Secure Computing SSL Scanner Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro ne Secure Computing SSL Scanner. Secure Computing SSL Scanner User's Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 191
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1 - USER’S GUIDE

USER’S GUIDEWebwasher SSL ScannerVersion 6.5www.securecomputing.com

Strany 2

Introductiondefaultis selected in the line below Policy, which means that the settingsyou are going to configure now will be valid under your default

Strany 3 - Contents

Common3.6.1Generic Header FilterThe Generic Header Filter tab looks like this:There is one section on this tab:• Header Filter ListIt is described in

Strany 4 - User’s Guide

CommonHeader Filter ListThe Header Filter List section looks like this:Using this section, you can configure the Generic Header Filter to delete head-

Strany 5

Common3.7Generic Body FilterThe Generic Body Filter options are invoked by clicking on the correspondingbutton under Common:If you want to enable any

Strany 6 - What Else Will You Fin

Common3.7.1Generic Body FilterThe Generic Body Filter tab looks like this:There is this section on this tab:• Body Filter ListIt is described in the f

Strany 7 - Using Webwasher

CommonBody Filter ListThe Body Filter List section looks like this:Using this section, you can configure the Generic Body Filter blocking andother act

Strany 8 - First Level Tabs

CommonSo, to block, e. g. all HTML pages encoded as UTF-16 you can configure arule like the following:0-128 Contains I"<\00h\00t\00m\00l\00&qu

Strany 9 - Configuring a Sample Setting

Common3.8.1SettingsThe Settings tab looks like this:There are six sections on this tab:• Link Filter• Dimension Filter• Popup Filter• Script Filter• A

Strany 10

Common• Advertising Filter SettingsThey are described in the following.Link FilterThe Link Filter section looks like this:Using this section, you can

Strany 12

Common— Text linksEnables or disables the filtering of text links.A text link is the grouping of linked text that, when clicked on, takesyou to anothe

Strany 13

Introduction3. Make settings effectiv eClick on the Apply Changes button:This completes the sample configuration.1.3.3General Features of the Web Inte

Strany 14

CommonTheir meaning is as follows:— ImagesEnables or disables the filtering of images.— AppletsEnables or disables the filtering of Java applets.These

Strany 15 - Other Documents

CommonUse the following checkbox to configure the additional setting:• Also disable manually opened windo wsIf this option is enabled, pop-ups will no

Strany 16

Common• Prevent modification of the browser’s status barIf this option is enabled, the filter will prevent the status bar of the browserfrom being mod

Strany 17 - Introduction

CommonAdvertising Filter SettingsThe Advertising Filter Settings section looks like this:Using this section, you can configure settings that will appl

Strany 18

CommonThen check the radio buttons below to further specify the exclusion:— the same pathEnable this option to exclude objects within the s ame place

Strany 19

CommonLink Filter ListThe Link Filter List section looks like this:Using this section, you can add URLs to the Link Filter List and edit them.To do th

Strany 20

Common— do not filterEnable this option to exclude the URL you entered above from filtering.— Add to Li n k Filter ListAfter specifying the informatio

Strany 21 - Chapter 2

Common3.8.3Dimension Filter ListThe Dimension Filter List tab looks like this:There is this one section on this tab:• Dimension Filter ListIt is descr

Strany 22 - Dashboard

CommonDimension Filter ListThe Dimension Filter List section looks like this:Using this section, you can add dimension settings to the Dimension Filte

Strany 23

Common— Add to Dimension Filter ListAfter specifying the dimensions settings in the w ay described above,click on this button to add them to the list.

