APPLIES TO: _Policy, Location, protection rule_
MODIFIED ON: 9-Oct-2016
DESCRIPTION:
Predefined locations can be used in the protection rules
[https://kb.cyren.com/index.php?/Knowledgebase/Article/View/45/0/how-to-create-and-update-a-protection-rul...
_Applies to: WebSecurity, ADSync, Support tools, User, Group_
_ Modified on: 26-June-2016_
DESCRIPTION:
End Users and groups can be added to WebSecurity by synchronizing user
data from the Active Directory using the Active Directory
Synchronization Ag...
_Applies to: WebSecurity, ADSync, Support tools, IE, Sync Agent,
Error, Installer file was probably renamed, please uninstall and
install again with the original name._
Modified on: 26-June-2016
Description
When downloading the Active Directory Agent...
_Applies to: ADSync, AD, Active Directory, Active Directory
Synchronization Agent_
_Applies to CYREN WebSecurity version number: 3.0.3_
_Modified on: 17-May-2016 _
DESCRIPTION:
When running the Active Directory Synchronization Agent on the Member
S...
_Applies to: Active Directory Synchronization Agent, ADSync, log,
synchronization_
Modified on: 10-July-2016
DESCRIPTION
The Active Directory Synchronization Agent, synchronize users and
groups data from the Active Directory every 10 minutes by def...
_Applies to: Company logo, icon, favicon, AUP, blocked page, login
page, branding_
_Modified on: 5-June-2016._
DESCRIPTION:
This article describes the steps for customizing the company logo
and/or icon (favicon) for the WebSecurity end-user landing ...
_Applies to: Proxy, bypass, PAC file, website, URL, IP, range,
hostname, filter, handshaken, WebSocket_
_Modified on: 17-May-2016 _
DESCRIPTION:
When browsing certain websites (chat sites for example), the website
does not load with connection error...
APPLIES TO: _Partner Portal, New Partner,Creating partner_
MODIFIED ON: Sep-28-2016
DESCRIPTION:
The following article describes how a new Partner account is created
via the Web Security Partner Portal.
RESOLUTION:
* Login to the Web Security...
_APPLIES TO: Login Page , End-user landing page, AUP_
MODIFIED ON: Oct-26-2016
DESCRIPTION:
The Acceptable Use Policy (AUP) is a standard legal statement
detailing the conditions under which your organization allows its
end-users to surf the Interne...
APPLIES TO:_ Email template, Welcome mail_
MODIFIED ON:_ 06/28/2016_
DESCRIPTION
When onboarding end-users to the Web Security service, the
administrator can choose if a Welcome Email will be sent to the
end-users or not. The Welcome Email contains ...
_Applies to: Wireless Security, Mobile Security, Policies, Android
devices._
_Modified on: 14-June-2016 _
DESCRIPTION:
Mobile security for Android is delivered via an application that is
downloaded from Google Play Store.
Note - WebSecurity servic...
_Applies to: Chrome, Firefox, IE, Internet Explorer, cookies,
end-user, login_
Modified date: 05/05/2016
DESCRIPTION:
After login, end user keeps getting the WebSecurity login page when
opening new tabs in the browser.
POSSIBLE REASON:
WebSecuri...
_Applies to:__ Google Safe Search, Android, iOS, mobile, WebSecurity,_
SAFE SEARCH NOT WORKING ON MOBILE DEVICES
ISSUE:
When Using Google or Yahoo Search engines, the SafeSearch option is
not being forced when behind the CYREN Mobile App. I've checked...
_APPLIES TO: Policies, Restrictions, protection rules, Managing Time
Sets, Time set_
MODIFIED ON: June-2-2016
DESCRIPTION:
Time Sets enable you to apply time-based policies to
users/groups/locations. By default, the Web Security service includes
one...
APPLIES TO: Allow, Deny, Block, Website, URL
MODIFIED ON: 06/06/2016
DESCRIPTION:
In cases where you wish to apply actions to a specific URL, for
example, you may want to add your corporate URL to the Allow List; or,
perhaps you are aware of a websi...
_APPLIES TO__: Advertisements & Pop-ups, block, allow, policy, policy
sets, category, super-category_
_MODIFIED ON__: 09-June-2016_
_DESCRIPTION__ :_
_Advertisements & Pop-ups include s_ites that provide advertising
graphics or other ad content file...
_Applies to: Proxy, bypass, skip, PAC file, website, URL, IP, range,
hostname, filter_
_Applies to CYREN WebSecurity version number: 3.0.3_
_Modified on: 17-May-2016 _
DESCRIPTION:
The PAC file, a Proxy Auto Configuration file, defines how web
bro...
_Applies to: Chrome, Firefox, IE, Internet Explorer, cookies, _
Modified date: 11/05/2016
DESCRIPTION:
Follow the below guidelines, for the supported browsers, to verify
that cookies are enabled.
INTERNET EXPLORER (IE) - BLOCK OR ALLOW COOKIES BAS...
Applies to: _website, URL, Proxy, Browsing, video, YouTube, Restricted
mode,_
Modified on: June-5-2016
DESCRIPTION:
When you try to watch a video with YouTube [http://www.youtube.com],
you may get the following alert:
"_This video is unavailable w...
_Applies to: WebSecurity, ADSync, Support tools, Windows tools, event
log, event viewer, system logs._
Modified on: 26-June-2016
Description
The Windows event logs record the events on the computer. These logs
can assist in troubleshooting system iss...
