﻿<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>LevelBlue Knowledge Base » Knowledgebase » Legacy Products » Secure Web Gateway » Security Policies</title><generator>InstantKB.NET 2.0.6</generator><description>LevelBlue Knowledge Base</description><link>https://support.levelblue.com/kb/</link><webMaster>website@m86security.com</webMaster><lastBuildDate>Tue, 21 Apr 2026 19:38:25 GMT</lastBuildDate><ttl>20</ttl><item><title>How to bypass Authentication by header</title><link>https://support.levelblue.com/kb/Goto14069.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;SWG 9.x &lt;/li&gt;    &lt;li&gt;SWG 10.x &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;Some sites or programs require you to bypass Authentication in order for it to be accessed through the SWG appliance. For Example, Google Earth’s update mechanism will not allow the program to run if it cannot contact its host site, and the host site cannot be reached when using Authentication through the SWG. &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Procedure:&lt;/h2&gt;&lt;p&gt; &lt;/p&gt;&lt;ul&gt;    &lt;li&gt;To bypass authentication for our Google Earth example, we will bypass using the User-Agent header that Google Earth uses to access its host site. &lt;/li&gt;&lt;/ul&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;-Navigate to Polices -&amp;gt; Condition Settings -&amp;gt; Header Fields &lt;/div&gt;&lt;div&gt;-Under Exclude by Headers click edit and enter the following information. &lt;/div&gt;&lt;div&gt;&lt;span class="Apple-tab-span" style="white-space: pre;"&gt;&lt;/span&gt;Header Name: &lt;/div&gt;&lt;div&gt;&lt;span class="Apple-tab-span" style="white-space: pre;"&gt;&lt;/span&gt;Condition: &lt;/div&gt;&lt;div&gt;&lt;span class="Apple-tab-span" style="white-space: pre;"&gt;&lt;/span&gt;Header Value: &lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;img alt="" style="height: 85px; width: 566px;" src="https://support.levelblue.com/kb/Uploads/Images/JB/Headerlayout.png" /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;- Save and Commit changes.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;*note: in VSOS 9.0.0 you cannot add more than one user agent header name to the same Headers Field list. If you need to add more than one user agent you will need to create a separate list for each user agent entry. &lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;-Other programs and hardware have been known to need to have authentication bypassed in order to be used. Here is the program and the Header name used to allow access. &lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;table class="MsoTableLightListAccent1" style="border-top-style: none; width: 482.6pt; border-collapse: collapse; border-bottom-style: none; border-right-style: none; border-left-style: none;" cellspacing="0" cellpadding="0" width="643" border="1"&gt;    &lt;tbody&gt;        &lt;tr style="height: 16.35pt;"&gt;            &lt;td style="border-top: #4f81bd 1pt solid; width: 117.9pt; border-bottom-style: none; border-right-style: none;" valign="top"&gt;            &lt;p class="MsoNoSpacing"&gt;&lt;strong&gt;&lt;span style="color: #ffffff;"&gt;Application&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="border-top: #4f81bd 1pt solid; width: 99pt; border-bottom-style: none; border-right-style: none; border-left-style: none;" valign="top"&gt;            &lt;p class="MsoNoSpacing" style="text-align: center;"&gt;&lt;strong&gt;&lt;span style="color: #ffffff;"&gt;Header&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="border-top: #4f81bd 1pt solid; width: 103.5pt; border-bottom-style: none; border-right-style: none; border-left-style: none;" valign="top"&gt;            &lt;p class="MsoNoSpacing"&gt;&lt;strong&gt;&lt;span style="color: #ffffff;"&gt;Value&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="border-top: #4f81bd 1pt solid; width: 162.2pt; border-bottom-style: none; border-left-style: none;" valign="top"&gt;            &lt;p class="MsoNoSpacing" style="text-align: center;"&gt;&lt;strong&gt;&lt;span style="color: #ffffff;"&gt;Expression&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr style="height: 16.35pt;"&gt;            &lt;td style="border-top: #4f81bd 1pt solid; width: 117.9pt; border-bottom: #4f81bd 1pt solid; border-right-style: none; border-left: #4f81bd 1pt solid;" valign="top"&gt;            &lt;p class="MsoNoSpacing"&gt;&lt;strong&gt;Google Earth&lt;o:p&gt;&lt;/o:p&gt;&lt;/strong&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="border-top: #4f81bd 1pt solid; width: 99pt; border-right-style: none; border-left-style: none;" valign="top"&gt;            &lt;p class="MsoNoSpacing" style="text-align: center;"&gt;User-Agent&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="border-top: #4f81bd 1pt solid; width: 103.5pt; border-right-style: none; border-left-style: none;" valign="top"&gt;            &lt;p class="MsoNoSpacing"&gt;Regular Expression&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="border-top: #4f81bd 1pt solid; border-right: #4f81bd 1pt solid; width: 162.2pt; border-bottom: #4f81bd 1pt solid; border-left-style: none;" valign="top"&gt;            &lt;p class="MsoNoSpacing"&gt;^GoogleEarth.*&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr style="height: 17.25pt;"&gt;            &lt;td style="border-top-style: none; width: 117.9pt; border-bottom-style: none; border-right-style: none; border-left: #4f81bd 1pt solid;" valign="top"&gt;            &lt;p class="MsoNoSpacing"&gt;&lt;strong&gt;iPhone&lt;o:p&gt;&lt;/o:p&gt;&lt;/strong&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="border-top-style: none; width: 99pt; border-bottom-style: none; padding-bottom: 0in; padding-top: 0in; border-right-style: none; padding-left: 5.4pt; border-left-style: none; padding-right: 5.4pt;" valign="top"&gt;            &lt;p class="MsoNoSpacing" style="text-align: center;"&gt;User-Agent&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="border-top-style: none; width: 103.5pt; border-bottom-style: none; padding-bottom: 0in; padding-top: 0in; border-right-style: none; padding-left: 5.4pt; border-left-style: none; padding-right: 5.4pt;" valign="top"&gt;            &lt;p class="MsoNoSpacing"&gt;Regular Expression&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="border-top-style: none; border-right: #4f81bd 1pt solid; width: 162.2pt; border-bottom-style: none; border-left-style: none;" valign="top"&gt;            &lt;p class="MsoNoSpacing"&gt;Apple iPhone.*&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr style="height: 16.35pt;"&gt;            &lt;td style="border-top: #4f81bd 1pt solid; width: 117.9pt; border-bottom: #4f81bd 1pt solid; border-right-style: none; border-left: #4f81bd 1pt solid;" valign="top"&gt;            &lt;p class="MsoNoSpacing"&gt;&lt;strong&gt;iPad&lt;o:p&gt;&lt;/o:p&gt;&lt;/strong&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="border-top: #4f81bd 1pt solid; width: 99pt; border-right-style: none; border-left-style: none;" valign="top"&gt;            &lt;p class="MsoNoSpacing" style="text-align: center;"&gt;User-Agent&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="border-top: #4f81bd 1pt solid; width: 103.5pt; border-right-style: none; border-left-style: none;" valign="top"&gt;            &lt;p class="MsoNoSpacing"&gt;Regular Expression&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="border-top: #4f81bd 1pt solid; border-right: #4f81bd 1pt solid; width: 162.2pt; border-bottom: #4f81bd 1pt solid; border-left-style: none;" valign="top"&gt;            &lt;p class="MsoNoSpacing"&gt;Apple iPad.*&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr style="height: 17.25pt;"&gt;            &lt;td style="border-top-style: none; width: 117.9pt; border-bottom-style: none; border-right-style: none; border-left: #4f81bd 1pt solid;" valign="top"&gt;            &lt;p class="MsoNoSpacing"&gt;&lt;strong&gt;iTunes&lt;o:p&gt;&lt;/o:p&gt;&lt;/strong&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="border-top-style: none; width: 99pt; border-bottom-style: none; padding-bottom: 0in; padding-top: 0in; border-right-style: none; padding-left: 5.4pt; border-left-style: none; padding-right: 5.4pt;" valign="top"&gt;            &lt;p class="MsoNoSpacing" style="text-align: center;"&gt;User-Agent&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="border-top-style: none; width: 103.5pt; border-bottom-style: none; padding-bottom: 0in; padding-top: 0in; border-right-style: none; padding-left: 5.4pt; border-left-style: none; padding-right: 5.4pt;" valign="top"&gt;            &lt;p class="MsoNoSpacing"&gt;Regular Expression&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="border-top-style: none; border-right: #4f81bd 1pt solid; width: 162.2pt; border-bottom-style: none; border-left-style: none;" valign="top"&gt;            &lt;p class="MsoNoSpacing"&gt;iTunes/.*&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr style="height: 16.35pt;"&gt;            &lt;td style="border-top: #4f81bd 1pt solid; width: 117.9pt; border-bottom: #4f81bd 1pt solid; border-right-style: none; border-left: #4f81bd 1pt solid;" valign="top"&gt;            &lt;p class="MsoNoSpacing"&gt;&lt;strong&gt;-&lt;o:p&gt;&lt;/o:p&gt;&lt;/strong&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="border-top: #4f81bd 1pt solid; width: 99pt; border-right-style: none; border-left-style: none;" valign="top"&gt;            &lt;p class="MsoNoSpacing" style="text-align: center;"&gt;-&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="border-top: #4f81bd 1pt solid; width: 103.5pt; border-right-style: none; border-left-style: none;" valign="top"&gt;            &lt;p class="MsoNoSpacing"&gt;-&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="border-top: #4f81bd 1pt solid; border-right: #4f81bd 1pt solid; width: 162.2pt; border-bottom: #4f81bd 1pt solid; border-left-style: none;" valign="top"&gt;            &lt;p class="MsoNoSpacing"&gt;AppleCoreMedia/.*&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr style="height: 17.25pt;"&gt;            &lt;td style="border-top-style: none; width: 117.9pt; border-bottom-style: none; border-right-style: none; border-left: #4f81bd 1pt solid;" valign="top"&gt;            &lt;p class="MsoNoSpacing"&gt;&lt;strong&gt;Microsoft Updates&lt;o:p&gt;&lt;/o:p&gt;&lt;/strong&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="border-top-style: none; width: 99pt; border-bottom-style: none; padding-bottom: 0in; padding-top: 0in; border-right-style: none; padding-left: 5.4pt; border-left-style: none; padding-right: 5.4pt;" valign="top"&gt;            &lt;p class="MsoNoSpacing" style="text-align: center;"&gt;User-Agent&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="border-top-style: none; width: 103.5pt; border-bottom-style: none; padding-bottom: 0in; padding-top: 0in; border-right-style: none; padding-left: 5.4pt; border-left-style: none; padding-right: 5.4pt;" valign="top"&gt;            &lt;p class="MsoNoSpacing"&gt;Equals&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="border-top-style: none; border-right: #4f81bd 1pt solid; width: 162.2pt; border-bottom-style: none; border-left-style: none;" valign="top"&gt;            &lt;p class="MsoNoSpacing"&gt;Windows-Update-Agent&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr style="height: 17.25pt;"&gt;            &lt;td style="border-top: #4f81bd 1pt solid; width: 117.9pt; border-bottom: #4f81bd 1pt solid; border-right-style: none; border-left: #4f81bd 1pt solid;" valign="top"&gt;            &lt;p class="MsoNoSpacing"&gt;&lt;strong&gt;-&lt;o:p&gt;&lt;/o:p&gt;&lt;/strong&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="border-top: #4f81bd 1pt solid; width: 99pt; border-right-style: none; border-left-style: none;" valign="top"&gt;            &lt;p class="MsoNoSpacing" style="text-align: center;"&gt;-&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="border-top: #4f81bd 1pt solid; width: 103.5pt; border-right-style: none; border-left-style: none;" valign="top"&gt;            &lt;p class="MsoNoSpacing"&gt;Regular Expression&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="border-top: #4f81bd 1pt solid; border-right: #4f81bd 1pt solid; width: 162.2pt; border-bottom: #4f81bd 1pt solid; border-left-style: none;" valign="top"&gt;            &lt;p class="MsoNoSpacing"&gt;^MicrosoftBITS/.