


Real time graphs show user activity but the optional Analyzer report module costs extra If you see any suspect activities or apps popping up you can create a rule to block, monitor or apply bandwidth restrictions. Rule creation can be streamlined by monitoring the App Flow graphs in the main dashboard. These can spot a huge range including Facebook likes, pokes and posts, Exchange address book requests and much more and block or log them. Likewise with email, you can create a policy to inspect message subjects, content and attachments and decides whether to permit or deny the transfer.įor even greater control there are advanced app controls which use signature IDs to identify specific activities. This inspects all uploads and downloads through a port zone looking for specific file types and blocks their transfer. You can, for example, create an Application Firewall policy for FTP transfers. App Rules are complex but a wizard helps create inspection policies for SMTP, POP3, FTP and HTTP. The Application Control provides precise management of activities such as web browsing, file transfers and messaging. There are plenty of categories to choose from for URL filtering which performs well For even more browsing control you can activate the Geo-IP filter which blocks access to web sites hosted in specific countries. Each policy can be customised with black and white lists, you can use schedules to determine when they are active and apply AUPs by redirecting users to a consent web page.

It provides over 60 URL categories and you can create multiple filtering policies and apply them to different port zones. CFS will be adequate for most businesses as we found very few dodgy web sites slipped past it during testing. Two options are provided for web content filtering as you can use the CFS (content filter service) included with the TotalSecure subscription or pay extra for the WebSense Enterprise hosted service. It uses a single, global configuration where you can activate scanning on HTTP, FTP, IMAP, POP3, SMTP, CIFS and TCP streams. Security policies can be applied using the appliance's port zone featureĪnti-virus scanning is applied at the gateway and can be enabled on selected zones.
