ProxyBlocker User Guide

8E6 TECHNOLOGIES, PROXYBLOCKER USER GUIDE v
CONTENTS
INTRODUCTORY SECTION ...............................................1
8e6 ProxyBlocker ........................................................................1
About this User Guide ................................................................1
How to Use this User Guide .......................................................3
Conventions ...................................................................................... 3
Terminology ...................................................................................... 4
Overview ......................................................................................9
Environment Requirements .....................................................10
Workstation Requirements .............................................................. 10
Network Requirements .................................................................... 10
Chapter 1: Filtering Operations ...............................................11
Invisible Mode ................................................................................. 11
Global Group ............................................................................ 13
Static Filtering Profiles .............................................................. 16
Master IP Group Filtering Profile......................................... 16
IP Sub-Group Filtering Profile ............................................. 16
Individual IP Member Filtering Profile ................................. 16
Global Filtering Profile......................................................... 17
Override Account Profile ..................................................... 17
Time Profile ......................................................................... 17
Lock Profile ......................................................................... 17
8e6 Supplied Categories..................................................... 19
Custom Categories ............................................................. 19
Rules ........................................................................................ 20
Minimum Filtering Level ............................................................ 20
Filter Settings ............................................................................ 21
Filtering Rules ................................................................................. 22
Filtering Levels Applied ............................................................ 22
Chapter 2: Logging and Blocking ............................................25
Web Access Logging ...................................................................... 25
How IM and P2P Blocking Works ............................................. 26