Activate the Web Filter ...........................................................................................................54
Log in to the Web Filter .......................................................................................................... 55
SWG Log Transfer Setup ....................................................................................................... 63
Policy Settings............................................................................................................ 64
Policy Settings ...........................................................................................................66
................................................................................................68
I. Threats/Liabilities ............................................................................................................... 72
A. Category block ...........................................................................................................72
B. Rule block .................................................................................................................. 72
E. URL Keywords ...........................................................................................................73
J. Exception URL bypass . ............................................................................................... 75
K. Proxy Patterns .............................................................................................................75
L. File type blocking .........................................................................................................75
II. Bandwidth/Productivity ...................................................................................................... 76
A. Time Quota/Hit Quota ................................................................................................ 76
B. Overall Quota .............................................................................................................76
C. Time Based Profiles ................................................................................................... 76
M86 S
I
G
ECURITY
NSTALLATION
UIDE
...............................................69
C
ONTENTS
v