Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Web Protection Policies > Enforcement order > Responding to a URL request
Responding to a URL request
Administrator Help | TRITON AP-WEB and Web Filter & Security | Version 8.2.x
When a user requests a site, Filtering Service is responsible for determining whether to block or permit the request.
 
Important 
If a request triggers Content Gateway analysis, Filtering Service uses the category returned as a result of the analysis to determine whether to block or permit the request.
Filtering Service determines which action to take as follows:
1.
*
If there is a block exception, block the site.
*
If there is a permit exception, permit the site.
Note that if the URL is permitted by exception, but classified as a security risk, the default action is to block it via security override. Administrators can disable the security override, but this is not recommended.
*
2.
Determines which category filter or limited access filter the policy enforces for the current day and time.
*
If the active category filter is Permit All, permit the site.
*
If the active category filter is Block All, block the site.
*
If the filter is a limited access filter, check whether the filter contains the URL or IP address. If so, permit the site. If not, block the site.
Note that if the URL is permitted by the limited access filter, but classified as a security risk, the default action is to block it via security override. Administrators can disable the security override, but this is not recommended.
*
 
Note 
3.
Checks the active protocol filter and determines whether any non-HTTP protocols are associated with the request.
*
*
4.
*
*
5.
*
*
With TRITON AP-WEB, sites not categorized by the Master Database are analyzed by Content Gateway. If this returns a new category for the site, Filtering Service applies an action based on the new category (rather than continuing to classify the site as Uncategorized).
6.
*
If the action is Block, block the site.
*
7.
Checks for Bandwidth Optimizer settings in the active category filter (see Using Bandwidth Optimizer to manage bandwidth).
*
*
8.
Checks for file type restrictions applied to the active category (see Managing traffic based on file type).
*
*
9.
Checks for blocked keywords in the URL and CGI path, if keyword blocking is enabled (see Keyword-based policy enforcement).
*
*
10.
*
Permit: Permit the site.
*
Limit by Quota: Display the block message with an option to view the site using quota time or go back to the previous page.
*
Confirm: Display the block message with the option to view the site for work purposes.
Filtering Service proceeds until the requested site is either blocked or explicitly permitted. At that point, no further investigation is attempted. For example, if a requested site belongs to a blocked category and contains a blocked keyword, Filtering Service blocks the site at the category level without checking the keyword. Log Server then logs the request as blocked because of a blocked category, not because of a keyword.
 
Note 

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Web Protection Policies > Enforcement order > Responding to a URL request
Copyright 2016 Forcepoint LLC. All rights reserved.