Enforced Client Policy and Reporting Server 2.3 Admin Guide
Enforced Client Policy and Reporting Server 2.3 Admin Guide
Legend
WARNING: A WARNING icon indicates a potential for property damage, personal injury, or death.
CAUTION: A CAUTION icon indicates potential damage to hardware or loss of data if instructions are not followed.
IMPORTANT, NOTE, TIP, MOBILE, or VIDEO: An information icon indicates supporting information.
System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Schedules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Adding a Schedule Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Editing a Schedule Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Deleting a Schedule Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Searching for Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Importing a Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Deleting a Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
LDAP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Schema . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Users & Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Google Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Users and Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
User Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
About the User Groups List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Searching for a User Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Synchronizing LDAP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Deleting User Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Importing User Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Importing User Groups from LDIF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Assigning Primary Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
About the Users List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Content Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Enforcement Setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Blocked Web Page Display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
CFS Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Custom List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Searching for Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Add/edit Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Enforcement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Client Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
About the Client Groups List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Searching Client Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Adding or Editing Client Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Deleting Client Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Searching for Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Deleting Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Moving Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Blocking Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Unblocking Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Categories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Sites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Initiators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Installation Errors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Content Filtering Client Errors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
SonicWall Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Document Contents
This document includes:
• This chapter, Overview, provides a general document overview and describes the conventions used
within this guide.
• Chapter 2, System, describes the System option, which includes viewing status, managing Schedule
Groups and managing certificates.
• Chapter 3, LDAP, describes how to access user and group data from the LDAP server.
• Chapter 4, Google Directory, describes how to access user and group data from Google Directory.
• Chapter 5, User Groups, describes how to utilize user groups that have already been established in LDAP
and Google Directory. You can then apply the same policies to everyone in a group. All the groups can be
viewed and managed from this option.
• Chapter 6, Users, describes how to view and manage users.
• Chapter 7, Content Filter, discusses how to set up and customize the content filtering for the Content
Filtering Client (CFC).
Guide Conventions
The following conventions used in this guide are as follows:
Text conventions
Convention Use
Bold Highlights dialog box, window, and screen names. Also highlights buttons. Also
used for file names and text or values you are being instructed to type into the
interface.
Italic Indicates the name of a technical manual. Also indicates emphasis on certain
words in a sentence. Sometimes indicates the first instance of a significant
term or concept.
Computer code Indicates sample code or text to be typed into data fields.
About EPRS
Content Filtering Client provides a single point from which to configure filtering policies and view reporting from
users systems that are running CFC. EPRS is comprised of:
• Web management interface and policy manager—a Web‐based interface that provides the system
administrator the ability to configure, create, and apply global policies and generate activity reports for
client systems.
• Policy Server—Supports policy functions including global management and user access credentials.
• Reporting Server—Provides summarization of raw data to be used in reports and supports the various
types of reports along with search and filtering functions.
Additional topics:
• How EPRS Works
• How to Access CFC
• Navigating the Interface
• Installing the Client on User Systems
When deployed in the Cloud, EPRS is a customized, stripped down version of SonicWall Global Management
System (GMS) providing just the client management function as a service. This means the server is optimized to
perform at higher loads and also designed to be scalable when additional servers need to be added as the
volume of clients requesting policies increases.
The Policy Manager is integrated with MySonicWall and the SonicWall License Manager. Data is saved in the
database and is used when a request for a policy is made to the Policy Server Web Services.
The far left pane displays the devices being managed. You can select a specific device to view or manage or you
can select the top node name, as in the figure above, to see information applicable to the global node.
NOTE: If you have only a single node or unit, the node pane is not displayed.
The Global View provides the Settings, Policies, and Client Groups pages, but does not provide the r Clients
pages since it pertains to a single SonicWall appliance.
Status
The global view (global node is selected) of the System > Status page is the default display when you first access
Content Filtering Client. To see the status of particular node, select the node from the left pane.