*&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr style="height: 17.25pt;"&gt;            &lt;td style="border-top-style: none; width: 117.9pt; border-bottom-style: none; border-right-style: none; border-left: #4f81bd 1pt solid;" valign="top"&gt;            &lt;p class="MsoNoSpacing"&gt;&lt;strong&gt;Adobe Flash&lt;o:p&gt;&lt;/o:p&gt;&lt;/strong&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="border-top-style: none; width: 99pt; border-bottom-style: none; padding-bottom: 0in; padding-top: 0in; border-right-style: none; padding-left: 5.4pt; border-left-style: none; padding-right: 5.4pt;" valign="top"&gt;            &lt;p class="MsoNoSpacing" style="text-align: center;"&gt;User-Agent&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="border-top-style: none; width: 103.5pt; border-bottom-style: none; padding-bottom: 0in; padding-top: 0in; border-right-style: none; padding-left: 5.4pt; border-left-style: none; padding-right: 5.4pt;" valign="top"&gt;            &lt;p class="MsoNoSpacing"&gt;Regular Expression&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="border-top-style: none; border-right: #4f81bd 1pt solid; width: 162.2pt; border-bottom-style: none; border-left-style: none;" valign="top"&gt;            &lt;p class="MsoNoSpacing"&gt;^Adobe Flash Update.*&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr style="height: 17.25pt;"&gt;            &lt;td style="border-top: #4f81bd 1pt solid; width: 117.9pt; border-bottom: #4f81bd 1pt solid; border-right-style: none; border-left: #4f81bd 1pt solid;" valign="top"&gt;            &lt;p class="MsoNoSpacing"&gt; &lt;/p&gt;            &lt;/td&gt;            &lt;td style="border-top: #4f81bd 1pt solid; width: 99pt; border-right-style: none; border-left-style: none;" valign="top"&gt;&lt;br /&gt;            &lt;/td&gt;            &lt;td style="border-top: #4f81bd 1pt solid; width: 103.5pt; border-right-style: none; border-left-style: none;" valign="top"&gt;&lt;br /&gt;            &lt;/td&gt;            &lt;td style="border-top: #4f81bd 1pt solid; border-right: #4f81bd 1pt solid; width: 162.2pt; border-bottom: #4f81bd 1pt solid; border-left-style: none;" valign="top"&gt;&lt;br /&gt;            &lt;/td&gt;        &lt;/tr&gt;    &lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;p&gt; &lt;/p&gt;</description><pubDate>Mon, 27 Apr 2015 15:17:40 GMT</pubDate><dc:creator>Charles</dc:creator></item><item><title>How to make sure that JAR Files are scanned for threats</title><link>https://support.levelblue.com/kb/Goto16538.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;SWG 10.x&lt;/li&gt;    &lt;li&gt;SWG 11.x&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;How to make sure that JAR Files are scanned for threats&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Information:&lt;/h2&gt;&lt;p&gt;If your security policy requires the scanning of JAR files, make sure that these rules are applied:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ol&gt;    &lt;li&gt;&lt;span style="line-height: 12px;"&gt;Block Known Viruses (Kaspersky / Mcafee / Sophos)&lt;/span&gt;&lt;/li&gt;    &lt;li&gt;&lt;span style="line-height: 12px;"&gt;Block Spoofed Content&lt;/span&gt;&lt;/li&gt;    &lt;li&gt;&lt;span style="line-height: 12px;"&gt;Block Known Malicious Content&lt;/span&gt;&lt;span style="line-height: 12px;"&gt; &lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;/p&gt;&lt;h2&gt;Notes:&lt;/h2&gt;&lt;p&gt;Make sure that these rules appear before others that may allow files without scanning.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><pubDate>Tue, 11 Feb 2014 01:26:15 GMT</pubDate><dc:creator>ofer Kalef</dc:creator></item><item><title>Allow (bypass) Audio Streaming through SWG</title><link>https://support.levelblue.com/kb/Goto14366.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;SWG 10.x&lt;/li&gt;    &lt;li&gt;SWG 11.x&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;Audio streams (e.g. Web Radio) do not work through the SWG, and there are no log entries.&lt;/li&gt;    &lt;li&gt;I have an "Allow Streaming" rule, but audio streaming does not work and the logs don't show anything being Blocked. &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Procedure:&lt;/h2&gt;&lt;p&gt;Audio streaming formats are not included in "Allow streaming" rule by default.&lt;/p&gt;&lt;p&gt;In order to allow (actually, to bypass) these formats, modify the rule conditions by selecting 'Audio File' as shown below:&lt;/p&gt;&lt;p&gt;&lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/14366/14366_01.jpg" /&gt;&lt;/p&gt;&lt;h2&gt;&lt;/h2&gt;</description><pubDate>Tue, 24 Sep 2013 08:21:13 GMT</pubDate><dc:creator>ofer Kalef</dc:creator></item><item><title>Malware Entrapment Profile levels as shown in the weblogs</title><link>https://support.levelblue.com/kb/Goto14490.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;SWG v10.1 and above&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;Malware Entrapment Profile level is set to Strict, however, transaction shows Basic, Medium and Strict levels. Why?&lt;/li&gt;    &lt;li&gt;&lt;span style="line-height: 13px; font-size: 12px;"&gt;Malware Entrapment Profile is blocking too much/little content. Can I adjust it?&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Information:&lt;/h2&gt;&lt;p&gt;As of SWG 10.1, the User Interface allows adjustment of Malware Entrapment Profile (MEP) security level. To do this, highlight the Malware Entrapment Profile condition in the "Block Malicious Content (Malware Entrapment Engine)" Rule and set its level as desired in the right pane, as shown below:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/SM/14490/Malware%20Entrapment%20Profile.jpg" style="width: 600px; height: 260px;" /&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Web content will be blocked by MEP up to and including the specified threshold, e.g. if set to Medium, content is blocked if it breaks Basic or Medium. The transaction log will show what MEP level was reached, so if MEP is set to Strict the transaction logs will show Basic, Medium and Strict entries.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Note that if the Logging Policy is set to log more than Blocked/Corrective actions (e.g. "Log everything except images"), then the logs will show MEP levels for traffic that was not blocked, indicating that the Entrapper engine was called but allowed the traffic, as shown in green below:&lt;/p&gt;&lt;div&gt;&lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/SM/14490/Malware%20Entrapment%20Profile%20-%20log.jpg" style="width: 600px; height: 285px;" /&gt;&lt;br /&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;h2&gt;Notes:&lt;/h2&gt;&lt;p&gt;&lt;/p&gt;None.</description><pubDate>Sun, 15 Sep 2013 01:17:30 GMT</pubDate><dc:creator>ofer Kalef</dc:creator></item><item><title>Incorrect Policy enforcement for Windows 7 / Windows Vista users due to the NCSI feature</title><link>https://support.levelblue.com/kb/Goto15205.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;SWG 10.x&lt;/li&gt;    &lt;li&gt;SWG 11.x&lt;/li&gt;    &lt;li&gt;Users running &lt;span style="font-size: 11px; line-height: 12px;"&gt;Microsoft &lt;/span&gt;Windows Vista or &lt;span style="font-size: 11px; line-height: 12px;"&gt;Microsoft &lt;/span&gt;Windows 7&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Symptoms:&lt;/h2&gt;&lt;p&gt;S&lt;span style="line-height: 12px;"&gt;ymptoms may vary d&lt;/span&gt;&lt;span style="line-height: 12px;"&gt;epending on SWG identification implementation.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;In some cases, when the user first boots into the Windows OS they get a message from Microsoft Networking with a yellow exclamation icon in the system tray. &lt;/p&gt;&lt;p&gt;The error message that opens is "No Internet Access".&lt;/p&gt;&lt;p&gt;T&lt;span style="line-height: 12px;"&gt;he yellow exclamation icon goes away a&lt;/span&gt;&lt;span style="line-height: 12px;"&gt;s soon as the user opens Internet Explorer.&lt;/span&gt;&lt;/p&gt;&lt;ul&gt;    &lt;/ul&gt;    &lt;p&gt;Another variation is that the users are identified as Unknown Users, and as a result the incorrect security policy is enforced for such users.&lt;/p&gt;    &lt;div&gt;This can be verified in the Web Logs view showing Authenticated User Names containing '$' signs:&lt;/div&gt;    &lt;div&gt;&lt;br /&gt;    &lt;/div&gt;    &lt;div&gt;&lt;span class="Apple-tab-span" style="white-space: pre;"&gt;       &lt;img alt="" style="width: 580px; height: 266px;" src="https://support.levelblue.com/KB/Uploads/Images/SM/15205/01.png" /&gt;&lt;/span&gt;&lt;/div&gt;    &lt;h2&gt;Causes:&lt;/h2&gt;    This behavior is unique to Window Vista and Windows 7 OS versions after the Network Connectivity Status Indicator (NCSI) feature was introduced in Windows Vista.&lt;br /&gt;    NCSI is designed to be responsive to network conditions, so it examines the connectivity of a network in a variety of ways. Once a test fails, NCSI may report an error, even if the network can &lt;span style="font-size: 11px; line-height: 18px;"&gt;actually &lt;/span&gt;be fully accessed.  &lt;br /&gt;    For example, NCSI tests connectivity by trying to connect to http://www.msftncsi.com, a simple website that exists only to support the functionality of NCSI. &lt;br /&gt;    &lt;br /&gt;    &lt;div&gt;Try to manually visit the website http://www.msftncsi.com/ncsi.txt. You should see “Microsoft NCSI”:&lt;br /&gt;    &lt;br /&gt;    &lt;img alt="" src="https://support.levelblue.com/KB/Uploads/Images/SM/15205/NCSI.PNG" /&gt;&lt;br /&gt;    &lt;br /&gt;    A proxy server requiring user authentication won't allow it to access the Internet.&lt;br /&gt;    &lt;h2&gt;Resolution:&lt;/h2&gt;    &lt;p&gt;There are two ways to resolve this issue:&lt;/p&gt;    &lt;p&gt;1. By bypassing *.msftncsi.com/* for Authentication purposes.