Windows 7 with IE 8................................................................................................... 50
Activate the Web Filter ...........................................................................................................54
Log in to the Web Filter .......................................................................................................... 55
................................................................................................62
I. Threats/Liabilities ............................................................................................................... 65
1. Category block ............................................................................................................65
2. Rule block ................................................................................................................... 65
5. URL Keywords ............................................................................................................ 66
10. Exception URL bypass . ............................................................................................. 68
11. Proxy Patterns ...........................................................................................................68
12. File type blocking ....................................................................................................... 68
II. Bandwidth/Productivity ...................................................................................................... 69
1. Time Quota/Hit Quota ................................................................................................. 69
2. Overall Quota .............................................................................................................69
3. Time Based Profiles ................................................................................................... 69
5. Warn-strike ................................................................................................................. 70
6. P2P patterns ............................................................................................................... 70
7. IM patterns .................................................................................................................. 71
8. Game patterns ............................................................................................................ 71
...............................................63
C
ONTENTS
v