Management Console Reference Guide

Total Page:16

File Type:pdf, Size:1020Kb

Management Console Reference Guide Secure Web Gateway Management Console Reference Guide Release 10.0 • Manual Version 1.01 M86 SECURITY SETUP AND CONFIGURATION GUIDE © 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange, CA 92865, USA Version 1.01, published November 2010 for SWG software release 10.0 This document may not, in whole or in part, be copied, photo- copied, reproduced, translated, or reduced to any electronic medium or machine readable form without prior written con- sent from M86 Security. Every effort has been made to ensure the accuracy of this document. However, M86 Security makes no warranties with respect to this documentation and disclaims any implied war- ranties of merchantability and fitness for a particular purpose. M86 Security shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. Due to future enhancements and modifications of this product, the information described in this documentation is subject to change without notice. Trademarks Other product names mentioned in this manual may be trade- marks or registered trademarks of their respective companies and are the sole property of their respective manufacturers. II M86 SECURITY, Management Console Reference Guide CONTENT INTRODUCTION TO THE SECURE WEB GATEWAY MANAGEMENT CONSOLE .................................................................... 1 WORKING WITH THE MANAGEMENT CONSOLE................ 3 Management Console . 3 Main Menu . 4 Using the Management Console . 6 Management Wizard . 10 User Groups Wizard . 11 Log Entry Wizard . 28 DASHBOARD............................................................... 33 Dashboard Console . 33 Functionality. 34 Device Gauges . 35 Performance Graphs . 38 Messages (SNMP). 40 Device Utilization Graphs. 41 USERS ....................................................................... 47 Users . 47 Users/User Groups . 47 User Group Details Screen . 49 Blocked and Revoked Cloud Users . 52 Unknown Users . 55 Independent Users. 57 Creating a New User Group. 60 Adding a User to a User Group . 63 Moving Users. 64 The Importance of User/User Group Identifiers . 66 Cloud User Certificate Management . 67 LDAP . 70 General . 72 Advanced Settings. 76 Example for Adding an LDAP Directory. 80 M86 SECURITY, SECURE WEB GATEWAY 10.01 Import Groups . 83 Populating the LDAP Groups with Users. 85 Settings and Defaults. 87 Scheduled Settings . 88 Unassigned LDAP Groups. 89 Assigning Policies . 91 Moving LDAP Groups . 92 Active Directory. 95 Authentication Server. 95 ADMINISTRATION ........................................................ 99 Administrators. 100 Default Permissions. 102 Administrator Group Details. 106 Administrator Details . 107 Creating a new Administrators Group . 109 Adding an Administrator to an Administrators Group. 111 Permissions . 112 System Settings . 116 M86 Devices . 118 Available Device Tree Options. 120 Device IP . 122 Network Roles . 130 Log Server . 131 Scanning Server . 142 Integrated SSL Scanning. 160 Default Values . 200 Policy Server . 203 Scanning Options. 213 Mail Server. 217 Scanning Engines . 219 Administrative Settings . 226 Digital Certificates . 228 License. 234 Debug Logs . 236 GUI Log Level . 237 Cloud . 239 Cloud Configuration . 240 Certificate Management Mode. 240 Configuration . 241 Email Template . 264 Rollback . 266 Rollback Settings . 268 2M86 SECURITY, SECURE WEB GATEWAY 10.0 Backup Now. 270 Restore (Rollback) . 271 Reports Settings . 272 Database Settings . 273 Database Restore . 276 Export/Import. 277 Export. 277 Import. 279 Updates . 308 Updates Management . 310 Updates Configuration . 317 Alerts . 320 Alert Settings . 320 SNMP. 325 Security . 330 System Information. 332 General . ..
