Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway
|
|
|
- Alan McGee
- 10 years ago
- Views:
Transcription
1 Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway Websense Support Webinar January 2010 web security data security security 2009 Websense, Inc. All rights reserved.
2 Webinar Presenter Juan R. Sanchez Title: Tech Support Specialist Over 3 years supporting Websense products 7 Years IT industry experience Websense Certified Software Engineer (WCSE) MCSA CCNA (In Progress) B.S. in Computer Sciences (National University) Juan Sanchez 2
3 Goals and Objectives Overview of Websense Web Security Requirements Transparent Authentication (NTLM Demo) Order of Precedence Locking down Category and Protocol Filters Bandwidth Optimization Real Time Scanning / Categorization Working with HTTPS (Certificates) Leveraging Reporting to Observe Trends Alerts to Monitor Behavior 3
4 Setup Overview Websense Content Gateway is a high-performance web proxy with caching. Integrates tightly with Websense Web Security components to provide maximum security, performance, and productivity management. 4
5 Websense Overview Installation & Setup Overview The integration mode must be Websense Content Gateway. A Port Mirror/SPAN must be configured at the top level switch. Directory Services Integration (Active Directory or edirectory) to leverage user and/or group filtering. NTLM Authentication or Transparent ID Agent (DC Agent, edirectory Agent, Logon Agent, or Radius Agent) must be configured to associate users to IPs for Filtering. Websense Content Gateway / V10000 Specific Webinars: Installing and Configuring Websense Content Gateway Common Configuration Methods for the Websense Content Gateway Configuration & Best Practices for Websense V
6 Ports Ports used for Websense Content Gateway 21 TCP (Transparent FTP proxy) 22 TCP (SSH) 53 or 5353 UDP (DNS requests) 80 TCP (Transparent HTTP proxy) 443 TCP (Transparent HTTPS proxy) 2048 UDP (WCCP) 2121 TCP (Explicit FTP proxy) 8070 TCP (Explicit HTTPS proxy) 8071 and 8081 TCP (Proxy management interface) 8080 TCP (Explicit HTTP proxy) , 3031 TCP (Required only if clustering proxies) 40000, 55806, 55880, TCP (Local Websense Policy Server) 55807, TCP (Local Websense Filtering Service) TCP (Remote Websense Policy Server or Filtering Service) 6
7 WCCP Sample Network Diagram Web traffic passes actively through Websense Content Gateway Other protocols are sniffed passively by Network Agent. 7
8 Transparent Identification with WCG Three basic ways to identify users Transparent ID agent such as DC Agent or Logon Agent detects users as they log onto the network. Manual Authentication prompts for credentials when the user makes their first request to the internet. NTLM challenge-based authentication. This can only be done with a proxy server that is in the data path and designed to integrate with Active Directory. Note: NTLM is transparent to user when on Domain and properly configured. Related Webinars: User Identification Technologies within Websense Web Security v7.x 8
9 NTLM Authentication Advantages Transparently identifies user at time of request (As opposed to being identified at logon) If transparent ID fails, manual prompt is built-in. This is commonly encountered if the user is not currently logged into the domain. Disadvantages Can be sensitive to browser settings in regards to transparent authentication. Occasionally may cause extra pop-up warnings requiring additional browser configuration. 9
10 NTLM Authentication A Common Solution to getting rid of the additional NTLM Authentication prompt is to set the proxy s IP address to Local Intranet zone, and confirm zone setting allows Automatic Logon. Step #1: From the Internet Options Security Tab Click on Custom Level Button 10
11 NTLM Authentication Step #2: Ensure the Logon Option is set on: Automatic logon only in Intranet zone 11
12 NTLM Authentication Step #3: From the Internet Options Security Tab Click on Sites Button 12
13 NTLM Authentication Step #4: From the Local Intranet Window Click on the Advanced Button Step #5: Add the WCG Proxy IP Address to the Websites List Box NTLM Demo 13
14 Order of Precedence You can assign a policy to a user, a single workstation IP, a IP range, or a group. Searching in this order, Websense software determines which policy applies to the current request. Websense proceeds through the list until a match is made. Once a match has been determined, the corresponding policy is applied and Websense looks no further. 14