&lt;/p&gt;    &lt;p&gt;&lt;/p&gt;    &lt;p&gt;2. By modifying registry settings to disable the NCSI functionality:&lt;/p&gt;    &lt;p&gt;   - Run regedit (administrative permission is required)&lt;/p&gt;    &lt;p&gt;   - Navigate to the following key:&lt;/p&gt;    &lt;p&gt;     HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\NlaSvc\Parameters\Internet\&lt;/p&gt;    &lt;p&gt;   - Locate EnableActiveProbing parameter&lt;/p&gt;    &lt;p&gt;   - Allowed values: 1 - Enable NCSI, 0 - Disable NCSI &lt;/p&gt;    &lt;p&gt;    &lt;img alt="" style="width: 580px; height: 283px;" src="https://support.levelblue.com/KB/Uploads/Images/SM/15205/02.png" /&gt;&lt;/p&gt;    &lt;p&gt;These registry settings can be distributed globally as part of the Group Policy push from the Domain Controller.&lt;/p&gt;    &lt;h2&gt;&lt;/h2&gt;    &lt;/div&gt;</description><pubDate>Mon, 19 Aug 2013 06:35:52 GMT</pubDate><dc:creator>ofer Kalef</dc:creator></item><item><title>What is the longest URL that could be added to the URL list?</title><link>https://support.levelblue.com/kb/Goto14914.aspx</link><description>&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;SWG 10.x&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;URL list entry - what is the limit on the URL length ?&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Information:&lt;/h2&gt;&lt;p&gt;&lt;span class="Apple-tab-span" style="white-space: pre;"&gt;	&lt;/span&gt;The following error message could show up when adding a very long URL:&lt;/p&gt;&lt;/div&gt;&lt;span class="Apple-tab-span" style="white-space: pre;"&gt;	&lt;/span&gt;&lt;img alt="" src="https://support.levelblue.com/KB/Uploads/Images/SM/14914/error_msg.JPG" style="width: 600px; height: 391px;" /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-tab-span" style="white-space: pre;"&gt;	&lt;/span&gt;When adding a URL from the logs section, the error message would be different:&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-tab-span" style="white-space: pre;"&gt;	&lt;/span&gt;&lt;img alt="" src="https://support.levelblue.com/KB/Uploads/Images/SM/14914/error_msg_02.jpg" /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span class="Apple-tab-span" style="white-space: pre;"&gt;	&lt;/span&gt;Every URL list entry is a name stored in the DB being the same as the URL itself&lt;br /&gt;This name field in the DB is limited to 192 chars.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-tab-span" style="white-space: pre;"&gt;	&lt;/span&gt;If needed there are ways to extend this field manually, however, these changes are not recommended.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-tab-span" style="white-space: pre;"&gt;	&lt;/span&gt;Our recommendation for such URLs is to use a RegEx entry with a wildcard:  domain_name*file_name .&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</description><pubDate>Fri, 19 Jul 2013 01:31:38 GMT</pubDate><dc:creator>ofer Kalef</dc:creator></item><item><title>Signing CSR request and importing certificate for the scanner</title><link>https://support.levelblue.com/kb/Goto14525.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;SWG v10.0&lt;/li&gt;    &lt;li&gt;&lt;span style="line-height: 12px; font-size: 11px;"&gt;SWG v10.1&lt;/span&gt;    &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;&lt;div&gt;This article describes detailed instructions on how to:&lt;/div&gt;&lt;ul&gt;    &lt;li&gt;Generate CSR request for Scanning Server using Trustwave SWG Web interface&lt;/li&gt;    &lt;li&gt;Submit CSR request data using MS PKI Web interface &lt;/li&gt;    &lt;li&gt;Import certificate information into &lt;span style="line-height: 12px; font-size: 11px;"&gt;Trustwave SWG Scanning Server&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Procedure:&lt;/h2&gt;&lt;p&gt;1.   Navigate to the Devices section in Trustwave SWG GUI, right-click the HTTPS module on the scanner and choose Generate Certificate option:&lt;/p&gt;&lt;p&gt;      &lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/SM/14525/01.png" style="width: 503px; height: 339px;" /&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;2.   Choose CSR Certificate Type in the right pane and fill in all relevant details:&lt;/p&gt;&lt;p&gt;      &lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/SM/14525/02.png" style="width: 496px; height: 315px;" /&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;3.   System responds with "Operation Succeeded" message, with the CSR request data in the background. Click OK and copy CSR data as simple text data.&lt;/p&gt;&lt;p&gt;      &lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/SM/14525/03.png" style="width: 403px; height: 225px;" /&gt;&lt;/p&gt;&lt;p&gt;4.   &lt;span style="line-height: 12px; font-size: 11px;"&gt;Commit the changes. Do not create new CSR requests for other devices managed under same Policy Server.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;5.   Navigate to the MS-PKI Web GUI and select "Request a certificate" task:&lt;/p&gt;&lt;p&gt;      &lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/SM/14525/04.png" /&gt;&lt;/p&gt;&lt;p&gt;6.   Submit advanced certificate request:&lt;/p&gt;&lt;p&gt;      &lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/SM/14525/05.png" /&gt;&lt;/p&gt;&lt;p&gt;7.   Choose the option to submit CSR by using a base-64-encoded CMC or PKCS#10 file:&lt;/p&gt;&lt;p&gt;      &lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/SM/14525/06.png" /&gt;&lt;/p&gt;&lt;p&gt;8.   Paste CSR data that was copied in step 3 above.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p style="font-size: 11px; line-height: 12px;"&gt;      Before submitting a request make sure Certificate Template is set to use Subordinate Certification Authority and "CA:TRUE" is set as Additional Attribute.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;      &lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/SM/14525/07.png" /&gt;&lt;/p&gt;&lt;p&gt;9.   Select Base 64 encoded option and download certificate:&lt;/p&gt;&lt;p&gt;      &lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/SM/14525/08.png" /&gt;&lt;/p&gt;&lt;p&gt;10.   Save the certificate on your system:&lt;/p&gt;&lt;p&gt;      &lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/SM/14525/09.png" /&gt;&lt;/p&gt;&lt;p&gt;11. Open this certificate using text editor and copy the data as simple text data:&lt;/p&gt;&lt;p&gt;      &lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/SM/14525/10.png" /&gt;&lt;/p&gt;&lt;p&gt;12. Navigate to the Devices section in Trustwave SWG GUI, &lt;span style="line-height: 12px; font-size: 11px;"&gt;right-click the HTTPS module on the scanner and choose Import Certificate option:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="line-height: 12px; font-size: 11px;"&gt;      &lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/SM/14525/11.png" style="width: 500px; height: 338px;" /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="line-height: 12px; font-size: 11px;"&gt;13. &lt;/span&gt;&lt;span style="line-height: 12px; font-size: 11px;"&gt;Choose CSR Certificate Type in the right pane and paste in certificate data that was copied in step 10 above:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="line-height: 12px; font-size: 11px;"&gt;      &lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/SM/14525/12.png" /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;14. Commit changes. Certificate can now be exported from the device.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;If required to sign CSR certificate for more than one scanning server, it is important to perform above steps as separate procedure for every device. &lt;/p&gt;&lt;h2&gt;&lt;/h2&gt;</description><pubDate>Tue, 29 Jan 2013 23:59:01 GMT</pubDate><dc:creator>ofer Kalef</dc:creator></item><item><title>How To Exclude Web Applications From the Authentication Mechanism</title><link>https://support.levelblue.com/kb/Goto13553.aspx</link><description>&lt;div class="atb65"&gt;&lt;li&gt;&lt;strong&gt;Description&lt;/strong&gt;&lt;br /&gt;Some web applications (such as Citrix Webmeeting) get stuck due to authentication requests which can not be handled by such applications.&lt;br /&gt;This article describes how to exclude them from authentication mechanism.&lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="atb66"&gt;&lt;li&gt;&lt;strong&gt;Symptoms&lt;/strong&gt;&lt;br /&gt;Example:&lt;br /&gt;Citrix Webmeeting gets stuck, or the connection setup wizard does not succeed.&lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="atb67"&gt;&lt;li&gt;&lt;strong&gt;Cause&lt;/strong&gt;&lt;br /&gt;An authentication request is sent to the client in a later session stage, but the application cannot handle it correctly.&lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="atb68"&gt;&lt;li&gt;&lt;strong&gt;Solution&lt;/strong&gt;&lt;br /&gt;The solution is to exclude this application / site from authentication mechanism.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Drawback:&lt;/strong&gt; The client is not authenticated or identified anymore and the policy for unknown users is applied.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;1. Step:&lt;/strong&gt; Create a list of URLs you want to exclude (It might be necessary to do a packet trace and analyze the destination URLs)&lt;br /&gt;&lt;br /&gt;&lt;img alt="" src="https://support.levelblue.com/kb/attachments/images/929~add_url-list.jpg" style="border-width: 0px; border-style: solid; " /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;2. Step:&lt;/strong&gt; add a condition to your authentication policy (it might be different from this example):&lt;br /&gt;&lt;br /&gt;&lt;img alt="" src="https://support.levelblue.com/kb/attachments/images/930~add_condition_1.jpg" style="border-width: 0px; border-style: solid; " /&gt;&lt;br /&gt;&lt;br /&gt;&lt;img alt="" src="https://support.levelblue.com/kb/attachments/images/931~add_condition_2.jpg" style="border-width: 0px; border-style: solid; " /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Note:&lt;/strong&gt; This condition is based on URLs, basically other conditions such as header fields are also possible - it depends on the needs.&lt;br /&gt;&lt;br /&gt;&lt;img alt="" src="https://support.levelblue.com/kb/attachments/images/932~add_condition_3.jpg" style="border-width: 0px; border-style: solid; " /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Step 3:&lt;/strong&gt; Commit your changes&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Note:&lt;/strong&gt; This option applies also to other identification policies (IP, Basic)&lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="atb69"&gt;&lt;li&gt;&lt;strong&gt;Software Version&lt;/strong&gt;&lt;br /&gt;9.x&lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;dl style="margin-top: 10px; "&gt;    &lt;dt&gt;&lt;em&gt;This article applies to:&lt;/em&gt;&lt;/dt&gt;    &lt;dd&gt;&lt;em&gt;NG 1000&lt;/em&gt;&lt;/dd&gt;    &lt;dd&gt;&lt;em&gt;NG 5000&lt;/em&gt;&lt;/dd&gt;    &lt;dd&gt;&lt;em&gt;NG 6000&lt;/em&gt;&lt;/dd&gt;    &lt;dd&gt;&lt;em&gt;NG 8000&lt;/em&gt;&lt;/dd&gt;    &lt;em&gt;    &lt;/em&gt;&lt;/dl&gt;    &lt;em&gt;    &lt;dl style="margin-top: 10px; "&gt;        &lt;dt&gt;&lt;em&gt;This article was previously published as:&lt;/em&gt;        &lt;/dt&gt;        &lt;dd&gt;&lt;em&gt;Finjan KB 1810&lt;/em&gt;        &lt;/dd&gt;    &lt;/dl&gt;    &lt;/em&gt;</description><pubDate>Fri, 31 Aug 2012 07:06:10 GMT</pubDate><dc:creator>Rudolf Kessler</dc:creator></item><item><title>How can I block java</title><link>https://support.levelblue.com/kb/Goto14948.