INTRODUCTORY SECTION CHAPTER 2: LOGGING AND BLOCKING

P2P Blocking

Peer-to-Peer (P2P) involves communication between computing devices—desktops, servers, and other smart devices—that are linked directly to each other. Using this feature of the ProxyBlocker, groups and/or individual client machines can be set up to block the use of P2P services specified in the library category.

When the P2P module is loaded on the server, the Proxy- Blocker compares packets on the network with the P2P library stored on the ProxyBlocker server. If a match is found, the ProxyBlocker checks the user’s profile to see whether the user’s connection to the P2P service should be blocked, and then performs the appropriate action.

Setting up IM and P2P

IM and P2P are set up in the System and Library sections of the Administrator console.

1.In the System section, activate Pattern Blocking in the Filter window.

2.In the Library section, note the services set up to be blocked, as defined at: http://www.8e6.com/pbahelp/ files/1system_im_block.html.

NOTE: Please contact an 8e6 technical support representative or a solutions engineer if access is needed to one or more P2P services blocked by 8e6's supplied library category for P2P.

3.In the Manual Update to 8e6 Supplied Categories window (accessible via Library > Updates > Manual Update), IM pattern files can be updated on demand.

8E6 TECHNOLOGIES, PROXYBLOCKER USER GUIDE

27

Page 41
Image 41
8e6 Technologies ProxyBlocker manual Setting up IM and P2P, P2P Blocking