Google Web Security for EnterpriseAdministration Guide
Activating Web Security 11During installation, you can choose to install one of the following Connector types, depending on which type works best wi
12 Google Web Security for Enterprise Administration Guide Activating and Deploying to Your EnterpriseYour activation specialist will guide you throu
Chapter 3 Administration Console 13Administration ConsoleChapter 3About the Administration ConsoleThe Administration Console is a secure web-based in
14 Google Web Security for Enterprise Administration Guide 5. Click Web Virus, Spyware, or Web Filtering. (For information about navigating within ea
Administration Console 15For each feature, a navigation menu will appear in the left-hand column. This menu includes links to the following pages:•
Chapter 4 Web Virus 17Web VirusChapter 4About the Web Virus PageThe Web Virus page enables you to monitor and manage the web security Web Virus featu
18 Google Web Security for Enterprise Administration Guide Viruses Blocked (table): This table displays all the malware (viruses, worms, Trojans, bac
Web Virus 19The web security service allows for fully customizable block pages, which means that you can define the entire HTML output of the block
20 Google Web Security for Enterprise Administration Guide Custom message text will appear in end-user block page:Email AlertsThe Web Virus Email Ale
Chapter 5 Spyware 21SpywareChapter 5About the Spyware PageThe Spyware page enables you to monitor and manage the spyware protection provided by the w
2 Google Web Security for Enterprise Administration Guide Google, Inc.1600 Amphitheatre ParkwayMountain View, CA 94043www.google.comPart number: WSCG
22 Google Web Security for Enterprise Administration Guide Spyware/Adware/Phishing Blocked (table): This table displays all the spyware, adware and p
Spyware 23Note: All Spyware (truly malicious code, such as: viruses, worms, Trojans, back-doors, key loggers, etc.) are automatically blocked by the
24 Google Web Security for Enterprise Administration Guide 6. Once you are happy with the Alert Page modifications you have made, click the “Save” bu
Spyware 25To set up Spyware Email Alerts:1. Click the “Spyware” link.2. Click the “Email Alerts” link in the Spyware Notifications box in the left h
Chapter 6 Web Filtering 27Web FilteringChapter 6About the Web Filtering PageThe Web Filtering page enables you to:• Configure, enforce, and monitor w
28 Google Web Security for Enterprise Administration Guide Note: To enable web filtering per user or group within your company, you will need to dow
Web Filtering 29Web Filtering ManagementThe process of configuring Web Filtering policies requires the use of several “filtering objects.” Each of t
30 Google Web Security for Enterprise Administration Guide Categories: These are presented as a selectable list of all the different categories that
Web Filtering 312. Under the Management sub-service dropdown, click the ‘Filter’. This will bring up the ‘Manage Filter’ screen.3. The main ‘Manage
32 Google Web Security for Enterprise Administration Guide 5. To make viewing of your listed pages easier, you can click the ‘sort alphabetically’ bu
3This software is provided “AS IS.” The copyright holders disclaim all warranties, either express or implied, including but not limited to implied w
Web Filtering 334. If you wish to filter all the available file extensions, then you can click the ‘Select All’ button located in the bottom of the
34 Google Web Security for Enterprise Administration Guide SchedulesWhen implementing Web Filtering within an organization, you may wish to change th
Web Filtering 357. Select the days of the week for which you would like the Schedule to be active. This is done by clicking on the check boxes loca
36 Google Web Security for Enterprise Administration Guide PoliciesThe Policy page provides you with a visual overview of the Filtering Rules you hav
Web Filtering 3710. Define ‘WHAT’ this rule will filter on. You can select any of your filters from the drop down box and click the Add button. Ad
38 Google Web Security for Enterprise Administration Guide 2. Click the ‘Policy’ link in the ‘Management’ sub-service menu. This will then bring up
Web Filtering 39QuotasThe Quotas feature is available only when using the Connector. Quotas enable you to limit the amount of Web access a user can
40 Google Web Security for Enterprise Administration Guide 8. Click the ‘Save’ button to save your new Quota.To edit a Quota:1. Click the ‘Web Filter
Web Filtering 41Categories (HTTPS) tab: This tab opens a page to define the restrictions for HTTPS-only traffic.If you later disable separate HTTP/H
42 Google Web Security for Enterprise Administration Guide 4. Click the preview button just beneath the text area to see how the additional informati
Contents 5ContentsChapter 1: Introduction 7Welcome to Web Security for Enterprise 7Features 7Service Components 8Chapter 2: Activating Web Security
Web Filtering 436. Once you are happy with the Alert Page modifications you have made, click the “Save” button located at the bottom of the screen.7
44 Google Web Security for Enterprise Administration Guide Email GenerationYou can specify a maximum of 5 different email addresses that you wish to
Chapter 7 Admin Page 45Admin PageChapter 7About the Admin PageThe Admin page enables you to manage groups, manage authentication keys, and download t
46 Google Web Security for Enterprise Administration Guide Authentication Keys can be created using the Web Admin page. You can create a Company, Gro
Admin Page 47Case 2: Group Authentication Key• Scenario Setup• There are three branch offices and they do NOT currently use Active Directory groups.