The System > Status page displays the status information for the node selected. The status information includes:
• General—Displays the serial number.
• Services—Displays the following information:
• License status (Current or Expired)
• Expiration date of the license
• Nodes or client machines currently in use with the CFC installed
• Total number of nodes licensed to install the Content Filtering Client
SonicWall EPRS 2.3 Adminstration Guide
9
System
• LDAP Settings—Displays LDAP Domain Alias
• LDAP Automatic Sync Status—Displays a message noting status and when LDAP was last synchronized.
• Google Directory Automatic Sync Status‐Displays a message noting status and when LDAP was last
synchronized.
You can also synchronize the license of the unit on this page by clicking Synchronize with MySonicWall.com.
Schedules
The System > Schedules page displays the default scheduled configured and available to use for policy
configuration. You configure and manage additional schedules from this page. If you expand a specific schedule
name, details of the schedule is displayed. If you expand the Name group, all the schedule names are expanded.
Topics:
• Adding a Schedule Group
• Editing a Schedule Group
• Deleting a Schedule Group
3 You can add a schedule by specifying the parameters and clicking Add. You can also delete a time period
in the list by selecting the existing schedule and clicking Delete, or clicking Delete All to delete all
schedules listed.
4 Click OK to save changes.
Certificates
The System > Certificates page allows administrators to perform a search for certificates. This page also allows
administrators to manage certificates and certificate requests.
Topics:
• Searching for Certificates
• Importing a Certificate
• Deleting a Certificate
To import a certificate:
1 On the System > Certificates page, click the Import link. The Import Certificate page displays.
Deleting a Certificate
To delete a certificate:
1 Navigate to the System > Certificate page.
2 Check the box next to the certificate you wish to delete.
3 Click the Delete Certificate(s) link. You can also click the Delete icon under the Configure column of the
group you wish to delete.
Settings
To configure the settings on the LDAP page:
1 On the Policies tab, navigate to Directory Services > LDAP. The LDAP page defaults to the Settings tab.
NOTE: Some operations, such as directory configuration or importing user groups, can take several
minutes, especially if running across multiple LDAP servers.
8 Check the Use TLS (SSL) box to enable the authentication of servers and clients and encryption of
messages on LDAP.
9 Click Update to save these settings.
Schema
To set up the LDAP schema:
1 On the Policies tab, navigate to Directory Services > LDAP.
2 Select the Schema tab.
NOTE: This attribute may be inefficient to the load performance of your LDAP server.
NOTE: This attribute may be inefficient to the load performance of your LDAP server
4 Select Read from Server to retrieve the LDAP schema from the LDAP server.
5 Choose to:
• Automatically update the schema configuration
• Export details of the schema
6 Click OK.
7 Click Update to save these settings.
Directory
Depending on the authentication method you specified on the Settings tab, you may have to enter additional
information on the Directory tab.
NOTE: Both Google Directory and LDAP server can be configured on the same firewall.
Topics:
• Settings
• Users and Groups
• Test
Settings
To configure the Google Directory:
1 On the Policies tab, navigate to Directory Services > Google Directory. The Google Directory page
defaults to the Settings tab.
Test
To test the Google Directory settings:
1 On the Policies tab, navigate to Directory Services > Google Directory.
Synchronizing LDAP
The User Groups page allows you to synchronize your LDAP and Google Directory to easily authenticate users.
Click the Synchronize link at the bottom of the page to efficiently synchronize the list of User Groups.
Synchronizing user groups:
• Replicates any membership changes for user groups listed in the User Groups Mirrored from LDAP and
Google Directory.
• Removes any deleted user groups from the list of User Groups Mirrored from LDAP/Google Directory.
• Removes client groups for the deleted user groups.
You will be asked to confirm your action because of the changes that could be made to your groups.
NOTE: You can delete multiple groups at a time. Check the boxes by the group names you want to
delete and click the Delete User Group(s) link at the bottom of the page.
