![]() |
![]() |
![]() |
![]() |
v8.3.0 Release Notes for Web Protection Solutions : New in Web Protection Solutions
|
![]() |
The Time period for the report.
|
![]() |
The App risk levels to be reported.
|
![]() |
Risk Level: an assessment of the level of threat (High, Medium, or Low) associated with each cloud application.
|
![]() |
Cloud App: the application name.
|
![]() |
Users: the number of users who have accessed the application.
|
![]() |
Requests: the total number of requests made to the application.
|
![]() |
Bytes Sent: the total number of bytes sent by requests to the application.
|
![]() |
Bytes Received: the total number of bytes received from the responses to requests for an application.
|
![]() |
Last Accessed: the date and time the application was last accessed.
|
![]() |
User: the user or IP address of the user accessing cloud applications.
|
![]() |
Cloud Apps Accessed: the total number of cloud applications accessed by the user.
|
![]() |
Requests: the total number of requests made to cloud applications.
|
![]() |
Bytes Sent: the total number of bytes sent by requests to cloud applications.
|
![]() |
Bytes Received: the total number of bytes received from the responses to requests for the applications.
|
![]() |
Last Accessed: the date and time a cloud application was last accessed by the user.
|
![]() |
Use the Find feature to restrict the information in the table.
|
![]() |
Click Export to CSV to generate a comma-separated table (maximum of 10,000 rows) of the data. The Time Period and Find values become part of the query used by the export, even if the filters were not used to update the table.
|
Delegated administrators with permission to Report on managed clients only, and assigned to multiple roles, will be able to view data only for their managed clients.
|
If you make changes on the Settings > Reporting > Log Server page of TRITON Manager, you must restart the Websense Cloud Apps Service to update the database connection to Cloud Apps reports.
|
![]() |
The Time period selected on the Cloud Apps report is provided, with the option to select a different Time Period for the summary report.
|
![]() |
A Top 10 Users chart displays the number of requests made by each user.
|
![]() |
The Usage Trend chart shows the bandwidth used by the application.
|
![]() |
Information about Users Accessing the application is provided at the bottom of the page. This columnar report includes:
|
![]() |
User: each user that has accessed the application.
|
![]() |
Requests: the number of times the application has been requested by the user.
|
![]() |
Bytes Sent: the total number of bytes sent by the user's requests to the application.
|
![]() |
Bytes Received: the total number of bytes received from the responses to the user's requests.
|
![]() |
Last Accessed: the date and time the user last used the application.
|
![]() |
The Time period selected on the Cloud App Use by report is provided, with the option to select a different Time Period for the user report.
|
![]() |
A Top 10 Cloud Apps chart displays the number of requests made to each application.
|
![]() |
The Usage Trend chart shows the bandwidth used by the user when accessing cloud applications.
|
![]() |
Information about Cloud Apps Accessed by the user is provided at the bottom of the page. This columnar report includes:
|
![]() |
Risk Level: an assessment of the level of threat (High, Medium, or Low) associated with cloud application.
|
![]() |
Cloud App: the application name.
|
![]() |
Type: the type of application being accessed.
|
![]() |
Requests: the number of times the application has been requested.
|
![]() |
Bytes Sent: the total number of bytes sent by requests to the application.
|
![]() |
Bytes Received: the total number of bytes received from the responses to requests for an application.
|
![]() |
Last Accessed: the date and time the application was last used.
|
1.
|
2.
|
Enter a User name for the account.
|
3.
|
Enter and confirm a Password for the account.
|
4.
|
![]() |
![]() |
![]() |
![]() |
![]() |
The Add to list on the Main > Policy Management > Filter Components > Edit Categories > Add Category page will not include API-managed categories.
|
![]() |
![]() |
On the Configure > SSL > Validation > General page:
|
![]() |
Enable the certificate verification engine is enabled by default.
|
![]() |
The validation of self-signed certificates has been added as a new setting and removed from the processing done as of part the No expired or not yet valid certificates option.
|
![]() |
The Verify entire certificate chain and Deny self-signed certificates options are the only CVE options now enabled by default.
|
![]() |
On the Configure > SSL > Validation > Verification Bypass page, the Permit users to visit sites with certificate failure after confirmation option is on by default.
|
Use status to enable Port Mirroring. By default, the feature is OFF.
|
![]() |
Click Enabled next to Client Certificate to enable client certificate authentication. Click Disabled to disable the feature.
|
![]() |
In the drop-down box next to Enabled, select a Client Certificate Authentication profile. See Client Certificate Authentication profiles below.
|
![]() |
Check the box next to Use the next selected authentication method if Client Certificate authentication fails to use one of the other authentication methods if certificate authentication fails for a user.
|
![]() |
The Domain Sequence list cannot be empty.
|
![]() |
Enable HTTP Authentication Page for Captive Portal is not supported and the option is disabled when the fallback option is selected.
|
![]() |
Complete the remaining options as necessary and click Add to add the rule.
|
![]() |
Click Apply and restart Content Gateway to put the rule into effect.
|
1.
|
2.
|
Select an entry from the User Name Mapping drop-down.
|
3.
|
In the Certificate Authorities section, add, view, or delete certificates.
|
4.
|
Click Apply to save your profile.
|
![]() |
Delegated administrator access to the report is now determined solely by the Report on all clients option in the Reporting Permissions section of the Delegated Administration > Edit Roles page. The Access investigative reports option is no longer also required. The Advanced File Analysis option under Main > Reporting is not available to administrators whose role does not have Report on all clients selected.
|
![]() |
The Threats tab of the Status > Dashboard includes the number of requests processed by Advanced File Analysis. This number is now generated based on the time period selected for the Threats data, rather than the time period on the Advanced File Analysis report page, ensuring that the number corresponds to the data included on the Threats tab.
|
![]() |
A fourth threat type, No analysis available, has been added, which means that all files sent for analysis can be included on the report. Check the box to include files for which no results have been returned. Either these files are an unsupported file type, or an error occurred during the analysis.
|
![]() |
The Browser tab has been renamed Client Apps, the Source Platform tab has been renamed Operating Systems, and the Search tab has been renamed User Agents. The new names are more indicative of the tab contents.
|
![]() |
The Device Type options have been removed from both pages.
|
![]() |
The Time Period default has been changed from 30 day to 7 days.
|
![]() |
![]() |
The Type column has been removed from the summary and detail tables that list browser or platform information.
|
![]() |
The links in the Lowest Version and Highest Version columns have been removed. Click the link under Browser or Platform to view additional information about the selected browser or platform.
|
![]() |
The Browser Family and Platform Comparison charts have been replaced by "Top 5" charts that show the top 5 most used browsers and platforms.
|
![]() |
The Use Trend charts now contain information for only the top 5 browsers or platforms.
|
![]() |
The Network Address Translation (NAT) section of the Configure > Networking > ARM > General page has been renamed to Redirection Rules to better reflect the contents of the table.
|
![]() |
Be inserted after Forecepoint rules.
|
![]() |
DEFAULT to use the default cipher list configured by Forcepoint. The Content Gateway DEFAULT setting is the OpenSSL Default list, excluding those that Forcepoint believes provide the least security or encryption strength.
|
![]() |
HIGH to use the OpenSSL high cipher list: those with key lengths larger than 128 bits, and some cipher suites with 128-bit keys.
|
![]() |
MEDIUM to use both the OpenSSL medium and high cipher list: the high cipher list plus some of those using 128 bit encryption algorithms.
|
![]() |
![]() |
![]() |
![]() |
v8.3.0 Release Notes for Web Protection Solutions : New in Web Protection Solutions
|