triton web help

Add to my manuals
564 Pages

advertisement

triton web help | Manualzz

The Web Security Dashboard

Web Security Status Monitor mode

Web Security Help | Web Security Solutions | Version 7.8.x

For security purposes, a TRITON console session ends after 30 minutes of inactivity.

You can, however, enter a Status Monitor mode that lets you monitor Internet activity and alerting data without timing out.

You must log off of other TRITON management modules to enter Status Monitor mode in the Web Security manager.

In Status Monitor mode, information on the Status > Dashboard, Status > Alerts,

Status > Deployment, and Reporting > Real-Time Monitor pages continues to update normally until you close the browser or log off.

To initiate Status Monitor mode, first save or discard any pending changes, then:

Select Status Monitor mode from the Role drop-down list in the Web Security toolbar.

Click the Status Monitor button in the toolbar at the top of the Status >

Dashboard or Status > Alerts. page.

To stop monitoring Web Security status, log off of the TRITON console or close the browser.

Web Security Help

47

The Web Security Dashboard

48

Websense Web Security Solutions

3

Internet Usage Filters

Web Security Help | Web Security Solutions | Version 7.8.x

Related topics:

Managing access to categories and protocols

, page 50

Working with filters

, page 61

Configuring filtering settings

, page 69

Internet Access Policies

, page 91

Refine Web Security Policies

, page 261

Policies govern user Internet access. A policy is a schedule that determines how and when clients are able to access websites and Internet applications. At their simplest, policies consist of:

Category filters, used to apply actions (permit, block) to website categories

Protocol filters, used to apply actions to Internet applications and non-HTTP

protocols

Note

In Websense Web Security Gateway Anywhere environments, the hybrid service does not enforce protocol filters.

A schedule that determines when each filter is enforced

Policies let you assign varying levels of Internet access to clients (for example, users, groups, or IP addresses in your network). First, create filters to define precise Internet access restrictions, and then use the filters to construct a policy.

Web Security Help

49

advertisement

Was this manual useful for you? Yes No
Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Download PDF

advertisement

Table of contents