MyWebsense Login
Buy & Renew
English (US)
English (US)
English (AU)
English (India)
English (UK)
Español (LatAm)
Français
Italiano
Português (Brasil)
Deutsch
日本語
中文 (simplified)
台灣 (traditional)
Русский
Türkçe
한국어
Products
Products
TRITON
®
APX
› TRITON APX Enterprise Core
› TRITON AP-WEB
› TRITON AP-DATA
› TRITON AP-EMAIL
› TRITON AP-ENDPOINT
TRITON RiskVision
Web Filter & Security
Free Trials and Demos
Product Expansion Options
Cloud & Hybrid Modules
DLP Module
Sandbox Module
Email Encryption Module
Image Analysis Module
TRITON AP-MOBILE
Technology Overview
TRITON Architecture
› Advanced Classification Engine
› Master Database
› Threatseeker Intelligence Cloud
Deployment Options
› Software
› Appliance
› Hybrid
› Cloud
Solutions
Advanced Persistent Threat Protection
Cloud Network Security
Corporate Email Phishing
Data Theft Prevention
Financial Services
Insider Threat
Mobile Workforce Security
Services
Free Trials and Demos
Contact Us
Find a Websense Partner
Implement
Implementation Support
Managed Deployment
Assess & Design
Technical Security Assessment
Cybersecurity Intelligence (CSI)
Free Analysis Tool: ACE Insight
Training and Certification
Customer Certifications
Partner Certifications
Support
Resources
Upgrade to 7.8
Upgrade to 8.0
Technical Library
Online Tools
Product Lifecycles
Supported Configurations
Contact Support
Support Webinars
Downloads
Product Installers
Product Upgrades
Hotfixes and Service Packs
MyWebsense
Access MyWebsense
Register
Stay Informed
Subscribe to Tech Alerts
View Support Videos
Visit Customer Forums
Resources
By Type
Analyst Reports
Brochures
Case Studies
Community
Datasheets
Free Trials and Demos
Infographics
Videos
Webcasts
Whitepapers
Featured
Websense Threat Report
Websense Security Predictions
The Forrester Wave™: SaaS Web Content Security, Q2 2015
Gartner 2015 Magic Quadrant For Secure Web Gateways
Gartner 2015 DLP Report
2015 Industry Drill-Down Report - Financial Services
Security Labs
Security Labs Blog
Security Labs Twitter Feed
Partners
Log In
Request a Login
Global Partner Program
Triton Security Alliance & OEM Partners
Find a Partner
Find a Distributor
Company
About Us
History
Executive Team
Offices
Office of the CSO
Executive Briefing Center
Triton Advisory Board
Customer Advocacy Board
Careers
News & Views
News
Blogs
› Insights
› Security Labs
Accolades
Support
Overview
Solution Center
Technical Library
Forums
Tools & Policies
Contact Support
Index
A
absolute freshness limit, setting
access log files
access web site
accessing Content Gateway Manager
1
,
2
Adaptive Redirection Module. See ARM.