48 Google Web Security for Enterprise Administration Guide Note: If you are using Active Directory, you are advised to use Case 1 (Company Authentica
Admin Page 49Note: User Authentication Key overrides all user information reported, so only use ONE user authentication key per ONE connector on ONE
50 Google Web Security for Enterprise Administration Guide To deactivate an Authentication Key:1. Click the Web Admin link, and click ‘Authentication
Admin Page 51Each of these groups will be discussed in further detail. For either of these group- based web access controls to function, you must h
52 Google Web Security for Enterprise Administration Guide Note: The Directory Group name, itself, is functional and therefore no further parameters
6 Google Web Security for Enterprise Administration Guide Edit Your Account Details 45Authentication Key Management 45Group Management 50Installing t
Admin Page 53WinNT://ACTIVE_DIRECTORY_REALM\USER_NAME3. The syntax is case insensitive and there may be spaces in the names, however the names shoul
54 Google Web Security for Enterprise Administration Guide Installing the ConnectorTo install the Secure Connector:1. Log in to the Administration Co
Chapter 8 Reports 55ReportsChapter 8About Web Security ReportsGoogle Web Security reports are accessible via the Reports link on the Web Content tab.
56 Google Web Security for Enterprise Administration Guide To run a search, do the following:1. Choose a time period for the search, from the last ho
Reports 57Viewing ReportsReports are generated from predefined or previously saved searches. They can be viewed online or downloaded as a PDF. When
58 Google Web Security for Enterprise Administration Guide 6. In the View as list, click a chart type. The available charts depend on the type of rep
Reports 59You can refine your search by clicking entries in the primary attribute column. Click an entry, and then click is equal to to include only
60 Google Web Security for Enterprise Administration Guide Click the hyperlink at the top of the chart to change the sort metric:Right-click the char
Reports 61Downloading PDF ReportsTo download a report in PDF format without viewing the report on-screen:1. Click the Reports tab to display the Rep
62 Google Web Security for Enterprise Administration Guide To add a filter:1. Click the Add link.2. In the attribute list, click the required attribu
Chapter 1 Introduction 7IntroductionChapter 1Welcome to Web Security for EnterpriseThe web security service is a managed service that provides protec
Reports 633. For each filter you want to add to the set:a. Click Add Filter.b. In the Select filter type list, click a filter type. You can add attr
64 Google Web Security for Enterprise Administration Guide 3. Click the tab for the type of search you want to create. The tabs are:SearchTime Analys
Reports 65The available metrics are:namebandwidthbrowse timebytes receivedbytes senthits6. Click the hyperlink to change the primary sort order. The
66 Google Web Security for Enterprise Administration Guide 3. In the View list, click the number of attributes to display.4. In the attribute list, c
Reports 67Allowed TrafficYou can also create a detailed report from an allowed traffic report. The allowed traffic report shows all of the allowed t
68 Google Web Security for Enterprise Administration Guide Saving a SearchTo save a search:1. Click Save. Alternatively, click "Save as" to
Reports 69Deleting a SearchTo delete a search:1. Click the Reports tab to display the Reports pane. Alternatively, on the Reports menu, click Report
70 Google Web Security for Enterprise Administration Guide 5. For each search you wish to include:• In the Report(s) to include in composite list, cl
Reports 71Deleting Composite ReportsTo delete a composite report:1. Click the Reports tab to display the Reports menu.2. On the Reports menu, click
72 Google Web Security for Enterprise Administration Guide Email RecipientsScheduled reports are sent to groups of email recipients. If you want to s
8 Google Web Security for Enterprise Administration Guide Service ComponentsWeb security includes two main components: Web Scanning and Web Filtering
Reports 735. In the Delivery schedule area, click one of the following to set when the report will run:Daily - every dayWeekly - every week on the d
74 Google Web Security for Enterprise Administration Guide 4. Click the Edit icon next to the composite report you wish to edit.Alternatively:1. Clic
Website Attributes / Categories 75Website Attributes / CategoriesAppendix 9IntroductionGoogle Web Security enables you to filter for website categor
76 Google Web Security for Enterprise Administration Guide Business and Industry: Marketing, commerce, corporations, business practices, workforce,
Website Attributes / Categories 77Fashion: Clothing and fashion; hair salons; cosmetics; accessories; jewelry; perfume; pictures and text relating
78 Google Web Security for Enterprise Administration Guide Illegal Activities: Promoting crime, such as stealing, fraud, illegally accessing telepho
Website Attributes / Categories 79Online Trading: Online brokerages; websites that enable the user to trade stocks online; information relating to
80 Google Web Security for Enterprise Administration Guide Shopping: Bartering; online purchasing; coupons and free offers; general office supplies;
Pre-defined Searches and Reports 81Pre-defined Searches and ReportsAppendix 10IntroductionGoogle Web Security provides a set of pre-defined searches
82 Google Web Security for Enterprise Administration Guide What were the Top 10 Categories that consumed the most Bandwidth?What were the Top 10 Site
Chapter 2 Activating Web Security 9Activating Web SecurityChapter 2OverviewWhen you first sign up for the web security service, an activation special
Pre-defined Searches and Reports 83Which Users spent the most time online?Category AnalysisWhat was the total number of Hits for all Categories?What
84 Google Web Security for Enterprise Administration Guide What were the Top 10 Threats blocked per protocol?Who were the Top 10 Users browsing Spywa
Index 85IndexAactivation 9activation email 10activation specialist 10Admin page 45Administration Console 7, 13Adware 7, 21Anti-Virus 14, 17attachmen
86 Google Web Security for Enterprise Administration Guide Uuser license key 48User Messages 23, 42Vviruses 7WWeb Admin page 14Web Content tab 9, 13,
10 Google Web Security for Enterprise Administration Guide 5. Discuss the following issues with your activation specialist:a. Verify that port 8080 i
Komentarze do niniejszej Instrukcji