eScan BlogeScan Blog    eScan WebsiteeScan Website    eScan ForumeScan Forum    eScan FeedseScan Feeds     
    
Languages:     

From eScan Wiki

(Difference between revisions)
Jump to: navigation, search
Revision as of 09:19, 11 April 2011
WikiSysop (Talk | contribs)

← Previous diff
Revision as of 10:13, 18 April 2011
WikiSysop (Talk | contribs)

Next diff →
Line 81: Line 81:
::::* '''White List: '''This section helps you customize the list of Web sites whose pop ups will not be blocked by the Pop up Filter. ::::* '''White List: '''This section helps you customize the list of Web sites whose pop ups will not be blocked by the Pop up Filter.
::::* '''Log Violations:''' You can also log all violations, add the Web sites to the whitelist for which a pop up was blocked by the pop-up filter, clear the log, browse the Web sites listed in the log, and refresh the log. In addition, you can assign a key to allow pop ups temporarily for the Web site being accessed. ::::* '''Log Violations:''' You can also log all violations, add the Web sites to the whitelist for which a pop up was blocked by the pop-up filter, clear the log, browse the Web sites listed in the log, and refresh the log. In addition, you can assign a key to allow pop ups temporarily for the Web site being accessed.
 +
 +
 +'''Default'''
 +
 +:::'''Note:-''' Click the Default button, if you want to apply default settings, which are done during installation of eScan. It loads and resets the values to the default settings.

Revision as of 10:13, 18 April 2011

Image:escan-g.jpg
· eScan  · MailScan  · Technologies   · Technical Info  · Security Awareness  · User Guides

Contents


Web Protection



Web Protection is a part of eScan\’s Protection feature. This module uses highly advanced algorithms based the occurrence of specific words or phrases in the contents of the Web site to block Web sites containing pornographic or offensive material. This feature is extremely beneficial to parents because it prevents kids from accessing Web sites containing harmful or restricted content. Administrators can also use this feature to prevent employees from accessing non-work-related Web sites during work hours. You can configure the following settings.