adding certificate authorities
1
,
2
adding nodes to a cluster
adding virtual IP addresses
administration tools
administrator ID
administrator ID, changing
administrator ID, setting
administrator password
administrator password default
administrator ID
aging factor
modifying
alarm messages
alarm script file
alarms
1
,
2
clearing
email notification
viewing
Alarms button
alerts
allow certificates
allowing requests
alternates for caching
analytic_server process
ARM
1
,
2
,
3
bypass and WCCP
enabling
redirection rules
static bypass rules
ASCII log files
ASCII_PIPE mode
1
,
2
,
3
auth.config file
autodeleting log files
B
backing up certificates
backup domain controllers
binary log files
browsers to use with Content Gateway Manager
bypass rules
deny
dynamic
static
viewing
bypass.config file
examples
format
bypassing certificate validation
bypassing parent proxies
1
,
2
C
cache
changing capacity
1
,
2
child
clearing
contents
1
,
2
,
3
hit
miss
partitioning
scheduling updates to
1
,
2
statistics
cache affinity
1
,
2
cache capacity
cache pinning
cache request overview
cache space
managing
1
,
2
cache statistics
cache.config file
1
,
2
cache-control headers
cached objects
expiration date
freshness
FTP
HTTP
caching
caching alternates
caching cookied content
caching dynamic content
caching FTP objects
certificate authorities
adding
1
,
2
certificate error
certificate revocation lists
updating
certificate status
certificate validation, bypassing
certificates
1
,
2
allow
backing up
bypassing validation
deleting
deny
generating
importing
managing
restoring
revocation status
sub-certificate authority
changing
changing cache capacity
1
,
2
changing certificate status
1
,
2
changing records.config variables
changing size
RAM cache
changing status of
changing virtual IP addresses
child cache
Citrix
1
,
2
,
3
clearing alarms
clearing the cache
client access control lists
client access to proxy cache
1
,
2
,
3
client no-cache directives
clustering
adding nodes
management
management-only
modes
collating event log files
command line interface
variables
command-line interface
commands
commands
content_line -h
WCGAdmin start
configuration
remote
configuration files
filter.config
configuration information, sharing
configuration options
changing in the records.config file
configuration snapshots
deleting
restoring
taking
configuration variables (records.config)
Configure mode
Content Gateway Manager
configuring Content Gateway
configuring user authentication
NTLM
RADIUS
configuring Websense Content Gateway
1
,
2
via the command line
Content Gateway Manager
1
,
2
,
3
accessing
alarms
Alarms button (Monitor)
Configure mode
1
,
2
controlling access
logging on
Monitor mode
1
,
2
Performance button (Monitor)
starting
starting Monitor mode
supported browsers
user accounts
viewing statistics
1
,
2
content_cop process
content_gateway process
content_line -h command
content_manager process
contents
controlling
access to Content Gateway Manager
1
,
2
client access to proxy cache
controlling host access to Content Gateway Manager
controlling information leakage
cookies. See caching cookied content
custom logging
fields
customer support
D
Date header
default
deleting certificates
deleting configuration snapshots
deny bypass rules
1
,
2
deny certificates
denying requests
deployment options
directory services, user authentication
disabling
FTP over HTTP caching
HTTP caching
logging
disk usage
restricting
1
,
2
displaying cache statistics
1
,
2
DNS
proxy caching
resolver
DNS servers
specifying
1
,
2
dynamic bypass rules
deny bypass
1
,
2
setting
dynamic bypass statistics, viewing
dynamic content
caching
E
editing virtual IP addresses
emailing alarms
encryption
error log files
error messages
HTML
event log entries, examples
event log files
collating
converting binary to ASCII
managing
splitting
statistics
summary logs
expiration date
Expires header
explicit proxy
HTTPS PAC file
SSL
explicit proxy caching
F
files
auth.config
bypass.config
cache.config
1
,
2
hosting.config
ip_allow.config
1
,
2
ipnat.conf
log_hosts.config
logs_xml.config
mgmt_allow.config
1
,
2
parent.config
1
,
2
partition.config
1
,
2
records.config
1
,
2
socks.config
socks_server.config
splitdns.config
1
,
2
storage.config
1
,
2
,
3
update.config
wccp.config
filter.config file
examples
format
filtering rules
FIPS 140-2
force immediate update option
forcing object caching
freshness computations
FTP client application
FTP objects
