Solved

bluecot proxy

Posted on 2010-08-14
2
876 Views
Last Modified: 2013-11-22
How would you determine which rules you were being accessed in a bluecoat proxy server policy?
0
Comment
Question by:coledej
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 10

Accepted Solution

by:
ujitnos earned 250 total points
ID: 33439568
In the VPM of the policy, create a rule for your IP and in acition tab, select "None" (select Delete) and then configure a track
Now navigate to https://<>ip address of proxy:8082/policy
There first select "Delete all policy traces".
Now access the required site from your IP nad refresh the above mentioned URL. N ow if your IP has hit the track rule, it will be shown as a link which u can click and view.
 
0
 
LVL 2

Assisted Solution

by:Ellush
Ellush earned 250 total points
ID: 33494675
The link ujitnos talks about has the name you configured in Track column (1.png)
The track object should be set to verbose (2.png)
The results can be seen at https://<>ip address of proxy:8082/policy (3.png)
You should view the output and look for MATCH at the beginning of the line - this way you would know which rules had been applied

1.png
2.png
3.png
0

Featured Post

Revamp Your Training Process

Drastically shorten your training time with WalkMe's advanced online training solution that Guides your trainees to action.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

These are on the increase and getting more common these days. Users who use the Google search engine may complain of having their search redirected to unwanted sites, regardless of what browser is used. This happens when the system is infected with…
The purpose of this Article is to provide information for a newly released variant of malware – with the assumption that many EE Members will have need of the information. According to “Computerworld”, well over one million web sites have been co…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question