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;SWG 10.x, 11.x&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;How can I block java traffic?&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Reply:&lt;/h2&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;SWG blocks requests/content based on its properties. Thus it cannot block java as a whole but perhaps based on its behavior. &lt;/p&gt;&lt;p&gt;Since java uses .class files you can add a rule to block File Extension .class files and you can also add a rule to block Content Type "Java Class". &lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;h2&gt;&lt;/h2&gt;&lt;p&gt;&lt;/p&gt;</description><pubDate>Thu, 30 Aug 2012 02:01:54 GMT</pubDate><dc:creator>Rudolf Kessler</dc:creator></item><item><title>SFG data mechanism and the use of 'Bypassed Context Scanning List' in SWG 10.x</title><link>https://support.levelblue.com/kb/Goto14946.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;SWG 10.x&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;SWG 10.1 comes with a new Scan Engine (Entrapper). Is the SFG Data Mechanism and the "Bypassed Context Scanning List" still in use?&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Reply:&lt;/h2&gt;&lt;p&gt;Inserting SFG Data tags to the page code was necessary in order to track and analyze a site in full context. If any problems occured with this, the solution was to add a site to the &lt;span style="font-size: 11px; line-height: 12px; "&gt;"Bypassed Context Scanning List". &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;SFG data is still being used in the product but in less scenarios than before. For example &lt;em&gt;java scripts&lt;/em&gt; are no longer marked with SFG since Entrapper (the new scan engine) now does pre-fetching, however, will still add SFG tags to &lt;em&gt;java applets&lt;/em&gt;.&lt;/p&gt;&lt;p&gt;Due to the above, the need for this list has dramatically decreased but we still want to keep this functionality for other scenarios in case it creates a problem in the page.&lt;/p&gt;&lt;div style="font-size: 11px; line-height: 12px; "&gt;&lt;br /&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;h2&gt;Notes:&lt;/h2&gt;&lt;p&gt;-&lt;/p&gt;</description><pubDate>Wed, 29 Aug 2012 01:47:01 GMT</pubDate><dc:creator>Rudolf Kessler</dc:creator></item><item><title>INFO: Changes to Dynamic Web Repair</title><link>https://support.levelblue.com/kb/Goto14655.aspx</link><description>&lt;p style="line-height: normal; "&gt;&lt;strong&gt;&lt;span style="font-size: 14pt; "&gt;This article applies to:&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;&lt;ul style="list-style-type: disc; "&gt;    &lt;li style="line-height: normal; "&gt;&lt;span style="font-size: 13px; "&gt;Secure Web Gateway&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p style="line-height: normal; "&gt;&lt;strong&gt;&lt;span style="font-size: 18pt; "&gt;Question:&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;&lt;ul style="list-style-type: disc; "&gt;    &lt;li style="line-height: normal; "&gt;&lt;span style="font-size: 13px; "&gt;What are the changes in SWG Dynamic Web Repair in versions 10.2 and above?&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p style="line-height: normal; "&gt;&lt;strong&gt;&lt;span style="font-size: 18pt; "&gt;Reply:&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p style="text-indent: -0.25in; "&gt;&lt;span style="font-family: verdana; font-size: 13px; "&gt;&lt;span style="color: black; "&gt;·&lt;span style="font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; "&gt;    &lt;/span&gt;&lt;/span&gt;&lt;span style="color: black; "&gt;Prior to the launch of the Malware Entrapment Engine (before 10.1) some of the MCRC rules had a fix up which was applied once the page was identified as malicious or suspected as malicious. Nevertheless, there are still some rules in the Malware Entrapment Engine that have such a fix up today for versions 10.1 and onwards, but in a much limited scope.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family: verdana; font-size: 13px; "&gt;&lt;span style="color: black; "&gt;We do still maintain those rules for the 9.2 and 10.0 installations, and the fix ups are being distributed through security updates.&lt;br /&gt;&lt;/span&gt;&lt;span style="text-indent: -0.25in; color: black; "&gt;As the Malware Entrapment engine is so much more accurate the need to repair significantly decreased.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="text-indent: -0.25in; font-family: verdana; font-size: small; color: black; "&gt;The way the system scans IFRAMEs on a single page as a separate component and blocks them did not change.&lt;/span&gt;&lt;/p&gt;</description><pubDate>Wed, 20 Jun 2012 05:45:55 GMT</pubDate><dc:creator>Rudolf Kessler</dc:creator></item><item><title>How to allow iTunes radio stations streaming contents</title><link>https://support.levelblue.com/kb/Goto14593.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;SWG 10.x&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;iTunes radio stations do not function properly with default security policy. With few changes listed below you could allow these contents through SWG proxy.&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Procedure:&lt;/h2&gt;&lt;p&gt;First, it is possible that current security policy blocks initial requests for iTunes radio stations. All iTunes radio stations are being launched as PLS file, with further connection to a remote server. &lt;/p&gt;&lt;p&gt;This file extension is listed among M86 Recommended Forbidden File Extensions. &lt;/p&gt;&lt;p&gt;&lt;span class="Apple-tab-span" style="white-space: pre; "&gt;	&lt;/span&gt;&lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/SM/14593/pls.png" style="width: 498px; height: 324px; " /&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="line-height: 12px; font-size: 11px; "&gt;Review SWG web logs to validate if there are any blocks of Block Forbidden Extensions rule. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;If there are no blocks of this kind, continue with below article to modify the settings to allow iTunes radio station contents. &lt;br /&gt;If there are blocks of PLS file extension, make sure your security policy is set to allow PLS files.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;iTunes radio stations are streaming audio contents over the web, and it have to be allowed to stream contents in the same fashion that SWG allows video streaming.&lt;/p&gt;&lt;p&gt;Refer to the Allow Streaming rule in your security policy and make sure that Audio File True Content Type is checked as shown below:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div&gt;&lt;span class="Apple-tab-span" style="white-space: pre; "&gt;	&lt;/span&gt;&lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/SM/14593/audio_file.png" /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;It is also possible that some audio streaming would be using a custom Content-Type that would have to be allowed in a different way.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;1. First, find out what these Content-Types are. This could be found in a network capture collected when a proxy was requested to deliver these streams.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="line-height: 12px; font-size: 11px; "&gt;   &lt;/span&gt;&lt;span style="line-height: 12px; font-size: 11px; "&gt; &lt;/span&gt;Refer to Notes section below to find a KB on how to collect tcpdump network captures on a SWG device:&lt;/div&gt;&lt;div&gt;&lt;span style="line-height: 12px; font-size: 11px; "&gt;    &lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="line-height: 12px; font-size: 11px; "&gt;   &lt;/span&gt;&lt;span style="line-height: 12px; font-size: 11px; "&gt; &lt;/span&gt;Below example shows typical responses from the web server:&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-tab-span" style="white-space: pre; "&gt;	&lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/SM/14593/contents.png" style="width: 583px; height: 216px; " /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-tab-span" style="white-space: pre; "&gt;	&lt;/span&gt;Note that SWG identifies above Content-Types as Audio File True Content Types, here it is only being used for demonstration purposes.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;2. Navigate to the GUI section: Policy -&amp;gt; Condition Settings -&amp;gt; Header Fields, and create new Header Fields list, Audio Streaming, as shown below:&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-tab-span" style="white-space: pre; "&gt;	&lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/SM/14593/header_list.png" /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-tab-span" style="white-space: pre; "&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-tab-span" style="white-space: pre; "&gt;3&lt;/span&gt;. Edit this Header Fields list to include the following two entries for above Content-Types:&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-tab-span" style="white-space: pre; "&gt;	&lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/SM/14593/header_details.png" /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-tab-span" style="white-space: pre; "&gt;4&lt;/span&gt;. Navigate to the GUI section: Policy -&amp;gt; Security -&amp;gt; Advanced and review current security policy.&lt;/div&gt;&lt;div&gt;    &lt;/div&gt;&lt;div&gt;    Create new rule to Allow Streaming Contents based on Content-Types, and refer to the Header Fields list created in step 3:&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-tab-span" style="white-space: pre; "&gt;	&lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/SM/14593/content_type_rule.png" /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-tab-span" style="white-space: pre; "&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-tab-span" style="white-space: pre; "&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-tab-span" style="white-space: pre; "&gt;&lt;span class="Apple-tab-span" style="white-space: pre; "&gt;	&lt;/span&gt;J&lt;/span&gt;ust as with default Allow Streaming rule in M86 Security policies, make sure that this new rule is set with Advanced Action to Bypass Scanning and is located on top of the policy:&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-tab-span" style="white-space: pre; "&gt;	&lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/SM/14593/allow.png" /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-tab-span" style="white-space: pre; "&gt;	&lt;/span&gt;Save and commit the changes.