8. Security policies

The Security policies section contains the following subsections:

  • Content filtering

  • Safe browsing

  • SSL inspection

  • Intrusion prevention and detection system

  • SCADA rules

  • Scenarios

  • Mail security

  • Integration with external ICAP servers

  • Publication of HTTP/HTTPS resources using the reverse proxy

Based on security policies, network administrators can perform the following:

  • Set up the HTTP/S content filtering, e.g. prohibit access to certain categories of websites in the specified periods for individual users or configure the virus scanning of web content

  • Set up safe browsing options, e.g. forced safe search, block social network application, log users' search phrases and blocking of ads

  • Set up the HTTPS inspection rules, e.g. to decrypt HTTPS in the "Forums" category for all users and decrypt HTTPS in the "Social media" category only for the selected users. Once the HTTP traffic is decrypted, the system will be able to apply various content filtering and safe browsing policies.

  • Enable and set up the IPS settings

  • Set up spam filtering and virus scanning of the SMTP and POP3 traffic

  • Set up logging or blocking of certain SCADA commands

  • Set up selective sampling of the traffic for analysis on external ICAP servers, e.g. on DLP systems

  • Set up publication of HTTP/HTTPS servers