?
Solved

Sonic CFS being bypassed by Google Search

Posted on 2013-11-07
3
Medium Priority
?
502 Views
Last Modified: 2013-11-07
We have implemented CFS on our Sonicwall. We have blocked Facebook (among other sites). If a user goes to Google and searches for Facebook, they can then access the site without CFS blocking it. Is there a way to secure this type of breach?
0
Comment
Question by:djstewartnc
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 

Accepted Solution

by:
djstewartnc earned 0 total points
ID: 39631049
Found my own answer. Usual newbie mistake. I enabled HTTPS content filtering.
0
 

Author Closing Comment

by:djstewartnc
ID: 39631057
When I answer my own questions I always do it in an Excellent manner.
0
 
LVL 25

Expert Comment

by:Blue Street Tech
ID: 39631251
When I answer my own questions I always do it in an Excellent manner.
hahahahha
0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting to know the threat landscape in which DDoS has evolved, and making the right choice to get ourselves geared up to defend against  DDoS attacks effectively. Get the necessary preparation works done and focus on Doing the First Things Right.
This article is written by John Gates, CISSP. Gates, the SNUG President-Elect, currently holds the position of Manager of Information Systems at Lake Park High School in Roselle, Illinois.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

801 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question