Getting Started
Getting Started
Trademarks
Forcepoint is a trademark of Forcepoint LLC. SureView, TRITON, ThreatSeeker, Sidewinder and Stonesoft are registered trademarks of
Forcepoint LLC. Raytheon is a registered trademark of Raytheon Company. All other trademarks are the property of their respective
owners.
Microsoft, Windows, Windows NT, Windows Server, and Active Directory are either registered trademarks or trademarks of Microsoft
Corporation in the United States and/or other countries.
Other product names mentioned in this manual may be trademarks or registered trademarks of their respective companies and are the
sole property of their respective manufacturers.
Contents
Chapter 1
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Chapter 2
Chapter 3
Chapter 4
Contents
Chapter 6
Chapter 7
ii
Websense
Contents
Chapter 9
Chapter 10
Chapter 11
iii
Contents
iv
Websense
Introduction
TRITON AP-WEB with Web Cloud Module is a fully managed service that provides
comprehensive and flexible protection against web threats such as viruses, spyware,
and phishing attacks as well as controlling employee web access.
As an alternative to the fully cloud-based service, you can deploy the i-Series
appliance as an add-on to TRITON AP-WEB. This provides fast on-premises URL
analysis and application/protocol detection for web traffic, along with centralized
policy management and reporting capabilities in the cloud.
TRITON AP-WEB is simple to use and works out of the box with a default policy.
To make full use of its features, however, you should configure your policy or add
new policies. This guide outlines the tasks that you must complete to get TRITON
AP-WEB filtering your web traffic.
Getting Started
Getting Started Guide | Cloud Web Protection Solutions
The following steps must be completed before you can use TRITON AP-WEB. It is
important that you follow these in order:
1. Requesting a TRITON AP-WEB Account.
2. Deploying your chosen solution, either purely cloud-based (see Deploying
TRITON AP-WEB in the cloud) or with an i-Series appliance (see Deploying an iSeries appliance).
The deployment options you choose may affect which of the following steps are
necessary. This includes setting up end-user browsers, and configuring your
firewall to allow and enforce TRITON AP-WEB connectivity.
3. Adding IP Addresses to Your Policy for your Internet gateway.
4. Setting Up End-User Authentication, if required.
Other chapters discuss which proxies are supported, how to set up roaming users, how
to configure data theft protection, and how to tailor your policy for your organization.
The final chapter provides tips for preparing your end users for their new web
protection system.
Introduction
Further Information
Detailed configuration advice for all TRITON AP-WEB services is available in the
Cloud TRITON Manager Help.
The Knowledge Base also contains technical information that is not included in this
guide, such as common configuration questions and known issues with workarounds.
The Knowledge Base also allows you to search for answers to a question you may
have. Enter a search phrase into the entry field and search all categories to see all the
articles in a given category. A list of related articles appears.
You should check these resources whenever you experience a problem or have a
support question.
Technical Support
If you have any questions during the set up phase, please contact your reseller or
Forcepoint Technical Support. Technical information about Forcepoint products is
available online 24 hours a day, including:
show-me tutorials
product documents
tips
If you are new to Forcepoint cloud-based services, request a trial online. For more
information, see Requesting a trial.
Requesting a trial
1. Go to www.forcepoint.com and select Products > Content Security > TRITON
AP-WEB, then click Get Started under the sign up for a free trial prompt.
2. On the Free Trials & Demos page, under Web Security, click TRITON AP-WEB
(Cloud).
3. If you already have a website account, log in on the page that appears. If you do
not have an account, click Register and follow the steps to enter your details, then
return to the Free Trials & Demos page and click the link again.
4. On the Registration page, fill out the request form and read the Evaluation Details
information, then click Continue.
5. When prompted, read and accept the terms and conditions, then click Confirm to
initiate the evaluation process.
Shortly after you click Confirm, you receive an email message containing the links to
the following:
this guide
support options
If you are new to Forcepoint cloud-based products, the message also includes your
portal username and a temporary password. You will be asked to change the password
the first time you log on.
If you are already a Forcepoint cloud customer, TRITON AP-WEB is added to your
account. Use your existing credentials to log on to the portal.
If you prefer to talk to a representative immediately, inside the U.S., call 1-800-7231166. Outside the U.S., please visit the Partners > Find a Parnter page at
www.forcepoint.com to locate a reseller.
When you receive logon information in your confirmation email, log on to the Cloud
TRITON Manager by clicking the link that is provided or visiting:
https://admin.forcepoint.net/portal
Note
You must have port 443 open on your firewall to access the
Cloud TRITON Manager.
Enter your user name and password into the fields provided.
If you are a new customer, you will be asked to change your password and set a
password reminder question. You must also accept the terms of your license
agreement to proceed.
You can now configure your TRITON AP-WEB account.
A default policy has been created for you: navigate to the Web > Policy
Management > Policies page to access it. This policy reflects the most commonly
chosen policy options.
Go to the Account > Contacts page to add administrator contacts for your
account. The administrator contacts can be given logons to the portal and their
permissions restricted as necessary.
If you want to synchronize your LDAP directory information with TRITON APWEB to simplify user and group management, go to the Account > Directory
Define account-level domains on the Web > Settings > Domains page.
Define policy-level domains on the Web > Policy Management > Policies
page. Select your policy, then click the End Users tab.
If you are deploying an i-Series appliance, follow the instructions in the chapter
Deploying an i-Series appliance, page 23. If you are installing the appliance as a
virtual machine, download the OVA file from the My Account page at
forcepoint.com
You can change your account configuration at any time. Refer to the Cloud TRITON
Manager Help for full instructions on how to configure your account. You can access
the Help and other reference tools from the Help menu in the cloud portal.
If you already have a proxy within your network, you should be able to direct
it to use TRITON AP-WEB in a chained proxy configuration. (See
Configuring a chained proxy, page 11.)
2. Configure your firewall to allow the host and port combinations that enable
TRITON AP-WEB to operate correctly. See Configuring your firewall, page 20.
Once you have completed these steps, you can define the IP addresses for which the
service will receive web requests (see Adding IP Addresses to Your Policy, page 65),
and choose how to manage your end users.
server (known as the origin server), but instead connects to a TRITON AP-WEB
proxy server, which relays the request to the origin server on behalf of the browser.
While doing this, the TRITON AP-WEB proxy server can examine the request and the
response, and make decisions such as whether to allow or block the request.
1. Depending on the browsers configuration, some requests may still go direct to the
origin server. This is indicated in the diagram by the Local server box, because
typically, such servers are local to the browser, inside the firewall.
2. Proxied HTTP requests (those that begin http://) are filtered and checked by
TRITON AP-WEB then relayed to the origin server as appropriate.
3. Proxied secure requests (those that begin https://) are carried over a tunneled
connection. This means that the TRITON AP-WEB proxy server connects to the
origin server on the browsers behalf, but takes no further part in the conversation,
passing data back and forth transparently.
You can choose to enable SSL decryption, in which case the cloud proxy
establishes SSL channels with newer browsers (Internet Explorer 8 or later, and
Firefox 3.5 or later) for HTTPS sites. This enables the proxy to serve the correct
notification page to the user for example, a block page if the SSL site is in a
category that the end user is prevented from accessing.
To implement this feature for your end users, you need a root certificate on each
client machine that acts as a Certificate Authority for SSL requests to the cloud
proxy. For more information, see the Cloud TRITON Manager Help.
4. Where the origin server is an FTP server (i.e., the URL begins ftp://), the
TRITON AP-WEB proxy server acts as a gateway, converting the HTTP request
sent by the browser into an FTP conversation with the origin server.
Some of the major benefits of TRITON AP-WEB over competing solutions are that:
During the initial stages of an evaluation, we recommend that you manually configure
a number of web browsers to access the TRITON AP-WEB PAC file. Once you are
happy that the service works as expected, you can add more users, perhaps by using
Active Directory group policy to configure browsers. Alternatively, if you have an
existing proxy, you may be able to proxy chain for a subset of users before deploying
across the complete organization.
You can also deploy endpoint client software for a small number of users to test
enforcement and seamless authentication. For more information, see Setting up
TRITON AP-ENDPOINT Web, page 67.
If you already have a proxy server that your users browsers are configured to use, you
should be able to leave the browsers settings unchanged and configure your existing
proxy to forward all HTTP, HTTPS, and FTP requests to TRITON AP-WEB. If your
proxy is capable of using a PAC file, you can use the one provided by TRITON APWEB. Otherwise, we recommend that you download a copy of the TRITON AP-WEB
PAC file and duplicate its functionality in your proxys configuration.
For more information about chained proxy configurations, see Using Chained
Proxies, page 51.
Note
The TRITON AP-WEB PAC file is not static, but is generated to reflect the current
settings of your policies. If you make policy changes and are not using the PAC file in
your proxy, you may have to change your proxy configuration to match.
If your browsers are to access TRITON AP-WEB directly (i.e., not through a chained
proxy), then we recommend you use a PAC file to configure the browsers. See The
TRITON AP-WEB PAC file, page 12, for more information.
TRITON AP-WEB has been tested with most commercially available web browsers,
but for support purposes we recommend you use one of the following:
Google Chrome 13 to 44
You can also install endpoint client software to ensure all web traffic is routed via the
TRITON AP-WEB proxy. The endpoint also passes authentication information to the
cloud proxies, enabling secure transparent authentication. For more information, see
Setting up TRITON AP-ENDPOINT Web, page 67.
Enabling cookies
For the best user experience, we recommend that you allow end users browsers to
accept cookies when using TRITON AP-WEB. If a browser is unable to, or is
configured not to accept cookies, the following features do not work:
If any of these features are enabled and cookies are not accepted, the browser may get
stuck in a loop between the end users requested URL and the relevant TRITON APWEB notification page.
Warning
Firefox is not the default or supported web browser for a Microsoft Active
Directory domain, therefore to configure this browser through Group Policy, you
must install third-party extensions to Group Policy in Active Directory. The
following extensions are not supported by Microsoft, nor are they supported and
endorsed by Forcepoint.