&lt;/div&gt;&lt;h2&gt;&lt;/h2&gt;&lt;h2&gt;&lt;/h2&gt;&lt;h2&gt;Notes:&lt;/h2&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;KB - How to run tcpdump trace on SWG device - &lt;a href="https://support.levelblue.com/kb/KnowledgebaseArticle14333.aspx" class="ApplyClass"&gt;https://support.levelblue.com/kb/KnowledgebaseArticle14333.aspx&lt;/a&gt;&lt;/p&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;</description><pubDate>Thu, 24 May 2012 01:42:48 GMT</pubDate><dc:creator>Rudolf Kessler</dc:creator></item><item><title>How to block Remote Access clients</title><link>https://support.levelblue.com/kb/Goto14502.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;SWG 9.x &lt;/li&gt;    &lt;li&gt;SWG 10.0 &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;I want to block remote access clients, like TeamviewerQS (Quick Support), but the URL Category "Remote Access" is not available with all URL Cat filters. Remote support web sites should not be blocked in general. &lt;/li&gt;    &lt;li&gt;It is not practical to block these requests based on destination URLs or IP addresses. &lt;/li&gt;    &lt;li&gt;These clients often use tunneled connections (such as TCP 443) which cannot be blocked in general. &lt;/li&gt;    &lt;li&gt;HTTP methods (e.g. CONNECT) are not available as conditions in SWG versions below 10.1. &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Procedure:&lt;/h2&gt;&lt;p&gt;Remote access clients often don't use a browser, but do use HTTP as a protocol. To block or control these connections, it is necessary to identify a specific criterion based on the content of the connection.&lt;/p&gt;&lt;p style="line-height: 12px; font-size: 11px; "&gt;&lt;strong&gt;Example:&lt;/strong&gt; TeamviewerQS&lt;/p&gt;&lt;h3&gt;Step 1: Trace a successful connection &lt;/h3&gt;&lt;p&gt;&lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/14502/14502_01_connect_ok.png" /&gt;&lt;/p&gt;&lt;p&gt;Identify a unique feature of the connection. In this case you can use the User Agent string: "User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; &lt;strong&gt;DynGate&lt;/strong&gt;)".&lt;/p&gt;&lt;h3&gt;Step 2: Create a Condition and a rule to block&lt;/h3&gt;&lt;ul&gt;    &lt;li&gt;In the SWG interface, navigate to Policies &amp;gt; Condition Settings &amp;gt; Header Fields, and add a new component, e.g. "Blocked User Agents": &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/14502/14502_02_header_field.png" /&gt;&lt;/p&gt;&lt;ul&gt;    &lt;li&gt;Create a Blocking Rule using this condition: &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/14502/14502_03_block_rule.png" /&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;h3&gt;Step 3: Test the connection request&lt;/h3&gt;&lt;p&gt;The requests should now fail, and the reason can be seen by tracing the network stream:&lt;/p&gt;&lt;p&gt;&lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/14502/14502_04_no_connection.png" /&gt;&lt;/p&gt;&lt;div style="width: 740px; overflow-x: hidden; overflow-y: hidden; "&gt;&lt;p&gt;&lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/14502/14502_05_trace_1.png" /&gt;&lt;/p&gt;&lt;/div&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt;&lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/14502/14502_06_trace_2.png" /&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;h2&gt;Notes:&lt;/h2&gt;&lt;p&gt;This procedure can be used to block many proprietary clients in a flexible and granular way. It is not limited to Remote Access clients.&lt;/p&gt;</description><pubDate>Mon, 14 May 2012 02:03:57 GMT</pubDate><dc:creator>Rudolf Kessler</dc:creator></item><item><title>What is the policy assignment order?</title><link>https://support.levelblue.com/kb/Goto13373.aspx</link><description>&lt;div class="atb62"&gt;&lt;li&gt;&lt;strong&gt;Question&lt;/strong&gt;&lt;br /&gt;What is the policy assignment order for a User Group/User in Trustwave Secure Web Gateway appliance? &lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="atb63"&gt;&lt;li&gt;&lt;strong&gt;Answer&lt;/strong&gt;&lt;br /&gt;&lt;p&gt;The policy assignment in Trustwave Secure Web Gateway appliance is as follows:&lt;/p&gt;&lt;/li&gt;&lt;/div&gt;&lt;ol&gt;    &lt;li&gt;The Local Users are being evaluated according to their respective username IP address. Please note that the Local Users are referred to as Independent Users in version 9.x/10.x. &lt;/li&gt;    &lt;li&gt;The Local Groups are being evaluated according to their set IP range. &lt;/li&gt;    &lt;li&gt;The imported LDAP users, which are associated with their relevant LDAP groups are then evaluated. &lt;/li&gt;    &lt;li&gt;The Unknown LDAP Users is then used, which may result due to unknown user which was imported to the SWG appliance as part of the LDAP objects, but is currently not associated with an LDAP group. &lt;/li&gt;    &lt;li&gt;Lastly, if all the above are not relevant, the Unknown Users group is then used, which means users that are completely unrecognized by the system. &lt;/li&gt;&lt;/ol&gt;&lt;br /&gt;&lt;div class="atb64"&gt;&lt;li&gt;&lt;strong&gt;Software Version&lt;/strong&gt;&lt;br /&gt;9.x.x&lt;br /&gt;10.x &lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;dl style="margin-top: 10px; "&gt;    &lt;dt&gt;&lt;em&gt;This article applies to:&lt;/em&gt; &lt;/dt&gt;    &lt;dd&gt;&lt;em&gt;SWG 3000&lt;/em&gt; &lt;/dd&gt;    &lt;dd&gt;&lt;em&gt;SWG 5000&lt;/em&gt; &lt;/dd&gt;    &lt;dd&gt;&lt;em&gt;SWG 7000&lt;br /&gt;    &lt;/em&gt;&lt;em&gt;    &lt;/em&gt;&lt;/dd&gt;    &lt;dt&gt;&lt;em&gt;&lt;em&gt;This article was previously published as:&lt;/em&gt; &lt;/em&gt;&lt;/dt&gt;    &lt;em&gt;    &lt;dd&gt;&lt;em&gt;Finjan KB 1521&lt;/em&gt; &lt;/dd&gt;    &lt;/em&gt;&lt;/dl&gt;</description><pubDate>Fri, 27 Apr 2012 00:41:00 GMT</pubDate><dc:creator>Rudolf Kessler</dc:creator></item><item><title>PDF files blocked due to "Container violation : Invalid format"</title><link>https://support.levelblue.com/kb/Goto14470.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;SWG 10.1.2&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Symptoms:&lt;/h2&gt;Some PDF files are being blocked with the following error: &lt;strong&gt;Container violation: Invalid format&lt;/strong&gt;&lt;h2&gt;Causes:&lt;/h2&gt;The PDF file is being blocked by the Rule "Block Illegitimate Archives (Including Password-Protected Archives)"&lt;h2&gt;Resolution:&lt;/h2&gt;Add a "True Content Type" Condition to the "Block Illegitimate Archives (Including Password-Protected Archives)" Rule, negate it by selecting the "Everything except for the items selected below" Applies To radio button, select "PDF File" as file type, and then Commit the change.&lt;p&gt;&lt;/p&gt;&lt;p style="text-align: left; "&gt;&lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/14470/image1a.png" /&gt;&lt;/p&gt;</description><pubDate>Mon, 27 Feb 2012 05:21:46 GMT</pubDate><dc:creator>Rudolf Kessler</dc:creator></item><item><title>Allow Content and Scan Containers Explanation</title><link>https://support.levelblue.com/kb/Goto14058.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;SWG Versions 8.5.0,9.0, 9.2.0, 9.2.5, and 10.0 &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;What is meant by the Advanced Action "Allow content and Scan containers" when used in conjunction with “Allow” when creating a new rule in a policy? &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Information:&lt;/h2&gt;&lt;p&gt;When creating a rule in any policy there is the ability to "Allow" but this can have different methods attached it using “Advanced Action”. One method specifically is "Allow Content and Scan Containers". &lt;/p&gt;&lt;p&gt;The first part to clarify is that a "Container" in SWG jargon stands for a Super-set of compressed archives such as ZIP, RAR, TAR, CAB, BZIP2, GZIP and others which are not archives specifically such as MIME containers (used in email format and used for HTML forms files. As well as 'whole page save' when using IE - using .MHT as the file to save to) or CHM container (compressed HTML help files, used by MS products).&lt;/p&gt;&lt;p&gt;What happens when using the "Allow content and Scan containers" Advanced Action:&lt;/p&gt;&lt;p&gt;When content reaches a rule using the "Action" "Allow content and Scan Containers" it will stop the Policy evaluation on this rule (meaning no more rules will be used to evaluate that page after the current rule), but if the content is a container the system will extract all the items held in the container. The scanner will then evaluate every file in the container using the Policy that has been assigned to that user until the evaluation is complete.&lt;/p&gt;&lt;p&gt;Where the content is not an archive or container (as would be the case with most web content) the action is simply equivalent to “Allow” without any further scanning.&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</description><pubDate>Fri, 17 Feb 2012 06:02:56 GMT</pubDate><dc:creator>Rudolf Kessler</dc:creator></item><item><title>Skype Blocking - 9.0 Technical Brief</title><link>https://support.levelblue.com/kb/Goto13514.aspx</link><description>&lt;iframe width="670" height="800" src="https://support.levelblue.com/kb/attachments/1740.pdf"&gt;&lt;/iframe&gt;&lt;dl style="margin-top: 10px;"&gt;    &lt;dt&gt;&lt;em&gt;This article applies to:&lt;/em&gt;&lt;/dt&gt;    &lt;dd&gt;&lt;em&gt;NG 1000&lt;/em&gt;&lt;/dd&gt;    &lt;dd&gt;&lt;em&gt;NG 5000&lt;/em&gt;&lt;/dd&gt;    &lt;dd&gt;&lt;em&gt;NG 6000&lt;/em&gt;&lt;/dd&gt;    &lt;dd&gt;&lt;em&gt;NG 8000&lt;/em&gt;&lt;/dd&gt;    &lt;em&gt;    &lt;/em&gt;&lt;/dl&gt;    &lt;em&gt;    &lt;dl style="margin-top: 10px;"&gt;        &lt;dt&gt;&lt;em&gt;This article was previously published as:&lt;/em&gt;        &lt;/dt&gt;        &lt;dd&gt;&lt;em&gt;Finjan KB 1740&lt;/em&gt;        &lt;/dd&gt;    &lt;/dl&gt;    &lt;/em&gt;</description><pubDate>Tue, 19 Jul 2011 05:52:19 GMT</pubDate><dc:creator>Rudolf Kessler</dc:creator></item><item><title>How do I prevent my URL blacklist from being bypassed by browsing to the site IP address</title><link>https://support.levelblue.com/kb/Goto14252.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;&lt;span style="font-size: 10px;"&gt;SWG 10.0 and above&lt;/span&gt; &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;&lt;span style="font-size: 10px;"&gt;When we block a site (e.g. &lt;/span&gt;&lt;a href="http://www.acme.com/"&gt;&lt;span style="font-size: 10px;"&gt;www.acme.com&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 10px;"&gt;) the user can browse to the site IP (e.g. 1.1.1.1) and bypass our custom defined block list, how do I prevent this ?&lt;/span&gt; &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Procedure:&lt;/h2&gt;&lt;ol&gt;    &lt;li&gt;&lt;span style="font-size: 10px;"&gt;Make sure you have SWG 10.0 or above&lt;/span&gt; &lt;/li&gt;    &lt;li&gt;    &lt;p style="margin: 0cm 0cm 0pt;"&gt;&lt;span style="font-size: 10px;"&gt;The Device IP Advanced tab allows administrators to enable the Reverse DNS lookup option, to determine the domain name that is associated with&lt;/span&gt;&lt;/p&gt;    &lt;p style="margin: 0cm 0cm 0pt;"&gt;&lt;span style="font-size: 10px;"&gt;a given IP address (using DNS).&lt;/span&gt;&lt;/p&gt;    &lt;/li&gt;    &lt;li&gt;    &lt;p style="margin: 0cm 0cm 0pt;"&gt;&lt;span style="font-size: 10px;"&gt;Click Edit and check the Enable Reverse DNS box.