How To

How To

Overview

This collection of How To articles provides a step-by-step guide to implement SafeSquid, and optimally use its various features.

Install SafeSquid Secure Web Gateway

You can setup your secure web gateway using different installation mechanisms based on your deployment plan.
SafeSquid Appliance Builder (SAB) is a security-enhanced Ubuntu Linux ISO, customised for SafeSquid installation on any physical or virtual hardware within 15 minutes. SAB automatically configures dependency libraries, services, custom partitioning. On booting from the SAB ISOUbuntu is automatically installedand SafeSquid SWG is downloaded and deployed with all necessary dependency libraries, and services.

SafeSquid On Cloud

With rise of distributed workforces, backchanneling all traffic to an on-premise solution is not efficient. To setup SafeSquid SWG on your preferred Cloud PaaS platform or your own private cloud infrastructure, use the SafeSquid cloud image or cloud-init script.

Install using SafeSquid TAR file

If you want to setup SafeSquid on already existing infrastructure or if you want to use other Operating System in Linux family other than Ubuntu, you can download the SafeSquid tarball and manually install it. You will need to partition the disks appropriately, fine-tune some of the features, and make some additional configurations to services used by SafeSquid, like Monit and BIND9.

Upgrade SafeSquid to a newer version

SafeSquid is regularly maintained, for bug fixes and enhancements. Upgrade to the latest stable version of SafeSquid to access the latest features, and the best user experience.

Access the SafeSquid User Interface

SafeSquid has an intrinsic Web-based UI, that will enable you to manage your instance, configure policies, fine-tune the features, and monitor your secure web gateway.  First, create a policy on the top to allow at-least one admin account to access the configuration portal to avoid lockout when configuring policies.

Setup SSL Inspection

For deep content inspection of encrypted HTTPS trafficenable HTTPS Inspection to safeguard from concealed threats.
On the Self-Service Portal, configure your Enterprise CA as the Root SSL certificate. If you do not have an Enterprise CA, generate SafeSquid’s Self Signed CertificateImport the Root SSL certificate into client browsers’ trusted authorities.

Bypass SSL Inspection

You may need to bypass SSL Inspection for websites that are not subject to decryption by proxy, like intranet websites. You may also choose to bypass inspection of requests with personal identification information.

Setup User Identities

SafeSquid has a dynamic user and group identity management system with configurable identification options.

Profile clients based on network identifiers

In shared workstationguest, and static IP networks, the access control policies are defined based on device-specific network signatures. Moreover, devices that do not support credential verification, like printers, and IoT devices, are identified based on IP address. It also enables you to secure varied network segments differently.

Integrate your enterprise directory service

For enterprises with centralized user management infrastructure, connect your LDAP-based directory services, like Microsoft® Windows Active Directory or OpenLDAP, with SafeSquid to authenticate users.
SafeSquid is also optimised to concurrently connect with multiple directory services. When credentials are entered, SafeSquid intelligently verifies the user from appropriate directory service , and efficiently caches user data.
FurthermoreSafeSquid can be configured for Kerberos-based authentication for Single Sign On (SSO).

Integrate with PAM service

For flexible and modular authentication, SafeSquid supports integration with all Linux-PAM authentication modules, including biometric, and custom authentication schemes.

Verify user credentials with in-built credential store

If you do not have an enterprise credential store, you can create users and passwords in SafeSquid.

Multi-Factor Authentication

For heightened security, combine network-based and credential-based authentication.

Create User Groups

For applying uniform security policies based on the specific roles, responsibilities, and risk profiles of different user sets, you can add user profiles to groups.
On integrating your enterprise directory service, SafeSquid automatically extracts group membership information.

Bypass Authentication for an application

Applications that do not support proxy authentication need to be bypassed to ensure no disruption for them while maintaining user authentication for other applications.

Categorise websites

To efficiently manage access to websites based on their content category, SafeSquid has a dynamic web categorisation engine. Real-time updates to SafeSquid’s web categorisation database ensures accurate classification of more than a million websites to over hundred categories. In addition to this, advanced heuristic algorithms categorize unknown websites in real-time, based on URL, content, functionality, target audience, thematic focus, and web traffic behavioural patterns.
Furthermore, custom categorisation empowers security administrators with the ability to manually classify websites into private categoriesWildcards can be used to categorise domain variants under the same category.

Control application behaviour

With SafeSquid, you can effectively control behaviour of every feature of every Web 2.0 applicationBy default, SafeSquid can identify every feature of over thousand applications, with a continuously updating database.
Furthermore, security administrators can define application signatures for custom-built enterprise software, and control their behaviour.

Enforce mandatory SafeSearch

Results from search engines may be harmful or explicit. To ensure inappropriate content is not served, search engines have optional SafeSearch filters.
With SafeSquid, you can forcefully apply SafeSearch filters across all major search engines, including Google searchYahoo search, and Bing Search.