The following URL contains information and extensions for Firefox and Group Policy
Objects (GPO):
http://sourceforge.net/projects/firefoxadm
We strongly recommend that you read all available documentation before installing
the Active Directory extensions for Firefox. The above link provides a download of
the FirefoxADM, which is a group of Active Directory Group Policy templates. Once
you have downloaded the templates, you can install them all; however, the 2 files that
are needed to configure Firefox for TRITON AP-WEB are:
firefox_startup.vbs, which is the startup script for locking down Firefox settings.
See Applying the policy, page 16.
Add these 2 files to AD. They are in the main FirefoxADM folder. You should save
and extract these files to an easily accessible folder on the machine that you use to
edit/create the GPO.
8. Edit the proxy settings to direct the browsers to pick up settings from the PAC file,
then select Locked from the Preference State drop-down.
The Automatic Proxy Configuration URL should point at the PAC file you have
chosen to use (see The TRITON AP-WEB PAC file, page 12, for more details).
4. In the Logon Properties dialog box, select Add to open the Add a Script option.
Click Browse and you are shown the file you have just placed in the scripts folder.
Select the firefox_startup.vbs script, click Open, then OK twice to apply this
script to the GPO.
The next time users log onto a machine, this logon script directs their Firefox browsers
to pick up the Firefox defaults set up in the earlier sections.
Use the steps below to configure Internet Explorer manually. For instructions on using
Group Policy, see Turning on Group Policy to configure a web proxy, page 19.
1. Go to Tools > Internet Options and click the Connections tab.
2. Click LAN Settings.
8. Apply the same configuration that you set for the LAN connection, as covered in
steps 4-6.
If the policy needs to be reversed, it is not as simple as removing the GPO that was
originally applied. IE stores proxy settings in the registry, therefore by removing the
policy, you are keeping the same registry settings; it take another write session to reconfigure the proxy settings. To achieve this follow these steps:
1. Log on to a server in the Domain, and with administrative permissions, open up
Administrative Tools > Group Policy Management and expand your domain.
2. Right click the original GPO (TRITON AP-WEB) and select Edit.
3. From User configuration > Windows Settings > Internet Explorer
Maintenance, clear Enable Automatic Configuration.
4. From Proxy Settings, clear Enable proxy settings.
5. Click OK and close the GPO.
The clients update the next time Group Policy refreshes or, as described above, use the
command line at a particular client to achieve this manually.
In the PAC file URL field, enter the path to the PAC file (See The TRITON
AP-WEB PAC file, page 12).
In the Proxy Configuration File URL field, enter the path to the PAC file (See
The TRITON AP-WEB PAC file, page 12).
Click OK.
Some host and port combinations must be allowed through your firewall in order for
TRITON AP-WEB to operate correctly. Below is a description of each port.
Port
Purpose
8006
8089
80
443
Deploying an i-Series
appliance
Getting Started Guide | Cloud Web Protection Solutions
Some of the major benefits of TRITON AP-WEB over competing solutions are that:
During the initial stages of an evaluation, it is recommended that you configure all of
your IP address ranges as trusted network sources, meaning that the appliance ignores
all traffic. You can then test your deployment with a small number of clients before
opening it up to all IP addresses and ignoring only those addresses whose traffic you
do not want to be analyzed (for example, servers that receive Microsoft and antivirus
updates).
If you are installing the appliance as a virtual machine, ensure the installation
machine meets the following requirements:
For a Silicom bypass card deployment, the card should be installed on ESXi
in VMDirectPath mode. For more information on Silicom card installation,
see Silicom card setup, page 32.
If you wish to use transparent NTLM authentication for your users, decide
whether to connect your appliance to a local Active Directory (see Configuring
Active Directory authentication, page 48).
If you plan to use Active Directory authentication, ensure that your appliance
hostname complies with Active Directory hostname requirements (see First-Time
Configuration Wizard, page 42).
Alternatively you can enter the domain that forms part of your users NTLM
identity when adding your appliance in the cloud service portal.
Note
To use your Active Directory for authentication, the
appliance must be able to access the directorys IP address
and port(s). You may need to edit an internal firewall
setting or LAN routing rules.
It is recommended that you provide a certificate when you add an appliance in the
cloud portal, in order to avoid browser warnings regarding SSL termination for
block, authentication, or quota/confirm operations. See Generating a certificate.
To use the cloud service SSL decryption feature, you should also install the
Forcepoint root certificate on each client machine. See the section Enabling SSL
decryption in the Cloud TRITON Manager Help.
The appliance ships with a pre-installed Web category database. After appliance
setup, an update to this database is initiated. During this update, the appliance can
analyze traffic using the pre-installed database. Because this database is out-ofdate, traffic analysis may be more accurate after the full update is complete.
A progress message displayed on the Status > General page disappears when the
update is complete.
Browsing with TRITON AP-WEB via an i-Series appliance has been tested with
most commercially available web browsers. However, note that using a Windows
XP machine with Internet Explorer 8 or below is not recommended, as HTTPS
connections are not supported on i-Series appliances for this platform and
browser.
You should have received your TRITON AP-WEB confirmation email, including a
Cloud TRITON Manager user name and temporary password if you are a new cloud
services customer, as described in Logging on to the Cloud TRITON Manager. The
initial setup involves the following tasks:
1. Run directory synchronization
2. Add new appliance information.
It is recommended that you use directory synchronization to import your users and
groups information from your LDAP directory (for example, Active Directory) into
the Cloud TRITON Manager. This is the quickest and easiest way to import end users
email addresses, and also NTLM details if you are planning to use NTLM
identification.
Note
For alternatives to directory synchronization, see Enabling
browsers for NTLM transparent authentication.
Although TRITON AP-WEB is a cloud-based service, it synchronizes with LDAP
directories via a client-resident application called the Directory Synchronization
Client. Changes made to a directory, such as deleting a former employee or adding a
new one, are picked up by the service on the next scheduled update. If you have more
than one LDAP directory, the client can merge them together before synchronizing the
data with the service.
To set up and run directory synchronization:
1. Log on to the Cloud TRITON Manager from the machine you want to use for
directory synchronization.
2. Go to Account > Directory Synchronization.
3. Download and install the appropriate version of the Directory Synchronization
Client.
4. In the Cloud TRITON Manager, go to Account > Contacts and set up an
administrator contact with Directory Synchronization permissions. The logon
credentials you define will be used by the Directory Synchronization Client to log
onto the manager.
5. Configure the Directory Synchronization Client as described in the Directory
Synchronization Client Administrators Guide, including the logon credentials you
created in the previous step.
Note
If your LDAP data does not include users email
addresses, you can change the default attribute for the
primary mail value in the Directory Synchronization Client
as follows:
6. Once you are ready to synchronize data with the cloud, go back to Account >
Directory Synchronization.
a. Click Edit.
b. Click Enable directory synchronization.
c. For User policy assignment, select Fixed.
d. For Email new users, define whether synchronized users should receive a
notification email from TRITON AP-WEB.
e. Click Submit when done.
7. Run the synchronization, and check the results both in the client and on the portal:
In the client, click on the Groups and Users tabs to view the results.
IP address range
Enter a suitable Description for the trusted network.
Select the traffic direction for the specified addresses as either Source or
Destination.
Click OK. You can delete a trusted network entry by marking the check box
next to it and clicking Remove.
Note
For the initial appliance deployment, it is recommended
that you configure all of your IP address ranges as trusted
network sources, meaning that the appliance ignores all
traffic. You can then test your deployment with a small
number of clients before opening it up to all IP addresses
and ignoring only those addresses whose traffic you do not
want to be analyzed - for example, servers that receive
Microsoft and antivirus updates.
b. For a network architecture that includes virtual LANs (VLANs), in the VLAN
Tag Support section check Support VLAN tags if you want the appliance to
analyze VLAN-tagged and untagged traffic. All VLAN traffic will be
analyzed unless you define some of that traffic as trusted. You can bypass
analysis for specific VLAN tags by entering trusted tag numbers in the VLAN
tag field, and bypass analysis for untagged traffic by checking the Trust
untagged traffic box.
The appliance supports the use of a single VLAN tag to identify management
communication traffic from the appliance to the cloud and database download
services. You can configure this tag on the Routing page of the First-Time
Configuration Wizard.
Note
The VLAN tag entered on the appliance Routing page is
also used by any client that communicates with the
appliance bridge interface, either explicitly for
management purposes or transparently, for example for
authentication, quota, or confirm actions when filtering.
Ensure you have configured valid routing between the
bridge interface and any client generating traffic that is
intercepted by the appliance, taking the VLAN tag into
account.
c. In the Ports section, enter comma-separated port numbers for HTTP and
HTTPS channels.
d. Specify how the cloud service handles requests for IPv6 destinations (allow or
block). Traffic to IPv6 destinations that is allowed (default setting) is not
filtered or logged.
5. In the Authentication tab:
a. If you wish to use transparent NTLM authentication and your appliance will
not be connected to a local Active Directory, enter the domain that forms part
of your users NTLM identity. The NTLM domain is the first part of the
domain\username with which users log on to their Windows PC; for example,
MYDOMAIN\jsmith.
Important
You must configure your end users browsers to support
transparent NTLM authentication, either manually or via
GPO or similar. See Enabling browsers for NTLM
transparent authentication, page 78.
If you are connecting your appliance to a local Active Directory for NTLM
authentication, this field is not required as the appliance retrieves this
information automatically from the local Active Directory.
b. Select a time period after which a users login and password must be
revalidated from the Session timeout drop-down list. The default is 1 day.
c. If you have users on a thin-client environment, define network addresses and
IP address ranges that should use session-based authentication. In this
environment, the mapping of end user to source IP address is no longer 1-to-1.
To overcome this issue and authenticate end users correctly, session-based
authentication takes place at configurable intervals by using cookies injected
into the web traffic that force the web client to authenticate.
Once a cookie is injected, it is analyzed by the appliance and serves as a
replacement for the user-to-source IP address mapping to associate a specific
transaction to a specific user. This authentication is then valid for the length of
time defined in the Session timeout drop-down list.
