13.07.2015 Views

TRITON - Web Security Help, Version 7.7 - Websense

TRITON - Web Security Help, Version 7.7 - Websense

TRITON - Web Security Help, Version 7.7 - Websense

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The <strong>Web</strong> <strong>Security</strong> Dashboardexported; not just those for the user, IP address, hostname, or severity level currentlydisplayed on the page.How severity is assigned to suspicious activity<strong>TRITON</strong> - <strong>Web</strong> <strong>Security</strong> <strong>Help</strong> | <strong>Web</strong> <strong>Security</strong> Solutions | <strong>Version</strong> <strong>7.7</strong>.xThe <strong>Web</strong>sense Master Database assigns a severity level to threat-related events basedon the category assigned to the request.Severity levels are mapped to categories in the <strong>Web</strong>sense Master Database, andmay change when the Master Database is updated.<strong>Web</strong>sense <strong>Web</strong> Filter and <strong>Web</strong>sense <strong>Web</strong> <strong>Security</strong> subscriptions do not includesome or all categories with High and Critical severity levels. These categoriesmay appear on the Threats dashboard, but not be available for filtering.Click the Severity Mapping link near the top of the Threats dashboard for a currentlist of the categories that have an associated severity ranking. The list indicates anycategories that are not available for filtering with your subscription.Reviewing threat incident details<strong>TRITON</strong> - <strong>Web</strong> <strong>Security</strong> <strong>Help</strong> | <strong>Web</strong> <strong>Security</strong> Solutions | <strong>Version</strong> <strong>7.7</strong>.xWhen an administrator selects an incident in the table at the top of the Threats > EventDetails page, the area below the table is populated with all available details about theincident. The available details may vary based on:What type of incident occurred. For example:• A outbound request for a URL that is assigned to a blocked category by theMaster Database is unlikely to include a threat name, intent, or type, becausethe request is blocked before Content Gateway analysis occurs.• A request that does not include an attempted file transfer does not includeforensic data.The integration providing Internet request information to Filtering Service. Forexample:• Only Content Gateway passes hostname, threat name, threat intent, threattype, and scanning category information.• Not all integrations pass protocol, method, or content type information.Whether any file transfer attempts were associated with the incident. (OnlyContent Gateway provides this type of forensic data.) See Reviewing threatrelatedforensic data, page 41.<strong>TRITON</strong> - <strong>Web</strong> <strong>Security</strong> <strong>Help</strong> 39

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!