Strany 24

IntroductionClicking on this arrow will display a button, which you can use to apply changesto all policies.After clicking on this button, your modifi

Strany 25

Common3.9Privacy FiltersThe Privacy Filters options are invoked by clicking on the corresponding but-ton under Common:If you want to enable any of the

Strany 26

Common3.9.1SettingsThe Settings tab looks like this:There are four sections on this tab:• Web Bug Filter• Referer Filter• Prefix Filter• Cookie F ilte

Strany 27

CommonUsing this section, you can configure a filter to eliminate Web bugs.These are also known as clear GIFs or Web beacons. They are are usually1 pi

Strany 28 - Executive Summary

CommonIt leaves the referer unaffected if you the user moves through the sameor subsequent path.This option may be enabled if user movement should be

Strany 29

CommonCookie FilterThe Cookie Filter section looks like this:Using this section, you can configure a filter to block bad cookies.You can set the life

Strany 30

Common• Neutral cookies expire afterUse the radio buttons and input fields provided here in the following way:— a time period of . . . h . . . minMake

Strany 31 - Traffic Volume

Common3.9.2Cookie Filter ListThe Cookie Filter List tab looks like this:There is one section on the tab:• Cookie Filte r ListIt is described in the fo

Strany 32

CommonCookie Filter ListThe Cookie Filter List section looks like this:Using this section, you can add entries to the Cookie Filter List and edit them

Strany 33

CommonThe Cookie Filter List is displayed at the bottom of this section.To display only a particular number of list entries at a time, type this numbe

Strany 34

CommonTo do this, select a policy from the drop-down list labeled Policy, which is lo-cated above the Media Type Filters button:The options are arrang

Strany 35

IntroductionThe click history is only recorded for the current session, i. e. until you log out.After logging in for a new session, the recording of t

Strany 36

CommonText CategorizationThe Text Categorization section looks like this:Using the text categorization filter you can specify single keywords and comb

Strany 37

Common3.10.2Categorization ListThe Categorization List tab looks like this:There is one section on this tab:• Text Catego rization ListIt is described

Strany 38 - Overview (Feature)

CommonText Categorization ListThe Text Categorization List section looks like this:Using the text categorization filter you can specify single keyword

Strany 39

CommonIn the input fields, enter the words or word combinations you want tofilter, e. g. Bahamas, Maledives, work tosetuparulelikethefol-lowing:Bahama

Strany 40

CommonUse the following items to perform other activities relating to the list:• FilterType a filter expression in this input field and enter it using

Strany 41

Common3.11.1HTTP Method Filter ListThe HTTP Method Filter List tab looks like this:There is one section on this tab:• HTTP Me thod Filter ListIt is de

Strany 42

CommonHTTP Method Filter ListThe HTTP Method Filter List section looks like this:Using this section, you can configure rules for assigning actions to

Strany 43

Common— CategoryFrom this drop-down list, select a URL filtering category you want toassign to the HTTP method. Setting this category is also optional

Strany 44 - TrustedSource

CommonUse the following items to perform other activities relating to the list:• FilterType a filtering term in the input field of the URL or Descript

Strany 45

CommonThese are policy-dependent options, i. e. they are configured for a particularpolicy. When you are configuring these options, you need to specif

Strany 46

IntroductionSearchA Search input field and button are located in the top right corner of the Webinterface area.Using these, you can start keyword quer

Strany 47

CommonFTP Command Filter ListThe FTP Command Filter List section looks like this:Using this section, you can configure rules for assigning actions to

Strany 48

CommonTo add a rule to the list, use the area labeled:• Add ruleUse the following items to configure the rule:— Command category

Strany 49

CommonThe FTP Command Filter List is displayed at the bottom of the section. Youcan edit list entries, change their order or delete them.To display on

Strany 50 - Malware Feedback Black List

Common3.13Welcome PageThe Welcome Page options are invoked by clicking on the correspondingbutton under Common:If you want to enable any of these opti

Strany 51

Common3.13.1Welcome PageThe Welcome Page tab looks like this:There are three sections on this tab:• Welcome Page Options• Manipulate User History• Upl

Strany 52

CommonUse the following items to configure the Welcome Page options:• Show once a day at . . .To let the Welcome Page appear only once a day, make sur

Strany 53 - Feedback

Common• Show againClick on this button to let the Welcome Page appear again for this user. Thismeans that the page is displayed not only once, but als

Strany 54

CommonUse the following items to handle the upload of a Welcome Page:• FilenameIn this input field, enter the name of the file you want to upload. Typ

Strany 55

Common3.14White ListThe White List options are invoked by clicking on the corresponding buttonunder Common:These are policy-dependent options, i. e. t