  • Start/Stop: It enables you to enable or disable Web-Protection module. Click the appropriate option.
  • Start Phishing filter:- Select this option if you want to enable the web-phishing filter on the client systems.
A. Filtering Options: This tab has predefined categories that help you control access to the Internet.
  • Status: This section helps you to allow or block access to specific Web site based on Filter Categories. You can set the status as Active or Block Web Access. You should select the Block Web Access option when you want to block all the Web sites except the ones that have been listed in the Filter Categories. When you select this option, only Filtering Options and Pop-up Filter tabs are available.
  • Filter Categories: This section uses the following color codes for allowed and blocked Web sites.
  • Green: It represents an allowed websites category
  • Red: It represents a blocked websites category
The filter categories used in this section include categories like Pornography, Gambling, Chat, Alcohol, Violence, Drugs, Ratings_block_category, Websites Allowed, etc. You can also add or delete filter categories depending on your requirement.
  • Category: [Category name]: This section shows the Words / Phrases list, which lists the words or phrases present in the selected category. In addition, the section displays the Site Names list, which lists the Web sites belonging to the selected category. You can also add or delete filter categories depending on your requirement.
  • Filter Options: This section includes the Add sites rejected by the filter to Block category check box. You should select this check box if you need eScan to add Web sites that are denied access to the Block category database automatically.
B. Scanning Options: This tab helps you enable content matching and content rating for Web sites. It also helps you block images, ActiveX controls, media components, and applications from appearing within the browser.
  • Content Matching Options: This section allows you to configure the settings for controlling and blocking access to Internet, based on different criteria.
  • Search in Site Name: You should select this check box if you need Web Protection to check whether the name of the Web site or its URL contains any reserved word or phrase listed in any of the restricted or blocked categories.
  • Search in HTML Tags: You should select this check box if you need Web Protection to check whether any of the HTML tags used to format the Web page contains reserve words or phrases listed in any of the restricted or blocked categories.
  • Search in Title: You should select this check box if you need Web Protection to check the title of a Web site for any of the reserve words or phrases listed in any of the restricted or blocked categories.
  • Search in Page Text: You should select this check box if you need Web Protection to check the content of Web sites for the occurrence of any of the reserve words or phrases listed in any of the restricted or blocked categories.
  • Search in Description and Keywords: You should select this check box if you need Web Protection to check the Web site’s description or keywords listed in the meta tags contain any of the reserve words or phrases listed in any of the restricted or blocked categories.
  • Reserve Word Threshold Level: The reserve word threshold is a threshold level that once set, keeps a count of the number of times a reserved word is found on the Web site. If the word appears as up to or more than the threshold level value, the access to the Web site is blocked.
  • Rating Systems: This section contains rules and policies defined by World-renowned organizations, such as Recreational Software Advisory Council (RSACI), Internet Content Rating Association (ICRA), and SafeSurf Rating Standard (SafeSurf), which cater to content filtering on the Internet.
  • Enable Filtering on the basis of RSACi rating: The RSACi rating is based on the work of Dr. Donal F. Roberts of Stanford University, who has studied the effects of media for nearly 20 years. This service rates the content on Web sites.
  • Enable Filtering on the basis of ICRA rating: The ICRA rating is a global, cross-cultural, rating, and filtering service for Web sites.
  • Enable Filtering on the basis of SafeSurf rating: The SafeSurf rating is designed with inputs from thousands of parents and Net Citizens to empower each family to make informed choices related to online content.
  • Set Rating: This button opens the Set Ratings dialog box, which contains tabs and options that help you customize the level of the Ratings Systems that should be applied to the Web sites that you visit.
  • ActiveX Blocking: An ActiveX control is component program that can be automatically downloaded and executed by a Web browser. It is similar to a Java applet. ActiveX controls may include malicious code and therefore may pose as a security hazard.
  • Java Applets: Java Applets are programs that are written in the Java programming language. These applets can be embedded in an HTML page and can be viewed from a Java enabled Web browser. Applets enhance the interactivity in Web pages and provide users with an enhanced Web experience. However, some applets contain malicious code that may either disrupt the processes running on your computer or steal sensitive information. You can select the Java Applets check box to block applets from being downloaded to your computer.
  • Scripts (Java & VB): Scripts are usually written in scripting languages such as JavaScript and VBScript. A script is a list of commands that can execute without user input. With the help of scripts, you can automate certain tasks within an application to work in a particular computing scenario. Hackers often use malicious script to steal information about the victims. When you select the Scripts (Java & VB) check box, eScan blocks script from being downloaded to your computer from the Internet.
  • Check for Virus: [Default] This check box is selected by default. You should select this check box if you need eScan to scan and block all Web sites that contain malicious code.
  • Actions: This section helps you select the actions that eScan should perform when it detects a security violation.
  • Log Violations: [Default] This check box is selected by default. You should select this check box if you need Web Protection to log all security violations for your future reference.
  • Shutdown Program in 30 Secs: You should select this check box if you need Web Protection to shut down the browser automatically in 30 seconds when any of the defined rules or policies is violated.
  • Port Setting: This section helps you specify the port numbers that eScan should monitor for suspicious traffic.
  • Internet Access (HTTP Port): Web browsers commonly use the port numbers 80, 8080, 3128, 6588, 4480, and 88 for accessing the Internet. You can add port numbers to the Internet Access (HTTP Port) box to monitor the traffic on those ports.
  • Content Type: This section helps you block content based on their type, such as images, applications, e-mails (RFC 822), audio files, and video files.
C. Define Real Time Restriction: This section helps you define policies to restrict access to the Internet.
  • Enable Time Restrictions for Web Access: You should select this check box if you want to set restrictions on when a user can access the Internet. By default, all the fields appear dimmed. The fields are available only when you select this check box.
The time restriction feature is a grid-based module. The grid is divided into columns based on the days of the week vertically and the time interval horizontally.
  • Active: Click this button and select the appropriate grid if you want to keep web access active on certain days for a specific interval.
  • Inactive: Select this option if you want to keep web access inactive on certain days for a specific interval.
  • Block Web Access: Select this option if you want to block web access on certain days for a specific interval.
D. Popup Filter: This section includes options for customizing notification alerts, whitelist, and violation logs for pop ups.
  • Notification: In this section, you can configure the settings for receiving notification alerts. Select the Block Pop – up check box, if you do not want to block certain websites listed in white list and select the Beep Via PC Speaker check box, if you want to receive a beep sound whenever a pop up window is blocked.
  • White List: This section helps you customize the list of Web sites whose pop ups will not be blocked by the Pop up Filter.
  • Log Violations: You can also log all violations, add the Web sites to the whitelist for which a pop up was blocked by the pop-up filter, clear the log, browse the Web sites listed in the log, and refresh the log. In addition, you can assign a key to allow pop ups temporarily for the Web site being accessed.


Default

Note:- Click the Default button, if you want to apply default settings, which are done during installation of eScan. It loads and resets the values to the default settings.

eScan Copyright © 2015 MicroWorld Technologies Inc.- AntiVirus & Content Security.       Send your feedback to solutions@escanav.com eScan Wiki

    Privacy policy  About eScan Wiki  Disclaimers