Recommended publications
  • 1 Table of Contents List of Figures
    Table of Contents List of Figures ..................................................................................................................... 4 List of Tables ...................................................................................................................... 5 Chapter 1: Introduction....................................................................................................... 6 1.1 Introduction....................................................................................................................6 1.2 Problem Statement .......................................................................................................12 1.3 Thesis Objective...........................................................................................................12 1.4 Thesis Organization.....................................................................................................14 Chapter 2: Intrusion Detection.......................................................................................... 15 2.1 Introduction..................................................................................................................15 2.2 What is an IDS .............................................................................................................15 2.2.1 The Basic Concepts of Intrusion Detection......................................................16 2.2.2 A Generic Intrusion-Detection System.............................................................17 2.2.3 Characteristics of
    [Show full text]
  • Using Remote Desktop Services with Ifix 1
    Proficy iFIX 6.5 Using Remote Desktop Services GE Digital Proficy Historian and Operations Hub: Data Analysis in Context 1 Proprietary Notice The information contained in this publication is believed to be accurate and reliable. However, General Electric Company assumes no responsibilities for any errors, omissions or inaccuracies. Information contained in the publication is subject to change without notice. No part of this publication may be reproduced in any form, or stored in a database or retrieval system, or transmitted or distributed in any form by any means, electronic, mechanical photocopying, recording or otherwise, without the prior written permission of General Electric Company. Information contained herein is subject to change without notice. © 2021, General Electric Company. All rights reserved. Trademark Notices GE, the GE Monogram, and Predix are either registered trademarks or trademarks of General Electric Company. Microsoft® is a registered trademark of Microsoft Corporation, in the United States and/or other countries. All other trademarks are the property of their respective owners. We want to hear from you. If you have any comments, questions, or suggestions about our documentation, send them to the following email address: [email protected] Table of Contents Using Remote Desktop Services with iFIX 1 Reference Documents 1 Introduction to Remote Desktop Services 2 Using iClientTS 2 Understanding the iFIX and Remote Desktop Services 3 File System Support 5 Where to Find More Information on Remote Desktop Services 5 Getting
    [Show full text]
  • Netop Remote Control User's Guide
    USER'S GUIDE 27 September 2017 Netop Remote Control User's Guide Copyright© 1981-2017 Netop Business Solutions A/S. All Rights Reserved. Portions used under license from third parties. Please send any comments to: Netop Business Solutions A/S Bregnerodvej 127 DK-3460 Birkerod Denmark E-mail: [email protected] Internet: www.netop.com Netop™ is a trademark of Netop Business Solutions A/S. All other products mentioned in this document are trademarks of their respective manufacturers. Netop Business Solutions A/S denies any and all responsibility for damages caused directly or indirectly as a result of using this document. The content of this document is subject to change without notice. Netop Business Solutions A/S retains the copyright to this document. The document is optimized for double-sided printing. 27 September 2017 Netop Remote Control User's Guide Contents 1 Overview ....................................................................................................................................................4 1.1 Remote Control modules ...............................................................................................................................................4 1.2 Security ...........................................................................................................................................4 1.3 Communication profiles ...............................................................................................................................................5 2 Managing Hosts ........................................................................................................................................6
    [Show full text]
  • Microsoft Active Platform: a Development Platform for Internet-Based Distributed Computing
    Microsoft Active Platform: A Development Platform for Internet-Based Distributed Computing Backgrounder March 19977 Intent on increasing online efficiency while reducing development and training costs, businesses are demanding a single solution for storing, publishing and retrieving information, as well as for running line-of-business applications on internal networks and the Internet. The Microsoft® Active Platform meets this demand by providing a foundation for distributed computing. An integrated, comprehensive set of client and server development technologies, the Active Platform makes it easy for developers to integrate the connectivity of the Internet with the power of the personal computer. The Active Platform is based on the leading standards-based implementation of HTML from Microsoft, open scripting and component architecture. It allows developers to use the same tools and components they know and use today to build powerful applications easily for the Internet and intranets. This comprehensive set of tools and technologies provides a new application development approach across clients and servers using a single component model. By making optimal use of today’s tools and tomorrow’s Internet technologies, the Active Platform enables developers to make the transition into the new paradigm for desktop computing and capitalize on the new opportunities it presents. The Active Platform offers users and administrators a graphically rich, intuitive, easy-to-manage and consistent experience across platforms. Developers benefit from rich services built into the system and a uniform programming model across the client and the server that can be accessed from a consistent, integrated set of tools. Figure1. The Microsoft Active Platform brings information to the desktop from the Internet and intranets under the comprehensive interface of the Active Desktop.
