire Cloud File Analysis
WildFire 6.1 Administrator s Guide WildFire Cloud File Analysis Palo Alto Networks WildFire Administrator s Guide Version 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America
Managing Users and Identity Stores
CHAPTER 8 Overview ACS manages your network devices and other ACS clients by using the ACS network resource repositories and identity stores. When a host connects to the network through ACS requesting
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
Mobile App User's Guide
Mobile App User's Guide Copyright Statement Copyright Acronis International GmbH, 2002-2012. All rights reserved. "Acronis", "Acronis Compute with Confidence", "Acronis Recovery Manager", "Acronis Secure
FOUR STEPS TO HIGH PERFORMANCE WAN AND INTERNET
WHITEPAPER VISIBILITY AND CONTROL ARE KEY TO AN EFFECTIVE WAN PERFORMANCE STRATEGY Problems with application and network performance on the WAN and Internet links are caused by many and varied issues congestion,
Blue Coat WebFilter >
White Paper Blue Coat WebFilter > Delivering the web access your users want with the control you need Why Dynamic Content Filtering has Become Essential Two billion videos per day are watched on YouTube.
Copyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Setting up Microsoft Office 365
Setup Guide Revision F Using McAfee SaaS Email Protection to Secure Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft
Setting up Microsoft Office 365
Integration Guide Revision G McAfee SaaS Email Protection Securing Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft
Audit Management Reference
www.novell.com/documentation Audit Management Reference ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
CA Nimsoft Monitor. Probe Guide for Active Directory Response. ad_response v1.6 series
CA Nimsoft Monitor Probe Guide for Active Directory Response ad_response v1.6 series Legal Notices This online help system (the "System") is for your informational purposes only and is subject to change
Deploying System Center 2012 R2 Configuration Manager
Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.
Application Control and URL Filtering
Application Control and URL Filtering R77 Versions Administration Guide 17 May 2015 Classification: [Protected] 2015 Check Point Software Technologies Ltd. All rights reserved. This product and related
NEXT GENERATION SECURITY ANALYTICS: REAL WORLD USE CASES KEY FEATURES AND NEW USES FOR THE BLUE COAT SECURITY ANALYTICS PLATFORM
NEXT GENERATION SECURITY ANALYTICS: REAL WORLD USE CASES KEY FEATURES AND NEW USES FOR THE BLUE COAT SECURITY ANALYTICS PLATFORM SECURITY ANALYTICS: MUCH MORE THAN NETWORK FORENSICS Prior generations of
Drobo How-To Guide. Cloud Storage Using Amazon Storage Gateway with Drobo iscsi SAN
The Amazon Web Services (AWS) Storage Gateway uses an on-premises virtual appliance to replicate a portion of your local Drobo iscsi SAN (Drobo B1200i, left below, and Drobo B800i, right below) to cloudbased
Blue Coat Systems ProxySG Appliance
Blue Coat Systems ProxySG Appliance SGOS 6.2 Upgrade/Downgrade Feature Change Reference Version SGOS 6.2 Blue Coat SGOS 6.2 Upgrade/Downgrade Feature Change Reference Contact Information Americas: Blue
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
NMS300 Network Management System
NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate
Installing GFI MailEssentials
Installing GFI MailEssentials Introduction to installing GFI MailEssentials This chapter shows you how to install and configure GFI MailEssentials. GFI MailEssentials can be installed in two ways: Installation
http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
Deploying the Workspace Application for Microsoft SharePoint Online
Microsoft Dynamics GP Deploying the Workspace Application for Microsoft SharePoint Online Microsoft Dynamics GP Workspace is a method to enable Microsoft Excel-based dashboards for SharePoint Online. This
WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks
WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on
NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
McAfee Endpoint Encryption Reporting Tool
McAfee Endpoint Encryption Reporting Tool User Guide Version 5.2.13 McAfee, Inc. McAfee, Inc. 3965 Freedom Circle, Santa Clara, CA 95054, USA Tel: (+1) 888.847.8766 For more information regarding local
Customer admin guide. UC Management Centre
Customer admin guide UC Management Centre June 2013 Contents 1. Introduction 1.1 Logging into the UC Management Centre 1.2 Language Options 1.3 Navigating Around the UC Management Centre 4 4 5 5 2. Customers
Step-by-Step Configuration
Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local
IBM Security QRadar SIEM Version 7.1.0 MR1. Administration Guide
IBM Security QRadar SIEM Version 7..0 MR Administration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 07. Copyright
OneDrive for Business FAQ s Updated 6/19/14
OneDrive for Business FAQ s Updated 6/19/14 What is OneDrive for Business? OneDrive for Business is an online service that provides resources for file storage, collaboration, and communication. It provides
Pharos Control User Guide
Outdoor Wireless Solution Pharos Control User Guide REV1.0.0 1910011083 Contents Contents... I Chapter 1 Quick Start Guide... 1 1.1 Introduction... 1 1.2 Installation... 1 1.3 Before Login... 8 Chapter
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
HP IMC Firewall Manager
HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this
Blue Coat Systems Reporter 9.x
Blue Coat Systems Reporter 9.x Initial Configuration Guide Reporter Versions 9.4.x Blue Coat Reporter 9.x Initial Configuration Guide Contact Information Americas: Blue Coat Systems Inc. 420 North Mary
Help. F-Secure Online Backup
Help F-Secure Online Backup F-Secure Online Backup Help... 3 Introduction... 3 What is F-Secure Online Backup?... 3 How does the program work?... 3 Using the service for the first time... 3 Activating
Portal Administration. Administrator Guide
Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec
genie app and genie mobile app
genie app and genie mobile app User Manual 350 East Plumeria Drive San Jose, CA 95134 USA June 2012 202-10933-02 v1.0 2012 NETGEAR, Inc. All rights reserved No part of this publication may be reproduced,
Configuring Trend Micro Content Security
9 CHAPTER This chapter describes how to configure the CSC SSM using the CSC Setup Wizard in ASDM and the CSC SSM GUI, and includes the following sections: Information About the CSC SSM, page 9-1 Licensing
Downloading and Configuring WebFilter
Downloading and Configuring WebFilter What is URL Filtering? URL filtering is a type of transaction content filtering that limits a user s Web site access through a policy that is associated with a specific
Manage Licenses and Updates
Manage Licenses and Updates Palo Alto Networks Panorama Administrator s Guide Version 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054
Kaseya 2. User Guide. Version 1.1
Kaseya 2 Directory Services User Guide Version 1.1 September 10, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.
Monitoring Replication
Monitoring Replication Article 1130112-02 Contents Summary... 3 Monitor Replicator Page... 3 Summary... 3 Status... 3 System Health... 4 Replicator Configuration... 5 Replicator Health... 6 Local Package
SolarWinds Migrating SolarWinds NPM Technical Reference
SolarWinds Migrating SolarWinds NPM Technical Reference Copyright 1995-2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified,
Secure Web Gateway 11.5 Release Notes
Trustwave is pleased to announce the release of Secure Web Gateway version 11.5. Review the Release Notes below for further information. Contents New Features... 1 General Enhancements and Bug Fixes...
