Secure Computing SSL Scanner User Manual

Page 3

Advertising
background image

Contents

Chapter 1

Introduction

.......................................................................................

1– 1

1.1

About This Guide

...........................................................................

1– 2

1.2

What Else Will You Find in This Introduction?

......................................

1– 2

1.3

Using Webwasher

..........................................................................

1– 3

1.3.1

First Level Tabs

.............................................................................

1– 4

1.3.2

Configuring a Sample Setting

...........................................................

1– 5

1.3.3

General Features of the Web Interface

...............................................

1– 7

1.4

Other Documents

..........................................................................

1–11

1.4.1

Documentation on Main Products

......................................................

1–12

1.4.2

Documentation on Special Products

..................................................

1–13

1.5

The Webwasher Web Gateway Security Products

................................

1–14

Chapter 2

Home

..................................................................................................

2– 1

2.1

Overview

.....................................................................................

2– 2

2.2

Dashboard

...................................................................................

2– 2

2.2.1

Executive Summary

.......................................................................

2– 8

2.2.2

Traffic Volume

...............................................................................

2–11

2.2.3

System

........................................................................................

2–13

2.3

Overview (Feature)

........................................................................

2–18

2.3.1

Overview (Feature)

........................................................................

2–19

2.4

Support

.......................................................................................

2–23

2.4.1

Support

.......................................................................................

2–23

2.5

TrustedSource

..............................................................................

2–24

2.5.1

TrustedSource

..............................................................................

2–25

2.5.2

Malware Feedback Black List

...........................................................

2–30

2.5.3

Feedback

.....................................................................................

2–33

2.6

Manuals

.......................................................................................

2–34

2.6.1

Documentation on Main Products

......................................................

2–35

2.6.2

Documentation on Special Products

..................................................

2–37

2.6.3

Additional Documentation

................................................................

2–39

2.7

Preferences

..................................................................................

2–40

2.7.1

Preferences

..................................................................................

2–40

2.8

License

........................................................................................

2–44

2.8.1

Information

...................................................................................

2–45

2.8.2

Notification

...................................................................................

2–48

Chapter 3

Common

.............................................................................................

3– 1

3.1

Overview

.....................................................................................

3– 2

3.2

Quick Snapshot

.............................................................................

3– 3

3.2.1

Quick Snapshot

.............................................................................

3– 4

3.3

Media Type Filters

.........................................................................

3– 8

3.3.1

Actions

........................................................................................

3– 9

3.3.2

Media Type Black List

.....................................................................

3–13

3.3.3

Media Type White List

....................................................................

3–16

i

Advertising