15 Order of Precedence Only Policies assigned to Groups can be combined to create unique combinations of permissions based on Group Memberships. Effective Policy = Basic + Expanded Effective Policy = Basic 15
16 Order of Precedence Allows both General and IT Categories and Protocols Allows both General and HR Categories and Protocols 16
17 Locking down Category and Protocol Filters Recommended Categories to Block/Restrict Web Reputation Potentially Damaging Content, Elevated Exposure and Emerging Exploits * The Extended Protection categories are only available with Websense Web Security Suite v6.3.1 and above. Bandwidth Categories (also known as Bandwidth PG) Internet Radio and TV, Internet Telephony, Peer-to-Peer File Sharing, Personal Network Storage and Backup and Streaming Media Information Technology Proxy Avoidance, URL Translation Sites, Web Hosting, Private IP Addresses, and Uncategorized Society and Lifestyles (Very Diverse and Dynamic Content) Social Networking and Personal Sites 17
18 Locking down Category and Protocol Filters Recommended Protocols to Block/Restrict Protocols File Transfer Malicious Traffic*, Bot Networks, -Borne Worms, Other Malicious, P2P File Sharing, Proxy Avoidance,Remote Access, Streaming Media ThreatSeeker Example Brittany Murphy's Death SEO Poisoning Date: Threat Type: Malicious Web Site / Malicious Code Websense Security Labs ThreatSeeker Network has discovered that Google top searches on "Brittany Murphy death" will return rogue AV Web sites. The malicious domains try everything to convince people that they are real AV software Web sites, so that users download and execute the fake software offered. There are now a lot of variants available, typically named install.exe, and at the moment it seems they haven't attracted much attention from AV companies. 18
19 Bandwidth Optimization Keeping your Bandwidth Under Control The more bytes of unnecessary data are transferred from/to your users' machines, the greater the impact on bandwidth available for other business critical tasks performed by your network. When you create a category or protocol filter, you can easily elect to limit access to a category or protocol based on bandwidth usage. Block access to categories or protocols based on total network bandwidth usage. Block access to categories based on total bandwidth usage by HTTP traffic. Block access to a specific protocol based on bandwidth usage by that protocol. Bandwidth Optimization Demo 19
20 Real Time Scanning Four different types of real-time scanning: Content Categorization (On or Off) - Leave turned on. Turn off briefly for troubleshooting only. Security Scanning (Dynamic sites, All, or Off) - Recommended is for only dynamic sites as researched by Websense. If you are running significantly below maximum capacity of the V10000 or have a very powerful Content Gateway server, switching to All can provide some additional peace of mind. Advanced File Scanning (Dynamic sites, All, or Off) Traditional Anti-Virus (Dynamic sites, All, or Off) - Recommended to leave these also at default Dynamic sites only. 20
21 Real Time Scanning 21
22 Real Time Scanning 22
23 Real Time Scanning Fine Tune Scanning 23
24 Working with HTTPS WCG HTTP vs HTTPS 24
25 Working with HTTPS Content Gateway is fully capable of terminating and doing deep inspection on HTTPS headers and data. This allows you to treat HTTPS traffic just like HTTP. Full real-time scanning available for encrypted connections. Full URLs, not just IP addresses are available in reports. Without HTTPS proxy, URL data is contained inside the encryption layer, and cannot be read. No need to recategorize sites by IP address. Websense Content Gateway can read the URL and categorize appropriately. 25
26 Working with HTTPS Much better reporting on HTTPS requests. Compare the data returned on what sites were visited in the following two reports. 26
27 Working with HTTPS Recategorize HTTPS sites by name without having to worry about which IP address(es) they resolve to. Saves you the trouble of having to run nslookup against the hostname, plus there is no concern about the DNS records of the recategorized site changing. Set it and leave it. 27
28 Working with HTTPS 28
29 Working with HTTPS 29
