McAfee MTP08EMB3RUA Product Guide - Page 126

Best practices (browser protection)

Page 126 highlights

6 Using Browser Protection and Web Filtering Best practices (browser protection) Best practices (browser protection) To develop an effective strategy for guarding against web-based threats, we recommend that you proactively track browsing activity on your network and configure policy options appropriate for your users. 1 Check your status emails or the SecurityCenter website for an overview of your account's status. Ensure that browser protection is installed and enabled on all computers. 2 Check the Web Filtering report regularly to see what sites users are visiting, their safety ratings, and their content categories. 3 Using the Web Filtering report: • Determine whether users are visiting sites that should be added to an Exceptions list. Authorize sites that are important to productivity to ensure that users can always access them. Prohibit sites that do not comply with company policy or contribute to job performance goals to ensure users cannot access them. • Note the number of visits to red, yellow, and unrated sites. If appropriate, configure policy options to block sites or site resources that have particular safety ratings. • Note the content categories for sites being visited. If appropriate, configure policy options to block sites containing particular types of content. • Note which computers are visiting which sites. If appropriate, configure different policies for computers that should and should not be able to access particular sites or content. 4 Customize a message to display on client computers that attempt to access a site you have blocked. 5 To ensure that all computers are protected against web-based threats, configure policy options to enable browser protection via policy and prevent users from disabling browser protection on their computers. 126 McAfee Total Protection Service 5.1.5 Product Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175

Best practices (browser protection)
To develop an effective strategy for guarding against web-based threats, we recommend that you
proactively track browsing activity on your network and configure policy options appropriate for your
users.
1
Check your status emails or the SecurityCenter website for an overview of your account’s status.
Ensure that browser protection is installed and enabled on all computers.
2
Check the Web Filtering report regularly to see what sites users are visiting, their safety ratings,
and their content categories.
3
Using the Web Filtering report:
Determine whether users are visiting sites that should be added to an Exceptions list. Authorize
sites that are important to productivity to ensure that users can always access them. Prohibit
sites that do not comply with company policy or contribute to job performance goals to ensure
users cannot access them.
Note the number of visits to red, yellow, and unrated sites. If appropriate, configure policy
options to block sites or site resources that have particular safety ratings.
Note the content categories for sites being visited. If appropriate, configure policy options to
block sites containing particular types of content.
Note which computers are visiting which sites. If appropriate, configure different policies for
computers that should and should not be able to access particular sites or content.
4
Customize a message to display on client computers that attempt to access a site you have blocked.
5
To ensure that all computers are protected against web-based threats, configure policy options to
enable browser protection via policy and prevent users from disabling browser protection on their
computers.
6
Using Browser Protection and Web Filtering
Best practices (browser protection)
126
McAfee Total Protection Service 5.1.5 Product Guide