Secure YouTube

With SafeSquid’s YouTube API Integration, you can enforcYouTube’s Restricted Mode, to mandatorily screen out potentially objectionable content.
Moreover, to prevent cyberslacking on YouTube, organisations can limit access to specific category of videos, or specific YouTube channels, or even specific videos.

Restrict Login

To prevent sophisticated phishing attacks, limit role-based login only to business-critical websites
Furthermore, SafeSquid can ensure logins only via corporate accounts, and block personal accounts to thwart attempts of leaking business sensitive data via personal account. 

Upload/Download restriction

You can impose role-based site-specific file size limits, and type restrictions on uploads and downloads, including overall volume quota management.

Read-only mode

To permit only viewing content on Web 2.0 applications without engaging in interactive featuresorganisations can implement "read-only" mode. This feature is particularly useful on social networking websites, like FaceBook, LinkedIn, Twitter, Reddit, etc.

Transparently redirect traffic

SafeSquid can seamlessly redirect the users to preferred or region-specific versions of websites.

Secure access to product interface

By provisioning a dedicated network channel for the product interface, you can isolate the policy configuration. Furthermore, you can restrict access of the interface to administrators only.

Block advertisements

Advertisements are annoying, intrusive, and distracting. Blocking banner Ads results in cleaner-looking web pages that load faster, and conserve bandwidth.

Control internet access based on time

SafeSquid offers customizable scheduling options for security policies, allowing temporal control over web trafficThus, you may allow access to specific websites based on the time of day, like social media during lunch hours.

Integrate with a DNS Blacklisting service (DNSBL)

DNS tunnelling attacks evade the legacy HTTP-based security solutions as the exploit is carried out via DNS queries, which is traditionally perceived as non-threatful. Integrating with a customisable DNSBL server enables your Security Operations Centre (SOC) to effectively block of domains at DNS level.

Filter IP based on geolocation

To defend against state-sponsored cyberattacks, and regional malware outbreaksSafeSquid’s Geo-IP can block traffic from specific geographical regions.

Enforce Content Security Policy (CSP)

By restricting the sources of executable scripts and resources, enforcing CSP at the secure web gateway mitigates the risk of Cross-Site Scripting (XSS) and other injection attacks.

Configure Antivirus Engines

To block virus uploads and downloads, SafeSquid offers diverse antivirus setups to ensure comprehensive protection against various threats. To defend against Zero-Day malwares, we recommend minimising the vulnerability window using a multi-layered antivirus scanning approach.

SqScan

SafeSquid’s integrated on-the-wire malware scanner employs advanced heuristic techniques to evaluate and sanitize all payloads, including those that are compressed or encrypted.

ClamAV

SafeSquid seamlessly integrates with the ClamAV engine for signature-based malware detection. Furthermore, it’s customisable configuration empowers security administrators to add PCRE keyword expressions sensitive to the organisation. Thus, enabling deep packet inspection for confidential information in archive files, emailsand Instant Messaging (IM) traffic.

Generic ICAP Threat Detection Interface

SafeSquid facilitates simultaneous connection with various ICAP-based threat detection services for broader security coverage. With its Intelligent Threat Quarantine Mechanism, SafeSquid automatically isolates content flagged by ICAP services.

Filter inappropriate content

SafeSquid’s Content Analyser has a keyword scoring system to thoroughly inspects all textual, and multimedia content in real-time to prevent the exposure to unsuitable materials such as pornography or violence. Furthermore, you can utilizes Perl Compatible Regular Expressions for sophisticated keyword detection in content filteringUser-adjustable settings allow fine-tuning the sensitivity of the content detection system. The image filtering AI systems updates in real-time for up-to-date and effective visual content analysis.

Protect user privacy

Websites generally use third-party cookies for tracking user activityBlocking third-party cookies is essential for user privacy and security. SafeSquid offers  you user-configurable option to limit the tracking data received by remote websites, bolstering user privacy.

Prioritise mission critical traffic

Mission-critical applications and services are vital for the business continuity. By prioritizing mission-critical traffic, the applications get the necessary bandwidth and low latency to perform optimally.

Segregate network channel for an application

Provisioning dedicated pathways for mission-critical applications reduces the risk of network congestion. Additionally, implementation of QoS policies ensures high-priority traffic gets the required resources and treatment.

Manage Bandwidth

In the event of a network disruption or disaster, managing bandwidth ensures that essential services and applications continue to operate, supporting business continuity and disaster recovery efforts.
To avoid degraded user experience due to network congestion, efficient allocation of network resources is essential. With SafeSquid, you can set boundaries on the size and volume of data transfers.