Strany 56

Common3.14.1White ListThe White List tab looks like this:There is one section on this tab:• White ListIt is described in the following.3–79

Strany 57

IntroductionAfter modifying the interval specified there, click on Apply Changes to makethe modification effective.When a session has timed out, the f

Strany 58

CommonWhite ListThe White List section l ooks like this:Using this section, you can add an object to the White List and exclude it fromthe application

Strany 59 - Additional Documentation

CommonTo add an object to the white list, use the area labeled:• Add new entrySelect String or International Domain Name from the first of the drop-do

Strany 60 - Preferences

CommonTo sort the list in ascending or descending order, c lick on the symbol next tothe Media Type or Description column heading.To edit an entry, ty

Strany 61

Common3.15User Defined CategoriesThe User Defined Categories options are invoked by clicking on the corre-sponding button under Common:The options are

Strany 62

CommonUser Defined CategoriesThe User Defined Categories section l ooks like this:Using this section, you can configure your own categories for URL cl

Strany 63

Common• Category 1 to Category nIn the input fields provided here, enter the category names you want to useand the abbreviated formats of these names.

Strany 64

Common3.16.1Media Type CatalogThe Media Type Catalog tab l ooks like this:There is one section on this tab:• Media Type CatalogIt is described in the

Strany 65 - Information

CommonMedia Type CatalogThe Media Type Catalog section looks like this:Using this section, you can add a m edia type to the Media Type Catalog.A media

Strany 66

CommonThe media type tells the application that receives the data what kind of appli-cation is needed to process the content, e. g. Real Audio is to p

Strany 67

Common— Magic BytesIn the input fields provided here, enter up to five magic byte sequencesand their offsets to identify a media type:OffsetIn the inp

Strany 68 - Notification

IntroductionThe following is provided in this section for the Webwasher Web G ateway Se-curity products:• An overview of the documents on the main pro

Strany 70 - %o FQDN name of the host

Chapter 4SSL ScannerThe features that are described in this chapter are accessible over the SSLScanner tab of the Web interface:These features allow y

Strany 71 - Chapter 3

SSL Scanner4.1OverviewThe following overview shows the sections that are in this chapter:User’s Guide – Webwasher SSL Scan nerIntroductionHomeCommonOv

Strany 72

SSL ScannerBefore this is done, however, the following subsection provides some generalinformation on this quick snapshot feature.Handling the Quick S

Strany 73

SSL Scanner4.2.1Quick SnapshotThe Quick Snapshot tab looks like this:There is one section on this tab:• Certificate Verification OverviewIt is describ

Strany 74

SSL Scanner• Wildcard MatchA wildcard name has been used in a certificate for a host, which matchesthe host name provided by the URL.Whenever a verifi

Strany 75

SSL ScannerTo do this, select a policy from the drop-down list labeled Policy, which is lo-cated above the Certificate Verification button:The options

Strany 76

SSL ScannerFurthermore, there is this section on the tab:• Certificate VerificationIt is described in the following.Certificate VerificationThe Certif

Strany 77

SSL ScannerIf the Common Name in a certificate is, e. g. abcde.com, but the Webserver’sURLisinfactwww.abcde.com, no match is achieved.• Wildcard match

Strany 78 - MediaTypeFilters

SSL ScannerTo do this, select a policy from the drop-down list labeled Policy, which is lo-cated above the Certificate Verification button:The options

Strany 79

Introduction1.4.2Documentation on Special ProductsThis section introduces the user documentation on the Webwasher Web Gate-way Security products for s

Strany 80

SSL ScannerTunneling by CategoryThe Tunneling by Category section looks like this:Using this section, you c an configure tunneling for particular URL

Strany 81

SSL Scanner— Bypass SSL ScannerThe SSL Scanner is bypassed completely, i. e. no activities whatso-ever are performed.Client Certificate HandlingThe Cl

Strany 82

SSL Scanner• Verify server certificate, but do not decrypt sessionEnable this option, to have the s erver certificate checked by the verificationproce

