RSS Feed
Knowledgebase : CYREN Web Security
APPLIES TO:  _Policy, Location, protection rule_ MODIFIED ON: 9-Oct-2016 DESCRIPTION: Predefined locations can be used in the protection rules [https://kb.cyren.com/index.php?/Knowledgebase/Article/View/45/0/how-to-create-and-update-a-protection-rul...
_Applies to: WebSecurity, ADSync, Support tools, User, Group_ _ Modified on: 26-June-2016_ DESCRIPTION: End Users and groups can be added to WebSecurity by synchronizing user data from the Active Directory using the Active Directory Synchronization Ag...
_Applies to: WebSecurity, ADSync, Support tools, IE, Sync Agent, Error, Installer file was probably renamed, please uninstall and install again with the original name._ Modified on: 26-June-2016 Description When downloading the Active Directory Agent...
_Applies to: ADSync, AD, Active Directory, Active Directory Synchronization Agent_ _Applies to CYREN WebSecurity version number: 3.0.3_ _Modified on: 17-May-2016 _ DESCRIPTION: When running the Active Directory Synchronization Agent on the Member S...
_Applies to: Active Directory Synchronization Agent, ADSync, log, synchronization_ Modified on: 10-July-2016 DESCRIPTION  The Active Directory Synchronization Agent, synchronize users and groups data from the Active Directory every 10 minutes by def...
_Applies to: Company logo, icon, favicon, AUP, blocked page, login page, branding_ _Modified on: 5-June-2016._ DESCRIPTION: This article describes the steps for customizing the company logo and/or icon (favicon) for the WebSecurity end-user landing ...
_Applies to: Proxy, bypass, PAC file, website, URL, IP, range, hostname, filter, handshaken, WebSocket_ _Modified on: 17-May-2016 _ DESCRIPTION: When browsing certain websites (chat sites for example), the website does not load with connection error...
APPLIES TO: _Partner Portal, New Partner,Creating partner_ MODIFIED ON: Sep-28-2016 DESCRIPTION:  The following article describes how a new Partner account is created via the Web Security Partner Portal. RESOLUTION: * Login to the Web Security...
_APPLIES TO: Login Page , End-user landing page, AUP_ MODIFIED ON: Oct-26-2016 DESCRIPTION: The Acceptable Use Policy (AUP) is a standard legal statement detailing the conditions under which your organization allows its end-users to surf the Interne...
APPLIES TO:_ Email template, Welcome mail_ MODIFIED ON:_ 06/28/2016_ DESCRIPTION When onboarding end-users to the Web Security service, the administrator can choose if a Welcome Email will be sent to the end-users or not. The Welcome Email contains ...
_Applies to: Wireless Security, Mobile Security, Policies, Android devices._ _Modified on: 14-June-2016 _ DESCRIPTION: Mobile security for Android is delivered via an application that is downloaded from Google Play Store. Note - WebSecurity servic...
_Applies to: Chrome, Firefox, IE, Internet Explorer, cookies, end-user, login_ Modified date: 05/05/2016 DESCRIPTION: After login, end user keeps getting the WebSecurity login page when opening new tabs in the browser. POSSIBLE REASON: WebSecuri...
_Applies to:__ Google Safe Search, Android, iOS, mobile, WebSecurity,_ SAFE SEARCH NOT WORKING ON MOBILE DEVICES ISSUE: When Using Google or Yahoo Search engines, the SafeSearch option is not being forced when behind the CYREN Mobile App. I've checked...
_APPLIES TO: Policies, Restrictions, protection rules, Managing Time Sets, Time set_ MODIFIED ON: June-2-2016 DESCRIPTION: Time Sets enable you to apply time-based policies to users/groups/locations. By default, the Web Security service includes one...
APPLIES TO: Allow, Deny, Block, Website, URL MODIFIED ON: 06/06/2016 DESCRIPTION: In cases where you wish to apply actions to a specific URL, for example, you may want to add your corporate URL to the Allow List; or, perhaps you are aware of a websi...
_APPLIES TO__: Advertisements & Pop-ups, block, allow, policy, policy sets, category, super-category_ _MODIFIED ON__: 09-June-2016_ _DESCRIPTION__ :_ _Advertisements & Pop-ups include s_ites that provide advertising graphics or other ad content file...
_Applies to: Proxy, bypass, skip, PAC file, website, URL, IP, range, hostname, filter_ _Applies to CYREN WebSecurity version number: 3.0.3_ _Modified on: 17-May-2016 _ DESCRIPTION: The PAC file, a Proxy Auto Configuration file, defines how web bro...
_Applies to: Chrome, Firefox, IE, Internet Explorer, cookies, _ Modified date: 11/05/2016 DESCRIPTION: Follow the below guidelines, for the supported browsers, to verify that cookies are enabled. INTERNET EXPLORER (IE) - BLOCK OR ALLOW COOKIES BAS...
Applies to: _website, URL, Proxy, Browsing, video, YouTube, Restricted mode,_ Modified on: June-5-2016 DESCRIPTION: When you try to watch a video with YouTube [http://www.youtube.com], you may get the following alert: "_This video is unavailable w...
_Applies to: WebSecurity, ADSync, Support tools, Windows tools, event log, event viewer, system logs._ Modified on: 26-June-2016 Description The Windows event logs record the events on the computer. These logs can assist in troubleshooting system iss...
