This feature helps you create security policies for an endpoint or group where Browsing and Phishing Protection can be enabled. This blocks malicious and phishing Web sites. You can restrict or allow access to the internet and Web sites as per your requirement.
The following settings are provided under Web Security:
- Browsing and Phishing
- Block Web Categories
- Block Specific Websites
- Schedule Internet Access
- Alerts and Reports
Browsing Protection
While users visit malicious Web sites some files may get installed on their systems. These files can spread malware, slow down the system, or corrupt other files. These attacks can cause substantial harm to the system.
Browsing Protection ensures that malicious Web sites are blocked while the users in a group are accessing the Internet. Once the feature is enabled, the site that is accessed is scanned and is blocked if found to be malicious.
Phishing Protection
Phishing is a fraudulent attempt, usually made through email, to steal your personal information. These emails usually appear to have been sent from seemingly well-known organizations and sites such as banks, companies and services seeking for your personal information such as credit card number, social security number, account number or password.
Administrators can enable Phishing Protection that prevents users from accessing phishing and fraudulent Web sites. As soon as a site is accessed, it is scanned for any phishing behavior. If found fraudulent, then it is blocked to prevent any phishing attempts.
Web Categories
There are certain concerns that most organizations may face:
- System infection by malware.
- Users browsing unwanted Web sites.
- The employees idling away time.
To avoid these concerns the administrators need to have a policy that regulates users and their Web access activities.
The Web Categories feature helps the administrators centrally control and manage the browsing behavior of the users. The administrators can create different security policies for different groups according to their requirements and priorities.
Creating a new Web Security policy
To configure policy for Web Security, follow these steps:
- Create Container/feature policy for Web Security.
-
On the Feature Policy page, you can see the following list of settings with expand sign and toggle button. Expand and Enable settings that you want to configure.
- Browsing and Phishing
- Block Web Categories
- Block Specific Websites
- Schedule Internet Access
- Alerts and Reports
-
Expand Browsing and Phishing. Select either of the following or both the check boxes:
- Browsing Protection
- Phishing Protection
- Enable and Expand Block Web Categories.
- Select Protection level, Low, Medium, or High.
- This restricts or allows access to the Web sites based on their categories as per the security policy of your organization. If you block a category, all the Web sites referring to the category will be blocked.
- The Web categories are enabled, and you can allow or deny access to each category.
- From Status column, select either Allow or Deny.
- Enable and expand Block specified websites. You can enter the Web sites that you want to block. For details, see Block specified websites mentioned below on this page.
-
Enable and expand Schedule Internet Access and do the following:
-
Select one of the following options:
- Always allow access to the internet
- Allow access to the internet as per schedule – When you select the option, Allow access to the internet as per schedule, you can add the schedule time.
- Click Add to add the schedule. Add Time Interval dialog appears.
- Select the Weekday from the list.
- Select the Start at and End at hours.
- Click OK.
You can delete the schedule entry if the entry is not required.Note
SSL versions earlier than 3.1 are not supported for Schedule Internet Access.
- Enable and expand Alerts and Reports.
- Select either of the following or both the check boxes:
- Display Alert Message – when website is blocked.
- Generate Web Security Reports – To generate reports for all blocked Web sites. If you select this option, a large number of reports will be generated depending upon the Web usage.
-
To save your settings, click Save Policy.
Importantly, if you have customized the settings and later you want to revert to the default settings, click the Reset Default button.
Exclusion for Browsing Protection and Phishing Protection
Exclusion enables you to apply an exception rule to the protection policy for Browsing Protection and Phishing Protection. This helps you exclude the URLs of the sites that are actually genuine, but get erroneously detected either as malicious or phishing sites. You are recommended to exclude only those URLs that you trust to be safe and genuine.
You can exclude the URLs in the following way:
- Log on to the Seqrite Endpoint Security.
- Go to Policies > Container Policies > Web Security.
- In the Browsing and Phishing section, under Exclude URLs, type the URL and then click Add. The Report Miscategorized URL dialog appears. You can report about miscategorization of the URL to the Seqrite lab if the URL is detected as malicious or phishing site.
- Select one of the reasons from the following:
- URL is getting detected as Malicious
- URL is getting detected as Phish
- To report about miscategorization, click Yes. If you do not want to report about miscategorization, click No. The URL is added in the Exclude URL list.
-
To save your settings, click OK.
In the action bar, you can perform the following actions:Action Description Add Helps you exclude a URL from being detected as malicious or phishing. Delete Helps you delete a URL from the Excluded URL list. Report Helps you report if a URL is miscategorized.
Exclusion for Web Categories
Exclusion helps you apply an exception rule to the protection policy for Web Categories. This helps you when you want to restrict access to a Web site category, but you want to allow certain Web sites from the restricted category.
You can enlist such Web sites in the Exclusion list in the following way:
- Log on to the Seqrite Endpoint Security.
- Go to Policies > Container Policies > Web Security.
- Click the Exclusion button. The Exclude URLs dialog appears.
- In the Block Web Categories section, under Exclusions, type the URL and then click Add. The URL is added in the Exclude URL list.
- To exclude the subdomains, in the column Exclude Subdomain, select option Yes or No.
- To save your settings, click OK.
Action | Description |
---|---|
Add | Helps you exclude a URL from being restricted even if it belongs to the blocked category. |
Delete | Helps you delete a URL from the Excluded URL list. |
Block specified websites
This feature is helpful in restricting access to certain Web sites or when a Web site does not fall into an appropriate category. It is also helpful if you have a shorter list of the Web sites that you would prefer to restrict the Web sites than blocking the entire category.
To block Web sites, follow these steps:
- Log on to Seqrite Endpoint Security.
- Go to Policies > Container Policies > Web Security. The Block specified websites features (Add, Delete, Delete All) are activated.
- Type a URL and then click Add.
- If you want to block the subdomains, select the option Yes or No in Block Subdomains column. For example, if you block www.google.com and enable ‘Block Subdomains’, all its subdomains such as mail.google.com will also be blocked.
You can delete the URL, if required.Note
The Block Subdomains feature is not applicable for the clients with Mac operating systems.
Exclusion for Schedule Internet Access
You can exclude certain known websites from getting it blocked. Excluded URLs/Websites will not get blocked even if internet is restricted.
You can enlist such Web sites in the Exclusion list in the following way:
- Log on to the Seqrite Endpoint Security.
- Go to Policies > Container Policies > Web Security.
- In the Schedule Internet Access section, under Exclusions, type the URL and then click Add. The URL is added in the Exclude URL list.
- To save your settings, click OK.
Action | Description |
---|---|
Add | Helps you exclude a URL from being restricted even if internet is restricted. |
Delete | Helps you delete a URL from the Excluded URL list. |