Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

bluecot proxy

Posted on 2010-08-14
2
Medium Priority
?
884 Views
Last Modified: 2013-11-22
How would you determine which rules you were being accessed in a bluecoat proxy server policy?
0
Comment
Question by:coledej
2 Comments
 
LVL 10

Accepted Solution

by:
ujitnos earned 1000 total points
ID: 33439568
In the VPM of the policy, create a rule for your IP and in acition tab, select "None" (select Delete) and then configure a track
Now navigate to https://<>ip address of proxy:8082/policy
There first select "Delete all policy traces".
Now access the required site from your IP nad refresh the above mentioned URL. N ow if your IP has hit the track rule, it will be shown as a link which u can click and view.
 
0
 
LVL 2

Assisted Solution

by:Ellush
Ellush earned 1000 total points
ID: 33494675
The link ujitnos talks about has the name you configured in Track column (1.png)
The track object should be set to verbose (2.png)
The results can be seen at https://<>ip address of proxy:8082/policy (3.png)
You should view the output and look for MATCH at the beginning of the line - this way you would know which rules had been applied

1.png
2.png
3.png
0

Featured Post

Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Have you ever tried to find someone you know on Facebook and searched to find more than one result with the same picture? Perhaps someone you know has told you that they have a 'facebook stalker' or someone who is 'posing as them' online and ta…
Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

971 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question