copy, Move Rules & Policies
First the Option to copy a rule would ease up System Setup. imagine the same rule with slightly different thresholds for different destinations or sources - creating the rule once and copy it several...
View Articlews audit log details
Websense Global Technical Support - Case Number:01889254request: Logon failed attempt (triton login) to audit log section. Thank YouBest Regards
View ArticleMake Endpoint Diagnosis Tool work when port 80 and 443 are blocked on a...
It would be good if the new Endpoint Diagnosis Tool worked when connected to a corporate LAN with port 80 and 443 blocked. I'm holding off rolling out this new client even though the feature would be...
View ArticleWebsense Endpoint agent - Windows 8.1 not supported
Currently, according to the agent supports the following operating systems:Windows 7Windows 8Recently, it has more Windows 8.1 workstation. After installing the agent in the settings section of the...
View ArticleDynamic AD Sync
When a user with a specific Websense policy (Policy Management > Clients) moves from one OU to another in AD, the client policy retains their old OU information . This leads to frequent issues...
View ArticleFeature Request: Saved Queries in Message Center
We review quarantined emails multiple times per day due to our file extension blocks. We would love to have a way to save the queries we use frequently to save time in pulling up these...
View ArticleFeature Request: Allow actions on messages when administraor notification...
When we recieve a notification that a message was quarantined, the link in the notification message doesn't give us any ability to take action on that message. We have to then go in and login to the...
View ArticleDecreasing effectiveness of Email Security 7.3
My company has been using Email Security (now at version 7.3, the last) since the early days of it being Surf Control. Lately though, it seems that the amount of spam leaking through the cracks is...
View ArticleTriton Security 7.6 config for vmware
I am migrating to a virtual environment and want to move my physical server to vMware environment. Currently I have two NIC interfaces on the server; one that monitors and one for the server with the...
View ArticleHow do I block FaceBook but allow access to company FaceBook pages and group
I need to block Facebook with the exception of the company Facebook page (www.facebook.com/companyname) and the company Facebook group (www.facebook.com/groups/companygroupname).I have seen an ancient...
View ArticleNew Cloud Portal UI appears to be unable to configure all reports to be...
The new Cloud Portal UI appears to generate reports based off the timezone your workstation is set to.I would like to set my user account to only display time in UTC (as the "old" portal UI did)If this...
View ArticleLink to ThreatScope Report inside the ESGA ThreatScope Notification
Can you implement a method to include the link to the ThreatScope Report inside the notification email sent to an administrator when an email attachment is determined to be malicious by File Sandboxing...
View ArticleFeature Request - Create a default scan job with all settings
We have to setup 600 individual scan tasks which have all the same settings - same credentials, same exclude/include filters, same settings for everything, run once schedule disabled (they have to be...
View ArticleSimple downloads are hard to find
Moving to a new server and wanted to download the latest version - but trying to find a simple download link AFTER signing in is frustrating me. Poorly laid out support site, more designed to market...
View ArticleCloud Web Security Policies
Hi all,I have a client for whom a POC of cloud web security is being done. Now as per normal procedure on WSG/Web Security policies are made per user or groups or OU.In cloud web security i've seen...
View ArticleNew Portal UI - BUG Report-User Filter when using the "Contains" option is...
Example:Searching for the user that contains the following string: mac.local.nobodyIf you select CONTAINS and then enter "mac.local.nobody" (no quotes) you receive resultsIf you select CONTAINS and...
View ArticleNew Cloud Portal UI - Threats Dashboard- Top Threat Types by Request graph...
The Top Threat Types by Request Graph has a Info icon that describes the graph as "Trends of the top Threat Types being blocked during the selected time frame"In this graph is the Entries for the...
View ArticlePEM 7.3 install on win server 2008r2 with SQL 2008 error
After going through the PEM install wizards and after the PEMConfig and PEMLog databases are created I run into an error that takes me back to the begining of the install wizard. The error...
View ArticleAccess to the Mobile Apps.
We are using many more mobile devices now and have a requirement for certain users to be using the Websense as a proxy in the premises.Along with this giving access to certain Policy's members on...
View Article