3 Click on OK after being asked to confirm that you want to delete the group.
NOTE: If you delete a group that has clients that uses a policy defined for that group, you get
warning message showing the relationship between the user group to the client. Then you can take
corrective action based on the comments provided.
NOTE: If you have a long list of User Group/OU Names, you can use the Search function at the top
of the page to filter the list. Select the field to search on (name, type, location); choose the type of
search (equals, starts with, ends with, contains); input the search string and select Search.
You can also perform other functions from the Import page:
• To remove user groups from EPRS, select one or more groups by checking the box, then click the Remove
from List button.
• Click on Undo to undo any action.
NOTE: Inclusion of other LDAP attributes in the file may result in large file volume. The server may take a
considerable amount of time to process the large files
NOTE: If you need to edit the User Groups, you will need to upload a new LDIF file with the changes.
NOTE: If a user is not assigned to a Primary Group, EPRS assigns the user to the first Primary Group the
user is a part of.
2 Select a username from the list, then click the > button to add this user to the Users Having Selected
Group as Primary. This user will have the selected Primary Group as his/her primary group.
Select a username from the list, then click the < button to add this user to the Users Not Having Selected
Group as Primary. This user will not have the selected Primary Group as his/her primary group.
3 Click the OK button to finish and save changes.
NOTE: When assigning a user to a user group, you can approach from one of two perspectives. When
making the assignment from the User Group page, you can look at all the individuals that make up the
user group. You can then easily validate that all the users needed for that group are included and remove
any that should not be in there. When making the assignment from the Users page, you only see the group
that individual belongs to, and you can choose a different group, if appropriate.
To edit a user:
1 On the Policies tab, navigate to Directory Services > Users.
2 Click on the edit icon for the user you want to change.
3 Check the Block box to block this user from being filtered.
4 Select the Groups tab.
NOTE: You can delete multiple users at a time. Check the boxes by the user names you want to
delete and click the Delete User(s) link at the bottom of the page.
4 Select the Primary Group from the drop‐down list at the top of the window.
5 Click the OK button to finish and save changes.
Blocking/Unblocking Users
Blocking and unblocking provides a way of managing individual licenses. If, for example, someone changed
assignments and no longer needs a filtering license, you can opt to block that user’s use of the license, making it
available to someone else. A blocked license can be restored.
To block users:
1 On the Policies tab, navigate to Directory Services > Users.
2 Check the box for the user you want to block. You can select more than one user at a time.
3 Select the Block User(s) link. The system asks for verification that you want to block this user.
4 Click OK to confirm that you want to block this user.
To unblock users:
1 On the Policies tab, navigate to Directory Services > Users.
2 Check the box for the user you want to unblock. You can select more than one user at a time.
3 Select the Unblock User(s) link. The system asks for verification that you want to unblock this user.
4 Click OK to confirm that you want to unblock this user.
Importing Users
You can import users from your LDAP server or from the Google Directory.
To import users:
1 On the Policies tab, navigate to Directory Services > Users.
2 Click the Import Users link at the bottom of the page. A list of available users displays. The following
figure shows the view for Google Directory, but LDAP would be very similar.
NOTE: If there are no user groups found on the LDAP server or Google Directory, a list of possible reasons
displays. See the image below for an example.
NOTE: Including other LDAP attributes in the file may result in large file volume. The server may take a
considerable amount of time to process the large files
NOTE: If you need to edit the Users, you need to upload a new LDIF file with the changes.
Settings
To configure the Content Filter Settings, choose the global or firewall that you want to manage. (In this example
a firewall has been selected.) On the Policies tab, select Content Filter > Settings.
Topics:
• Enforcement Setting
• Blocked Web Page Display
• CFS Settings
NOTE: The firewall listed can be edited in this section too. Enter serial Number in the text field and
click on the Add icon. Click on the edit icon to update a serial number and save it. Click on the
delete icon to delete a firewall from the list.