    [Show full text]
  • Innovations Across the Grid Partnerships Transforming the Power Sector
    VOLUME II INNOVATIONS ACROSS THE GRID PARTNERSHIPS TRANSFORMING THE POWER SECTOR The Edison Foundation INSTITUTE for ELECTRIC INNOVATION The Edison Foundation INSTITUTE for ELECTRIC INNOVATION VOLUME II INNOVATIONS ACROSS THE GRID PARTNERSHIPS TRANSFORMING THE POWER SECTOR December 2014 © 2014 by the Institute for Electric Innovation All rights reserved. Published 2014. Printed in the United States of America. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage or retrieval system or method, now known or hereinafter invented or adopted, without the express prior written permission of the Institute for Electric Innovation. Attribution Notice and Disclaimer This work was prepared by the Edison Foundation Institute for Electric Innovation (IEI). When used as a reference, attribution to IEI is requested. IEI, any member of IEI, and any person acting on IEI's behalf (a) does not make any warranty, express or implied, with respect to the accuracy, completeness or usefulness of the information, advice, or recommendations contained in this work, and (b) does not assume and expressly disclaims any liability with respect to the use of, or for damages resulting from the use of any information, advice, or recommendations contained in this work. The views and opinions expressed in this work do not necessarily reflect those of IEI or any member of IEI. This material and its production, reproduction, and distribution by IEI does
    [Show full text]
  • Accurate Weather Forecasting Through Locality Based Collaborative Computing
    Accurate Weather Forecasting Through Locality Based Collaborative Computing Bard˚ Fjukstad John Markus Bjørndalen Otto Anshus Department of Computer Science Department of Computer Science Department of Computer Science Faculty of Science and Technology Faculty of Science and Technology Faculty of Science and Technology University of Tromsø, Norway University of Tromsø, Norway University of Tromsø, Norway Email: [email protected] Email: [email protected] and the Norwegian Meteorological Institute Forecasting Division for Northern Norway Email: [email protected] Abstract—The Collaborative Symbiotic Weather Forecasting of collaboration is when users use forecasts from the national (CSWF) system lets a user compute a short time, high-resolution weather services to produce short-term, small area, and higher forecast for a small region around the user, in a few minutes, resolution forecasts. There is no feedback of these forecasts on-demand, on a PC. A collaborated forecast giving better uncertainty estimation is then created using forecasts from other from the users to the weather services. These forecasts take users in the same general region. A collaborated forecast can be minutes to compute on a single multi-core PC. The third is visualized on a range of devices and in a range of styles, typically a symbiotic collaboration where users share on-demand their as a composite of the individual forecasts. CSWF assumes locality locally produced forecasts with each other. between forecasts, regions, and PCs. Forecasts for a region are In a complex terrain like the fjords and mountains of Nor- computed by and stored on PCs located within the region. To locate forecasts, CSWF simply scans specific ports on public IP way, the topography have a significant impact on the weather addresses in the local area.
    [Show full text]
  • Bankovní Institut Vysoká Škola Praha
    Bankovní institut vysoká škola Praha Katedra informačních technologií a elektronického obchodování Moderní servery a technologie Servery a superservery, moderní technologie a využití v praxi Bakalářská práce Autor: Jan Suchý Informační technologie a management Vedoucí práce: Ing. Vladimír Beneš Praha Duben, 2007 Prohlášení: Prohlašuji, ţe jsem bakalářskou práci zpracoval samostatně a s pouţitím uvedené literatury. podpis autora V Praze dne 14.4.2007 Jan Suchý 2 Anotace práce: Obsahem této práce je popis moderní technologie v oblasti procesorového vývoje a jeho nasazení do provozu v oblasti superpočítačových systémů. Vědeckotechnický pokrok je dnes významně urychlován právě specializovanými prototypy superpočítačů určenými pro nejnáročnější úkoly v oblastech jako jsou genetika, jaderná fyzika, termodynamika, farmacie, geologie, meteorologie a mnoho dalších. Tato bakalářská práce se v krátkosti zmiňuje o prvopočátku vzniku mikroprocesoru, víceprocesorové architektury aţ po zajímavé projekty, jako jsou IBM DeepBlue, Deep Thunder nebo fenomenální IBM BlueGene/L, který je v současné době nejvýkonnějším superpočítačem na světě. Trend zvyšování výkonu a důraz na náklady související s provozováním IT, vedl zároveň k poţadavku na efektivnější vyuţívání IT systémů. Technologie virtualizaci a Autonomic Computingu se tak staly fenoménem dnešní doby. 3 Obsah 1 ÚVOD 6 2 PROCESORY 7 2.1 HISTORIE A VÝVOJ 7 2.2 NOVÉ TECHNOLOGIE 8 2.2.1 Silicon Germanium - SiGe (1989) 8 2.2.2 První měděný procesor (1997) 8 2.2.3 Silicon on Insulator - SOI (1998) 9 2.2.4
    [Show full text]
  • Modeling and Distributed Computing of Snow Transport And
