Cisco Cisco Web Security Appliance S670 Betriebsanweisung
1-5
Cisco IronPort AsyncOS 7.0 for Web User Guide
OL-23079-01
Chapter 1 Getting Started with the Web Security Appliance
What’s New in This Release
To enable SaaS Access Control, you must configure settings on both the Web
Security appliance and the SaaS application. It is very important that the settings
you configure on the appliance and SaaS application match each other
appropriately.
Security appliance and the SaaS application. It is very important that the settings
you configure on the appliance and SaaS application match each other
appropriately.
For more information, see
New Feature: Sophos Anti-Virus Scanning
AsyncOS for Web 7.0 adds the Sophos scanning engine to the list of possible Web
Security appliance on-box anti-malware scanning engines. The Sophos engine
offers award-winning protection against known and unknown threats using their
Genotype and Behavioral Genotype Protection. The Sophos Genotype virus
detection technology proactively blocks families of viruses, and Behavioral
Genotype Protection automatically guards against zero-day threats by analyzing
the behavior of the code before it executes—offering protection from new and
existing viruses, trojans, worms, spyware, adware, and other potentially unwanted
applications (PUAs).
Security appliance on-box anti-malware scanning engines. The Sophos engine
offers award-winning protection against known and unknown threats using their
Genotype and Behavioral Genotype Protection. The Sophos Genotype virus
detection technology proactively blocks families of viruses, and Behavioral
Genotype Protection automatically guards against zero-day threats by analyzing
the behavior of the code before it executes—offering protection from new and
existing viruses, trojans, worms, spyware, adware, and other potentially unwanted
applications (PUAs).
For more information, see
New Feature: Transparent User Identification for Novell
eDirectory
eDirectory
AsyncOS for Web 7.0 allows you to configure the Web Security appliance so that
it identifies users by an authenticated user name transparently—that is, without
prompting the end user. You might want to do this to:
it identifies users by an authenticated user name transparently—that is, without
prompting the end user. You might want to do this to:
•
Create a single sign-on environment so users are not aware of the presence of
a proxy on the network.
a proxy on the network.
•
Use authentication based policies to apply to transactions coming from client
applications that are incapable of displaying the authentication prompt to end
users.
applications that are incapable of displaying the authentication prompt to end
users.
To identify users transparently, you must define at least one LDAP authentication
realm that supports Novell eDirectory.
realm that supports Novell eDirectory.
For more information, see
.