25.10.2013 Views

Webwasher 6.5 SSL Scanner User's Guide - McAfee

Webwasher 6.5 SSL Scanner User's Guide - McAfee

Webwasher 6.5 SSL Scanner User's Guide - McAfee

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Contents<br />

Chapter 1 Introduction ....................................................................................... 1– 1<br />

1.1 About This <strong>Guide</strong>........................................................................... 1– 2<br />

1.2 What Else Will You Find in This Introduction? ...................................... 1– 2<br />

1.3<br />

1.3.1<br />

1.3.2<br />

1.3.3<br />

Using <strong>Webwasher</strong>..........................................................................<br />

First Level Tabs.............................................................................<br />

Configuring a Sample Setting...........................................................<br />

General Features of the Web Interface...............................................<br />

1– 3<br />

1– 4<br />

1– 5<br />

1– 7<br />

1.4<br />

1.4.1<br />

1.4.2<br />

Other Documents ..........................................................................<br />

Documentation on Main Products......................................................<br />

Documentation on Special Products ..................................................<br />

1–11<br />

1–12<br />

1–13<br />

1.5 The <strong>Webwasher</strong> Web Gateway Security Products ................................ 1–14<br />

Chapter 2 Home .................................................................................................. 2– 1<br />

2.1 Overview ..................................................................................... 2– 2<br />

2.2<br />

2.2.1<br />

2.2.2<br />

2.2.3<br />

Dashboard ...................................................................................<br />

Executive Summary .......................................................................<br />

Traffic Volume...............................................................................<br />

System........................................................................................<br />

2– 2<br />

2– 8<br />

2–11<br />

2–13<br />

2.3<br />

2.3.1<br />

Overview (Feature) ........................................................................<br />

Overview (Feature) ........................................................................<br />

2–18<br />

2–19<br />

2.4<br />

2.4.1<br />

Support .......................................................................................<br />

Support .......................................................................................<br />

2–23<br />

2–23<br />

2.5<br />

2.5.1<br />

2.5.2<br />

2.5.3<br />

TrustedSource ..............................................................................<br />

TrustedSource ..............................................................................<br />

Malware Feedback Black List...........................................................<br />

Feedback.....................................................................................<br />

2–24<br />

2–25<br />

2–30<br />

2–33<br />

2.6<br />

2.6.1<br />

2.6.2<br />

2.6.3<br />

Manuals.......................................................................................<br />

Documentation on Main Products......................................................<br />

Documentation on Special Products ..................................................<br />

Additional Documentation................................................................<br />

2–34<br />

2–35<br />

2–37<br />

2–39<br />

2.7<br />

2.7.1<br />

Preferences..................................................................................<br />

Preferences..................................................................................<br />

2–40<br />

2–40<br />

2.8<br />

2.8.1<br />

2.8.2<br />

License........................................................................................<br />

Information ...................................................................................<br />

Notification ...................................................................................<br />

2–44<br />

2–45<br />

2–48<br />

Chapter 3 Common ............................................................................................. 3– 1<br />

3.1 Overview ..................................................................................... 3– 2<br />

3.2<br />

3.2.1<br />

Quick Snapshot.............................................................................<br />

Quick Snapshot.............................................................................<br />

3– 3<br />

3– 4<br />

3.3<br />

3.3.1<br />

3.3.2<br />

3.3.3<br />

Media Type Filters .........................................................................<br />

Actions ........................................................................................<br />

Media Type Black List.....................................................................<br />

Media Type White List ....................................................................<br />

3– 8<br />

3– 9<br />

3–13<br />

3–16<br />

i

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!