    Modeling and distributed computing of snow transport and delivery on meso-scale in a complex orography Modelitzaci´oi computaci´odistribu¨ıda de fen`omens de transport i dip`osit de neu a meso-escala en una orografia complexa Thesis dissertation submitted in fulfillment of the requirements for the degree of Doctor of Philosophy Programa de Doctorat en Societat de la Informaci´oi el Coneixement Alan Ward Koeck Advisor: Dr. Josep Jorba Esteve Distributed, Parallel and Collaborative Systems Research Group (DPCS) Universitat Oberta de Catalunya (UOC) Rambla del Poblenou 156, 08018 Barcelona – Barcelona, 2015 – c Alan Ward Koeck, 2015 Unless otherwise stated, all artwork including digital images, sketches and line drawings are original creations by the author. Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons BY-SA License, version 4.0 or ulterior at the choice of the reader/user. At the time of writing, the license code was available at: https://creativecommons.org/licenses/by-sa/4.0/legalcode Es permet la lliure c`opia, distribuci´oi/o modificaci´od’aquest document segons els termes de la Lic`encia Creative Commons BY-SA, versi´o4.0 o posterior, a l’escollida del lector o usuari. En el moment de la redacci´o d’aquest text, es podia accedir al text de la llic`encia a l’adre¸ca: https://creativecommons.org/licenses/by-sa/4.0/legalcode 2 In memoriam Alan Ward, MA Oxon, PhD Dublin 1937-2014 3 4 Acknowledgements A long-term commitment such as this thesis could not prosper on my own merits alone.
    [Show full text]
  • Internet of Things and Big Data Analytics Toward Next-Generation Intelligence Studies in Big Data
    Studies in Big Data 30 Nilanjan Dey Aboul Ella Hassanien Chintan Bhatt Amira S. Ashour Suresh Chandra Satapathy Editors Internet of Things and Big Data Analytics Toward Next-Generation Intelligence Studies in Big Data Volume 30 Series editor Janusz Kacprzyk, Polish Academy of Sciences, Warsaw, Poland e-mail: [email protected] About this Series The series “Studies in Big Data” (SBD) publishes new developments and advances in the various areas of Big Data- quickly and with a high quality. The intent is to cover the theory, research, development, and applications of Big Data, as embedded in the fields of engineering, computer science, physics, economics and life sciences. The books of the series refer to the analysis and understanding of large, complex, and/or distributed data sets generated from recent digital sources coming from sensors or other physical instruments as well as simulations, crowd sourcing, social networks or other internet transactions, such as emails or video click streams and other. The series contains monographs, lecture notes and edited volumes in Big Data spanning the areas of computational intelligence incl. neural networks, evolutionary computation, soft computing, fuzzy systems, as well as artificial intelligence, data mining, modern statistics and Operations research, as well as self-organizing systems. Of particular value to both the contributors and the readership are the short publication timeframe and the world-wide distribution, which enable both wide and rapid dissemination of research output. More information about this series at http://www.springer.com/series/11970 Nilanjan Dey • Aboul Ella Hassanien Chintan Bhatt • Amira S. Ashour Suresh Chandra Satapathy Editors Internet of Things and Big Data Analytics Toward Next-Generation Intelligence 123 Editors Nilanjan Dey Amira S.
    [Show full text]
  • SPERI Paper No. 13 Climate Risk, Big Data and the Weather Market
    SPERI Paper No. 13 Climate Risk, Big Data and the Weather Market. Jo Bates About the author Jo Bates Jo Bates is a Lecturer in Information Politics and Policy in the Information School, University of Sheffield. She researches the political economy of data, particularly data sets that are produced by public bodies and which are often referred to as Public Sector Information. Her research focuses on understanding the socio- cultural and political economic factors shaping developments in this field, including the ideas, practices and policies shaping the production and distribution of public data sets and their re-use by third parties including citizens and businesses. Her research has explored the development of the UK’s Open Government Data initiative. Her current project is focused on the distribution and re-use of weather data. ISSN 2052-000X Published in May 2014 SPERI Paper No. 13 – Climate Risk, Big Data and the Weather Market 1 Introduction In a recent SPERI paper, Colin Hay and Tony Payne (2013) develop the concept of “The Great Uncertainty” to describe our current era. They point to “three major processes of structural change” which underlie this uncertainty – financial crisis, shifting economic power and environmental threat – arguing that, despite their differing historical timespans, these deep structural changes are all taking place in the present and “arguably will come to a head at broadly the same time” (Hay & Payne 2013, p. 3). This paper draws together two core elements of “The Great Uncertainty” – financial crisis and environmental threat – with Sandra Braman’s (2006) concept of “informational power” to explore the relationship between this uncertain terrain and developments in (‘big’) data analytics.