&lt;/span&gt;&lt;/p&gt;    &lt;/li&gt;    &lt;li&gt;    &lt;p style="margin: 0cm 0cm 0pt;"&gt;&lt;span style="font-size: 10px;"&gt;Click Save, then Commit changes.&lt;/span&gt;&lt;/p&gt;    &lt;/li&gt;&lt;/ol&gt;&lt;h2&gt;&lt;/h2&gt;</description><pubDate>Mon, 18 Jul 2011 08:48:33 GMT</pubDate><dc:creator>Rudolf Kessler</dc:creator></item><item><title>How to download files larger than 1 GB through the Finjan</title><link>https://support.levelblue.com/kb/Goto13556.aspx</link><description>&lt;div class="atb65"&gt;&lt;li&gt;&lt;b&gt;Description&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;There is a hard coded limitation of 1 GB filesize. &lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="atb66"&gt;&lt;li&gt;&lt;b&gt;Symptoms&lt;/b&gt;&lt;br /&gt;&lt;p&gt;If a file that is larger than 1 GB is requested by the client through the Finjan, the proxy will return an error:&lt;/p&gt;&lt;p&gt;Error Occurred &lt;br /&gt;      HTTP Error Status: 403 Forbidden&lt;br /&gt;      Error Reason: Response body too large Please contact your system administrator&lt;/p&gt;Without a reason being given in the web log. &lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="atb67"&gt;&lt;li&gt;&lt;b&gt;Cause&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;The largest file-size that is limited to traverse through the Finjan is 1 GB. This limit is hard coded and can not be increased through the GUI. &lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="atb68"&gt;&lt;li&gt;&lt;b&gt;Solution&lt;/b&gt;&lt;br /&gt;&lt;p&gt;In order to circumvent this issue, please follow the steps below:&lt;/p&gt;&lt;p&gt;1. Create a header fields list (please note the correct header name "Content-Length"):&lt;/p&gt;&lt;p&gt;&lt;img alt="" style="border-bottom: 0px solid; border-left: 0px solid; border-top: 0px solid; border-right: 0px solid;" src="https://support.levelblue.com/kb/attachments/images/938~1782_1.jpg" /&gt;&lt;/p&gt;&lt;p&gt;Define a header value of ~ 1 GB (in Bytes, e.g. "1048576000"):&lt;br /&gt;&lt;br /&gt;&lt;img alt="" style="border-bottom: 0px solid; border-left: 0px solid; border-top: 0px solid; border-right: 0px solid;" src="https://support.levelblue.com/kb/attachments/images/1002~header_length_1GB.jpg" /&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt;2. Create a rule using the header list as a condition:&lt;/p&gt;&lt;p&gt;&lt;img alt="" style="border-bottom: 0px solid; border-left: 0px solid; border-top: 0px solid; border-right: 0px solid;" src="https://support.levelblue.com/kb/attachments/images/940~1782_3.jpg" /&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt;&lt;img alt="" style="border-bottom: 0px solid; border-left: 0px solid; border-top: 0px solid; border-right: 0px solid;" src="https://support.levelblue.com/kb/attachments/images/941~1782_4.jpg" /&gt;&lt;/p&gt;NOTE: This will not work if the server does not reply with correct headers, such as in the example below:&lt;br /&gt;&lt;img alt="" style="border-bottom: 0px solid; border-left: 0px solid; border-top: 0px solid; border-right: 0px solid;" src="https://support.levelblue.com/kb/attachments/images/942~kb.jpg" /&gt; &lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="atb69"&gt;&lt;li&gt;&lt;b&gt;Software Version&lt;/b&gt;&lt;br /&gt;9.0 &lt;br /&gt;9.2 &lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;dl style="margin-top: 10px;"&gt;    &lt;dt&gt;&lt;i&gt;This article applies to:&lt;/i&gt; &lt;/dt&gt;    &lt;dd&gt;&lt;i&gt;NG 1000&lt;/i&gt; &lt;/dd&gt;    &lt;dd&gt;&lt;i&gt;NG 5000&lt;/i&gt; &lt;/dd&gt;    &lt;dd&gt;&lt;i&gt;NG 6000&lt;/i&gt; &lt;/dd&gt;    &lt;dd&gt;&lt;i&gt;NG 8000    &lt;dl style="margin-top: 10px;"&gt;        &lt;dt&gt;&lt;i&gt;This article was previously published as:&lt;/i&gt; &lt;/dt&gt;        &lt;dd&gt;&lt;i&gt;Finjan KB 1815&lt;/i&gt; &lt;/dd&gt;    &lt;/dl&gt;    &lt;/i&gt;&lt;/dd&gt;&lt;/dl&gt;</description><pubDate>Tue, 25 Jan 2011 07:41:54 GMT</pubDate><dc:creator>Rudolf Kessler</dc:creator></item><item><title>Blocking Insecure Library Loading with SWG</title><link>https://support.levelblue.com/kb/Goto13963.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;Secure Web Gateway 9.x &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;Does Trustwave SWG protect against the insecure library loading vulnerability?    &lt;ul&gt;        &lt;li&gt;&lt;a href="http://www.microsoft.com/technet/security/advisory/2269637.mspx" class="ApplyClass"&gt;SA 2269637&lt;/a&gt; &lt;/li&gt;    &lt;/ul&gt;    &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Answer:&lt;/h2&gt;&lt;p&gt;The vulnerability described in Microsoft Security Advisory 2269637, involves using a legitimate application to preload malicious library files from remote sources, including SMB shares and WebDAV.  For example, an audio/video player application might be tricked into loading malware that poses as a codec DLL.  This technique is sometimes called “DLL hijacking”.&lt;br /&gt;&lt;br /&gt;Although SMB falls outside of the scope of secure web gateway solutions, SWG appliances can prevent client applications from using WebDAV to retrieve malicious libraries from the Internet.  By default, SWG appliances include a rule named &lt;strong&gt;Block Binary Objects without a Digital Certificate&lt;/strong&gt;.  Since malware authors do not sign their code, this rule by itself blocks exploits based on this vulnerability.&lt;br /&gt;&lt;br /&gt;In some environments, it is preferable to permit downloading of unsigned binaries, so the &lt;strong&gt;Block Binary Objects without a Digital Certificate&lt;/strong&gt; rule is sometimes disabled or placed in X-Ray mode.  In this situation, it is still possible to define a policy that prevents attempts to exploit this vulnerability via WebDAV.  Doing so involves preventing WebDAV downloads of .dll and .ocx files.  The procedure for creating the appropriate lists and rule is detailed below.&lt;/p&gt;&lt;ol&gt;    &lt;li&gt;Log in to the SWG web interface.&lt;br /&gt;      &lt;/li&gt;    &lt;li&gt;Navigate to &lt;strong&gt;Policies&lt;/strong&gt; -&amp;gt; &lt;strong&gt;Condition Settings&lt;/strong&gt; -&amp;gt; &lt;strong&gt;File Extensions&lt;/strong&gt;.&lt;br /&gt;      &lt;/li&gt;    &lt;li&gt;Right-click the &lt;strong&gt;File Extensions&lt;/strong&gt; folder and select &lt;strong&gt;Add Component&lt;/strong&gt;.&lt;br /&gt;      &lt;/li&gt;    &lt;li&gt;Define a name for the new list.&lt;br /&gt;      &lt;/li&gt;    &lt;li&gt;Click the green &lt;strong&gt;+&lt;/strong&gt; to add an entry.  The value for the entry should be: &lt;em&gt;dll&lt;br /&gt;     &lt;/em&gt; &lt;/li&gt;    &lt;li&gt;Click the green &lt;strong&gt;+&lt;/strong&gt; to add an entry.  The value for the entry should be: &lt;em&gt;ocx&lt;br /&gt;     &lt;/em&gt; &lt;/li&gt;    &lt;li&gt;Click the &lt;strong&gt;Save&lt;/strong&gt; button.  The screenshot below illustrates the new entry.&lt;br /&gt;    &lt;br /&gt;    &lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/13963-FileExt.png" /&gt;&lt;br /&gt;      &lt;/li&gt;    &lt;li&gt;Navigate to &lt;strong&gt;Policies&lt;/strong&gt; -&amp;gt; &lt;strong&gt;Condition Settings&lt;/strong&gt; -&amp;gt; &lt;strong&gt;Header Fields&lt;/strong&gt;.&lt;br /&gt;      &lt;/li&gt;    &lt;li&gt;Right-click the &lt;strong&gt;Header Fields&lt;/strong&gt; folder and select &lt;strong&gt;Add Component&lt;/strong&gt;.&lt;br /&gt;      &lt;/li&gt;    &lt;li&gt;Define a name for the new list, and click the green &lt;strong&gt;+&lt;/strong&gt; to add an entry.  The values for the entry should be:&lt;br /&gt;    &lt;strong&gt;Header Name:&lt;/strong&gt; User-Agent&lt;br /&gt;    &lt;strong&gt;Condition: Regular&lt;/strong&gt; Expression&lt;br /&gt;    &lt;strong&gt;Header Value:&lt;/strong&gt; .*Microsoft-WebDAV.*&lt;br /&gt;      &lt;/li&gt;    &lt;li&gt;Click the &lt;strong&gt;Save&lt;/strong&gt; button.  The screenshot below illustrates the new entry.&lt;br /&gt;     &lt;br /&gt;    &lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/13963-HeaderFields.png" /&gt;&lt;br /&gt;      &lt;/li&gt;    &lt;li&gt;Navigate to &lt;strong&gt;Polices&lt;/strong&gt; -&amp;gt; &lt;strong&gt;Security&lt;/strong&gt; -&amp;gt; &lt;strong&gt;Advanced&lt;/strong&gt; and expand the tree so that the rules under the active security policy are visible.&lt;br /&gt;      &lt;/li&gt;    &lt;li&gt;Right-click the rule above which the new rule will be inserted.  For policies based on the Finjan Medium Security Policy, the new rule will typically be inserted above &lt;strong&gt;Allow Whitelisted ActiveX, Java Applets and Executables&lt;/strong&gt;.&lt;br /&gt;      &lt;/li&gt;    &lt;li&gt;Choose the &lt;strong&gt;Insert New Rule&lt;/strong&gt; option.&lt;br /&gt;      &lt;/li&gt;    &lt;li&gt;Define a name for the rule, make sure that the Action is set to &lt;strong&gt;Block&lt;/strong&gt; and an appropriate End-User message is selected.&lt;br /&gt;      &lt;/li&gt;    &lt;li&gt;Click &lt;strong&gt;Save.&lt;br /&gt;     &lt;/strong&gt; &lt;/li&gt;    &lt;li&gt;Right-click the new rule and click &lt;strong&gt;Add Condition&lt;/strong&gt;.&lt;br /&gt;      &lt;/li&gt;    &lt;li&gt;In the Condition Name picklist, select &lt;strong&gt;File Extensions&lt;/strong&gt;.  Select the checkbox for the new File Extensions list that you created, and click &lt;strong&gt;Save&lt;/strong&gt;.&lt;br /&gt;      &lt;/li&gt;    &lt;li&gt;Right-click the new rule and click &lt;strong&gt;Add Condition&lt;/strong&gt; again.&lt;br /&gt;      &lt;/li&gt;    &lt;li&gt;In the Condition Name picklist, select &lt;strong&gt;Header Fields&lt;/strong&gt;.  Select the checkbox for the new Header Fields list that you created, and click &lt;strong&gt;Save&lt;/strong&gt;.&lt;br /&gt;      &lt;/li&gt;    &lt;li&gt;If you click on the new rule name in the left pane, it should appear similar to the screenshot below.  If this is the case, please commit the changes.&lt;br /&gt;     &lt;br /&gt;    &lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/13963-WebDAV-DLL-Rule.png" /&gt;&lt;br /&gt;      &lt;/li&gt;&lt;/ol&gt;&lt;h2&gt;Notes:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;If more than one policy is in use, it will be necessary to repeat Steps 13 – 20 for each policy that should include this rule.  Please commit when all of the modifications are finished.&lt;br /&gt;      &lt;/li&gt;    &lt;li&gt;Some sites might have legitimate reasons for accessing DLL and OCX files via WebDAV.  Exceptions can be implemented on a case-by-case basis by using other policy elements, such as URL Lists. &lt;/li&gt;&lt;/ul&gt;</description><pubDate>Thu, 23 Sep 2010 16:22:19 GMT</pubDate><dc:creator>Eric Hanson</dc:creator></item><item><title>SWG continues to block applet after white listing</title><link>https://support.levelblue.com/kb/Goto13871.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;SWG - all versions &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Description:&lt;/h2&gt;&lt;p&gt;Secure Web Gateway (SWG) appliances are designed to scan inbound/outbound traffic and to take specific actions (allow or block) on various contents as prescribed by the security policy.