30 Working with HTTPS Tunneling Remote access programs that are designed to be 100% secure between the end user and server. HTTPS connections that contain highly sensitive data exchanged between users and trusted servers (such as financial sites). 30
31 Working with HTTPS 31
32 Working with HTTPS Certificates HTTPS inspection at the Content Gateway User s browser literally exchanges keys with the Content Gateway not the web site on the internet. Browser trusts the Content Gateway to determine if the site s certificate is valid. Websense Content Gateway uses a certificate validation engine with updated revocation lists to provide this functionality. 32
33 Working with HTTPS For initial deployment phase, it is recommended to leave the Certificate Validation Engine disabled. Managing incidents takes time and generally is not technically problematic. Phase two deployment should include validation, with the option for users to bypass the certificate failure warnings. For maximum security, the validation should be required. 33
34 Certificate Validation Engine settings 34
35 Certificate Warning Internet Explorer This is direct to Internet. 35
36 Certificate Warning Firefox This is direct to Internet. 36
37 Certificate not valid Content Gateway This is the equivalent of IE and Firefox warnings, but will be returned by Content Gateway. 37
38 Manage Incidents 38
39 Leveraging Reporting and Alerts to Observe Trends Alerts, Investigative and Presentation Reports are invaluable tools to monitor: Productivity Bandwidth Usage Risk Useful Webinar Resources: Leveraging Websense Explorer to Optimize Internet Use and Minimize Security Threats Maximizing Your Return Using Investigative & Presentation Reports v7 39
40 Leveraging Reporting and Alerts to Observe Trends Alerts and Reporting Demo How to Track Productivity Loss, Legal Liability, Security Risk and Bandwidth Loss How to identify the main potential risks defined as Risk Classes Forensic Reporting Optimizing Policies based on Report Output Setting Up Alerts 40
41 Support Online Resources Knowledge Base Search or browse the knowledge base for documentation, downloads, top knowledge base articles, and solutions specific to your product. Support Forums Share questions, offer solutions and suggestions with experienced Websense Customers regarding product Best Practices, Deployment, Installation, Configuration, and other product topics. Tech Alerts Subscribe to receive product specific alerts that automatically notify you anytime Websense issues new releases, critical hot-fixes, or other technical information. ask.websense.com Create and manage support service requests using our online portal.
42 Customer Training Options To find Websense classes offered by Authorized Training Partners in your area, visit: Websense Training Partners also offer classes online and onsite at your location. For more information, please send to:
43 Webinar Announcement Title: Websense Content Gateway HTTPS Configuration Date: February 17, 2010 Webinar Update Time: 8:30 AM PST (GMT -8) How to register: SupportWebinars.aspx 43
44 Questions? 44
Websense Web Security Gateway: What to do when a Web site does not load as expected
Websense Web Security Gateway: What to do when a Web site does not load as expected Websense Support Webinar November 2011 web security data security email security Support Webinars 2009 Websense, Inc.
Installing and Configuring Websense Content Gateway
Installing and Configuring Websense Content Gateway Websense Support Webinar - September 2009 web security data security email security Support Webinars 2009 Websense, Inc. All rights reserved. Webinar
Websense Content Gateway HTTPS Configuration
Websense Content Gateway HTTPS Configuration web security data security email security Support Webinars 2010 Websense, Inc. All rights reserved. Webinar Presenter Title: Sr. Tech Support Specialist Cisco
Using Integrated Windows Authentication with Websense Content Gateway, v7.6
Using Integrated Windows Authentication with Websense Content Gateway, v7.6 Websense Support Webinar August 2011 web security data security email security Support Webinars 2009 Websense, Inc. All rights
Configuring WCCP v2 with Websense Content Gateway the Web proxy for Web Security Gateway
Configuring WCCP v2 with Websense Content Gateway the Web proxy for Web Security Gateway Webinar December 2011 web security data security email security 2011 Websense, Inc. All rights reserved. Webinar