Note
When session-based authentication is enabled, the Allow
end users to bypass all certificate errors option on the
portal Bypass Settings page is not currently supported.
6. In the Certificates tab:
a. Specify the certificates used for this appliance:
Browse to the public certificate file. Open the file to enter its name in the
Public certificate field.
Browse to the private key file. Open the file to enter its name in the Private
key field.
If you have chained certificates, mark the Add chained certificate check
box and browse to the intermediate certificate. Open the file to enter its
name in the Add chained certificate field.
For information on generating your own certificate for the appliance, see
Generating a certificate below.
If you want to specify your certificates later, mark the I want to define
certificates later option.
7. Click OK.
The appliance details are displayed on the Network Devices page. The appliance is
also added as the proxied connection on the Connections tab of the policy that you
specified, ensuring your policy is applied to all requests originating from the
appliance.
Generating a certificate
We strongly recommend that each appliance has a valid version 3 X.509 identity
certificate with an unencrypted key. This avoids browser warnings regarding SSL
termination block, authentication, or quota/confirm operations.
The certificate can be generated using a variety of tools. Below is a simple procedure
using OpenSSL to generate a private key and CA that can be used for your appliance.
This section assumes that you are familiar with OpenSSL and have a working
OpenSSL installation.
The OpenSSL statement
openssl genrsa -passout pass:1234 -des3 -out
CA_key_password.pem 2048
creates a 2048-bit RSA private key with a password of 1234. You must supply a
password, as OpenSSL does not allow the creation of a private key without one. You
can then strip the password from the key as follows:
openssl rsa -in CA_key_password.pem -passin pass:1234 -out
CA_key.pem
This also renames the private key file from CA_key_password.pem to CA_key.pem.
Finally, use the following statement to create the CA:
openssl req -x509 -days 11000 -new -sha1 -key CA_key.pem out CA_cert.pem
Note that this command prompts you to input information about different parameters,
such as country, state, locality, or your organizations name.
Once you have created the private key (CA_key.pem) and public certificate
(CA_cert.pem), import the certificate to all relevant browsers, and upload the
certificate to each appliance using the Certificates tab.
Perform the steps below to set up and configure your appliance. The steps for the
hardware version are also described, with diagrams, on the Quick Start poster.
1. Either:
Verify the contents of the accessory box that was shipped with the appliance.
It should include power cable, an appliance bezel, and a quick start poster.
Or:
Download the OVA file suitable for your deployment from your website account to a
local directory. There are 2 ways to install appliance on a virtual machine:
With a Silicom bypass card connected to the ESXi host, and with one
management NIC. For this scenario, use the OVA file starting Websense-i500vdio-bp-InstallImage.
Without a Silicom card, just using 3 virtual switches. In this scenario, use the
OVA file starting Websense-i500v-InstallImage.
For a Silicom bypass card deployment, the card should be installed on ESXi in
VMDirectPath mode. For more information on Silicom card installation, see
Silicom card setup, page 32.
The appliance virtual machine can be installed only on VMware vSphere ESXi
5.1, 5.5, or 6.0.
This section describes how to set up the ESXi machine, and how to install the OVA
file.
Network settings
Network settings
It is recommended that you have dedicated NICs for each of the 3 switches required
for the appliance. The B1 WAN and B2 LAN switches must use different physical
interfaces.
Important
Do not use the ESXi management physical interface for
the B1 or B2 switch.
To create the required network interfaces:
1. In the VMware vSphere Client, select Hosts and Clusters.
2. Select your host and click the Configuration tab.
3. Select Networking in the Hardware section, and click Add Networking.
4. Select a connection type and click Next.
5. Select Create a vSphere standard switch.
6. Select the check boxes for the network adapters that your standard switch will use
and click Next.
7. Under Port Group Properties, enter a network label for the management NIC: C1
Management.
8. Click Next.
9. Review your settings and click Finish.
10. Repeat these steps for 2 more switches: B1 WAN (for outgoing traffic) and B2
LAN (for incoming traffic).
1. In the vSphere Client, go to the Configuration tab and select Advanced Settings
in the Hardware section.
2. Click the Edit link.
3. Mark the Silicom card check box. You can identify the Silicom card by checking
the device details for the Silicom Subvendor ID, which should be 1374.
4. Click OK.
The message Changes made to some of the devices below will not take effect
until the host is restarted appears on the Advanced Settings screen.
5. Restart the ESXi host server.
After the restart, the list of Silicom Card NICs should appear on the Advanced
Settings screen with green bullets.
4. On the Security tab, mark Promiscuous Mode, and select Accept from the dropdown list.
Click OK.
5. The B1 NIC properties should now look like this:
Click Close.
6. Repeat steps 2-5 for the B2 NIC.
5. Click Next.
2.
Confirm that the generated MAC addresses are in alphabetical order, with B1
WAN having the lowest address, followed by B2 LAN and then C1 Management.
If this is not the case, change the mapping of your NICs as follows:
a. Select the NIC with the lowest MAC address.
b. Under Network Connection, change the Network label to B1 WAN.
c. Repeat the Network label change for the next lowest MAC address (setting it
to B2 LAN) and finally the highest MAC address (setting it to C1
Management).
d. Click OK when done.
2. Click Add.
3. Select PCI Device from the Device Type list, then click Next.
4. Choose the first NIC of the Silicom card (this is the first entry displayed on the
Configuration tab > Advanced Settings page).
7. Click OK on the Virtual Machine Properties page to see the final result:
The First-Time Configuration Wizard walks you through some initial settings that are
important for appliance operation. You must complete the wizard before you can
manage the appliance. Canceling the wizard before completing initial appliance
configuration logs you out of the appliance, and any settings you may have entered up
to that point are not saved.
Click Next on the Welcome page to start the wizard.
1. On the Hostname page, enter the appliance host name or fully-qualified domain
name (FQDN). The name can consist of 1-32 alphanumeric characters, dashes,
and periods. It must begin with a letter and cannot end with a period.
The format for an appliance hostname is hostname. You can also use the format
hostname.parentdomain.
The format for the FQDN is hostname.parentdomain.com.
If you plan to use Active Directory authentication, the following hostname
requirements are enforced:
BATCH
BUILTIN
DIALUP
INTERACTIVE
INTERNET
LOCAL
NETWORK
NULL
PROXY
RESTRICTED
SELF
SERVER
SERVICE
SYSTEM
USERS
WORLD
You can define up to 3 DNS servers. You cannot define more than one server
with the same IP address.
Click Next to continue with the wizard.
3. On the Routing page, specify the IP address of your default gateway for outbound
traffic.
Note
In many cases, you need only a gateway specification on
this page. However, there may be cases where explicit or
static routing is required. For more information on these
scenarios, please see the knowledge article Configuring
routing for i-Series appliances.
If you need to define routing over the bridge interface,
please contact Technical Support in the first instance. You
can define routing rules over the management interface as
follows:
Click Routing Table.
Click Add and then provide the following route
information in the Route Properties dialog box:
Destination network
Gateway IP address
The appliance supports the use of a single VLAN tag to identify management
communication traffic from the appliance to the cloud and database download
services. This tag is also used by any client that communicates with the appliance
bridge interface, either explicitly for management purposes or transparently, for
example for authentication, or for quota or confirm actions when filtering.
Note
Ensure you have configured valid routing between any
client generating traffic that is intercepted by the appliance
and the bridge interface, taking into account the VLAN tag
that you define on this page.
Mark the Use the following VLAN tag check box, then enter the tag in the entry
field using a number from 0 to 4094.
Click Next to continue with the wizard.
4. The final page of the wizard summarizes the entries and selections you have
made. If you want to change any setting after your review, click Back to access
the desired wizard page and edit your settings.
Connect the appliance to your network. The appliance must have at least a valid
connection to the cloud service for registration and the subsequent database update to
succeed. You can choose either of the following methods:
Install the appliance in your network and then register it with the cloud service.
The appliance operates as a simple network bridge, forwarding all traffic, until
registration is complete.
Install the appliance offline, with only the B1 interface connected to the network
to allow an upstream connection to the cloud service. Once registration is
complete and the appliance is fully set up, you can connect it to your the rest of
your network.
If your network includes a firewall, by default your appliance is configured to use the
standard destination TCP ports 80 and 443 for connections to the cloud service.
Ensure these ports are open.
Alternatively and depending on your corporate firewall policy, you can configure your
appliance to use the following ports, which are the ones used for non-appliance
connections to the cloud service:
Port
Purpose
8002
Configuration and policy update information retrieval from TRITON APWEB. This port must be open for an i-Series appliance to retrieve periodic
configuration and policy updates from the cloud service.
8081
80
443
You can switch between the standard and alternative ports at any time using the
appliance command-line interface (CLI). To switch port settings:
1. On the appliance machine, open a command-line window.
2. Type device.
cmd> device
for the alternative ports 8002 and 8081, plus 80 and 443
The CLI returns the confirmation Done when the ports have been switched. If the
ports are already set to the option you specify, the CLI returns Not changed.
You must also open outbound UDP port 123 to enable the appliance to synchronize its
clock with the Network Time Protocol.
To guarantee availability, TRITON AP-WEB uses global load balancing technology to
direct traffic across multiple geographic locations. Content analysis is typically
always performed by proxies from the cloud service closest to the end user. In the
event of localized or Internet-wide connectivity issues, the global load balancing
technology automatically routes requests to the next closest location. To make the
most of the resilience offered by this infrastructure, users must be allowed to connect
to the entire cloud service network, both those IP addresses that the service uses now
and those that may be deployed in the future.
If you decide to lock down your firewall, you should permit all the IP address ranges
in use by the Forcepoint cloud service for all the above ports. These ranges are
published in a Knowledge Base article called Cloud Service cluster IP addresses and
port numbers. Note that you need to log on to your Forcepoint website account to
view this article.
In order to manage your appliance, you must change the initial password and register
the appliance with TRITON AP-WEB.