Multi-homing your network

Using multiple Internet Service Providers (ISPs) minimises the risk of downtime due to outage at internet provider. Splitting load between different ISPs allows you to manage bandwidth more effectively by leveraging the combined capacity of multiple ISPs.

Cluster your proxy servers

By linking multiple Proxy nodes in a load-balanced or failover cluster, you can enhance performance and reliability. SafeSquid supports both active-active and active-standby modes, catering to different operational requirements. Instances activated with the same key will have consistent policy replication, and private web category synchronisation

Caching Specific websites

Content Caching leads to faster load times and reduced bandwidth usage at the cost of increased management complexity and potential staleness of cached content. SafeSquid offers a neat, efficient, and manageable solution to only store content from frequently accessed websites.

Customise blocking templates

Organisations can customize blocking templates to conform to organizational branding and communication styles.

Recover from a disaster

With SafeSquid’s 365-days integrated cloud backup and disaster recovery, you can access the last saved configuration. 

Configure proxy operational mode

With a range of versatile Proxy Operational configuration settings, SafeSquid can cater to diverse network requirements.

Configure SafeSquid as Forward Proxy

As a forward proxy, SafeSquid acts as an intermediary for requests from the clients seeking resources from other servers, enabling organizations to protect internet users. Here, client applications are explicitly set to use a specified proxy server

Configure SafeSquid as Reverse Proxy

As a reverse proxy, SafeSquid sits between external clients and internal servers, intercepting requests from clients and forwarding them to the appropriate server, enabling organizations to protect web resources. 

Configure SafeSquid in a Proxy-Chain

You can choose to route traffic through multiple proxy servers before reaching the final destination. A multi-layered approach makes it harder for attackers to intercept or tamper with the traffic. 

Configure SafeSquid as Transparent Proxy

To facilitate proxy-unaware applications, seamlessly redirect traffic by configuring SafeSquid as a Transparent Proxy. As no configuration is required, deployment is quick and easy.

Leverage Proxy Auto-Configuration (PAC)

SafeSquid supports PAC files to enable automatic traffic distribution across proxy cluster.

Manage Disk Space

SafeSquid generates large log files and reports for traffic analysis. To ensure enough space is always available, managing disk space on a SafeSquid server is crucial.

Troubleshoot

To identify the root cause of usability issues and performance bottlenecksSafeSquid offers multiple levels of troubleshooting assistance.

Monitor SafeSquid health

SafeSquid Dashboard displays the status of each modular function, integration, and database, and enables administrators to analyse performance of your secure web gateway. 

Generate performance plots

To visualise performance metrics, administrators can also generate the performance plots.

Use the SWG troubleshooter

SafeSquid’s troubleshooting tool provides a web interface to assist you in identifying common problems in the accessing websites.

Configure logging

SafeSquid has customisable logging options for diverse usage analytics, debugging, and performance validation requirements. SafeSquid’s Open Format logs are human-readable, and structured for programmatic analysis using elementary tools. Logs are also streamed to the product interface for quick impact analysis of configuration changes. 

Analyse the SafeSquid Logs

SafeSquid application logs are stored in plain text form under the /var/log/safesquid directory. comprehensive set of logging modules offers advanced forensic capabilities for enhanced network security and usage analysis. 

Manage log storage

SafeSquid logs are automatically time-stamped, and latest log file is rotated. For reducing footprint, SafeSquid has configurable options for compressing log files, and scavenging old data.

Stream logs to Remote Collectors

SafeSquid also facilitates real-time transport of logs to remote aggregators and analytics facilities like SIEM.


    • Related Articles

    • Upgrade SafeSquid To A Newer Version

      Overview SafeSquid SWG upgrade is a newer version of the SafeSquid that offers a significant change or major improvement over your current version. Upgrade your SafeSquid to the latest version which may consists of bugfixes and enhancements. When you ...
    • YouTube API Integration With SafeSquid To Allow Specific YouTube Videos

      Overview YouTube is a video-sharing website which provides a wide variety of videos. YouTube video content categories organize channels and videos on YouTube website. YouTube has lots of videos for entertainment like comedy, music, movies, web ...
    • Restrict any desk

      Access the SafeSquid interface Go to configure page Go to Real time content security Configuration on anydesk Set proxy on anydesk application If authentication is enabled you have to specify Username and Password on any desk application. Anydesk ...
    • Provide Access To The Block Listed Website

      Overview When you are browsing through SafeSquid, one of the websites you are accessing is blocked due to configuration in SafeSquid. But you don't know why the website is blocked. Now you need to allow that website by changing the configuration in ...
    • Integrate AD or OpenLDAP with SafeSquid

      Overview Active directory information is used to authorize/authenticate the users and computers which are part of your network. Active directory objects are mainly a set of attributes like domain, Organization Unit (OU), user, group, subnet etc. In ...