Cyan Networks Secure Web vs. Websense Security Gateway Battle card
URL Filtering CYAN Secure Web Database - over 30 million web sites organized into 31 categories updated daily, periodically refreshing the data and removing expired domains Updates of the URL database
Quick Start 5: Introducing and configuring Websense Cloud Web Security solution
Quick Start 5: Introducing and configuring Websense Cloud Web Security solution Websense Support Webinar April 2013 TRITON STOPS MORE THREATS. WE CAN PROVE IT. 2013 Websense, Inc. Page 1 Presenter Greg
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
Websense Support Webinar: Questions and Answers
Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user
SSL Decryption: Benefits, Configuration and Best Practices
SSL Decryption: Benefits, Configuration and Best Practices Websense Support Webinar January 2013 1 Presenter Matt Bruce Title: Sr. Technical Support Specialist Accomplishments: Backline Support Linux and
Configuration Guide. Websense Web Security Solutions Version 7.8.1
Websense Web Security Solutions Version 7.8.1 To help you make the transition to Websense Web Security or Web Security Gateway, this guide covers the basic steps involved in setting up your new solution
Websense Certified Engineer Web Security Professional Examination Specification
Websense Certified Engineer Web Security Professional Examination Specification Introduction This is an exam specification for the Websense Certified Engineer - Web Security Professional examination. The
Websense Content Gateway v7.x: Troubleshooting
Websense Content Gateway v7.x: Troubleshooting Topic 60042 Content Gateway Troubleshooting Updated: 28-October-2013 Dropped HTTPS connections Websites that have difficulty transiting Content Gateway Low
V Series Rapid Deployment Version 7.5
V Series Rapid Deployment Version 7.5 Table of Contents Module 1: First Boot Module 2: Configure P1 and N interfaces Module 3: Websense Software installation (Reporting Server) Module 4: Post installation
Upgrading to Websense Web Security v7.6
Upgrading to Websense Web Security v7.6 Webinar April 2011 web security data security email security 2009 Websense, Inc. All rights reserved. Webinar Presenter Greg Didier Title: Support Specialist Accomplishments:
Barracuda Web Filter Demo Guide Version 3.3 GETTING STARTED
Version 3.3 GETTING STARTED What is the Web Filter? Integrated content filtering and application blocking Best-of-breed spyware protection Integrated gateway antivirus Desktop spyware protection Firmware
Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications
Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications November, 2010 2010 Websense, Inc. All rights reserved. Websense is a registered
How to Configure Captive Portal
How to Configure Captive Portal Captive portal is one of the user identification methods available on the Palo Alto Networks firewall. Unknown users sending HTTP or HTTPS 1 traffic will be authenticated,
User Identification and Authentication
User Identification and Authentication Vital Security 9.2 Copyright Copyright 1996-2008. Finjan Software Inc.and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included
User and Group-Based Reporting in TRITON - Web Security: Best Practices and Troubleshooting
User and Group-Based Reporting in TRITON - Web Security: Best Practices and Troubleshooting Websense Support Webinar March 2012 web security data security email security Support Webinars 2012 Websense,
Infor Xtreme Browser References
Infor Xtreme Browser References This document describes the list of supported browsers, browser recommendations and known issues. Contents Infor Xtreme Browser References... 1 Browsers Supported... 2 Browser
Configuration Information
Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.
Direct or Transparent Proxy?
Direct or Transparent Proxy? Choose the right configuration for your gateway. Table of Contents Direct Proxy...3 Transparent Proxy...4 Other Considerations: Managing authentication made easier.....4 SSL
Filtering remote users with Websense remote filtering software v7.6
Filtering remote users with Websense remote filtering software v7.6 Websense Support Webinar April 2012 Websense 2012 Webinar Presenter Greg Didier Title: Support Specialist Accomplishments: 9 years supporting
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.
WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard
TRITON - Web Security Help
TRITON - Web Security Help Websense Web Security Websense Web Filter v7.6 1996 2015, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2015 Printed in the
Deploying F5 to Replace Microsoft TMG or ISA Server
Deploying F5 to Replace Microsoft TMG or ISA Server Welcome to the F5 deployment guide for configuring the BIG-IP system as a forward and reverse proxy, enabling you to remove or relocate gateway security
Using TestLogServer for Web Security Troubleshooting
Using TestLogServer for Web Security Troubleshooting Topic 50330 TestLogServer Web Security Solutions Version 7.7, Updated 19-Sept- 2013 A command-line utility called TestLogServer is included as part
REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.1.0.XXX Requirements and Implementation Guide (Rev 4-10209) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis Training Series
TRITON - Web Security Help
TRITON - Web Security Help Websense Web Security Websense Web Filter v7.5 1996 2015, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2015 Printed in the
Click Studios. Passwordstate. Installation Instructions
Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior
NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
Getting Started. Websense V10000 Appliance. v1.1
Getting Started Websense V10000 Appliance v1.1 1996 2009, Websense, Inc. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA All rights reserved. Published 2009 Revision C Printed in the United States
Configuring SonicWALL TSA on Citrix and Terminal Services Servers
Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,
Transparent Identification of Users
Transparent Identification of Users Websense Web Security Solutions v7.5, v7.6 Transparent Identification of Users 1996 2011, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA
User Service and Directory Agent: Configuration Best Practices and Troubleshooting
User Service and Directory Agent: Configuration Best Practices and Troubleshooting Websense Support Webinar March 2011 web security data security email security Support Webinars 2009 Websense, Inc. All
XIA Configuration Server
XIA Configuration Server XIA Configuration Server v7 Installation Quick Start Guide Monday, 05 January 2015 1 P a g e X I A C o n f i g u r a t i o n S e r v e r Contents Requirements... 3 XIA Configuration
Network Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway
A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway Table of Contents Introduction... 3 Implementing Best Practices with the Websense Web Security
v.5.5.2 Installation Guide for Websense Enterprise v.5.5.2 Embedded on Cisco Content Engine with ACNS v.5.4
v.5.5.2 Installation Guide for Websense Enterprise v.5.5.2 Embedded on Cisco Content Engine with ACNS v.5.4 Websense Enterprise Installation Guide 1996 2004, Websense, Inc. All rights reserved. 10240 Sorrento
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router
McAfee Web Gateway 7.4.1
Release Notes Revision B McAfee Web Gateway 7.4.1 Contents About this release New features and enhancements Resolved issues Installation instructions Known issues Find product documentation About this
Filtering and Identifying Web Activity by User Name
WavecrestTechBrief Filtering and Identifying Web Activity by User Name www.wavecrest.net When a company implements Web filtering and monitoring software, it typically wants to filter and monitor the Web
NetSpective Global Proxy Configuration Guide
NetSpective Global Proxy Configuration Guide Table of Contents NetSpective Global Proxy Deployment... 3 Configuring NetSpective for Global Proxy... 5 Restrict Admin Access... 5 Networking... 6 Apply a
Integrated SSL Scanning
Software Version 9.0 Copyright Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
Installation Guide Supplement
Installation Guide Supplement for use with Microsoft ISA Server and Forefront TMG Websense Web Security Websense Web Filter v7.5 1996 2010, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd.,
ReadyNAS Remote Troubleshooting Guide NETGEAR
ReadyNAS Remote Troubleshooting Guide NETGEAR June 2010 Symptom: I cannot see any shares from my PC This symptom can be caused by a variety of reasons. To diagnose the problem, please make sure your are
Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?
What is Network Agent? The Websense Network Agent software component uses sniffer technology to monitor all of the internet traffic on the network machines that you assign to it. Network Agent filters
Web Application Firewall
Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
WatchGuard SSL v3.2 Update 1 Release Notes. Introduction. Windows 8 and 64-bit Internet Explorer Support. Supported Devices SSL 100 and 560
WatchGuard SSL v3.2 Update 1 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 445469 Revision Date 3 April 2014 Introduction WatchGuard is pleased to announce the release of WatchGuard
Pass Through Proxy. How-to. Overview:..1 Why PTP?...1
Pass Through Proxy How-to Overview:..1 Why PTP?...1 Via an SA port...1 Via external DNS resolution...1 Examples of Using Passthrough Proxy...2 Example configuration using virtual host name:...3 Example