When you log back in to the appliance after completing the First-Time Configuration
Wizard, the initial screen lets you change the initial password, if you have not already
done so, in the Administrator Credentials box. If you changed the password before
completing the wizard, the Administrator Credentials box does not appear on this page
when you log back in.
This initial page also lets you enter your TRITON AP-WEB registration key. To
register your appliance:
1. Log on to the Cloud TRITON Manager and click Web > Network Devices.
2. Select the row that contains this appliance.
3. Click Register at the bottom of the page to open the Register Appliance box.
4. Copy the displayed registration key and click Close.
5. Return to the appliance manager and paste the key into the Registration key field.
6. Click OK.
At this point, an update to the pre-installed Web category database begins. During this
update, the appliance can analyze traffic using the pre-installed database. Note that
this database is out-of-date, and analysis may be more accurate after the update
process completes.
A download progress message appears on the Status > General page. This message
disappears when the update is complete.
Browser support
Getting Started Guide | Cloud Web Protection Solutions
TRITON AP-WEB has been tested with most commercially available web browsers,
but for support purposes we recommend you use one of the following:
Google Chrome 13 to 43
Use the appliance Configuration > System page to connect to an Active Directory
server for transparent NTLM authentication. When this screen first opens, the status
under Active Directory Authentication is Disconnected, and a button labeled
Connect is available.
To establish a connection to an Active Directory server for authentication:
48 TRITON AP-WEB with Web Cloud Module
1. Click Connect.
2. In the Active Directory Authentication dialog, enter the following server
information in the appropriate fields:
Domain name
3. Indicate how the system finds the domain controller by selecting 1 of the
following options:
4. Click OK.
The connection cannot be made if the server hostname does not adhere to Active
Directory naming restrictions. See First-Time Configuration Wizard, page 42, for a
detailed list of Active Directory hostname requirements.
After a connection is successfully established, the button name changes from Connect
to Disconnect.
Running diagnostics
Getting Started Guide | Cloud Web Protection Solutions
The Diagnostics tab on the appliance Status > Alerts and Diagnostics page provides
the capability to run a series of system tests to determine the current state of the cloud
service. As a best practice, it is recommended that you run these tests when you first
deploy an appliance, and if you encounter any connectivity issues.
The first time you open the Diagnostics tab, a table shows a list of the tests to run. The
tests include, for example, a status check of the network interfaces, the default
gateway, your DNS servers, or the cloud connection.
Click Run Diagnostics to start the tests. The Results column displays test status (In
progress) and results (Passed, Failed, or Could not complete). For tests that do not
complete or fail, the Details column displays more information, including suggestions
for resolving the issue that caused the failure.
Each time you open the Diagnostics tab thereafter, the results of the last test run
appear, along with the date/time of those tests.
Then run the monitor using the monitor command and its arguments:
monitor <arguments>
Other command options let you configure default display attributes for the log entries
as well as display custom attribute combinations and protocols. Click here to see a
Knowledge Base article that provides detailed information about the CLI monitor
command options.
If some of your end users have TRITON AP-ENDPOINT Web installed, perhaps
because they often work remotely, you can set up your appliance to handle endpoint
traffic in one of the following ways when those end users are at a site served by an
appliance:
Ignore all traffic generated by an endpoint client. This means that endpoint users
are effectively treated as roaming users even when on-site.
Manipulate PAC file requests from endpoint clients and ensure that endpoint
traffic goes direct through the appliance rather than via the cloud service proxy.
This means that end users have less latency and get a better user experience.
Note
This chapter is not applicable if you are deploying
TRITON AP-WEB with an i-Series appliance.
TRITON AP-WEB has been tested with a number of commercially available proxies
in chained proxy configuration. For support purposes, if chained proxy is your chosen
deployment method, using of one of the following is recommended:
Basic chaining. The ISA server does not perform any authentication before
forwarding requests to the cloud proxy. The cloud proxy can perform manual
authentication only.
In this guide, ISA/TMG refers to ISA Server and Forefront TMG collectively. When
instructions or information differ for the two products, they are referred to specifically
as ISA Server or Forefront TMG.
Basic chaining
Getting Started Guide | Cloud Web Protection Solutions
To set up your ISA/TMG server to chain with the upstream cloud proxy, follow the
instructions below.
1. Log on to the ISA/TMG server and open the Server Management console.
2. Under Configuration, open the Networks option and select the Web Chaining
tab. Under this tab a default rule is present. Leave this as it is.
3. Click the Tasks tab, then click the Create New Web Chaining Rule link to start
the wizard.
4. Give the rule a meaningful name such as TRITON AP-WEB, and click Next.
5. In the next section, choose the destinations to which this rule applies (in most
cases, it applies to external networks).
9. On the Primary Routing page, specify the address of the TRITON AP-WEB
service: webdefence.global.blackspider.com
10. Specify port 8081 for both Port and SSL. Click Next.
11. On the Backup Action page, select the appropriate action for your organization.
Your choice depends on whether you are willing to allow requests to be served
directly, without using TRITON AP-WEB. Click Next.
Configuring exceptions
Getting Started Guide | Cloud Web Protection Solutions
If there are any hosts that you do not want to use the proxy service, you must
configure an exception for them. Minimally, you should add those hosts that are in the
PAC file that is downloaded from the TRITON AP-WEB service (see The TRITON
AP-WEB PAC file, page 12, for more details).
You should also configure direct access to the Cloud TRITON Manager to allow the
following:
End-user self-registration
2. Right-click Domain Name Sets and click New Domain Name Set.
7. Expand Domain Name Sets, select the domain set you just created (TRITON APWEB Unproxied), and click Add.
8. Click Close on Add Network Entities.
9. Click OK on the Web chaining policy and Apply the changes.
To chain your ISA/TMG server with the cloud proxy and perform NTLM
identification:
1. Follow the steps in Basic chaining, page 52.
2. Log on to the Cloud TRITON Manager.
3. Select Web > Policy Management > Policies > policy name > Access Control.
4. Select Authenticate users on first access, then select NTLM transparent
identification where possible. For more information, see NTLM identification in
the Cloud Security Help.
5. Click Save.
You can pass authentication details from your ISA/TMG server to the cloud proxy via
a plug-in from Forcepoint LLC. This plug-in allows the cloud proxy to read the
X-Authenticated-User
With this setup, end users can be authenticated transparently by the cloud proxy,
removing an authentication step and improving performance.
Two versions of the plug-in are available, for 32-bit ISA servers and 64-bit TMG
servers. Zip files for both versions are available for download:
1. Log on to your Forcepoint website account.
2. Select the Downloads tab.
3. Select TRITON AP-WEB from the Product drop-down list.
4. In the list that appears, expand TMG 64-bit plugin for Websense Content
Gateway or ISA 32-bit plugin for Websense Content Gateway to see the
download details. You will need to scroll down to older product versions to see the
ISA 32-bit plug-in. Click the download link to start the download.
Install the plug-in as follows:
1. Copy the appropriate Websense-AuthForward.dll file (for 32-bit or 64-bit) to
the Microsoft ISA/TMG installation directory. The default directory for this file is
C:\Program Files\Microsoft ISA Server for ISA server, or C:\Program
Files\Microsoft Forefront Threat Management Gateway for ForefrontTMG.
For the 32-bit version, install the following files in the installation directory in
addition to Websense-AuthForward.dll:
msvcp100.dll
msvcr100.dll
2. Open a Windows command prompt and change directory to the installation
directory.
3. From the command prompt, type
regsvr32 Websense-AuthForward.dll
4.
Verify the plug-in was registered in the ISA/TMG management user interface
(Start > Programs > Microsoft ISA Server > ISA Server Management, or
Start > Programs > Microsoft Forefront TMG > Microsoft Forefront TMG
Management). In the Configuration (for 32-bit) or System (for 64-bit) section,
select Add-ins, then click the Web-filter tab. The WsAuthForward plug-in should
be listed.
To uninstall the plug-in, run the following command in a Windows command prompt
from the ISA/TMG installation directory.
regsvr32 /u Websense-AuthForward.dll
Blue Coat ProxySG can be deployed as a downstream proxy with TRITON AP-WEB.
You can configure proxy chaining in the following ways:
Basic chaining. The Blue Coat server does not perform any authentication before
forwarding requests to the cloud proxy. The cloud proxy can perform manual
authentication only.
Basic chaining
Getting Started Guide | Cloud Web Protection Solutions
In this case, Blue Coat ProxySG forwards requests to the cloud proxy but performs no
authentication. End users can be authenticated using manual authentication only:
prompting users for a user name and password the first time they access the Internet
through a browser.
Use the Blue Coat Management Console to forward requests to the cloud proxy as
follows:
1. In the Blue Coat Management Console Configuration tab, select Forwarding >
Forwarding Hosts.
2. Select Install from Text Editor from the drop-down, and then click Install.
3. Update the Forwarding Hosts configuration file to point an alias name to
webdefence.global.blackspider.com, port 8081. For example, if you choose the
alias name Forcepoint_Proxy, enter the following at the end of the Forwarding
host configuration section:
fwd_host Forcepoint_Proxy webdefence.global.blackspider.com
http=8081
4. Add the following to the end of the Default fail-over sequence section:
sequence alias name
replacing alias name with the alias name that you chose in step 3.
5. When you have finished editing, click Install.
6. In the Blue Coat Management Console Configuration tab, click Policy and select
Visual Policy Manager. Click Launch.
7. In the Policy menu, select Add Forwarding Layer and enter an appropriate
policy name in the Add New Layer dialog box.
8. Select the Forwarding Layer tab that is created. The Source, Destination, and
Service column entries should be Any (the default).
NTLM chaining
Getting Started Guide | Cloud Web Protection Solutions
To chain Blue Coat ProxySG with the cloud proxy and perform NTLM identification:
1. Follow the steps in Basic chaining, page 59.
2. Log on to the Cloud TRITON Manager.
3. Select Web > Policy Management > Policies > policy name > Access Control.
4. Select Always authenticate users on first access, then select NTLM
transparent identification where possible. For more information, see NTLM
identification in the Cloud TRITON Manager Help.
