Profiled Internet Access

Profiled Internet Access

Overview

In modern days the importance of security in organizations is vital and managing security products is become common practice. Everything will go well until and unless some engineer makes a mess of the setup. It will be a nightmare for systems administrators to fix it immediately. So, the need for simple and interactive configuration engaged security experts in designing amazing user interfaces for configuration.
SafeSquid's Profiles feature allows you to accommodate the demands of extremely granular rules for Internet Access privileges and restrictions. You will be able to deal with the most complex situation, as long as you can accurately define a situation, and properly Profile a situation.
Safesquid provides robust user interface for granular policy creation and management. Web GUI is one of the simplest UI and everything connected to it make users life easy.

Policy Management

SafeSquid manages policies using profiles to link each security policy with required attributes like time, user/group, category and actions required.
The Policies can be built to very precisely define situations, by subjecting them to a variety of conditional parameters. And then by applying the profile in to one or more rules in an appropriate filter, we can always define the restrictions or relaxations.
Yet manages critical setups separately.
Policy Management

Creating Access Profiles

Understanding the creation and application of "Profiles" is the most essential part of overall SafeSquid's filtering configuration. Understanding how the Profiles work, internally, could be quite useful. Each request is matched against the various rules in the Access Profiles Section. If all the specified conditional parameters (entries) of a rule match the request, then the list of Added Profiles are included in the Profiles List for that request. Similarly, if a rule in the Access Profiles Section has a list of Removed Profiles, then these Removed Profiles are deleted from the Profiles List. SafeSquid, thus builds an internal Profiles List for each connection. SafeSquid ensures that all Profile names are unique in the list.
Create your security policy using Time/ user/group / HTTP request/ HTTP response/ Application /Website categories and mention respective actions. 
Now name it. It’s a profile.
Binding Access Profiles 
Binding Access Profiles
Each of the filters, uniquely processes a connection, based on the conditional parameters specified as entries in the various rules in the filters. Almost all Filters have Profiles as a conditional parameter. Thus, by appropriately creating a profile and then, specifying them as a conditional parameter in any rule of any Filtering Section, you can either subject or immunize the connection from a Filtering Rule.
You have created your profiles; Now bind them for various filtering and scanning policies.
Simple right.
Binding Access Profiles 

See Also



    • Related Articles

    • Access Through SafeSquid

      Overview Some remote applications like Remote desktop application (Anydesk and TeamViewer), Download managers, etc. get automatically block if HTTPS inspection is enabled. You don't require any policy or configuration for blocking purpose. Access ...
    • Access Remote Desktop Applications Through SafeSquid

      Case 1: There is no direct Internet access to the client Machine A)HTTPS ENABLED Any desk : Any desk is not able to connect to the remote server through proxy Team viewer : Team viewer is not able to connect to the remote server through proxy ...
    • Provide Access To The Block Listed Website

      Overview When you are browsing through SafeSquid, one of the websites you are accessing is blocked due to configuration in SafeSquid. But you don't know why the website is blocked. Now you need to allow that website by changing the configuration in ...
    • Avoid Locking Yourself When You Are Configuring Policies In Access Restrictions

      Client Scenario When you are trying to create policies in the Access Restrictions section of SafeSquid you may get locked out yourself. The first rule that matches a user is applied. You need to create atleast one Admin account, or you might lock ...
    • Secure WIFI Access Through Active Directory Infrastructure And SafeSquid Captive Portal

      Business challenge Securing Unmonitored and Unsecured WIFI networks is a challenge that many organizations are looking forward to address. As increased demand for BYOD (bring your own device), WIFI is common and minimum facility required in every ...