Appliance Trim Kit User Manual
Volume 9: Managing the Blue Coat SG Appliance
94
destination objects Used in Visual Policy Manager. These are the objects that define the target location of
an entry type.
detect protocol attribute Detects the protocol being used. Protocols that can be detected include: HTTP, P2P
(eDonkey, BitTorrent, FastTrack, Gnutella), SSL, and Endpoint Mapper.
diagnostic reporting Found in the Statistics pane, the Diagnostics tab allows you to control whether Daily
Heartbeats and/or Blue Coat Monitoring are enabled or disabled.
directives Commands used in installable lists to configure forwarding and SOCKS gateway.
DNS access A policy layer that determines how the SG appliance processes DNS requests.
domain name system (DNS) An Internet service that translates domain names into IP addresses. See also private
DNS or public DNS.
dynamic bypass Provides a maintenance-free method for improving performance of the SG appliance
by automatically compiling a list of requested URLs that return various kinds of
errors.
dynamic real-time rating
(DRTR)
Used in conjunction with the Blue Coat Web Filter (BCWF), DRTR (also known as
dynamic categorization) provides real-time analysis and content categorization of
requested Web pages to solve the problem of new and previously unknown
uncategorized URLs—those not in the database. When a user requests a URL that has
not already been categorized by the BCWF database (for example, a brand new Web
site), the SG appliance dynamic categorization service analyzes elements of the
requested content and assigns a category or categories. The dynamic service is
consulted only when the installed BCWF database does not contain category
information for an object.
E
early intercept attribute Controls whether the proxy responds to client TCP connection requests before
connecting to the upstream server. When early intercept is disabled, the proxy delays
responding to the client until after it has attempted to contact the server.
ELFF-compatible format A log type defined by the W3C that is general enough to be used with any protocol.
emulated certificates Certificates that are presented to the user by SG appliance when intercepting HTTPS
requests. Blue Coat emulates the certificate from the server and signs it, copying the
subjectName and expiration. The original certificate is used between the SG
appliance and the server.
encrypted log A log is encrypted using an external certificate associated with a private key.
Encrypted logs can only be decrypted by someone with access to the private key. The
private key is not accessible to the SG appliance.
EULA End user license agreement.
event logging Allows you to specify the types of system events logged, the size of the event log, and
to configure Syslog monitoring. The appliance can also notify you by email if an
event is logged. See also access logging.