Solved

bluecot proxy

Posted on 2010-08-14
2
875 Views
Last Modified: 2013-11-22
How would you determine which rules you were being accessed in a bluecoat proxy server policy?
0
Comment
Question by:coledej
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 10

Accepted Solution

by:
ujitnos earned 250 total points
ID: 33439568
In the VPM of the policy, create a rule for your IP and in acition tab, select "None" (select Delete) and then configure a track
Now navigate to https://<>ip address of proxy:8082/policy
There first select "Delete all policy traces".
Now access the required site from your IP nad refresh the above mentioned URL. N ow if your IP has hit the track rule, it will be shown as a link which u can click and view.
 
0
 
LVL 2

Assisted Solution

by:Ellush
Ellush earned 250 total points
ID: 33494675
The link ujitnos talks about has the name you configured in Track column (1.png)
The track object should be set to verbose (2.png)
The results can be seen at https://<>ip address of proxy:8082/policy (3.png)
You should view the output and look for MATCH at the beginning of the line - this way you would know which rules had been applied

1.png
2.png
3.png
0

Featured Post

Register Today - IoT Current and Future Threats

Are you prepared to protect your organization from current and future IoT Threats?  Join our Wi-Fi expert in episode three of our webinar series for a look at the current state of Wi-Fi IoT and what may lie ahead. Register for our live webinar on April 20th at 9 am PDT!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
increase internet speed 3 100
iptables limit connection per ip correct way ? 2 252
Windows Defender Accessing Excluded Drives 5 142
Virus Software comparrison 5 50
Have you ever tried to find someone you know on Facebook and searched to find more than one result with the same picture? Perhaps someone you know has told you that they have a 'facebook stalker' or someone who is 'posing as them' online and ta…
For those of you actively in the Malware fightling business, we now have available an amazing new tool in the malware wars (first recommended to me by rpggamergirl (http://www.experts-exchange.com/M_3598771.html), the Zone Advisor for the Virus and …
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

740 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question