caching
freshness
G
getting started
Graphs button
Content Gateway Manager
statistics
Graphs button (Monitor)
H
header requirements
headers
cache-control
Expires
Last-Modified
max-age
WWW-Authenticate
headroom limit (logging)
health alerts
hierarchical caching
1
,
2
HTTP hierarchies
parent failover
host access
host access to Content Gateway Manager
host database
host log splitting
hosting.config file
hostname length restriction with IWA
hostname, changing when using IWA user authentication
1
,
2
HTML error messages
HTTP
alternates
cache hierarchies
1
,
2
,
3
host, separate logs
HTTP object freshness
HTTP response messages
I
ICAP
ICAP (Internet Content Adaptation Protocol)
protocols supported
ICAP Service URI
immediate update
inbound traffic
SSL
incidents
increasing cache capacity
information leakage, controlling
integrated windows authentication
interception strategies
internal root CA
backup
IP spoofing
ip_allow.config file
1
,
2
examples
format
ipnat.conf file
IWA
changing the domain
configuration
configuration summary
finding the domain controller
hostname length restriction
hostname, changing
1
,
2
troubleshooting
J
Java
JavaScript
K
keeping header information
Kerberos
L
Last-Modified header
1
,
2
LDAP authentication rules
LDAP proxy authentication
listing cache contents
1
,
2
,
3
listing commands
log collation
log collation server
log files
autodeleting
log files, contents
log formats
log_hosts.config file
logcat application
LogFilter specification
LogFormat specification
logging
access logs
activity logs
aggregate summaries
ASCII_PIPE
1
,
2
,
3
choosing log file formats
collating log files
converting binary files to ASCII
custom logging fields
disabling
example log entries
file splitting
headroom limit
length of time to keep files
managing log files
Netscape Common formats
Netscape Extended formats
Netscape Extended-2 formats
offset hour
rolling intervals
size of log files
Squid formats
SSL Manager
stand-alone collator (SAC)
statistics
time stamps
WELF
logging on
Windows 7
logging on to Content Gateway Manager
LogObject specification
logs_xml.config file
M
management clustering
management-only clustering
manager alarms
managing certificates
max-age header
messages
certificate validation failure
connection failure
mgmt_allow.config file
1
,
2
modifying aging factor
monitor
remote
Monitor mode
multiple realm user authentication
aliases and logging
authentication logic
changing a rule
configuration summary
domains
global options
IWA rules
LDAP rules
legacy NTLM rules
troubleshooting
use cases
multi-user hosts
1
,
2
,
3
Multi-user IP Exclusions
1
,
2
,
3
My Proxy
statistics
My Proxy button
Monitor tab
N
naming rolled log files
Netscape Common logging formats
Netscape Extended logging formats
Netscape Extended-2 logging formats
Networking
statistics
Networking button
Content Gateway Manager Monitor tab
nodes
adding to a cluster
NTLM authentication rules
NTLM proxy authentication
1
,
2
NTLMv2
O
object caching, forcing
object freshness
aging factor
object store
offset hour
Online certification status protocol
origin server
orphan log files
outbound traffic
SSL
outgoing content, examining
overwriting dynamic bypass rules
P
PAC file
HTTPS
SSL Manager
parent cache
parent failover
parent proxies
bypassing
1
,
2
parent.config file
1
,
2
partition.config file
1
,
2
partitioning the cache
partitions
passphrase
password
1
,
2
password encryption
password, setting administrator
Performance graphs
pin-in-cache
print_bypass utility
processes (Websense Content Gateway)
Protocol
statistics
Protocols button
Content Gateway Manager Monitor tab
proxy
explicit
transparent
proxy cache
client access to
controlling client access to
proxy caching
cache-control headers
client no-cache directives
cookied content
disabling HTTP caching
dynamic content
FTP object freshness
header requirements
HTTP alternates
revalidating HTTP objects
scheduling cache updates
server no-cache directives
whether to cache
WWW-Authenticate headers
proxy user authentication
PUSH
R
RADIUS proxy authentication
1
,
2
RAM cache
1
,
2
raw disk
Read authentication from child proxy
1
,
2
re-authentication
records.confg file
records.config file
Redirect Hostname
redirecting requests (ARM)
reducing cache capacity
regular expressions
remote monitoring and configuration
restoring certificates
restoring configuration snapshots
restoring Websense Content Gateway configurations
1
,
2
