M86 Security 350 Installation Manual page 5

M86 web filter and reporter
Hide thumbs Also See for 350:
Table of Contents

Advertisement

Enterprise Reporter registration, Save settings ............................................................... 43
Step 4: Generate SSL Certificate. ................................................................................ 44
Generate a Self-Signed Certificate for the WFR .................................................................... 44
IE Security Certificate Installation Procedures ....................................................................... 46
Accept the Security Certificate in IE ................................................................................ 46
Windows XP or Vista with IE 7 or 8............................................................................ 46
Windows 7 with IE 8................................................................................................... 50
Map the WFR's IP Address to the Server's Host Name .................................................. 51
Step 5: Test Filtering or the Mobile Client Connection. ............................................ 53
Test Filtering on the Web Filter ..............................................................................................53
Test the Mobile Client Connection ......................................................................................... 53
Step 6: Set Library Updates. ........................................................................................ 54
Activate the Web Filter ...........................................................................................................54
Log in to the Web Filter .......................................................................................................... 55
Perform a Complete Library Update ...................................................................................... 56
Monitor the Library Update Process ....................................................................................... 57
Step 7: Set Self-Monitoring. ......................................................................................... 58
Step 8: Verify Web Filter Log Transfer........................................................................ 60
Single Sign-On Access, Default Username/Password. ............................................. 61
Access WFR Applications from the TAR User Interface ........................................................ 61
Default Usernames and Passwords for WFR Applications ....................................................61
................................................................................................62
Web Filter Usage Scenarios......................................................................................... 64
I. Threats/Liabilities ............................................................................................................... 65
1. Category block ............................................................................................................65
2. Rule block ................................................................................................................... 65
3. X-Strike on blocked categories ................................................................................... 65
4. Custom Lock, Block, Warn, X Strikes, Quota pages .................................................. 66
5. URL Keywords ............................................................................................................ 66
6. Search Engine Keywords ........................................................................................... 66
7. Custom Category (blocked) . ....................................................................................... 67
8. Minimum Filtering Level ..............................................................................................67
9. Override Account bypass ........................................................................................... 67
10. Exception URL bypass . ............................................................................................. 68
11. Proxy Patterns ...........................................................................................................68
12. File type blocking ....................................................................................................... 68
II. Bandwidth/Productivity ...................................................................................................... 69
1. Time Quota/Hit Quota ................................................................................................. 69
2. Overall Quota .............................................................................................................69
3. Time Based Profiles ................................................................................................... 69
4. Warn option with low filter settings . ............................................................................ 70
5. Warn-strike ................................................................................................................. 70
6. P2P patterns ............................................................................................................... 70
7. IM patterns .................................................................................................................. 71
8. Game patterns ............................................................................................................ 71
9. Streaming Media patterns .......................................................................................... 71
...............................................63
C
ONTENTS
v

Advertisement

Table of Contents
loading

This manual is also suitable for:

550

Table of Contents