_Applies to:Web security,Policy sets, security, Custom Category, Add Category_ _Modified on: Sept-29-2016_ DESCRIPTION:  This article describes the process of adding a new custom category for the CYREN WebSecurity service. Custom categories allow yo...
_Applies to: Web security, Policy set, policies, _ _Modified on: 06-June-2016_ DESCRIPTION:  Policy Sets define the URL categories and the corresponding action - allow/block access when users browse the internet. The WebSecurity service starts with ...
_Applies to: HTTPS, SSL_ Applies to CYREN WebSecurity version number: 3.1 _Modified on: 12-Oct-2016_ DESCRIPTION: The goal of the Protection tab is to enable you to create one or more protection rules that are applied in a hierarchical order to cre...
_Applies to: Block page, website, URL, miscategorization, end user pages_ Modified date: 03/05/2016 DESCRIPTION When a user browse to a website that is set to be blocked in the CYREN WebSecurity customer policy, the user will be redirected to the Bl...
_Applies to: Wireless Security, Mobile Security, Policies, iOS, Android_ _Modified on: 30-Sep-2016 _ DESCRIPTION A key value-added element of the Web Security service is the ability to protect end-users while they are surfing on mobile devices (spec...
_Applies to: ADSync, AD, Active Directory, Active Directory Synchronization Agent_ _Applies to CYREN WebSecurity version number: 3.0.3_ _Modified on: 17-May-2016 _ DESCRIPTION: The WebSecurity Active Directory Synchronization Agent (ADSync) allows...
_APPLIES TO: Configure, Active Directory, ADSync, Synchronizing User accounts_ _APPLIES TO : ADSync Agent Version number: 2.0.8.00_ _MODIFIED ON: Oct-06-2016_ DESCRIPTION:  The Active Directory Synchronization Agent should be used when the end-use...
_Applies to: ADSync, AD, Active Directory, Active Directory Synchronization Agent, Task scheduler_ _Modified on: 14-June-2016_ DESCRIPTION: The WebSecurity Active Directory Synchronization Agent (ADSync) allows you to automatically synchronize the i...
_APPLIES TO: Agent less, Location, IP address Based Protection, Authentication, Location based authentication,_ _MODIFIED ON: Oct-06-2016_ DESCRIPTION:  For implementations that require no software (WebSecurity Agent) to be installed on the end user...
_Applies to: File type Control, Media streaming, Policies, Restriction downloads, Bandwidth usage, File size control, application _ _Modified on: 18-May-2016 _ DESCRIPTION The File Type Control section of the Policies page enables you to block conte...
_APPLIES TO: Category, webpage, URL_ _APPLIES TO CYREN WEBSECURITY VERSION NUMBER: 3.0.3_ _MODIFIED ON: 06/07/2016_ DESCRIPTION:  Websites may be categorized under one or more categories, based on the site's characteristics. The CYREN WebSecurity ...
APPLIES TO: _Reports, Activity Log, _ MODIFIED ON: 24-July-2016 DESCRIPTION  The Reports [https://kb.cyren.com/staff/index.php?/Knowledgebase/Article/Edit/73] page can assist you in monitoring Web Security past performance, user browsing and activit...
_Applies to: adoption reports, Inactive mobile devices, Inactive users and devices adoption. _ _Modified on: 28-Sep-2016. _ _DESCRIPTION _ _The Reports [https://kb.cyren.com/staff/index.php?/Knowledgebase/Article/Edit/73] page can assist you in moni...
_APPLIES TO: Reports, top performers, Domains, Categories, Users, File types_ _MODIFIED ON: 29-Sep-2016._ DESCRIPTION  The Reports [https://kb.cyren.com/staff/index.php?/Knowledgebase/Article/Edit/73] page can assist you in monitoring Web Security p...
APPLIES TO:_ Reports, Trends, Users, Sites, Groups, Mobile_ MODIFIED ON:_ 30_-Sep-2016. DESCRIPTION  The Reports [https://kb.cyren.com/staff/index.php?/Knowledgebase/Article/Edit/73] page can assist you in monitoring Web Security past performance, u...
APPLIES TO: _Reports, Web Security, Botnets, Malware, Malicious Files and Compromised, Phishing & Fraud_ MODIFIED ON: Sep-28-2016. DESCRIPTION  The Reports [https://kb.cyren.com/staff/index.php?/Knowledgebase/Article/Edit/73] page can assist you in ...
APPLIES TO:_ Media streaming, Policies, downloads, Bandwidth usage, Audio, Video_ MODIFIED ON: 27-May-2016 DESCRIPTION  Playing Audios and Videos on sites that deliver streaming content, such as Internet radio, Internet TV, live or archived media do...
APPLIES TO:_ Contact Email, Support Contact_ MODIFIED ON:_ 06/28/2016_ DESCRIPTION Support contact email field enables you to specify a contact email address which will receive end user support requests. This address is included in the default messa...
_Applies to: PAC file, browser, proxy settings, Chrome, Edge, Firefox, _ Modified data: 05/05/2016 DESCRIPTION: The PAC file, a Proxy Auto Configuration file, defines how web browsers and other user agents can automatically choose the appropriate pro...