Strany 83 - Media Type Black List

SSL Scanner4.5Certificate ListThe Certificate L ist options are invoked by clicking on the corresponding but-ton under SSL Scanner:If you want to enab

Strany 84

SSL Scanner4.5.1Certificate ListThe Certificate List tab looks like this:There is one section on this tab:• Certificate ListIt is described in the fol

Strany 85

SSL ScannerTo add an exception to the list, use the area labeled:• Add new exceptionIn the input field provided here, enter the exception you want to

Strany 86 - Media Type White List

SSL Scanner— by hostEnabling the by host method means that the host is checked without acertificate being included in the verification process. If the

Strany 87

SSL ScannerIf the number of entries is higher than this number, the remaining entries areshown on successive pages. A page indicator is then displayed

Strany 88

SSL Scanner4.6.1Trusted Certificate AuthoritiesThe Trusted Certificate Authorities tab looks like this:At the top of this tab, there is the Known Cert

Strany 89 - Document Inspector

SSL ScannerUsing this section, you can configure actions for content with certificates issuedby known Certificate Authorities (CAs) that are either tr

Strany 90

Introduction1.5The Webwasher Web Gateway Security P roductsThe Webwasher Web Gateway Security products provide an optimal solutionfor all your needs i

Strany 91

SSL ScannerTrusted Certificate AuthoritiesThe Trusted Certificate Authorities section looks like this:This section provides the list of Trusted Certif

Strany 92

SSL ScannerTo make the addition valid for all policies, mark the checkbox labeled Addto all policies before proceeding any further.Then click on eithe

Strany 93

SSL Scanner4.7Global Certificate ListThe Global Certificate List options are invoked by clicking on the corre-sponding button under SSL Scanner:If you

Strany 94

SSL ScannerThere is one section on this tab:• Global Certificate ListIt is described in the following.Global Certificate ListThe Global Certificate Li

Strany 95

SSL ScannerFor the meaning of these actions, see the following table:by certificate by hostAllow Theexceptionisallowed. not availableBlock The excepti

Strany 96 - Archive Handler

SSL ScannerFor the meaning of these actions, see the description of the by cer-tificate method above.A message will then be displayed, stating if the

Strany 97

SSL Scanner4.8Global Trusted Certificate AuthoritiesThe Global Trusted Certificate Authorities options are invoked by clickingon the corresponding but

Strany 98

SSL ScannerTrusted Certificate AuthoritiesThe Trusted Certificate Authorities section looks like this:This section provides the global list of Trusted

Strany 99

SSL ScannerIf the number of entries is higher than this number, the remaining entries areshown on successive pages. A page indicator is then displayed

Strany 100 - Generic Header Filter

SSL ScannerThey are described in the upcoming section:• Incident Manager, see 4.9.14.9.1Incident ManagerThe Incident Manager tablookslikethis:There is

Strany 101

IntroductionThese two products have their own user interfaces, which are described in thecorresponding documents:Webwasher®ContentReporterFeatures a l

Strany 102 - Generic Body Filter

SSL ScannerUsing this section, you can inspect and manage incidents relating to SSL-en-crypted communication.The Incident Manager enables you to retri

Strany 103

SSL ScannerA list entry consists of the following fields:• Host - URL that caused the incident.Incidents can be added to the certificate lists either

Strany 104

Part Number: 86-0946643-AAll Rights Reserved, Published and Printed in G erma ny©2007 Secure Computing Corporation. This document may not, in whole or

Strany 106 - Settings

Chapter 2HomeThe features that are described in this chapter are accessible over the Hometab of the Web interface:These are basic features that are co

Strany 107

Home2.1OverviewThe following overview shows the sections that are in this chapter:User’s Guide – Webwasher SSL Scan nerIntroductionHome Overview –this

Strany 108

HomeThe dashboard provides the following tabs:They are described in the upcoming sections:• Executive Summary, see 2.2.1• Traffic Volume, see 2.2.2• S

Strany 109

HomeOn the right side of a section, parameter values are shown as they developedin time, using either a line or a stacked mode, see also further below

Strany 110

HomeNote that the color of a category in the selection list is also used when thecategory is displayed in proportion to other categories by means of a