3 Select Update to save the Enforcement Settings or Reset to reload the prior settings.
CFS Settings
These settings are used when on the user system is protected by the firewall and CFC is suspended.
Custom List
To configure the Content Filter Custom List, choose the global or node that you want to manage. (In this
example a node has been selected.) On the Policies tab, select Content Filter > Custom List.
From the Content Filter > Custom List page, you can manage:
• Allowed Domains—Allows user access to these domains with their Web browser.
• Select Add New Allowed Domain to add a domain to the allowed list. You can add multiple
domains at the same time; separate them with a semicolon (;).
• Select Import... to select a text file of allowed domain names. Each domain name should appear
on a separate line.
• Click on the delete icon next to the domain name to delete it from the allowed list. You can also
check the box next to one or more domain names and select Delete Allowed Domain(s).
Policies
The Content Filter > Polices page allows you to search for, add, and delete policies that block objectionable Web
sites. To configure the Content Filter > Policies, choose the global or node that you want to manage. (In this
example a node has been selected.) On the Policies tab, select Content Filter > Policies.
NOTE: A default policy is provided called Default. This policy can be viewed and cloned, but cannot be
deleted.
Topics:
• Searching for Policies
• Add/edit Policy
To add a policy:
1 On the Policies tab, navigate to Content Filter> Policies.
2 At the bottom of the Policies list, click the Add New Policy link at the bottom of the page. The policies set
up page displays.
3 On the Policy tab, enter the policy name in the Name field.
4 On the Categories tab, select the forbidden categories from the list provided. You can opt to select all
categories by checking the Select All Categories box at the top of the page.
6 The Custom List tab create a list of Allowed Domains, Forbidden Domains or Keyword.
In the Content field add the domain name you want to allow or forbid, or add the keyword and click Add.
You can also highlight or an entry in the list and choose Update to make changes or Remove to delete the
entry. Select Remove all to delete all entries in that section.
Override Settings
Allow client to override forbidden Check the box to enable this option.
websites
Override Password Enter a password that a user can enter to override
the forbidden website. If the password field is left
empty, the current password remains unchanged.
Use blank password Check the box to enable this option. A blank is
allowed for the Override Password field.
Override Duration Input the length of time, in minutes, that the
override is in effect.
Authorized Processes ‐ Process Name
Enter Process Name Type the process name in the text field and click on
the add icon.
Any process (a.k.a application) that is installed in a
non‐privileged folder(s) is blocked by the CF Client.
Only Users with admin privileges is allowed to install
in a privileged folder. If you want to allow any such
process that is installed in a non‐privileged location
then you have to specify the complete path (a path
that can be specified with wild cards) to the process
or the path to the folder that contains the process.
When the policy is updated on the CF Client it will
allow this process to run if it matches the path.
Authorized Processes ‐ Certificate Subject Name
Enter Subject Cert Name Type the subject certificate name in the text field
and click on the add icon.
This is the string that appears in the CN= portion of
a certificate’s subject field. The Certificate Subject
Name must be specified exactly how it appears in
the Name of the certificate.
NOTE: Note that when the global node is selected, the command options are Policies and Client Groups.
When an individual node or firewall is selected, the Client command option is also available.
Topics:
• Policies
• Client Groups
• Clients
Policies
Content Filtering Client includes a Default Desktop Policy and a Default Mobile Policy that you can access from
the Enforcement > Policies page. The Default Desktop and Default Mobile policies provide standard settings for
content filters. These policies are configured to be moderately strict and are suitable for use with most Content
Filtering Clients. They cannot be edited or deleted.
You can create a new policy or clone one from an existing policy, such as the Default Desktop Policy. Cloning the
Default Desktop Policy or an existing policy is recommended. Then edit specific fields within the cloned policy.