5. Click Save.
X-Authenticated-User chaining
Getting Started Guide | Cloud Web Protection Solutions
You can pass authentication details from your Blue Coat proxy to send
X-Forwarded-For and X-Authenticated-User headers to the cloud proxy either by
manually editing a policy text file, or defining the policy in Blue Coat Visual Policy
Manager.
X-Forwarded-For
X-Authenticated-User
With this setup, end users can be authenticated transparently by the cloud proxy,
removing an authentication step and improving performance.
Note that for Blue Coat to service HTTPS requests properly with the following setup,
you must have a Blue Coat SSL license and hardware card.
<Proxy>
action.Add[header name for authenticated user](yes)
define action dd[header name for authenticated user]
set(request.x_header.X-Authenticated-User, "WinNT://
$(user.domain)/$(user.name)")
end action Add[header name for authenticated user]
action.Add[header name for client IP](yes)
define action dd[header name for client IP]
set(request.x_header.X-Forwarded-For,$(x-client-address))
end action Add[header name for client IP]
9. Click OK.
10. Click New and select Control Request Header again.
11. In the Add Control Request Header Object dialog box, enter a name for the
authenticated user information Action object in the Name entry field.
12. Enter X-Authenticated-User in the Header Name entry field.
13. Select the Set value radio button and enter the following value:
WinNT://$(user.domain)/$(user.name)
Squid Proxy
Getting Started Guide | Cloud Web Protection Solutions
Basic chaining
For policies where NTLM is enabled and end users are asked to authenticate for
TRITON AP-WEB
Basic chaining
Getting Started Guide | Cloud Web Protection Solutions
In this case, Squid forwards requests to the cloud proxy but performs no
authentication. End users can be authenticated using manual authentication only:
prompting users for a user name and password the first time they access the Internet
through a browser.
Configure Squid to forward requests to the cloud proxy as follows:
1. Define one or more ACLs to identify sites that should be not be filtered through
TRITON AP-WEB. These must include certain service-specific sites, and should
include any other sites that are not normally handled through the cloud service.
You can identify these sites by examining the service-generated PAC file available
at http://pac.webdefence.global.blackspider.com:8082/proxy.pac.
You should also configure direct access to the Cloud TRITON Manager to allow
the following:
End-user self-registration
NTLM chaining
Getting Started Guide | Cloud Web Protection Solutions
The Squid proxy performs local NTLM identification, then forwards the appropriate
Proxy-Authorization headers as an NTLM Type 3 message to the cloud proxy for
further transparent user authentication. Squid can maintain multiple connections to the
cloud proxy, allowing the sharing of connections across users but ensuring that each
request is associated with the correct user. When Squid reassigns a connection to
another user, only then is a new Proxy-Authorization header sent for that user.
To use this setup, configure Squid to do the following:
1. Perform NTLM authentication.
2. Forward requests to the cloud proxy.
3. Forward user information to the cloud proxy.
Adding IP Addresses to
Your Policy
Getting Started Guide | Cloud Web Protection Solutions
Note
This chapter is not applicable if you are deploying
TRITON AP-WEB with an i-Series appliance.
When a TRITON AP-WEB proxy receives a request, its first task is to identify the
correct policy to use. First, it checks the IP address that is the source of the request.
Typically, this is the external IP address of your firewall. If this IP address matches a
proxied connections setting in a policy, then that policy is used. Alternatively, if you
have deployed Web Endpoint, the endpoint passes authentication details to the cloud
proxies, enabling the cloud service to associate the correct policy with the user.
Otherwise, the user is invited to log onto the TRITON AP-WEB service (by an email
address that is used as a unique logon name), and the users email address is used to
find the correct policy.
Initial settings
Getting Started Guide | Cloud Web Protection Solutions
In the Cloud TRITON Manager, under Web, there is a single policy called DEFAULT.
Initially, this policy has no proxied connections. It is possible to use TRITON APWEB like this, but it may be inconvenient because users always have to authenticate
and you have to manually invite each user to register on the service.
To allow users to use the service anonymously - they dont have to authenticate.
with their own Internet gateway and can be used, for example, to delegate user
administration and reporting to local support personnel.
To add IP addresses to your policy:
1. Log on to the Cloud TRITON Manager.
2. Go to Web > Policy Management > Policies.
3. Select the DEFAULT policy.
4. Select the Connections tab.
5. Click Add under Proxied Connections.
6. Enter a Name and Description for the connection.
7. Select the connection type. A proxied connection can be an IP address, an IP
range, or an IP subnet.
8. Enter the IP address, range, or subnet details.
9. Define the connections time zone.
Each proxied connection has a time zone setting. If you have a single policy for
multiple Internet gateways in different countries, you may want to set each to a
different time zone. If all connections are in the same time zone, it is easier to set
the time zone for the whole policy on the General tab and leave the connection
setting as use policy time zone.
10. Click Submit.
Setting Up End-User
Authentication
Getting Started Guide | Cloud Web Protection Solutions
The TRITON AP-WEB service works out of the box for many organizations. A
single policy applied to an organizations web traffic provides protection from
malware and inappropriate content. Most companies, however, want to tailor the
service to align it with their Internet usage policy, which may require granular
configuration on a per-user and per-group basis. Also companies usually want to
report on the surfing habits of their employees, which requires users to identify
themselves.
Authentication and identification options are set up on the Access Control tab within a
policy, meaning that you can specify different authentication methods for different end
users. Log on to the cloud portal, go to Web > Policy Management > Policies, click
your policy name, then select Access Control.
TRITON AP-WEB offers the following options for user identification and
authentication:
If you have an on-network identity provider, you can use this to provide secure
clientless authentication to TRITON AP-WEB. See the Cloud TRITON Manager
Help for details.
You can register your end users with TRITON AP-WEB to enable NTLM
identification, secure form-based authentication, or manual authentication.
Alternatively, you can request users to self-register, or identify themselves for
NTLM. See End-user registration, page 85.
The endpoint appends two additional headers into each HTTP request. One header
tells TRITON AP-WEB which version of the endpoint is installed; the other is an
encrypted token which identifies the end user. This enables TRITON AP-WEB to
apply the appropriate policy for that user and correctly log reporting data. These
headers do not include any domain passwords or other security information, meaning
that there is no security risk in using the endpoint. The headers are then stripped from
the requests by the TRITON AP-WEB proxy.
The endpoint has been designed to consume minimal CPU, memory, and disk
resources. It can be deployed on Windows and Mac operating systems (excludes iOS
devices, such as iPhones, iPods, or iPads).
To enable the use of the endpoint for some or all of your end users, you must deploy it
to those users.
You can deploy TRITON AP-ENDPOINT Web in the following ways:
Windows operating system users
Download the endpoint installation file for Windows and push it manually to
selected client machines using your preferred distribution method. For example,
you might deploy it using Microsoft Group Policy Object (GPO). Alternatively
you can send users a URL from which they can download and install the endpoint
themselves.
Deploy the endpoint to the end users in a Web policy directly from the cloud. Each
user will be asked to install the endpoint software on their machine when they start a
browsing session.
Mac operating system users
Remotely install the endpoint using Apple Remote Desktop software, which
distributes the installation package to a group of machines and performs the
installation on that group.
If a user does not install the endpoint, he or she is authenticated according to the
options you have selected on the Access Control tab for their policy. Single sign-on is
used if configured; otherwise the cloud service falls back to NTLM identification or
basic authentication. The user is again asked to install the endpoint next time they start
a browsing session.
The endpoint has a number of key protections against tampering, which should
prevent the majority of end users from uninstalling or deleting the endpoint even if
they have local administrator rights:
Windows and Mac operating systems
Endpoint files and folders are protected from deletion and cannot be modified,
moved, or renamed.
Windows 7
The following Web browsers fully support the endpoint for Windows operating
system users.
Internet Explorer 7 to 11
Firefox 3.x to 38
Chrome 15 to 43
Opera 11 to 30
The endpoint can be installed either by GPO or directly from the cloud service. Once
installed on these browsers, the endpoint provides user authentication, enforces
filtering via TRITON AP-WEB, and is able to manipulate proxy settings in real time
for example, to temporarily disable itself at public Internet access points to allow a
roaming user to complete the billing requirements. Updates directly from the cloud
service are also supported.
If your end users have browsers other than those listed above, you can download the
endpoint installer and deploy it to those users. Once installed, the endpoint provides
user authentication and enforces filtering via TRITON AP-WEB, but cannot perform
proxy manipulation and cannot be updated directly from the cloud service.
The Windows installer is less then 5MB in size, and requires less than 10MB in hard
disk space and less than 6MB in memory usage.
Full support means that the browser supports all installation methods, and both Web
analysis and filtering and proxy manipulation.
Mac operating systems
TRITON AP-ENDPOINT Web is supported on the following 64-bit operating
systems:
Mac OS X v10.7
Mac OS X v10.8
Getting Started Guide 69
Mac OS X v10.9
Mac OS X v10.10
Firefox 3.x to 38
Chrome 15 to 43
Opera 11 to 30
If your end users have browsers other than those listed above, you can download the
endpoint installer and deploy it to those users. Once installed, the endpoint provides
user authentication and enforces filtering via TRITON AP-WEB. Proxy manipulation
is supported.
For Mac end users, no option exists to auto-update the endpoint. You must uninstall
the endpoint first.
The installer for the Mac is less than 2MB in size and requires less than 10MB in hard
disk space.
Download the latest version of the endpoint from the Web > Settings > Endpoint
page in the Cloud TRITON Manager. If you are using a Windows operating system,
the endpoint is available in separate installation packages for 32-bit and 64-bit
operating systems.
The endpoint for the Mac consists of only one installation package for both 32-bit and
64-bit operating systems. Note that you do not need to reinstall Web Endpoint for the
Mac if you switch between these systems.
