The appliance provides configuration options that enable you to set whether you will Allow user
access to each of over 50 categories of URLs, and, if access is allowed, whether you want to
Warn users that they have requested a URL that violates your organization’s browsing policy.
This set of options constitutes the policy.
You can set the default policy on the Configuration > Group Policy > Default Policy page. You
can set a special hours policy (for example, to allow less restrictive browsing during lunch hour
and after regular business hours) on the Configuration > Group Policy > Special Hours page.
Also, you can set numerous additional policies to grant groups or specified users extraordinary
access, optionally for a limited time, on the Configuration > Group Policy > Additional Policies
page.
G.18 potentially unwanted application
Potentially unwanted applications include spyware and adware.
Potentially unwanted applications (PUAs) are applications that, although not malicious, can affect
performance of client machines or potentially introduce security and related risks into your
organization. Some applications that may be classified as PUAs may have legitimate uses, but
these should be installed only with the system administrator’s knowledge and at his or her
discretion.
Sophos is an active member of the Anti Spyware Coalition (ASC). When classifying PUAs,
SophosLabs uses the following broad definitions, which are derived from the ASC risk model.
Adware
■
Application that often has the primary function of delivering advertising to the desktop.
■
Software that tracks internet usage and/or collects potential Personally Identifiable Information
(PII) data from a user’s computer for the purposes of selling this information, or associated
information, to a third party.
■
Usually unknowingly installed on systems without specific user interaction.
■
Includes Advertising Display Software and Tracking Software as defined by ASC.
System Monitors
■
Commercially or freely available software whose primary function is to monitor the use of the
local computer.
■
Commonly marketed as PC surveillance software.
■
Usually installed with user interaction.
■
Of interest to corporate networks to ensure that users do not make unauthorized use of such
software.
■
Applications for which some customers may want to authorize use.
■
Include Tracking Software as defined by ASC.
Remote Administration Tools
■
Commercial or freely available tools used for remotely accessing and controlling one or more
computers.
234 | Glossary | Sophos Web Appliance