User Manual Part 2
Table Of Contents
- Using SmartDefense
- Using Antivirus and Antispam Filtering
- Overview
- Using VStream Antivirus
- Using VStream Antispam
- How VStream Antispam Works
- Header Marking
- Default Antispam Policy
- Enabling/Disabling VStream Antispam
- Viewing VStream Antispam Statistics
- Configuring the Content Based Antispam Engine
- Configuring the Block List Engine
- Configuring the IP Reputation Engine
- Configuring the VStream Antispam Policy
- Configuring the Safe Sender List
- Configuring VStream Antispam Advanced Settings
- Using Centralized Email Filtering
- Using Web Content Filtering
- Updating the Firmware
- Using Subscription Services
- Working With VPNs
- Overview
- Setting Up Your Safe@Office Appliance as a VPN Server
- Adding and Editing VPN Sites
- Viewing and Deleting VPN Sites
- Enabling/Disabling a VPN Site
- Logging in to a Remote Access VPN Site
- Logging Out of a Remote Access VPN Site
- Using Certificates
- Viewing VPN Tunnels
- Viewing IKE Traces for VPN Connections
- Viewing VPN Topology
- Managing Users
- Using Remote Desktop
- Controlling the Appliance via the Command Line
- Maintenance
- Viewing Firmware Status
- Upgrading Your Software Product
- Configuring a Gateway Hostname
- Configuring Syslog Logging
- Configuring HTTPS
- Configuring SNMP
- Setting the Time on the Appliance
- Using Diagnostic Tools
- Backing Up and Restoring the Safe@Office Appliance Configuration
- Using Rapid Deployment
- Resetting the Safe@Office Appliance to Defaults
- Running Diagnostics
- Rebooting the Safe@Office Appliance
- Using Network Printers
- Troubleshooting
- Specifications
- Glossary of Terms
- Index
Overview
528 Check Point Safe@Office User Guide
Web Rules Web Filtering
Subscription and
Connection
Requirement
Web rules are included with the
Safe@Office appliance and do
not require a Service Center
subscription or connection.
The Web Filtering service is subscription-
based and requires a connection to the
Service Center.
You can use either Web content filtering solution or both in conjunction. When a user
attempts to access a Web site, the Safe@Office appliance first evaluates the Web rules. If
the site is not blocked or allowed by the Web rules, the Web Filtering service is then
consulted.
Regardless of which method is used, if a user attempts to access a blocked page, the
Access Denied page appears. For information on customizing this page, see Customizing
the Access Denied Page on page 543.
If desired, you can perm
it
specific users to override Web content filtering, by granting
them Web Filtering Override permissions. Such users will be able to view Web pages
without restriction, after they have provided their username password via the Access
Denied page. For information on granting Web Filtering Override permissions, see Adding
and Editing Users on page 643.
In addition,
you can choos
e to exclude specific network objects from Web content filtering
enforcement. Users connecting from these network objects will be able to view Web pages
without restriction, regardless of whether they have Web Filtering Override permissions.
For information on configuring network objects, see Using Network Objects on page 185.