Before you can download the installation file or enable deployment from the cloud
service, you must define an anti-tampering password to be used to stop the endpoint
service or uninstall the endpoint. The password is automatically linked to any
deployments of the endpoint, including Web deployments. To set the password, do the
following:
1. Under Set Anti-Tampering Password, click Set Password.
2. Enter and confirm your anti-tampering password, then click Submit.
Important
For security reasons, TRITON AP-WEB does not retain a
copy of your anti-tampering password. If you forget your
password, you can reset it in the Cloud TRITON Manager
by entering and confirming a new password. All installed
endpoints will be updated to use the new password next
time they connect to the Internet.
Windows operating system users should note the script command displayed on screen
and use it to configure your GPO deployment script or manual installation. This
command is in the format:
WSCONTEXT=xxxx
Where:
WSCONTEXT=xxxx is the script command noted from the Endpoint page in the
9. In the Script Name field type the full network path and filename of the script
batch file you created in step 2.
10. Click OK.
11. Close the GPMC.
12. Run the gpupdate /force command at the command prompt to refresh the group
policy.
The application should be installed on startup. The client may not be fully functional
until a reboot occurs.
where <path> is the path to your endpoint package, and xxxx is the anti-tampering
password you set in the Cloud TRITON Manager.
Important
If you uninstall the endpoint, be sure to restart your
operating system or your web browsing experience may be
affected.
To stop the endpoint, navigate to the endpoint installation folder and run this
command:
wepsvc -stop -password <password> wspxy
Ask your endpoint support representative to add the Send HWS endpoint to
port 80 template to your account. You can add this template to specific
policies or globally.
To this:
<PACFile URL="http://
pac.webdefence.global.blackspider.com/proxy.pac" />
By applying this template, you will also move to port 80 any endpoints that are
already installed.
3. Double-click the endpoint package to open an introductory screen for the installer.
Click Continue for step-by-step instructions on the installation process.
4. When you reach the Standard install on Macintosh HD screen, click Install to
begin the installation process.
You must install the endpoint on the local hard disk. You can change the
installation location on this screen by clicking Change Install Location.
5. Enter a user name and password for a user with administrator rights to install the
software.
If the installation process fails, check that the HWSConfig.xml file is present and
is in the correct format if you have edited it.
6.
Uninstall Endpoint.
Save Debug Logs to Desktop allows your endpoint support team to quickly
access all troubleshooting logs in one place. Clicking it creates an archive file on
the Mac desktop beginning with ClientInfo*.zip. If you need to open a support
ticket about the endpoint, include this zip file with your request.
2. You will be asked for the service password, which is the default password unless
the password was changed in the Cloud TRITON Manager.
To stop the endpoint, do the following through the command line:
1. After entering the Mac administrator password, run this command:
sudo wepsvc --stop
2. You will be asked for the service password, which is the default password unless
the password was changed in the Cloud TRITON Manager.
You can deploy the endpoint on a per-policy basis to either the roaming users or all
users in a policy directly from the cloud service.
When you select this option, on the Endpoint tab of a policy in the Cloud TRITON
Manager, end users are prompted to install the endpoint next time they open a
browser. See Local users, page 76, and Roaming users, page 76. You can customize
the text on the first page of the installer to make it clear that the installation is
sanctioned by your organization.
The endpoint installer for Windows operating system users is available in English,
French, German, Italian, Spanish, Dutch, Simplified Chinese, and Japanese. The
language used for the installation is picked up from the browser settings.
Local users
For Windows operating system users, when the endpoint has been deployed to all
users in a policy, an end user opening Internet Explorer or Firefox sees the following:
If the user clicks Install Secure Browsing, they are redirected to an assistance page
that explains the installation process for their browser. They then click Continue with
the installation to install the endpoint.
If the user clicks Ask me next time, TRITON AP-WEB falls back to alternative
authentication or identification methods if enforced in the Access Control tab for the
users policy. The endpoint installer will reappear next time the user opens a Web
browser.
Roaming users
For Windows operating system users, when the endpoint is deployed to roaming users,
the user must first authenticate using their basic authentication credentials, if they
have them. If they do not already have credentials, they must self-register with
TRITON AP-WEB (see End-user self registration, page 86).
Once they are registered and have logged in using basic authentication, the endpoint
installer starts and the process is the same as for local users. If the user clicks Ask me
next time, the user is presented with a manual authentication login page each time
they access the Internet as a roaming user, followed by the endpoint installation page.
For Windows operating system users, the Endpoint tab in Web policies includes an
auto-update feature which can automatically deploy newer versions, without desktop
administrators getting involved. If you select this option, it applies to all users in the
policy who have installed the endpoint, regardless of whether it has been deployed via
GPO or directly from the policy, assuming their browser supports deployment from
the cloud service.
Mark Automatically update installations when a new version is released on the
Endpoint tab if you want to ensure that endpoints on your client machines have the
latest version when it is available.
The setting is disabled by default, as most organizations like to control the software on
the desktop themselves and test newer versions before deploying them. You may want
to enable the option once you have tested the new software so all users (including
roaming users) get the latest endpoint installed. Once they have all updated the
endpoint, you can then disable updates again.
Note that while an endpoint update is taking place (which can take several minutes),
end users will be unable to browse, but will be shown a web page stating that the
endpoint is updating. This page will continue to retry the requested web page every 10
seconds until the endpoint has finished updating, and will then display the requested
page correctly if the user is allowed to access this URL, or alternatively will display a
block page.
If your endpoint end users sometimes browse from a location served by an i-Series
appliance, you may wish to either direct that traffic through the appliance when
appropriate, or have the appliance ignore endpoint-generated traffic. For more
information, see Using TRITON AP-ENDPOINT Web with an appliance, page 50.
End users can use the details entered during registration to authenticate with TRITON
AP-WEB when working remotely or, if forced authentication is configured within the
policy, whenever they access the Internet.
For secure form-based authentication, users are asked to authenticate the first time
they open a browser. Users who have authenticated once do not then have to reauthenticate for subsequent web browsing sessions, for a period of time defined by the
Session Timeout option on the Access Control tab.
For basic authentication, users are asked to authenticate when opening a new browser
instance. Once authenticated, they are not asked to authenticate again as long as the
browser remains open.
Warning
If you want to protect remote users, instruct them to log onto the service using their
email address and the password with which they registered. NTLM transparent
identification is not used when the browser has connected from a remote location.
End-user identification
Getting Started Guide | Cloud Web Protection Solutions
If the policy dictates that NTLM is to be used to identify users unless they are working
remotely, end users never have to login, but their surfing habits can be monitored and
per-user configuration can be applied. In this case, the users are transparently
identified.
If you have an i-Series appliance deployment and have enabled transparent NTLM
authentication on the appliances Authentication tab, see Enabling browsers for NTLM
transparent authentication.
you have chosen to connect your appliance to a local Active Directory, or you
entered your NTLM domain on the Authentication tab when you added your
appliance to TRITON AP-WEB
You must also configure your end users browsers to support this form of
authentication. In order for a browser to work with NTLM transparent authentication,
the machine on which the browser is hosted must be part of the domain.
This section describes how to configure supported browsers, either manually or via a
Group Policy.
Note
The settings in this section will also be applied to a Google
Chrome browser on the same machine.
To enable NTLM on a single Internet Explorer browser:
1. Go to Tools > Internet Options.
2. Select the Security tab.
3. Select Local Intranet, then click Sites to open the list of Trusted Sites for the
Intranet zone.
4. For Internet Explorer 8 and above, click Advanced on the window that appears.
5. Enter the IP address of the B1/B2 bridge interface on your appliance, then click
Add.
6. Clear the Require server verification box.
7. Click Close.
9. Scroll down to the User Authentication section, and ensure Automatic logon only
in Intranet zone is selected.
8. Navigate to User Configuration > Policies > Windows Settings > Internet
Explorer Maintenance > Security > Security Zones and Content Ratings.
9. Select Import the current security zones and privacy settings.
10. You may receive a warning about Enhanced Security Configuration. This is why
the enhanced configuration was disabled in step 3, so that this policy will apply to
workstations without enhanced security turned on. Click Continue.
11. Turn on Enhanced Security Configuration again, and repeat steps 4-9 to create a
policy with ESC enabled. This ensures that workstations with either configuration
are supported.
12. Close all open windows.
The changes will take time to replicate though your Active Directory, depending on
your setup. This may be from 15 minutes to an hour; if you have a multi-site AD
setup, it may take a day or two.
You can then set up a login script that will install the policy when end users log on to
their workstations.
This method uses 2 files:
login.bat
ntlm.reg
In the ntlm.reg script, replace <Box IP> with the IP address of your appliance:
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion
\Internet Settings\ZoneMap\Ranges\Range5]
"*"=dword:00000001
":Range"="<Box IP>"
Configuring Firefox
Getting Started Guide | Cloud Web Protection Solutions
Note
If you are configuring Firefox v38 or later on Linux, you
must perform step 6 in the procedure below to ensure the
browser falls back to NTLM v1. This is due to the Linux
version having issues with NTLM v2 that can cause
authentication failures.
To enable NTLM transparent authentication in Firefox:
1. Open Firefox, and type about:config in the address bar.
2. Click I'll be careful, I promise! to open the advanced configuration page.
End-user registration
Getting Started Guide | Cloud Web Protection Solutions
If you do not deploy Web Endpoint or single sign-on, the following options are
available for end-user registration, and subsequent authentication or identification:
Directory synchronization
These options are also used as a fallback if either the endpoint or single sign-on fails.
Note that manual authentication is always used if none of the above methods is
available.
Directory synchronization
Getting Started Guide | Cloud Web Protection Solutions
One way to register users is to invite them to self-register. For those using secure
form-based or manual authentication, there are 3 steps for individual end-user self
registration:
1. You enter your email domains into the policy or account.
2. Users complete stage 1 registration (enter name and email address into a form).
3. Users complete stage 2 registration (create a password).
Users can access the stage 1 registration form at:
https://www.mailcontrol.com/enduser/reg/index.mhtml
or by clicking Register on the default pre-login welcome page or NTLM registration
page that is presented when they are forced to identify or authenticate themselves.
