Webwasher 6.5 SSL Scanner User's Guide - McAfee
Webwasher 6.5 SSL Scanner User's Guide - McAfee
Webwasher 6.5 SSL Scanner User's Guide - McAfee
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Contents<br />
Chapter 1 Introduction ....................................................................................... 1– 1<br />
1.1 About This <strong>Guide</strong>........................................................................... 1– 2<br />
1.2 What Else Will You Find in This Introduction? ...................................... 1– 2<br />
1.3<br />
1.3.1<br />
1.3.2<br />
1.3.3<br />
Using <strong>Webwasher</strong>..........................................................................<br />
First Level Tabs.............................................................................<br />
Configuring a Sample Setting...........................................................<br />
General Features of the Web Interface...............................................<br />
1– 3<br />
1– 4<br />
1– 5<br />
1– 7<br />
1.4<br />
1.4.1<br />
1.4.2<br />
Other Documents ..........................................................................<br />
Documentation on Main Products......................................................<br />
Documentation on Special Products ..................................................<br />
1–11<br />
1–12<br />
1–13<br />
1.5 The <strong>Webwasher</strong> Web Gateway Security Products ................................ 1–14<br />
Chapter 2 Home .................................................................................................. 2– 1<br />
2.1 Overview ..................................................................................... 2– 2<br />
2.2<br />
2.2.1<br />
2.2.2<br />
2.2.3<br />
Dashboard ...................................................................................<br />
Executive Summary .......................................................................<br />
Traffic Volume...............................................................................<br />
System........................................................................................<br />
2– 2<br />
2– 8<br />
2–11<br />
2–13<br />
2.3<br />
2.3.1<br />
Overview (Feature) ........................................................................<br />
Overview (Feature) ........................................................................<br />
2–18<br />
2–19<br />
2.4<br />
2.4.1<br />
Support .......................................................................................<br />
Support .......................................................................................<br />
2–23<br />
2–23<br />
2.5<br />
2.5.1<br />
2.5.2<br />
2.5.3<br />
TrustedSource ..............................................................................<br />
TrustedSource ..............................................................................<br />
Malware Feedback Black List...........................................................<br />
Feedback.....................................................................................<br />
2–24<br />
2–25<br />
2–30<br />
2–33<br />
2.6<br />
2.6.1<br />
2.6.2<br />
2.6.3<br />
Manuals.......................................................................................<br />
Documentation on Main Products......................................................<br />
Documentation on Special Products ..................................................<br />
Additional Documentation................................................................<br />
2–34<br />
2–35<br />
2–37<br />
2–39<br />
2.7<br />
2.7.1<br />
Preferences..................................................................................<br />
Preferences..................................................................................<br />
2–40<br />
2–40<br />
2.8<br />
2.8.1<br />
2.8.2<br />
License........................................................................................<br />
Information ...................................................................................<br />
Notification ...................................................................................<br />
2–44<br />
2–45<br />
2–48<br />
Chapter 3 Common ............................................................................................. 3– 1<br />
3.1 Overview ..................................................................................... 3– 2<br />
3.2<br />
3.2.1<br />
Quick Snapshot.............................................................................<br />
Quick Snapshot.............................................................................<br />
3– 3<br />
3– 4<br />
3.3<br />
3.3.1<br />
3.3.2<br />
3.3.3<br />
Media Type Filters .........................................................................<br />
Actions ........................................................................................<br />
Media Type Black List.....................................................................<br />
Media Type White List ....................................................................<br />
3– 8<br />
3– 9<br />
3–13<br />
3–16<br />
i