Strany 111

HomeSince only the categories are shown that yielded the top six values or thecategories you selected on your own, values that may have occurred inoth

Strany 112

Home• Selecting stacked or line modeYou can have parameter values displayed in stacked or line mode:— In line mode, lines are displayed to represent t

Strany 113

Home2.2.1Executive SummaryThe Executive Summary tab looks like this:There are three sections on this tab:• URL Executive Summary• Mail Executive Summa

Strany 114 - Link Filter List

HomeURL Executive SummaryThe URL Executive Summary section displays the number of URLs thatwere processed by the Webwasher filters within a given time

Strany 115

ContentsChapter 1 Introduction ... 1– 11.1 About This Guide...

Strany 116

Home• Spam level lowThis category is for e-mails that were classified as low-level spam.Number of Feedbacks SentThe Number of Feedbacks Sent section d

Strany 117 - Dimension Filter List

Home2.2.2Traffic VolumeThe Traffic Volume tab looks like this:There are two sections on this tab:• Traffic Volum e per Policy• Traffic Volume per Prot

Strany 118

Home• EmergencyPrefix ListThe list below shows the prefixes that are used for multiples of bytes, with bytevalues calculated in binary mode, to measur

Strany 119

Home2.2.3SystemThe System tab is shown here in two parts because of its size. The upperpart of the tab looks like this:2–13

Strany 120 - Privacy Filters

HomeThe lower part looks like this:There are seven sections on this tab:• Update Status• Open Ports• CPU Utilization• Memory Usage• Swap Utilization•

Strany 121

HomeUpdate StatusThe Update Status section d isplays the status of several Webwasher filteringfeatures, e. g. SmartFilter, Secure Anti Malware, etc.,

Strany 122

HomeCPU UtilizationThe CPU Utilization (All CPUs) section shows to what extent the CPUs ofthe system Webwasher is running on have been used. within a

Strany 123

Home• UsedAmount of swap memory that was usedFilesystem Utilization (Used Capacity)The Filesystem (Used Capacity) section displays the percentages of

Strany 124

Home2.3Overview (Feature)The Overview options are invoked by clicking on the corresponding buttonunder Home:The options are arranged under the followi

Strany 125

Home2.3.1Overview (Feature)The Overview tab looks like this:There are four sections on this tab:• System Alerts• System Summary• One-Click Lockdown• V

Strany 126 - Cookie Filter List

User’s Guide3.4 Document Inspector ... 3–193.4.1 Document Inspector...

Strany 127

HomeSystem AlertsThe System Alerts section looks like this:This section displays alerts to make you aware of any problems concerning thesystem s tatus

Strany 128 - Text Categorization

HomeSystem SummaryThe System Summary section looks like this:This section d isplays information on the system status.Information is provided on the us

Strany 129

HomeTo enable the emergency mode:• Click on the Activate emergency mode button.This button is a toggle s witch. After enabling the emergency mode, the

Strany 130

Home2.4SupportThe Support options are invoked by clicking on the corresponding button un-der Home:The options are arranged under the following tab:The

Strany 131 - Categorization List

HomeAssistanceThe Assistance section provides a link to contact the Secure Computing tech-nical support team.A click on this link takes you to the Wel

Strany 132

Home2.5.1TrustedSourceThe TrustedSource tab looks like this:There are four sections on this tab:• Spam False Positives Feedback Queue• Spam False Nega

Strany 133

HomeE-mails that were released from a queue after receiving a digest e-mail will becopied to the false positives queue and sent from there to Secure C

Strany 134 - HTTP Method Filter List

HomeSpam False Negatives Feedback QueueThe Spam False Neg atives Feedback Queue section looks like this:Using this section, you can configure the send

Strany 135

HomeE-mails can be sent manually, however, using the Queue Managementpage, which is launched after clicking on the See Content of Queue linknext to th

Strany 136

HomeThe queue should be used for no other purpose than that of collectingmalware since it will be cleared after e-mails and downloads have beensent of

