Kaspersky Lab Hosted Email & Web Security, 150-249u, 1Y KL7604XWSFS User Manual
Product codes
KL7604XWSFS
I M
C
O N T R O L
77
The report can be generated in a similar way to the ‘Allowed Traffic’ report (see ‘
’ on page
B
Y
P
ARTICIPANTS
The IM Control ‘By Participants’ sub-service enables an administrator to receive a detailed audit trail of all IM Control
activity that contains data between two participants. The requested activity is exported to a CSV file and contains the
following data:
activity that contains data between two participants. The requested activity is exported to a CSV file and contains the
following data:
Date/Time: date and time of the blocked scan / event.
Message: the message.
Sending User: the user who sent the message.
Receiving User: the user who received the message.
The report can be generated in a similar way to the ‘Allowed Traffic’ report (see ‘
’ on page
IM
M
ANAGEMENT
The process of configuring IM Control policy requires the use of several ‘IM Control objects’. Each of these objects is
listed in the left hand column under the IM Control Policy Manager sub-service. These objects are:
listed in the left hand column under the IM Control Policy Manager sub-service. These objects are:
Groups: a group is a collection of users who share similar access privileges. A group can be defined using
directory information, such as directory group or username, or by network parameters such as IP address or
subnet. For further details, see ‘
directory information, such as directory group or username, or by network parameters such as IP address or
subnet. For further details, see ‘
’ on page
Dictionaries: these are where words to be blocked or alerts to be generated are specified. These are
implemented in the Access Restrictions.
implemented in the Access Restrictions.
Access Restrictions: each Access restriction consists of the following objects: