Sales Overview
17
Scenario: Secure the Network - While Leveraging the Web
12. Select the Spyware/Malicious Sites category.
13. Now, search for and select the following additional sites and applications to
block users from accessing:
•
Phishing
•
Botnets
•
Anonymizer
•
Anonymizers/proxy avoidance sites
•
P2P File Sharing
•
Facebook-Chat
•
Skype
14. Click OK.
Note:
It’s important to block P2P applications and sites because hackers use
these to spread malware. Anonymizers are dangerous because they can
be used to bypass the security systems that your clients already have in
place.