&lt;br /&gt;&lt;br /&gt;Several conditions may be used in the policy rule to trigger the action. Exceptions for general blocking rules may also be created in order to allow specific content.&lt;br /&gt;&lt;br /&gt;The most simple and common way to create an exception is to use a URL White List, where a list of domains is maintained by the administrator.&lt;br /&gt;&lt;br /&gt;Once content has been blocked, other actions that do not directly involve the SWG system might be required in order to allow the content to load normally on client machines.&lt;/p&gt;&lt;h2&gt;Symptoms:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;Users continue to see block messages from SWG after content has been white listed. &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;This can occur even if the white list additions have completely finished committing all all devices.   This is typically the result of additional components involved in the regular traffic flow:&lt;/p&gt;&lt;blockquote dir="ltr" style="margin-right: 0px;"&gt;&lt;p&gt;Browser -&amp;gt; Proxy -&amp;gt; Server -&amp;gt; Proxy -&amp;gt; Browser&lt;/p&gt;&lt;/blockquote&gt;&lt;h2&gt;Causes:&lt;/h2&gt;&lt;p&gt;Web content that executes in a client machine's Java Runtime Environment (JRE) adds another layer to the well-known traffic flow that was mentioned above:&lt;/p&gt;&lt;p&gt;Browser -&amp;gt; Java VM -&amp;gt; Proxy -&amp;gt; Server ….&lt;br /&gt;&lt;br /&gt;As a result, a request made from the client machine may sometimes use the Java Virtual Machine to fetch the content from the web.&lt;/p&gt;&lt;p&gt;The Java Virtual Machine maintains its own cache system that is designed to enhance and to optimize web requests by serving previously stored applets from local resources, similar to a browser's cache. Therefore, a change made on the proxy layer might not be apparent at the client until the Java VM's cache is cleared. &lt;/p&gt;&lt;h2&gt;Resolution:&lt;/h2&gt;&lt;p&gt;To review the Java VM's caching options, open the Java item in the Control Panel.  The exact options and window design vary depending on the JRE version(s) installed on the client machine.&lt;/p&gt;&lt;p&gt;&lt;img alt="" style="border: 0px solid;" src="https://support.levelblue.com/kb/Attachments/51168dc7-cd4a-4558-b85d-da6a.png" /&gt;&lt;/p&gt;&lt;p&gt;Click the &lt;strong&gt;View&lt;/strong&gt; button to view cached objects. It is possible to delete individual objects instead of clearing all cached content by right clicking an applet, as shown below:&lt;/p&gt;&lt;p&gt;&lt;img alt="" style="border: 0px solid;" src="https://support.levelblue.com/kb/Attachments/a75470f6-041b-4fd8-9007-8bd9.png" /&gt; &lt;/p&gt;&lt;p&gt;To clear the whole cache or disable Java caching altogether, click the &lt;strong&gt;Settings&lt;/strong&gt; button on the main Java Control Panel window and perform the appropriate task below:&lt;/p&gt;&lt;ul&gt;    &lt;li&gt;To remove all cached applets completely, click the &lt;strong&gt;Delete Files…&lt;/strong&gt; button. &lt;/li&gt;    &lt;li&gt;If there is no need to cache Java applets on this client machine – uncheck the &lt;strong&gt;Keep temporary files on my computer&lt;/strong&gt; option. &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;img alt="" style="border: 0px solid;" src="https://support.levelblue.com/kb/Attachments/11882042-0817-4b3d-9540-adac.png" /&gt;&lt;/p&gt;</description><pubDate>Tue, 14 Sep 2010 17:39:32 GMT</pubDate><dc:creator>Eric Hanson</dc:creator></item><item><title>Allowing logins to Yahoo Mail via SWG</title><link>https://support.levelblue.com/kb/Goto13855.aspx</link><description>&lt;P&gt;&lt;STRONG&gt;Description:&lt;/STRONG&gt;&lt;BR&gt;In some environments, it is necessary to reconfigure the Secure Web Gateway (SWG) Download Status Page so that users can access Yahoo Mail.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Symptoms:&lt;/STRONG&gt;&lt;BR&gt;When a user tries to access Yahoo Mail while proxying through a SWG appliance, the following text could appear in the user’s browser:&lt;/P&gt;&lt;BLOCKQUOTE dir=ltr style="MARGIN-RIGHT: 0px"&gt;&lt;P&gt;&lt;EM&gt;Ooops. Yahoo! Mail can't load.&lt;BR&gt;Loading Yahoo! Mail failed due to a client side error.&lt;/EM&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;When the administrator reviews the Web Logs on the appliance, they will not see any blocks that are related to the Yahoo Mail session.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Cause:&lt;/STRONG&gt;&lt;BR&gt;These symptoms occur when a script that is downloaded from the Yahoo Mail site is not received by the browser.  Yahoo Mail uses a JavaScript file that is over 800 KB in size, which is atypically large for a web-based script.  In order to inform users that a file is downloading and being scanned, SWG appliances usually send a Download Status Page to the browser when retrieving files that are over 512 KB in size.  In the case of Yahoo Mail, the browser displays an error because it is expecting to receive a script but it receives the HTML-based Download Status Page instead.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Solution:&lt;/STRONG&gt;&lt;BR&gt;There are two ways to address this without disabling any scanning functionality for the Yahoo Mail site.  Both involve adjusting the status page’s configuration.  Either option is sufficient by itself.  There is no need to do both, although it is certainly possible to do both.&lt;/P&gt;&lt;P&gt;&lt;U&gt;Option 1&lt;BR&gt;&lt;/U&gt;Increase the status page’s “Size Threshold for Immediate Activation”.  Below are the locations that this setting can be found in different VSOS versions.&lt;/P&gt;&lt;P&gt;VSOS 8.x setting location: &lt;STRONG&gt;Settings&lt;/STRONG&gt; -&amp;gt; &lt;STRONG&gt;Miscellaneous&lt;/STRONG&gt; -&amp;gt; &lt;STRONG&gt;Status Page&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;VSOS 9.x setting location: &lt;STRONG&gt;Administration&lt;/STRONG&gt; -&amp;gt; &lt;STRONG&gt;System Settings&lt;/STRONG&gt; -&amp;gt; &lt;STRONG&gt;Scanning Options&lt;/STRONG&gt; -&amp;gt; &lt;STRONG&gt;General Settings&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Note - In order for this change to be effective the threshold must be increased beyond the size of the script file.  For example, 1024 KB has tested successfully with Yahoo Mail.  This will disable the status page for all downloads under 1 MB.  With most high speed Internet connections, this should be fine.  This might only cause some consternation amongst users if they are downloading a file that is almost 1 MB from a very slow site.  In any case, there is a second status page configuration option that activates the status page if a download takes over 5 seconds, so users will not have to wait long for a response.&lt;/P&gt;&lt;P&gt;&lt;U&gt;Option 2&lt;/U&gt;&lt;BR&gt;Disable the status page for JavaScript files.&lt;/P&gt;&lt;P&gt;VSOS 8.x configuration: Append “, x-javascript” (without the quotes) to the contents of the “Don't Activate if Content Type includes following Substrings” field at &lt;STRONG&gt;Settings&lt;/STRONG&gt; -&amp;gt; &lt;STRONG&gt;Miscellaneous&lt;/STRONG&gt; -&amp;gt; &lt;STRONG&gt;Status Page&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;VSOS 9.x configuration:   Navigate to &lt;STRONG&gt;Administration&lt;/STRONG&gt; -&amp;gt; &lt;STRONG&gt;System Settings&lt;/STRONG&gt; -&amp;gt; &lt;STRONG&gt;Scanning Options&lt;/STRONG&gt; -&amp;gt; &lt;STRONG&gt;Activate&lt;/STRONG&gt;, click &lt;STRONG&gt;Edit&lt;/STRONG&gt;, click the green &lt;STRONG&gt;+&lt;/STRONG&gt; in the Unless box, choose “Mime Type Contains”, and enter “x-javascript” (without the quotes).&lt;/P&gt;&lt;P&gt;Notes - When the status page is disabled for JavaScript downloads, a user who tries to manually download a large, individual JavaScript file (instead of the browser retrieving it as part of a web page) may experience a delay if they are communicating with a slow server.  However, it is very unusual for a user to download individual JavaScript files manually.&lt;/P&gt;&lt;P&gt;Please be sure to Apply/Save and Commit any changes before retesting access to Yahoo Mail.  Please wait for the commit to finish completely.  It is also important to close any open browser windows and clear the browser’s cache.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Software Versions:&lt;/STRONG&gt;&lt;BR&gt;8.x&lt;BR&gt;9.x&lt;/P&gt;</description><pubDate>Fri, 18 Jun 2010 16:40:00 GMT</pubDate><dc:creator>Eric Hanson</dc:creator></item><item><title>Streaming MP4 files via SWG</title><link>https://support.levelblue.com/kb/Goto13831.aspx</link><description>&lt;P&gt;&lt;STRONG&gt;Description:&lt;/STRONG&gt;&lt;BR&gt;In order to play certain videos, MP4 files must be allowed to stream through Secure Web Gateway (SWG) appliances running system version 9.2 and below.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Symptoms:&lt;/STRONG&gt;&lt;BR&gt;When trying to play a video, the content will not load.  The video player might indicate that it is still trying to load the video, or it could display an error.  The logs on the SWG appliance will not indicate that any content was blocked.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Cause:&lt;/STRONG&gt;&lt;BR&gt;Symptoms like those described above are usually the result of the video being in a format that doesn’t stream by default on the SWG system.  In particular, MP4 files are becoming more common, and YouTube has started using this file format for their high definition videos.  Although SWG system version 9.2.5 streams MP4 files by default, earlier versions do not do this.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Solution:&lt;/STRONG&gt;&lt;BR&gt;In order to allow content to stream to the client, that content must bypass SWG appliance’s scanning mechanisms.  If the administrator only wants to allow the content from a particular site, this is typically accomplished by adding the video’s address to the Trusted Sites URL List.  Please note that the video might be hosted on a different site than the one that appears in the browser’s address bar while the video is playing.  If the administrator would prefer to allow all MP4 files from all web sites, this can be accomplished by following the steps below.&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;In the Vital Security web interface, navigate to &lt;STRONG&gt;Policies&lt;/STRONG&gt; -&amp;gt; &lt;STRONG&gt;Condition Settings&lt;/STRONG&gt; -&amp;gt; &lt;STRONG&gt;Header Fields&lt;/STRONG&gt;.&lt;BR&gt;&lt;/LI&gt;&lt;LI&gt;Right-click on the &lt;STRONG&gt;Header Fields&lt;/STRONG&gt; folder in the left pane and left-click on &lt;STRONG&gt;Add Component&lt;/STRONG&gt;.&lt;BR&gt;&lt;BR&gt;&lt;IMG hspace=0 src="https://support.levelblue.com/kb/Attachments/03a45b99-308b-43b0-9514-d507.png" border=0&gt;&lt;BR&gt;&lt;/LI&gt;&lt;LI&gt;In the &lt;STRONG&gt;Name&lt;/STRONG&gt; field, enter a name to describe this list.  Since the list will be used for MP4 files, a simple name like “MP4 Files” is recommended.&lt;BR&gt;&lt;/LI&gt;&lt;LI&gt;Click the green &lt;STRONG&gt;+&lt;/STRONG&gt; icon to add an entry to the list.  