Strany 137

Chapter 1IntroductionWelcome to the User ’s Guide Webwasher® SSL Scanner. It provides youwith the information needed to configure and use the Webwashe

Strany 138 - FTP Command Filter List

HomeUse the following item to configure the URL feedback:• Send interval in . . . minute sIn the input field provided here, enter a time interval (in

Strany 139

HomeMalware Feedback Media Type Black ListThe Malware Feedback Media Type Black List section looks like this:Using this section, you can add a media t

Strany 140

HomeTo sort the list in ascending or descending order, c lick on the symbol next tothe Media Type or Description column heading.To edit an entry, type

Strany 141 - — Command category

Home2.5.3FeedbackThe Feedback tab looks like this:There are two sections on this tab:• Feedback E-Mail Address• URL Filter Database FeedbackThey are d

Strany 142

HomeURL Filter Database FeedbackThe URL Filter Database Feedba ck section looks like this:Using this section, you can submit uncategorized or incorrec

Strany 143 - Welcome Page

Home2.6.1Documentation on Main ProductsThe DocumentationonMainProductstab looks like this:There are three sections on this tab:• General Documents• Pr

Strany 144

HomeTo view any of the documents listed here, click on the PDF link in the sameline. This will open a .pdf format version of the document.Product Docu

Strany 145

Home2.6.2Documentation on Special ProductsThe Documentation on Special Products tab looks like this:There are four sections on this tab:• Content Repo

Strany 146

HomeInstant Message Filter DocumentsThe Instant Message Filter Documents section looks like this:This section allows you to v iew user documentation o

Strany 147

HomeTo view any of the documents listed here, click on the PDF link in the sameline. This will open a .pdf format version of the document.2.6.3Additio

Strany 148 - White List

Introduction1.1About This GuideThe following overview lists the chapters of this guide and explains briefly whatthey are about:User’s Guide – Webwashe

Strany 149

Home2.7PreferencesThe Preferences options are invoked by clicking on the corresponding buttonunder Home:The options are arranged under the following t

Strany 150

HomeThey are described in the following.Change PasswordThe Change Password section looks like this:Using this section, you can change the password you

Strany 151

HomeIf you are only interested in viewing and configuring settings for Web traffic,you can hide the e-mail related settings and vice versa.Furthermore

Strany 152

HomeTo what extent you are allowed to configure access permissions for other ad-ministrators, depends on your seniority level. This is measured by a v

Strany 153 - User Defined Categories

Home— Allow read o nly accessCheck this radio button to allow read only access.• Deny simultaneous accessCheck this radio button to deny simultaneous

Strany 154

Home2.8.1InformationThe Information tablookslikethis:There are four sections on this tab:• License Information• Webwasher End User License Agreement•

Strany 155 - Media Type Catalog

HomeLicense InformationThe License Information section looks like this:This section displays information regarding the license of the Webwasher soft-w

Strany 156

HomeTo import a license, proceed as follows:1. Click on the Browse button provided here and browse for the license fileyou want to import.Before you c

Strany 157

Home2.8.2NotificationThe Notification tab looks like this:There are two sections on this tab:• System Notifications• Too Many ClientsThey are describe

Strany 158

HomeAfter specifying the appropriate information, click on Apply Changes to makeyour settings effective.Use the following items to configure the syste

Strany 159 - to identify a media type:

Introduction1.3Using WebwasherA user-friendly, task-oriented Web interface has been designed for handlingthe Webwasher features. It looks like this:Th

Strany 160

HomeUsing this section, you can configure messages to be written to the system logif connections were refused due to heavy work load or license exhaus

Strany 161 - SSL Scanner

Chapter 3CommonThe features that are described in this chapter are accessible over the Com-mon tab of the Web interface:These are filtering features t

Strany 162 - Quick Snapshot

Common3.1OverviewThe following overview shows the sections that are in this chapter:User’s Guide – Webwasher SSL Scan nerIntroductionHomeCommon Overvi

Strany 163

Common3.2Quick SnapshotThe Quick Snapshot for the common filtering functions is invoked by clickingon the corresponding button under Common:The follow