_Applies to:Web security,Policy sets, security, Custom Category, Add
Category_
_Modified on: Sept-29-2016_
DESCRIPTION:
This article describes the process of adding a new custom category for
the CYREN WebSecurity service. Custom categories allow yo...
_Applies to: Web security, Policy set, policies, _
_Modified on: 06-June-2016_
DESCRIPTION:
Policy Sets define the URL categories and the corresponding action -
allow/block access when users browse the internet. The WebSecurity
service starts with ...
_Applies to: HTTPS, SSL_
Applies to CYREN WebSecurity version number: 3.1
_Modified on: 12-Oct-2016_
DESCRIPTION:
The goal of the Protection tab is to enable you to create one or more
protection rules that are applied in a hierarchical order to cre...
_Applies to: Block page, website, URL, miscategorization, end user
pages_
Modified date: 03/05/2016
DESCRIPTION
When a user browse to a website that is set to be blocked in the CYREN
WebSecurity customer policy, the user will be redirected to the Bl...
_Applies to: Wireless Security, Mobile Security, Policies, iOS,
Android_
_Modified on: 30-Sep-2016 _
DESCRIPTION
A key value-added element of the Web Security service is the ability
to protect end-users while they are surfing on mobile devices
(spec...
_Applies to: ADSync, AD, Active Directory, Active Directory
Synchronization Agent_
_Applies to CYREN WebSecurity version number: 3.0.3_
_Modified on: 17-May-2016 _
DESCRIPTION:
The WebSecurity Active Directory Synchronization Agent (ADSync) allows...
_APPLIES TO: Configure, Active Directory, ADSync, Synchronizing User
accounts_
_APPLIES TO : ADSync Agent Version number: 2.0.8.00_
_MODIFIED ON: Oct-06-2016_
DESCRIPTION:
The Active Directory Synchronization Agent should be used when the
end-use...
_Applies to: ADSync, AD, Active Directory, Active Directory
Synchronization Agent, Task scheduler_
_Modified on: 14-June-2016_
DESCRIPTION:
The WebSecurity Active Directory Synchronization Agent (ADSync) allows
you to automatically synchronize the i...
_APPLIES TO: Agent less, Location, IP address Based Protection,
Authentication, Location based authentication,_
_MODIFIED ON: Oct-06-2016_
DESCRIPTION:
For implementations that require no software (WebSecurity Agent) to be
installed on the end user...
_Applies to: File type Control, Media streaming, Policies, Restriction
downloads, Bandwidth usage, File size control, application _
_Modified on: 18-May-2016 _
DESCRIPTION
The File Type Control section of the Policies page enables you to
block conte...
_APPLIES TO: Category, webpage, URL_
_APPLIES TO CYREN WEBSECURITY VERSION NUMBER: 3.0.3_
_MODIFIED ON: 06/07/2016_
DESCRIPTION:
Websites may be categorized under one or more categories, based on the
site's characteristics. The CYREN WebSecurity ...
APPLIES TO: _Reports, Activity Log, _
MODIFIED ON: 24-July-2016
DESCRIPTION
The Reports
[https://kb.cyren.com/staff/index.php?/Knowledgebase/Article/Edit/73]
page can assist you in monitoring Web Security past performance, user
browsing and activit...
_Applies to: adoption reports, Inactive mobile devices, Inactive users
and devices adoption. _
_Modified on: 28-Sep-2016. _
_DESCRIPTION _
_The Reports
[https://kb.cyren.com/staff/index.php?/Knowledgebase/Article/Edit/73]
page can assist you in moni...
_APPLIES TO: Reports, top performers, Domains, Categories, Users,
File types_
_MODIFIED ON: 29-Sep-2016._
DESCRIPTION
The Reports
[https://kb.cyren.com/staff/index.php?/Knowledgebase/Article/Edit/73]
page can assist you in monitoring Web Security p...
APPLIES TO:_ Reports, Trends, Users, Sites, Groups, Mobile_
MODIFIED ON:_ 30_-Sep-2016.
DESCRIPTION
The Reports
[https://kb.cyren.com/staff/index.php?/Knowledgebase/Article/Edit/73]
page can assist you in monitoring Web Security past performance, u...
APPLIES TO: _Reports, Web Security, Botnets, Malware, Malicious Files
and Compromised, Phishing & Fraud_
MODIFIED ON: Sep-28-2016.
DESCRIPTION
The Reports
[https://kb.cyren.com/staff/index.php?/Knowledgebase/Article/Edit/73]
page can assist you in ...
APPLIES TO:_ Media streaming, Policies, downloads, Bandwidth usage,
Audio, Video_
MODIFIED ON: 27-May-2016
DESCRIPTION
Playing Audios and Videos on sites that deliver streaming content,
such as Internet radio, Internet TV, live or archived media do...
APPLIES TO:_ Contact Email, Support Contact_
MODIFIED ON:_ 06/28/2016_
DESCRIPTION
Support contact email field enables you to specify a contact email
address which will receive end user support requests. This address is
included in the default messa...
_Applies to: PAC file, browser, proxy settings, Chrome, Edge, Firefox,
_
Modified data: 05/05/2016
DESCRIPTION:
The PAC file, a Proxy Auto Configuration file, defines how web
browsers and other user agents can automatically choose the
appropriate pro...
Help Desk Software by Kayako