restricting access to Content Gateway Manager
revalidation
revocation list
restoring
revocation status
rolled log files
rolling intervals
root CA
internal
backup
routers
configuring
rules
filtering
S
SAC (stand-alone collator)
sample records.config file
saving configurations
scheduling cache updates
scheduling updates
script file for alarms
Secure Sockets Layer
security
Content Gateway Manager
access
options
1
,
2
proxy user authentication
SOCKS
split DNS
SSL for secure administration
Security
statistics
Security button
Content Gateway Manager Monitor tab
security certificate alerts
server no-cache directives
service group ID number
service groups
disabling WCCP processing
enabling WCCP processing
guidelines for configuring
setting absolute freshness limit
setting administrator ID and password
1
,
2
setting administrator password
sharing configuration information
snapshots
deleting
restoring
taking
SOCKS
proxy options
SOCKS servers
specifying
1
,
2
socks.config file
socks_server.config file
split DNS
splitdns.config file
1
,
2
splitting event log files
spoofing
Squid logging formats
SSL
certificates
enabling (Content Gateway Manager)
inbound traffic
outbound traffic
SSL Manager
enabling
stand-alone collators
starting
Content Gateway Manager Configure mode
Content Gateway Manager Monitor mode
1
,
2
starting Content Gateway Manager
starting Websense Content Gateway
static bypass rules
1
,
2
statistics
My Proxy
Networking
Protocol
Subsystems
viewing from Content Gateway Manager
viewing from the command line
viewing in Content Gateway Manager
status
changing certificate
status, certificate
storage.config file
1
,
2
,
3
format
stripping header information
Subsystems
statistics
Subsystems button
Content Gateway Manager Monitor tab
summary log files
system status
T
technical support
terminal servers
1
,
2
,
3
time in cache
1
,
2
time stamps (log files)
timeout period for user authentication
traffic analysis options
traffic graphs, see Performance graphs
transaction logging
transparent proxy
interception strategies
transparent proxy authentication
1
,
2
Authentication Mode
1
,
2
Redirect Hostname
1
,
2
Session TTL
1
,
2
transparent proxy caching
L4 switch
policy-based routing
software solutions
WCCP
troubleshooting
Integrated Windows Authentication
U
update.config file
1
,
2
updates
scheduling
URL regular expressions
url_regix
user accounts
user authentication
backup domain controllers
browser limitations
integrated windows
integrated windows, configuration summary
Kerberos
LDAP
Multiple realm authentication
aliases and logging
authentication logic
changing a rule
configuration summary
domains
global options
IWA rules
LDAP rules
legacy NTLM rules
troubleshooting
use cases
NTLM
NTLMv2
RADIUS
supported directories
timeout period
transparent
transparent proxy
V
validation, bypassing certificate
variables
records.config file
1
,
2
verifying that Websense Content Gateway is running
verifying URLs
viewing alarms
viewing bypass rules
viewing certificates
certificates
viewing
viewing dynamic bypass statistics
1
,
2
viewing logging statistics
viewing statistics
from Content Gateway Manager
from the command line
virtual IP addresses
adding
editing
virtual IP failover
1
,
2
W
wccp
wccp.config file
WCCP
enabling
load balancing
service groups
WCCP 2.0
security
WCCP processing
disabling
enabling
WCCP2 routers
configuring
WCGAdmin start command
Web browser authentication support limits
web proxy caching
1
,
2
Web Security user identification
web site access
Websense Content Gateway
verifying
Websense Content Gateway components
Websense Content Gateway configurations
saving
Websense Content Gateway Manager
Monitor mode
Websense Content Gateway processes
WELF
Windows 7
WWW-Authenticate headers
X
X-Authenticated-User
1
,
2
X-Forwarded-For
1
,
2
XML custom log formats
1
,
2
Print
Email
Font Size:
A
A
Search
All
Technical Library
Article Rating:
Do you have any additional feedback?
Email:
close
Related Articles
Overview
Table of Contents
Deployment options
Proxy traffic analysis features
Quick Links
Technical Library
Site lookup tool
Hotfixes and downloads
Certified Product Matrix
Support Videos
Support Webinars
Suggest a Feature
Service Requests
Open a New Case
Manage My Cases
How are we doing?
Provide us feedback on your experience with the Service Request portal.
provide feedback >
Careers
Contact Us
News & Views
Site Map
Legal Information
Privacy Policy
©2015 Websense, Inc. All Rights Reserved.