INTRODUCTORY SECTION CHAPTER 2: LOGGING AND BLOCKING
8E6 TECHNOLOGIES, PROXYBLOCKER USER GUIDE 27

P2P Blocking

Peer-to-Peer (P2P) involves communication between
computing devices—desktops, servers, and other smart
devices—that are linked directly to each other. Using this
feature of the ProxyBlocker, groups and/or individual client
machines can be set up to block the use of P2P services
specified in the library category.
When the P2P module is loaded on the server, the Proxy-
Blocker compares packets on the network with the P2P
library stored on the ProxyBlocker server. If a match is
found, the ProxyBlocker checks the user’s profile to see
whether the user’s connection to the P2P service should be
blocked, and then performs the appropriate action.

Setting up IM and P2P

IM and P2P are set up in the System and Library sections of
the Administrator console.
1. In the System section, activate Pattern Blocking in the
Filter window.
2. In the Library section, note the services set up to be
blocked, as defined at: http://www.8e6.com/pbahelp/
files/1system_im_block.html.
NOTE: Please contact an 8e6 technical support representative or
a solutions engineer if access is needed to one or more P2P
services blocked by 8e6's supplied library category for P2P.
3. In the Manual Update to 8e6 Supplied Categories
window (accessible via Library > Updates > Manual
Update), IM pattern files can be updated on demand.