4.4.10 Central Management....................................................................141
4.4.12 Endpoint Web Control..................................................................144
4.5.1 Configuring the Network Interface..................................................147
4.5.2 Hostname and Other Network Settings.........................................150
4.5.3 Configuring WCCP.........................................................................153
4.5.4 Load Balancing with the Management Appliance..........................155
4.5.5 Testing Network Connectivity.........................................................155
4.5.6 Running the Diagnostic Tools.........................................................156
5.1.1 Traffic & Performance: Volume ......................................................157
5.1.2 Traffic & Performance: Latency .....................................................157
5.1.3 Traffic & Performance: Throughput ................................................158
5.1.4 Users: Virus Downloaders .............................................................158
5.1.5 Users: Sandstorm Users ...............................................................158
5.1.6 Users: PUA Downloaders ..............................................................159
5.1.7 Users: High Risk Site Visitors ........................................................159
5.1.8 Users: Policy Violators ...................................................................160
5.1.9 Users: Top Users By Quota ...........................................................160
5.1.10 Users: Top Bandwidth Users .......................................................160
5.1.11 Users: Top Users By Browse Time ..............................................161
5.1.12 Users: Browse Time By User ......................................................161
5.1.13 Users: Browse Summary By User ...............................................162
5.1.14 Users: Top Users By Category ....................................................162
5.1.15 Users: Category Visits By User ...................................................163
5.1.16 Users: Site Visits By User ...........................................................163
5.1.17 Users: Users By Search Queries ................................................164
5.1.18 Users: Top Web Application Users ..............................................164
5.1.19 Policy & Content: Allowed Sites ..................................................164
iv | Contents | Sophos Web Appliance