Define the entry as indicated below (please match the capitalization exactly):&lt;BR&gt;&lt;BR&gt;&lt;STRONG&gt;Header Name:&lt;/STRONG&gt; Content-Type&lt;BR&gt;&lt;STRONG&gt;Condition:&lt;/STRONG&gt; Equal&lt;BR&gt;&lt;STRONG&gt;Header Value:&lt;/STRONG&gt; video/mp4&lt;BR&gt;&lt;BR&gt;&lt;IMG hspace=0 src="https://support.levelblue.com/kb/Attachments/7c2b559b-09c3-4e37-9aed-952c.png" border=0&gt;&lt;BR&gt;&lt;/LI&gt;&lt;LI&gt;Click the &lt;STRONG&gt;Save&lt;/STRONG&gt; button.&lt;BR&gt;&lt;/LI&gt;&lt;LI&gt;Navigate to the security policy (&lt;STRONG&gt;Policies&lt;/STRONG&gt; -&amp;gt; &lt;STRONG&gt;Security&lt;/STRONG&gt; -&amp;gt; &lt;STRONG&gt;Advanced&lt;/STRONG&gt;) that will be configured to allow MP4 files.  Please note that this must be a custom security policy, since the built-in security policies are not editable.  It is possible to duplicate a built-in security policy and use it as the basis for a custom security policy by right-clicking the policy to be duplicated and choosing the &lt;STRONG&gt;Duplicate Policy&lt;/STRONG&gt; option.&lt;BR&gt;&lt;/LI&gt;&lt;LI&gt;Right-click the &lt;STRONG&gt;Allow Streaming&lt;/STRONG&gt; rule and choose the &lt;STRONG&gt;Insert New Rule&lt;/STRONG&gt; option.&lt;BR&gt;&lt;BR&gt;&lt;IMG hspace=0 src="https://support.levelblue.com/kb/Attachments/cd357923-deec-473d-a3c5-feef.png" border=0&gt;&lt;BR&gt;&lt;/LI&gt;&lt;LI&gt;Define a name for the rule in the &lt;STRONG&gt;Rule Name&lt;/STRONG&gt; field.  An example rule name would be “Allow MP4 Files”.&lt;BR&gt;&lt;/LI&gt;&lt;LI&gt;Select "Allow" in the &lt;STRONG&gt;Action&lt;/STRONG&gt; field and select "Bypass scanning" in the &lt;STRONG&gt;Advanced Action&lt;/STRONG&gt; field.&lt;BR&gt;&lt;/LI&gt;&lt;LI&gt;Click the &lt;STRONG&gt;Save&lt;/STRONG&gt; button.&lt;BR&gt;&lt;/LI&gt;&lt;LI&gt;Right-click the new rule and select the &lt;STRONG&gt;Add Condition&lt;/STRONG&gt; option.&lt;BR&gt;&lt;BR&gt;&lt;IMG hspace=0 src="https://support.levelblue.com/kb/Attachments/0d193ce0-27a8-4b22-a2d0-8d6b.png" border=0&gt;&lt;BR&gt;&lt;/LI&gt;&lt;LI&gt;In the &lt;STRONG&gt;Condition Name&lt;/STRONG&gt; field, select &lt;STRONG&gt;Header Fields&lt;/STRONG&gt;&lt;BR&gt;&lt;/LI&gt;&lt;LI&gt;In the list of checkboxes, select the new header fields list that was created in &lt;EM&gt;Step 3&lt;/EM&gt; above.&lt;BR&gt;&lt;/LI&gt;&lt;LI&gt;Click the &lt;STRONG&gt;Save&lt;/STRONG&gt; button.&lt;BR&gt;&lt;/LI&gt;&lt;LI&gt;Right-click the new rule and select the &lt;STRONG&gt;Add Condition&lt;/STRONG&gt; option.&lt;BR&gt;&lt;/LI&gt;&lt;LI&gt;In the &lt;STRONG&gt;Condition Name&lt;/STRONG&gt; field, select &lt;STRONG&gt;True Content Type&lt;/STRONG&gt;.&lt;BR&gt;&lt;/LI&gt;&lt;LI&gt;In the list of checkboxes, select &lt;STRONG&gt;Video Image&lt;/STRONG&gt;.&lt;BR&gt;&lt;/LI&gt;&lt;LI&gt;Click the &lt;STRONG&gt;Save&lt;/STRONG&gt; button.&lt;BR&gt;&lt;/LI&gt;&lt;LI&gt;If this policy is already assigned to users, commit the change.  Otherwise, it might be necessary to assign the policy to users before committing.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;STRONG&gt;Software Versions:&lt;/STRONG&gt;&lt;BR&gt;9.0&lt;BR&gt;9.2&lt;/P&gt;</description><pubDate>Mon, 14 Jun 2010 18:15:00 GMT</pubDate><dc:creator>Eric Hanson</dc:creator></item><item><title>Why a Security Policy Might Appear to Be Ineffective - Caching and Multiple Hosts - Internal</title><link>https://support.levelblue.com/kb/Goto13213.aspx</link><description>&lt;div class="atb17"&gt;&lt;li&gt;&lt;b&gt;Description&lt;/b&gt;&lt;br&gt;In some cases, the security policy on a Finjan system might appear to be ineffective.  This can be noticed after a recent policy change or after first deploying a Finjan solution.&lt;/div&gt;&lt;br&gt;&lt;div class="atb18"&gt;&lt;li&gt;&lt;b&gt;Symptoms&lt;/b&gt;&lt;br&gt;Common symptoms include:&lt;BR&gt;&lt;OL&gt;&lt;LI&gt;Content that should be blocked is downloadable by a browser.&lt;LI&gt;Images or text content might be missing from an allowed page.&lt;LI&gt;A script error might be indicated in the lower left corner of the browser on an allowed page. &lt;LI&gt;Some menus on an allowed page might not function.&lt;/LI&gt;&lt;/OL&gt;&lt;/div&gt;&lt;br&gt;&lt;div class="atb19"&gt;&lt;li&gt;&lt;b&gt;Cause&lt;/b&gt;&lt;br&gt;There are two common causes for this behavior:&lt;OL&gt;&lt;LI&gt;Caching&lt;LI&gt;Content received from multiple web hosts&lt;/LI&gt;&lt;/OL&gt;&lt;/div&gt;&lt;br&gt;&lt;div class="atb20"&gt;&lt;li&gt;&lt;b&gt;Solution&lt;/b&gt;&lt;br&gt;&lt;STRONG&gt;&lt;U&gt;Caching&lt;/U&gt; &lt;/STRONG&gt;- Caching is often the reason why a security policy change might appear to be ineffective.  &lt;BR&gt;For example, if the default policy blocks an applet, the substitute applet might be cached.&lt;BR&gt;If the administrator changes the policy to allow the applet, the user might continue to receive the cached substitute applet. Therefore, it appears as though the security policy change did not work.&lt;P&gt;Using logs, it is possible to determine if cached content is provided to the user.  &lt;BR&gt;If an object is served from a cache, there will be no record of the request in the logs.  &lt;BR&gt;In order to see all transactions, it may be necessary to temporarily change the logging settings.  &lt;BR&gt;Please note that increased logging can reduce performance, so it is important to change the logging settings back to their previous values when troubleshooting is complete. &lt;/P&gt;&lt;P&gt;The systems administrator should be aware of all caches that might prevent requests from reaching the scanner.  &lt;BR&gt;The administrator should also know how to manage these caches.  &lt;BR&gt;Common caches include:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;A network caching solution, such as ISA or Blue Coat, that is located between the Finjan system and the browsers.&lt;LI&gt;The browser's own cache - In order to completely clear this cache, it may be necessary to first exit all browser instances.&lt;LI&gt;The JVM's cache - Sun's Java Virtual Machine maintains its own applet cache that is separate from the browser's cache.  This cache can be managed by double-clicking the Java Plug-in icon in Windows' Control Panel and selecting the Cache tab.&lt;LI&gt;Vital Security NG's built-in Security Caching - To disable this, navigate in the Management Console to Settings -&amp;gt; Content Processors -&amp;gt; Security Caching and unselect the Enable Caching checkbox.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;When the Finjan system is implemented in proxy mode, one way to determine if a policy change took effect is to configure a browser to proxy directly through the Finjan proxy.  &lt;BR&gt;This will eliminate the possiblility of interference from any network caching solutions.  &lt;BR&gt;If a browser having a clear cache and configured to proxy directly to the Finjan system continues to receive the wrong policy, then the policy should be inspected once more.  &lt;BR&gt;In environments that utilize different user policies, please verify that the correct policy is assigned to the test browser.&lt;BR&gt;&lt;BR&gt;&lt;STRONG&gt;&lt;U&gt;Content received from Multiple Web Hosts&lt;/U&gt;&lt;/STRONG&gt;&lt;BR&gt;Even if the URL list entry matches the website shown in the browser's address bar, it is important to note that many web pages are built from content that comes from several websites.  &lt;BR&gt;For example, on a news site, the initial links on the page might come from one server, while the dynamic content (links to new articles) might come from a different server in a completely different domain.  &lt;BR&gt;Again, the logs should reveal which sites are involved in the transaction.  &lt;BR&gt;As with caching, it may be necessary to temporarily increase the logging level to track the transactions associated with the web page.  &lt;BR&gt;Once the all of the involved sites have been identified, the logs can be returned to their former settings and the policy can be modified appropriately to allow the desired page.&lt;BR&gt;&lt;BR&gt;&lt;STRONG&gt;VSOS&lt;BR&gt;&lt;/STRONG&gt;8.3.x&lt;BR&gt;8.4.x&lt;BR&gt;8.5.0&lt;/P&gt;&lt;/div&gt;&lt;br&gt;&lt;DL style="margin-top:10px;"&gt;&lt;DT&gt;&lt;i&gt;This article applies to:&lt;/i&gt;&lt;dd&gt;&lt;i&gt;NG 1000&lt;/i&gt;&lt;/dd&gt;&lt;dd&gt;&lt;i&gt;NG 5000&lt;/i&gt;&lt;/dd&gt;&lt;dd&gt;&lt;i&gt;NG 8000&lt;/dd&gt;&lt;/DL&gt;&lt;DL style="margin-top:10px;"&gt;&lt;DT&gt;&lt;i&gt;This article was previously published as:&lt;/i&gt;&lt;DD&gt;&lt;i&gt;Finjan KB 1299&lt;/i&gt;&lt;/DL&gt;</description><pubDate>Wed, 03 Feb 2010 06:10:00 GMT</pubDate><dc:creator>Peleg Samson</dc:creator></item><item><title>CVE vulnerability - general information</title><link>https://support.levelblue.com/kb/Goto13676.aspx</link><description>&lt;div class="atb62"&gt;&lt;li&gt;&lt;b&gt;Question&lt;/b&gt;&lt;br&gt;How can I determine if my Finjan solution provides protection against a specific vulnerability or attack?&lt;/div&gt;&lt;br&gt;&lt;div class="atb63"&gt;&lt;li&gt;&lt;b&gt;Answer&lt;/b&gt;&lt;br&gt;&lt;P&gt;Finjan Vital Security Web Appliances provide both reactive (signature-based) and proactive (behavior-based) protection though their Vulnerability Anti.dote™ and Application Level Behavior Blocking engines, respectively.  These security engines help to mitigate new exploits based on known vulnerabilities.  In many cases, they also stop new threats based on unknown vulnerabilities.&lt;BR&gt;&lt;BR&gt;From time to time vendors publish official statements, revealing details about new vulnerabilities or exposures that are related to their products.  For example, Microsoft typically releases security bulletins on the second Tuesday of every month.  The Common Vulnerabilities and Exposures (CVE) system provides a global, cross-vendor reference method for publicly known information security vulnerabilities and exposures.  Each vendor alert is typically related to one or more CVE numbers.  The CVE web page linked below inlcudes a search mechanism that can be used to look up vulnerabilities by CVE numbers or vendor identifiers.&lt;BR&gt;&lt;BR&gt;&lt;A href="http://cve.mitre.org/cve/cve.html"&gt;http://cve.mitre.org/cve/cve.html&lt;/A&gt;&lt;BR&gt;&lt;BR&gt;When researching a particular vulnerability, open a Finjan support case to receive information regarding the level of protection provided by a Finjan solution.  To identify the vulnerability under investigation, please provide its CVE number in the support case.  If there is any other information that could prove helpful, please provide it as well.  Such information can include:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;vendor identifiers&lt;/LI&gt;&lt;LI&gt;links to web pages that discuss the vulnerability&lt;/LI&gt;&lt;LI&gt;e-mails that discuss the vulnerability&lt;/LI&gt;&lt;/UL&gt;&lt;/div&gt;&lt;br&gt;&lt;div class="atb64"&gt;&lt;li&gt;&lt;b&gt;Software Version&lt;/b&gt;&lt;br&gt;all&lt;/div&gt;&lt;br&gt;&lt;DL style="margin-top:10px;"&gt;&lt;DT&gt;&lt;i&gt;This article was previously published as:&lt;/i&gt;&lt;DD&gt;&lt;i&gt;Finjan KB 12677&lt;/i&gt;&lt;/DL&gt;</description><pubDate>Thu, 24 Dec 2009 00:00:00 GMT</pubDate><dc:creator>support finjan</dc:creator></item></channel></rss>