Strany 164

Common3.2.1Quick SnapshotThe Quick Snapshot tab looks like this:There are four sections on this tab:• Frequent Media Types by Hits• Frequent Media Typ

Strany 165 - Certificate Verification

CommonThey are described in the following.Before this is done, however, the following subsection provides some generalinformation on the quick snapsho

Strany 166

CommonThere is, however, a property of the quick snapshot features that is not presenton the dashboard tabs. It is described in the following:• Resett

Strany 167

CommonMedia Types by HitsThe Media Types by Hits section displays a list of the top media types, i.e. the media types that were most often processsed

Strany 168 - Scan Encrypted Traffic

Common3.3MediaTypeFiltersThe Media Type Filters options are invoked by clicking on the correspondingbutton under Common:If you want to enable any of t

Strany 169

Common3.3.1ActionsThe Actions tablookslikethis:There are two sections on this tab:• Media Type Filter• Web Upload FilterThey are described in the foll

Strany 170

Introduction1.3.1First Level TabsThe Web interface displays a number of tabs and sections for configuring theWebwasher features. On the topmost level,

Strany 171

CommonMedia Type FilterThe Media Type Filter section looks like this:Using this section, you can configure actions, e. g. Block, Block, log andnotify,

Strany 172

Common• Non-rectifiable media types with magic bytes mismatchThe actions configured here will be executed when content types do notmatch their magic b

Strany 173 - Certificate List

CommonFurthermore, you need to enable an option on the REQMOD Settings tab touse this filter. To do this, click on the REQMOD Settings link provided a

Strany 174

Common3.3.2Media Type Black ListThe Media Type Black List tablookslikethis:There is one section on this tab:• Media Type Black ListIt is described in

Strany 175

CommonMedia Type Black ListThe Media Type Black List section looks like this:Using this section, you can add a media type to the Media Type Black List

Strany 176

Common— Add to Media Type Black ListAfter s electing a media type, click on this button to add it to the list.This addition will be valid only under t

Strany 177

Common3.3.3Media Type White ListThe Media Typ e White List tab looks like this:There is one section on this tab:• Media Type White ListIt is described

Strany 178

CommonMedia Type White ListThe Media Type White List section l ooks like this:Using this section, you can add a media type to the Media Type White Lis

Strany 179

Common— Add to Media Type White ListAfter s electing a media type, click on this button to add it to the list.This addition will be valid only under t

Strany 180

Common3.4Document InspectorThe Document Inspector options are invoked by clicking on the correspond-ing button under Common:If you want to enable any

Strany 181

Introduction1.3.2Configuring a Sample SettingThis section explains how to configure a s ample setting of a Webwasher fea-ture. The feature chosen here

Strany 182 - Global Certificate List

Common3.4.1Document InspectorThe Document Inspector tab looks like this:There are five sections on this tab:• Document Download Filter• Document Uploa

Strany 183

CommonDocument Download FilterThe Document Download Filter section looks like this:Using this section, you can configure actions for inbound office do

Strany 184

CommonTo view or modify the actions that are currently configured for these actions,click on the Text Categorization link in the checkbox inscription.

Strany 185

CommonDocument Mail FilterThe Document Mail Filter section looks like this:Using this section, you can configure actions for office documents that are

Strany 186

CommonDocument TypesThe Document Types section looks like this:Using this section, you can configure which of the filters that are accessibleover the

Strany 187

CommonUse the following checkboxes to modify the assignment of filters to documentformats:• Download FilterMark or clear the checkboxes in this line t

Strany 188 - Incident Manager

Common• Structured Storage document, like Visio or MSI, not readableFrom the drop-down lists provided here, select actions for documents inWeb and e-m

Strany 189

CommonThe options are arranged under the following tab:They are described in the upcoming section:• Archive Handler, see 3.5.13.5.1Archive HandlerThe

Strany 190

CommonArchive HandlingThe Archive Handling section looks like this:Using this section, you can configure blocking and other actions for encrypted,corr

Strany 191

CommonAfter specifying the appropriate settings click on Apply Changes to makethem effective.Use the following input fields to configure limits for ar

Komentáře k této Příručce

Žádné komentáře