Once users have entered their name and email address into the form, they receive an
email from TRITON AP-WEB. This contains a link, that when clicked, takes them to
a page where they can complete registration stage 2 by creating a password.
If you do not have an LDAP directory and your users are using NTLM transparent
identification, an additional one-time step is required.
The first time these users send a request to TRITON AP-WEB, an NTLM registration
form appears where they must enter their email address and password. TRITON APWEB associates these user credentials with the NTLM credentials automatically
obtained from the browser. This association is saved and the user does not have to
complete this step again.
Note
If you are using directory synchronization and have
synchronized NTLM IDs, users are not prompted for this
information. Only NTLM users who self-registered, were
invited to register, or were bulk registered have to perform
this step.
You can select multiple authentication options for your end users on the Access
Control tab of a policy. The options are prioritized as follows:
it has been selected on the Access Control tab for the end users policy.
If neither the endpoint nor single sign-on is available, the end user is authenticated
via either NTLM identification or basic authentication.
You can also enforce a specific authentication option for certain end users, overriding
the authentication settings in the policy, by deploying a PAC file URL in the following
format:
http://webdefence.global.blackspider.com:8082/proxy.pac?a=X
The a= parameter controls the authentication option, and X can be one of the
following:
Parameter
Description
a=n
a=t
a=f
We recommend that you deploy PAC files with the a= parameter if you want some of
your users in a policy to use single sign-on, and others to use secure form-based
authentication. This is because the two methods use different ports on the cloud
service (see Configuring your firewall, page 20).
TRITON AP-WEB can protect and monitor users even when they are not in their
normal office location, such as when they are traveling. This section describes how
TRITON AP-WEB handles users who are roaming from their network domains.
TRITON AP-WEB works on the basis of source IP. When the service receives a
request, for example www.google.com, TRITON AP-WEB checks the source IP
address of the requests and searches all the customer policies to find the policy with
that source IP address. The source IP address is configured as a proxied connection on
a policys Connections tab in the Cloud TRITON Manager.
If users are roaming, they are most likely either at home, an Internet cafe, a hotel, or
an airport. It is unlikely that the IP addresses of these places are configured in any of
your proxied connections. In this situation, the roaming user encounters one of the
following scenarios:
If the user has a laptop with TRITON AP-ENDPOINT Web installed, the endpoint
forces a connection to TRITON AP-WEB to send authentication and get the PAC
file and policy settings appropriate for the user.
If you have deployed single sign-on, the roaming user is authenticated seamlessly
as long as you have a suitable proxy on your network.
If neither TRITON AP-ENDPOINT Web nor single sign-on is in use and the
service cannot find the source IP address in any of the customer policies, then
TRITON AP-WEB responds with a logon page stating, You are connecting from
an unrecognized location. The user has to log on. When they do, TRITON APWEB searches for them in the policies. When it finds the user, the service knows
who they are, which policy they are using, and how to filter the request (in other
words, whether to allow or block the request).
In order to log on, the user has to be registered. Roaming users must go through
the one-time registration process to be covered.
1. The web browser is launched and the laptop does not have Internet access because
it does not have IP connectivity, nor is it connected to another device, such as a
router, with IP connectivity. The browser cannot get the PAC file from the
TRITON AP-WEB service. This typically occurs in home office environments.
2. The laptop has full network connectivity but is unable to connect to the Internet
because it is located behind a firewall that is preventing this. This typically occurs
when the user is connected to a third-partys network either corporate or public.
These scenarios are expanded upon in the next sections.
If you are not using the TRITON AP-WEB proxy, it looks like this:
This proxy query page link has also been embedded in the TRITON AP-WEB remote
user home page: http://home.webdefence.global.blackspider.com/. This home page is
also used to help resolve other challenges associated with remote user connectivity. As
a best practice, make this the home page for all remote users.
You can customize the remote user home page if required. The URL for the resulting
account-specific page is available from your account in the Cloud TRITON Manager.
It looks like the figure above, but has an account-specific identifier appended to it.
In some circumstances, home users might connect to a network, launch a browser, and
find that they are not using TRITON AP-WEB.
This can happen for two main reasons:
The user launches the browser before the computer receives its IP configuration
information.
The computer connects to a network that uses a router that does not have an IP
address assigned. This can occur with some Internet connections that use
dynamically assigned IP addresses such as some home broadband connections. If
the connection hasnt been used for some time, the routers lease for its IP address
may have expired.
In both of the above cases, the browser tries to get the PAC file and fails. If the
computer then gets its IP address immediately after the failure to get the PAC file, the
browser then accesses the Internet directly without retrying the PAC file.
Solutions
Deploy TRITON AP-ENDPOINT Web
Installing the endpoint, either for roaming users or all users, ensures all Web traffic is
routed via TRITON AP-WEB. In the above scenario, Internet access will be denied
until the endpoint can access TRITON AP-WEB to send user authentication and get
the PAC file and policy settings appropriate for the user.
For more information, see Setting up TRITON AP-ENDPOINT Web, page 67.
The benefit of this is that use of TRITON AP-WEB is enforced regardless of delays
with network connectivity.
When connecting from a third-party corporate network, users most likely are behind a
firewall that may restrict Internet connectivity.
The laptop is connected to a network behind a firewall that does not allow
connectivity using port 8082, and the browser is unable to get the standard PAC
file from TRITON AP-WEB.
The laptop is connected to a network behind a firewall that does not allow
connectivity using port 8081, and the browser is not able to communicate with the
proxy.
Solution
Use the PAC file available via port 80
If port 8082 is locked down, a URL is available that enables the remote user to access
the PAC file and cloud service over port 80. Remote users should also use the PAC file
address for port 80 if requesting access from a network that has port 8081 locked
down. Even if they can access the PAC file on port 8082, port 8081 is the standard
required port to be able to use TRITON AP-WEB filtering.
This URL is available on the Web > Settings > General page, and a policy-specific
version is displayed on the General tab of each policy.
The Data Security feature in TRITON AP-WEB for the cloud provides visibility into
the loss of sensitive data and intellectual property via the web channel, and helps you
to assess your risk exposure to data loss via the web. This includes intellectual
property, data that is protected by national legislation or industry regulation, and data
suspected to be stolen by malware or malicious activities.
To get started, follow these steps:
1. Create content classifiers
This is helpful for monitoring intellectual property.
2. Configure Data Security policy settings
3. Configure reporting permissions (if you want to view Data Security reports)
In addition, you can do the following (optional):
1. Configure privacy settings
2. View the dashboard
3. View reports
4. View the audit trail
Content classifiers can be used to identify intellectual property and data types that are
not covered by the out of the box Personally Identifiable Information (PII), Payment
Card Industry (PCI), and Protected Health Information (PHI) rules. For example, a
key phrase custom classifier can be created to identify a document classification
marker.
The content classifiers that you create can then be used on the Data Security tab of
your web policies.
If you are concerned only about regulatory compliance and data theft, you can skip
this step.
1. In the Cloud TRITON Manager, select Web > Policy Management > Content
Classifiers from the main toolbar.
2. Click Add and select the type of classifier you want to create:
3. Complete the fields as described in the appropriate section, and then click Save.
4. Repeat steps 2-3 until youve added all the classifiers you require.
Regular expression (regex) patterns can be detected within content, such as the pattern
of an internal account number or alphanumeric document code.
When extracted text from a transaction is scanned, the system searches for strings that
match regular expression patterns and may be indicative of confidential information.
To create a regular expression classifier:
1. Enter a unique Name for the pattern.
2. Enter a Description for the pattern.
3. Enter the Regular expression pattern (regex) that you want the system to search
for, using Perl syntax.
For syntax and examples, click Help > Explain This Page.
4. Use the Pattern Testing section of the page to test your regular expression.
Because a regular expression patterns can be quite complex, it is important that
you test the pattern before saving it. If improperly written, a pattern can create
many false-positive incidents and slow down the system.
a. Create a .txt file (less than 1 MB) that contains values that match this regex
pattern. The file must be in plain text UTF8 format.
b. Browse to the file and click Test to test the validity of your pattern syntax. If
the pattern you entered is invalid, youre given an opportunity to fix it. You
cannot proceed until the test succeeds.
You can have up to 100 regular expression classifiers.
b. Weight: Select a weight, from -999 to 999 (excluding 0). When matched with
a threshold, weight defines how many instances of a phrase can be present, in
relation to other phrases, before triggering a policy.
5. If you have many phrases to include, create a text file listing the phrases, then
click Import and navigate to the text file.
6. Mark The phrases in this dictionary are case-sensitive if you want the phrases
that you entered to be added to the dictionary with the same case you applied.
You can have up to 100 dictionary classifiers. Each is limited to 100 phrases.
For examples and restrictions, click Help > Explain This Page.
property, data that is protected by national legislation or industry regulation, and data
suspected to be stolen by malware or malicious activities.
Important
The system monitors and reports on potential data
exposure. It does not block them.
To search for data over HTTPS, be sure SSL decryption is enabled by following the
instructions provided on the SSL Decryption tab.
Most countries and certain industries have laws and regulations that protect
customers, patients, or staff from the loss of personal information such as credit card
numbers, social security numbers, and health information.
To set up rules for the regulations that pertain to you:
1. Click No region selected.
2. Select the regions in which you operate.
3. Select the regulations of interest:
Field
Description
Personally Identifiable
Information (PII)
Protected Health
Information (PHI)
Use this section to detect when data is being exposed due to malware or malicious
transactions. When you select these options, TRITON AP-WEB searches for and
reports on outbound passwords, encrypted files, network data, and other types of
information that could be indicative of a malicious act.
To see if your organization is at risk for data theft:
1. Select the types of data to look for.
Information Type
Description
Common password
information
IT asset information
Malware communication
Password files
Use this section if you want to detect intellectual property or sensitive data using
custom phrases, dictionaries, or regular expressions containing business-specific
terms or data.
1. Select the classifiers that you want to enable for the policy. If you skipped the
section Create content classifiers, page 93, go there now to populate the list.
