Security Profiles

Defining Security Profiles

Security Profiles is an essential part of the deployment. By setting security profiles, users can select which category or applications will be blocked. Security Profile menu is accessed from the settings main menu. There are four security profiles with predefined settings. Built-in security profiles cannot be edited. New profiles must be created to enable editing..

Figure 1. List of Security Profiles

After accessing the security profiles page, list of security profiles can be seen. The number of users shows how many deployments are using this profile.

To create own profile click "Create New Profile" button on right upper corner of screen and security profile definition screen appears from the right side of the screen for creating new profile.

Figure 2. Security Profile Definition

A name should be given to the security profile. After providing a name to the new profile, category settings for allowing or blocking user requests is defined. Security profiles are divided into three main categories, and each main category is divided into subcategories. To Allow/Block any subcategory click on it. You can enforce users to "Safe Search" by enabling "Safe Search" button in the Security Settings. In addition to safe search enforcement, "YouTube restricted mode" can also be enabled to allow viewing verified or secure content in YouTube.

Security Settings: Security Settings has two mode for operation. Positive Security mode, block every think which is not classified or firstly seen in addition to blocked categories, and Negative Security mode, in which only blocked categories will be block but unclassified or firstly seen request will not blocked. Security Settings contains four main groups and categories, which are classified based on content, under the groups. These groups are , Malicious Categories, Harmful Categories,Variable Categories and Safe Categories. Under each group, you can block or allow user traffic based on category information.

Figure 3. Security Settings

Applications: Application Category consist of subcategories which is focused on online applications such as remote access, instant messaging etc...

Black-White Lists: Black and White lists allow the creation of exceptions for blocked or allowed categories. If a website is defined in the blacklist, it will be blocked regardless of its category, and a domain in white list will be allowed irrespective of the category.

Evaluation Order: First look up Black/White Lists, then Applications, then Security Settings.