This is an effective way to create a new policy that is similar to an existing policy.
Note that the client does not assign a content filtering policy to the Default Desktop Policy. Content filtering
policies are assigned only to the Default Mobile Policy.
NOTE: When all settings are left as the default settings, all desktop devices acquire the policies as defined
in the Default Desktop Policy. Likewise, all mobile devices, such as a laptop, acquire the policies defined in
the Default Mobile Policy.
3 On the General tab, input or change the name of the Policy in the Name field.
4 Add descriptive information about the policy in the Comments field.
5 Under the Version Settings section, select the desired Version (specific release) from the drop‐down list.
This allows the policy to be configured for a specific version. You can select General Release, Early
Release, Alpha or Beta.
6 Select the Content Filter tab.
Client Groups
Administrators can configure client groups on the Enforcement > Client Groups page. You can edit existing client
groups or create new client groups. The Default Client Group can be edited, but cannot be deleted.
All clients requesting a policy for the first time are automatically added to the Default Client Group and are
served with the policy defined for this group. The administrator can move a client to a different client group
after the client is initially added to the Default Client Group.
NOTE: All desktop devices acquire the policies as defined in the Default Desktop Policy. All mobile devices,
such as a laptop, acquire the policies defined in the Default Mobile Policy. If you would like to modify the
service associated with the client defined default policy, you must clone the Default Desktop or Mobile
Policy, then add/remove the services that the default client groups contain.
The Enforcement > Client Groups page is available on the Policies tab.
NOTE: The Default Client Group and User Group‐based Client Groups cannot be deleted so they
have a grayed‐out icon Trash icon.
3 To specify what part of that field to match against, choose among the following operators:
• Equals – The entire field must match the text you provide.
• Starts with – The field must start with the text you provide.
• Ends with – The field must end with the text you provide.
• Contains – The field must contain the text you provide.
4 In the blank field, type in the text or value that you want to search for.
5 Click Search.
6 Click Clear to return the search fields to their default values and clear the text field
Moving Clients
Moving clients allows you to move a Client to a different Client Group. Moving clients is only supported for Host‐
based groups.
To move clients:
1 On the Policies tab, navigate to the Enforcement > Clients page.
2 Check the box next to the clients you want to move.
3 Click the Move Client(s) link at the bottom of the page.
4 When the pop‐up window displays asking you to select the destination client group, select the option
you want.
5 Select OK.
Unblocking Clients
Unblocking clients allows the client to receive content filter protection. Unblocking the client also allows access
to the Internet if it is a client behind a firewall enforcing client content filtering.
Categories
The categories report provides information the Categories, Match and Attempts.
Each report has several options for sharing or viewing the data. These options apply to all reports.
• In the upper right corner of the report, you can chose to export the report to a PDF or CVS file.
• The icons in the upper right corner of the shaded area allow you to change the view to chart only, data
only or combined chart and data.
• The icon with two curved arrows refreshes the data.
• To view a percentage amount, move the curser over a category item listed on the right or a section of the
pie chart.
Initiators
The initiators report provides information on the Initiator Host, User and Attempts.To view a percentage
amount, move the curser over a category item listed on the right or a section of the pie chart.
NOTE: To add a filter click on the + sign to view the drop down menu as shown in the figure below.
Topics:
• Installation Errors
• Content Filtering Client Errors
Installation Errors
Two specific errors may occur during installation of the Content Filtering Client:
1 An invalid serial number is entered.
2 The serial number entered is not licensed for the Content Filtering Client.
In both of these install errors, the installation fails and a notepad opens with log messages displays. You can save
this log file for diagnostic reference. You may need to use this log if you contact SonicWall Support.
The following message displays when the Content Filtering Client is blocked from use. Navigate to the Security
Services > Client CFS Enforcement page to unblock the client.
For more information and related documentation, see the SonicWall Support Site at
https://support.sonicwall.com/