2. Select a severity for each classifier to indicate how severe a breach would be.
Select High for the most severe breaches. Severity is used for reporting purposes.
It allows you to easily locate High, Medium, or Low severity breaches when
viewing reports.
Trusted Domains
Getting Started Guide | Cloud Web Protection Solutions
Select Enable trusted domains if you do not want certain domains to be monitored,
then enter URLs for the trusted domains separated by commas.
The system does not analyze content passed between trusted domains. This means
users can send them any type of sensitive information via HTTP, HTTPS, or other web
channels from your network.
The domains you enter apply only to data security and only to the current web policy.
Use the Account > Settings > Privacy Protection page to prevent end-user
identifying information, data security incident trigger values, or both from appearing
in logs and web reports. If required, you can still collect this information for security
threats.
Credit card numbers, social security numbers, and email addresses are masked when
they are stored, as are passwords in certain instances.
Changing this setting has no impact on incident data that has already been collected.
You can control which administrators can view data security reports (and potentially
sensitive information). This setting is assigned at the account level.
To give administrators these permissions:
1. Navigate to Account > Settings > Contacts.
2. Select the contact whose permissions you want to edit.
3. In Contact Details, click the user name (email address) to view the contact login
details.
4. On the Login Details screen, click Edit.
5. Under Account Permissions, select View All Reports and Data Security
Reports, and then click Save.
This enables users to view data security reports, which may or may not contain
incident forensics and trigger data, depending on your privacy protection settings. It
does not change their ability to manage data security configuration settings.
For a high-level view of activity in your organization, click Dashboard, and then
click the Data Security tab. Data Security charts include:
Incident Count Timeline shows a daily incident count for the designated period.
With it, you can quickly identify trends and make policy changes as required.
Total Incidents by Content Type shows the number of regulatory incidents, data
theft incidents, and custom classifier incidents in the designated period.
Top Destination Domains shows the Internet domains most frequently targeted
with sensitive data.
Top Web Categories shows the website categories most frequently targeted with
sensitive data. These can be custom categories or the categories classified by the
URL category database.
View reports
Getting Started Guide | Cloud Web Protection Solutions
3. Select a report from the list that displays. Following are descriptions of each
report.
Report
Description
Content Type
Compliance Summary
Incidents
Incident List
Report
Description
Users Summary
4. After you select a report, select a time period (last 7 days by default) and any
required attributes, then click the Update Report button.
Tip
To view only incidents that meet a certain threshold (not
every single match), filter the report using the Top
Matches attribute.
Top Matches indicates the number of matches on the
incident's most violated rule. For example, if rule A in
MyPolicy has 2 matches, rule B has 5 matches, and rule C
has 10 matches, top match equals 10.
When you apply the filter, enter the threshold to include in
the report, and then select the operator to use: equal to,
greater than, etc.
Refer to the Cloud TRITON Manager Help for details on adding attributes to a
report.
Click Account > Settings > Audit Trail, and then click View Results to view an
audit trail of all policy configuration changes.
10
Next Steps
You should now be directing all Internet traffic through the TRITON AP-WEB service
and be protected from Internet threats. TRITON AP-WEB works out of the box, but
to get best use of its features, you probably want to tailor your policy. Specific areas of
interest may be:
Adjusting the website category dispositions to suit the nature of your business
Configuration advice for all of these features and others can be found in the Cloud
TRITON Manager Help in the Technical Library. Some basic steps for configuring
your policy and managing reporting in the Cloud TRITON Manager are outlined in
the sections below.
Next Steps
The category list on the Web Categories tab includes standard categories and any
custom categories that you have defined on the Policy Management > Custom
Categories page.
In the Standard Categories section, child categories are indented under their parent
categories. Parent categories allow specific categories to be grouped by a more
generic description. However, there is no hierarchical relationship between parent
categories and the child categories within them: you can set a filtering action for a
parent category without it affecting the child category, and vice versa.
To edit the web filtering action for a category:
1. Select a web category from the category list.
You can select a category directly from the list, or enter text in the search box to
locate the category you want.
To select multiple categories, use the Shift and/or Ctrl keys. You can also use the
drop-down menu above the category list to select or deselect the following
categories:
all categories
privacy categories
Allow access means that any website within the category is always accessible,
regardless of whether it exists in another category that has the Block access
action.
Do not block ensures that the site is not blocked under this rule, but if it also
exists in another category that has an action of Block access, it is blocked
under that category.
Confirm means that users receive a block page, asking them to confirm that
the site is being accessed for business purposes. Clicking Continue enables
the user to view the site and starts a timer. During the time period that you
configure (10 minutes by default), the user can visit other sites in the
confirmed category without receiving another block page. Once the time
period ends, browsing to any other Confirm site results in another block page.
Use Quota means that users receive a block page, asking them whether to use
quota time to view the site. If a user clicks Use Quota Time, he can view the
site.
Clicking Use Quota Time starts two timers: a quota session timer and a total
quota allocation timer. The session length and total quota time available for
each category depend on the options selected on the General tab.
Block access blocks access to websites in this category unless they exist in
another category with a filtering action of Allow access. When a site is
blocked, you can choose a notification page to be displayed.
3. To apply the setting to all categories within the selected category, mark Apply to
all sub-categories.
Next Steps
4. Click Save.
Note
To ensure that notification pages appear for HTTPS sites,
mark Use Websense certificate to serve notifications for
HTTPS pages on the Web > Policy Management >
Block and Notification Pages page.
Managing protocols
Getting Started Guide | Cloud Web Protection Solutions
This feature is available for i-Series appliance deployments only. Click the Protocols
tab to manage how protocols, or non-HTTP Internet traffic, are handled by a policy.
The list of protocols appears in a 2-level tree display similar to that in the Categories
tab. Protocol groups can be expanded to show the individual protocols within each
group.
The list on the Protocols tab includes both standard protocols and any custom
protocols that you have defined on the Policy Management > Protocols page. The
standard protocol groups are updated regularly.
Configure how a protocol is filtered by selecting it in the protocols tree and specifying
an action (Allow or Block) from the box on the right. You can select a protocol
directly from the list, or enter text in the search box to locate the protocol you want.
Use the Shift and/or Ctrl keys to select multiple protocols.
Managing exceptions
Getting Started Guide | Cloud Web Protection Solutions
Exceptions allow the default action for a web category or protocol to be overridden for
specified users and groups of users. Exceptions are listed at the bottom of the
Protocols (for i-Series appliance deployments only) and Web Categories tabs. Click
a protocol or category to view exception rules that may apply to it.
Click Add to add a new exception.
Reporting
Getting Started Guide | Cloud Web Protection Solutions
The available reports for web traffic and analysis are located in the navigation pane
under Reporting.
Next Steps
The Report Catalog contains a number of predefined reports that cover common
scenarios, available in bar chart, trend chart, and tabular formats. You can copy any
predefined report to apply your own filters to create a custom report, and share your
reports with other administrators.
The Report Builder offers an enhanced model for creating multi-level, flexible
reports that allow you to analyze information from different perspectives and gain
insight into your organizations Internet usage. If a high-level summary shows areas of
potential concern, you can drill down to find more details and use Transaction
Viewer for granular reports on individual transactions.
You can also do the following:
Save the reports you generate most frequently and want to be able to locate
quickly.
For more information about reporting and the full list of available reports, see the
Cloud TRITON Manager Help.
11
Before deploying TRITON AP-WEB, you should inform your users what the service
does and how it impacts them. This may even be a legal requirement in some
countries. Below is some sample text that you can use in an initial communication.
You can also customize the registration email templates and pre-logon welcome page,
if you are going to use them.
Note that text in italics is instructional and not meant for inclusion in any
communication.
Introduction to the TRITON AP-WEB with Web Cloud Module service
TRITON AP-WEB is an advanced web protection service that we have deployed to
protect Internet users from computer viruses and other web-based threats such as
spyware. All of our Internet traffic is directed to data centers where these threats are
filtered out and our Internet acceptable use policy is enforced.
Many websites exist that contain viruses or inappropriate content that might offend
you. Often links to these sites are returned by search engines and you do not realize
what you are accessing until you have clicked a link and it is too late. The TRITON
AP-WEB service allows us to block such sites so that you are not exposed to this
content.
Internet acceptable use policy
We have published an Internet acceptable use policy that outlines your responsibilities
as an individual when using company resources to access the Internet. TRITON APWEB allows us to enforce this policy, report on web usage and block inappropriate
downloads. In the event that a website is blocked, you are presented with a page
explaining why.
We recognize that different people need to access different types of websites to
perform their jobs, so if sites that you are trying to access are being blocked, please
email XXXX, include the website address and the reason why you need to access it.
The full website address can be copied from your browser address bar.
Please click the link below to access our corporate Internet acceptable use policy.
http://link_to_corporate_acceptable_use_policy
Note
The acceptable use policy feature is not available for i-Series appliance
deployments.
You may have the option to display a notice to users that informs them of your
organizations acceptable use policy for Internet use and asks them to agree to
accept its terms before they can continue browsing. You can select how frequently
you would like to display the notice. The choices are 1, 7, and 30 days. As with all
notification pages, you can tailor the default to meet your needs. See Notification
pages in the Cloud TRITON Manager Help.
End-user registration
Getting Started Guide | Cloud Web Protection Solutions
Click the link below. It takes you to the end-user registration portal. https://
www.mailcontrol.com/enduser/reg/index.mhtml
When you receive an email from Forcepoint, click the link it contains.
try and access a website, you are first asked to log in. Type the email address and
password that you used to register with TRITON AP-WEB and click OK. You may
want to check the box that invites you to save these login details to simplify future
logins.
If using NTLM transparent identification without directory synchronization:
This takes you to the end-user registration portal. Enter the password that you
want to use when you access the web (twice), and click Submit.
Now enter a URL, such as www.forcepoint.com, into your browser address bar
and you are presented with the final registration page.
Type the email address and password that you used to register with TRITON APWEB into the appropriate boxes.