Configuration Manual
Configuration Manual Page 1 of 20 Table of Contents Chronicall Setup...3 Standard Installation...3 Non-standard Installation (Recording Library on Separate machine)...8 Configuring Call Recording through
Quick Start 4: Identifying and Troubleshooting proxy issues for Websense Web Security Gateway
Quick Start 4: Identifying and Troubleshooting proxy issues for Websense Web Security Gateway Websense Support Webinar March 2013 1 Presenter Greg Didier Title: Support Specialist Accomplishments: 9 years
Delegated Administration Quick Start
Delegated Administration Quick Start Topic 50200 Delegated Administration Quick Start Updated 22-Oct-2013 Applies to: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere,
ProxySG TechBrief Enabling Transparent Authentication
ProxySG TechBrief Enabling Transparent Authentication What is Transparent Authentication? Authentication is a key factor when defining a web access policy. When the Blue Coat ProxyxSG is configured for
GoToMyPC Corporate Advanced Firewall Support Features
F A C T S H E E T GoToMyPC Corporate Advanced Firewall Support Features Citrix GoToMyPC Corporate features Citrix Online s advanced connectivity technology. We support all of the common firewall and proxy
Aspera Connect User Guide
Aspera Connect User Guide Windows XP/2003/Vista/2008/7 Browser: Firefox 2+, IE 6+ Version 2.3.1 Chapter 1 Chapter 2 Introduction Setting Up 2.1 Installation 2.2 Configure the Network Environment 2.3 Connect
v7.7.3 Release Notes for Websense Content Gateway
v7.7.3 Release Notes for Websense Content Gateway Topic 55400 / Updated: 20-February-2013 Applies To: Websense Content Gateway, version 7.7.3 (a component of Web Security Gateway and Web Security Gateway
Release Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
Chapter 6 Virtual Private Networking Using SSL Connections
Chapter 6 Virtual Private Networking Using SSL Connections The FVS336G ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN provides a hardwarebased SSL VPN solution designed specifically to provide
v7.8.2 Release Notes for Websense Content Gateway
v7.8.2 Release Notes for Websense Content Gateway Topic 60086 Web Security Gateway and Gateway Anywhere 12-Mar-2014 These Release Notes are an introduction to Websense Content Gateway version 7.8.2. New
Evaluation Guide. iprism Web Security. 800-782-3762 www.edgewave.com V7.000
800-782-3762 www.edgewave.com Welcome to EdgeWave Web Security! This short guide is intended to help administrators set up and test the iprism Web Filtering appliance for evaluation purposes. A more detailed
GFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide
GFI Product Manual Web security, monitoring and Internet access control Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as
WHITE PAPER Citrix Secure Gateway Startup Guide
WHITE PAPER Citrix Secure Gateway Startup Guide www.citrix.com Contents Introduction... 2 What you will need... 2 Preparing the environment for Secure Gateway... 2 Installing a CA using Windows Server
SevOne NMS Download Installation and Implementation Guide
SevOne NMS Download Installation and Implementation Guide 5.3.X 530 V0002 Contents 1. Get Started... 3 2. SevOne Download Installation... 6 3. Appliance Network Configuration... 9 4. Install License and
Quick start 6: Administering the Websense Cloud Web Security solution
Quick start 6: Administering the Websense Cloud Web Security solution Websense Support Webinar May 2013 TRITON STOPS MORE THREATS. WE CAN PROVE IT. 2013 Websense, Inc. Page 1 Presenter Greg Didier Title:
Proxies. Chapter 4. Network & Security Gildas Avoine
Proxies Chapter 4 Network & Security Gildas Avoine SUMMARY OF CHAPTER 4 Generalities Forward Proxies Reverse Proxies Open Proxies Conclusion GENERALITIES Generalities Forward Proxies Reverse Proxies Open
Installation Guide. Squid Web Proxy Cache. Websense Enterprise Websense Web Security Suite. v6.3.2. for use with
Installation Guide for use with Squid Web Proxy Cache Websense Enterprise Websense Web Security Suite v6.3.2 1996-2008, Websense, Inc. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA All rights reserved.
Using DC Agent for Transparent User Identification
Using DC Agent for Transparent User Identification Using DC Agent Web Security Solutions v7.7, 7.8 If your organization uses Microsoft Windows Active Directory, you can use Websense DC Agent to identify
Using Protection Engine for Cloud Services for URL Filtering, Malware Protection and Proxy Integration Hands-On Lab
Using Protection Engine for Cloud Services for URL Filtering, Malware Protection and Proxy Integration Hands-On Lab Description In this hands-on session, you will learn how to turn your proxy into a security
Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Lab 5 Explicit Proxy Performance, Load Balancing & Redundancy
Lab 5 Explicit Proxy Performance, Load Balancing & Redundancy Objectives The purpose of this lab is to demonstrate both high availability and performance using virtual IPs coupled with DNS round robin
GlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
2. Are explicit proxy connections also affected by the ARM config?
Achieving rapid success with WCCP and Web Security Gateway October 2011 Webinar Q/A 1. What if you are already using WCCP for Cisco waas on the same routers that you need to use WCCP for websense? Using
NetSpective Content Filter User Guide
NetSpective Content Filter User Guide Copyright 2002-2013 by TeleMate.Net Software, LLC. All rights reserved Although the author and publisher have made every effort to ensure that the information in this
Click Studios. Passwordstate. Installation Instructions
Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior
Test Case 3 Active Directory Integration
April 12, 2010 Author: Audience: Joe Lowry and SWAT Team Evaluator Test Case 3 Active Directory Integration The following steps will guide you through the process of directory integration. The goal of
Deploying with Websense Content Gateway
Deploying with Websense Content Gateway Websense Content Gateway is a high-performance Web proxy that provides realtime content scanning and Web site classification to protect network computers from malicious
M86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: 5.0.00 Document Version: 02.01.12
M86 Web Filter USER GUIDE for M86 Mobile Security Client Software Version: 5.0.00 Document Version: 02.01.12 M86 WEB FILTER USER GUIDE FOR M86 MOBILE SECURITY CLIENT 2012 M86 Security All rights reserved.
v7.8.1 Release Notes for Websense Web Security
v7.8.1 Release Notes for Websense Web Security Topic 43010 Release Notes Web Security Solutions Updated 22-Oct-2013 Applies to: Websense Web Filter, Web Security, Web Security Gateway, and Web Security
Svn.spamsvn110. QuickStart Guide to Authentication. WebTitan Version 5
Svn.spamsvn110 QuickStart Guide to Authentication WebTitan Version 5 Copyright 2014 Copperfasten Technologies. All rights reserved. The product described in this document is furnished under a license agreement
WAN Optimization, Web Cache, Explicit Proxy, and WCCP. FortiOS Handbook v3 for FortiOS 4.0 MR3
WAN Optimization, Web Cache, Explicit Proxy, and WCCP FortiOS Handbook v3 for FortiOS 4.0 MR3 FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP v3 13 January 2012 01-433-96996-20120113
Migrating your custom settings to version 7.6
Migrating your custom settings to version 7.6 Webinar July 2011 web security data security email security 2009, Inc. All rights reserved. Webinar Presenter Greg Didier Title: Support Specialist Accomplishments:
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
642 523 Securing Networks with PIX and ASA
642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall
Quickstart guide to Configuring WebTitan
Quickstart guide to Configuring WebTitan 1. Install the License Once you have received the evaluation license by e-mail, you log on to WebTitan as follows using a browser as admin/hiadmin. Then navigate
Configuring your email client to connect to your Exchange mailbox
Configuring your email client to connect to your Exchange mailbox Contents Use Outlook Web Access (OWA) to access your Exchange mailbox... 2 Use Outlook 2003 to connect to your Exchange mailbox... 3 Add
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN
HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP
HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP When you install SQL Server you have option to automatically deploy & configure SQL Server Reporting
Filter Avoidance and Anonymous Proxy Guard
March 21, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Filter Avoidance and Anonymous Proxy Guard Filter Avoidance The award winning XLi technology
Websense Appliance Manager Help
Websense Appliance Manager Help Websense V-Series Appliance Models: V10000, V10000 G2, V5000 G2 v7.7 1996 2012, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA R150612770
SSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN
1. Introduction... 2 2. Remote Access via SSL... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Software and Certificates...10
www.novell.com/documentation SSL VPN Server Guide Access Manager 3.1 SP5 January 2013
www.novell.com/documentation SSL VPN Server Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
Aspera Connect User Guide
Aspera Connect User Guide Mac OS X 10.4/10.5 Browser: Firefox 2+, Safari 2+ Version 2.2 Chapter 1 Chapter 2 Chapter 3 Appendix Introduction Setting Up 2.1 Installation 2.2 Configure the Network Environment
Webinar Information. Title: Websense Remote Filtering Audio information: Dial-in numbers:
Webinar Information Title: Websense Remote Filtering Audio information: This presentation incorporates STREAMING AUDIO. Use of speakers or headsets is required. If unable to hear streaming audio or it
NETASQ MIGRATING FROM V8 TO V9
UTM Firewall version 9 NETASQ MIGRATING FROM V8 TO V9 Document version: 1.1 Reference: naentno_migration-v8-to-v9 INTRODUCTION 3 Upgrading on a production site... 3 Compatibility... 3 Requirements... 4
