C
ONTENTS
M86 S
ECURITY
I
NSTALLATION
G
UIDE
v
Enterprise Reporter registration, Save settings ...............................................................43
Step 4: Generate SSL Certificate. ................................................................................ 44
Generate a Self-Signed Certificate for the WFR ....................................................................44
IE Security Certificate Installation Procedures .......................................................................46
Accept the Security Certificate in IE ................................................................................46
Windows XP or Vista with IE 7 or 8............................................................................46
Windows 7 with IE 8...................................................................................................50
Map the WFR’s IP Address to the Server’s Host Name ..................................................51
Step 5: Test Filtering or the Mobile Client Connection. ............................................ 53
Test Filtering on the Web Filter ..............................................................................................53
Test the Mobile Client Connection .........................................................................................53
Step 6: Set Library Updates. ........................................................................................ 54
Activate the Web Filter ...........................................................................................................54
Log in to the Web Filter ..........................................................................................................55
Perform a Complete Library Update ......................................................................................56
Monitor the Library Update Process .......................................................................................57
Step 7: Set Self-Monitoring. ......................................................................................... 58
Step 8: Verify Web Filter Log Transfer........................................................................ 60
Single Sign-On Access, Default Username/Password. ............................................. 61
Access WFR Applications from the TAR User Interface ........................................................61
Default Usernames and Passwords for WFR Applications ....................................................61
C
ONCLUSION
................................................................................................62
B
EST
F
ILTERING
AND
R
EPORTING
P
RACTICES
...............................................63
Web Filter Usage Scenarios......................................................................................... 64
I. Threats/Liabilities ...............................................................................................................65
1. Category block ............................................................................................................65
2. Rule block ...................................................................................................................65
3. X-Strike on blocked categories ...................................................................................65
4. Custom Lock, Block, Warn, X Strikes, Quota pages ..................................................66
5. URL Keywords ............................................................................................................66
6. Search Engine Keywords ...........................................................................................66
7. Custom Category (blocked) . .......................................................................................67
8. Minimum Filtering Level ..............................................................................................67
9. Override Account bypass ...........................................................................................67
10. Exception URL bypass . .............................................................................................68
11. Proxy Patterns ...........................................................................................................68
12. File type blocking .......................................................................................................68
II. Bandwidth/Productivity ......................................................................................................69
1. Time Quota/Hit Quota .................................................................................................69
2. Overall Quota .............................................................................................................69
3. Time Based Profiles ...................................................................................................69
4. Warn option with low filter settings . ............................................................................70
5. Warn-strike .................................................................................................................70
6. P2P patterns ...............................................................................................................70
7. IM patterns ..................................................................................................................71
8. Game patterns ............................................................................................................71
9. Streaming Media patterns ..........................................................................................71
Содержание 350
Страница 8: ...CONTENTS viii M86 SECURITY INSTALLATION GUIDE...
Страница 124: ...INDEX 116 M86 SECURITY INSTALLATION GUIDE...
Страница 125: ......