This module enables the network administrator to test issues related to accesing particular internet based resources by temporarily disabling the iShield proxies. Take note that leaving the proxies disabled is not recommended as it will have an impact on reporting and our ability to filter traffic.
This page enables network administrators to search for a particular domain across all of the pre-defined domain lists/blacklists. Wherever the domain is linked to a particular blacklist, the name of the blacklist will be returned.
This is useful in cases where a particular domain has been incorrectly classified, or if the domain has not been classified, the network administrator can include the domain in a particular blacklist.
This page enabled network administrators to build their own blacklists or include/exclude domains from a particular blacklist.
To create a blacklist override click on the “Add New Blacklist Override” button. A dialog box will appear the allows us to select either a System domain category / blacklist or a Custom domain category / blacklist. In this case as we are including or excluding a domain from a blacklist, select the System domain category / blacklist checkbox and select the blacklist from the drop down box.
Once the blacklist has been selected click on the “Add Overrides” button. We can now include or exclude domains from the social-media blacklist.
Clicking the include or exclude domain buttons will prompt the network administrator to enter a domain name. Once the domain name has been entered in the dialog box and the “Add Domain Override” button is clicked the override will appear in the list for the blacklist as seen below.
Alternatively, a network administrator can create their own custom blacklists by clicking on the “Add New Blacklist Override” button. Within the dialog box that will appear select Custom domain category / blacklist, and enter the name of the category / blacklist that you would like to create.
The same process applies to include domains within the custom category / blacklist as with the system category / blaclist override domain inclusion process.
This custom blacklist can be used in web rules and will appear under the “Blacklists” list of categories when creating web rules within policies.
Safe Browsing references a list of malicious URLs linked to malware and or phishing content. If a URL requested is matched to the list of poor reputation URLs, the iShield will block access to the site. This is an additonal layer of security and will work alongside the other layers of protection baked into the iShield.