    [Show full text]
  • Eduapps User Manual
    EduApps User Manual NDCO Project 2010 Incorporating AccessApps EduApps User Manual NDCO Project 2010 Table of Contents Section Title Page No ( i ) Purpose of the EduApps User Manual 2 ( ii ) Introduction to Portable Applications 3 ( iii ) Background to EduApps – Portable Inclusive Solutions 4 ( iv ) Open Source and Freeware Applications 5 ( v) Assistive Technology Overview 6 1. Overview of EduApps Applications 8 2. AccessApps, Teach Apps, Learn Apps and MyApps 9 3. Why Use AccessApps? 10 4. Benefits to Learners and End-Users 12 5. Benefits to Schools and Organisations 13 6. Key Features of Portable Applications 14 7. Downloading EduApps Initiatives 15 8. Installing AccessApps to a USB External drive 17 9. Configuring and Customising AccessApps 18 10. Storage of Documents, Files, Music and Video files 19 11. Adding Additional Apps 20 12. Starting and Finishing a Session Using Apps 21 13. Using AccessApps software a. Together 22 b. With other MS Windows Programs 23 c. In Education and Training 24 d. At Home and in Other Domains 25 14. List and Descriptions of AccessApps programs 26 15. Web Links and Resources for Other Portable Apps 37 16. Backing Up Data 40 17. Selection and Maintenance of a USB Drive 41 18. Problem Solving 42 19. Future Directions of Portable Apps – a. MyStudyBar V2 43 b. MyVisBar 44 20. Contact Information 46 21. Credits 47 EduApps - AccessApps; TeachApps; LearnApps; MyApps; MyStudyBar, MyVisBar Page 1 EduApps User Manual NDCO Project 2010 Purpose of the EduApps User Manual The EduApps User Manual was written to help guide and support new and existing users of the four EduApps initiatives, particularly those wishing to promote and use AccessApps.
    [Show full text]
  • Effective Web Design, Second Edition
    Effective Web Design Effective Web Design, Second Edition Ann Navarro SYBEX® Associate Publisher: Cheryl Applewood Contracts and Licensing Manager: Kristine O'Callaghan Acquisitions and Developmental Editor: Raquel Baker Editors: Joseph A. Webb, James A. Compton, Colleen Wheeler Strand Production Editor: Dennis Fitzgerald Technical Editor: Marshall Jansen Book Designer: Maureen Forys, Happenstance Type-O-Rama Graphic Illustrator: Tony Jonick Electronic Publishing Specialist: Maureen Forys, Happenstance Type-O-Rama Proofreaders: Nelson Kim, Nancy Riddiough, Leslie E.H. Light Indexer: Ann Rogers CD Coordinator: Christine Harris CD Technician: Kevin Ly Cover Designer: Design Site Cover Illustrator/Photographer: Dan Bowman Copyright © 2001 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501. World rights reserved. page 1 Effective Web Design The author(s) created reusable code in this publication expressly for reuse by readers. Sybex grants readers limited permission to reuse the code found in this publication or its accompanying CD-ROM so long as (author(s)) are attributed in any application containing the reusable code and the code itself is never distributed, posted online by electronic transmission, sold, or commercially exploited as a stand- alone product. Aside from this specific exception concerning reusable code, no part of this publication may be stored in a retrieval system, transmitted, or reproduced in any way, including but not limited to photocopy, photograph, magnetic, or other record, without the prior agreement and written permission of the publisher. An earlier version of this book was published under the title Effective Web Design © 1998 SYBEX Inc. Library of Congress Card Number: 2001088112 ISBN: 0-7821-2849-1 SYBEX and the SYBEX logo are either registered trademarks or trademarks of SYBEX Inc.
    [Show full text]