8e6 Technologies ProxyBlocker Manual Do Utilizador

Página de 482
 I
NTRODUCTORY
 S
ECTION
  C
HAPTER
 2: L
OGGING
 
AND
 B
LOCKING
8
E
6 T
ECHNOLOGIES
, P
ROXY
B
LOCKER
 U
SER
 G
UIDE
27
P2P Blocking
Peer-to-Peer (P2P) involves communication between 
computing devices—desktops, servers, and other smart 
devices—that are linked directly to each other. Using this 
feature of the ProxyBlocker, groups and/or individual client 
machines can be set up to block the use of P2P services 
specified in the library category.
When the P2P module is loaded on the server, the Proxy-
Blocker compares packets on the network with the P2P 
library stored on the ProxyBlocker server. If a match is 
found, the ProxyBlocker checks the user’s profile to see 
whether the user’s connection to the P2P service should be 
blocked, and then performs the appropriate action.
Setting up IM and P2P
IM and P2P are set up in the System and Library sections of 
the Administrator console.
1.  In the System section, activate Pattern Blocking in the 
Filter window.
2.  In the Library section, note the services set up to be 
blocked, as defined at: http://www.8e6.com/pbahelp/ 
files/1system_im_block.html
.
NOTE: Please contact an 8e6 technical support representative or 
a solutions engineer if access is needed to one or more P2P 
services blocked by 8e6's supplied library category for P2P.
3.  In the Manual Update to 8e6 Supplied Categories 
window (accessible via Library > Updates > Manual 
Update), IM pattern files can be updated on demand.