Back=right mouse click.
The HTTP Inspection feature in IWSVA provides policy control based on HTTP methods, URLs, and HTTP headers.
Web behavior has become more complicated. IT managers face many challenges, like enforcing browser type policies, blocking large file transfers to save bandwidth, blocking Web file uploads and blocking Web Distributed Authoring and Versioning (WebDAV) traffic. These actions are used to protect company data from loss, filter on keywords in headers and take action, block video uploads, and prevent message posting on social networking service (SNS) sites.
HTTP Inspection allows admins to identify behavior and filter web traffic according to HTTP methods, URLs, and headers. It also allows admins to create filters or use default filters to identify web traffic. After the traffic is identified, IWSVA can control it according to policy settings that allow admins to determine the appropriate actions for specific traffic.
Note: HTTP Inspection filters cannot inspect the data payload of the HTTP packets. For example, it cannot look for pattern matching inside the text or file of a webmail or social networking site post. It can only identify that a POST action is happening to a defined site or set of sites and prevent that POST.
Information about HTTP Inspection is shown in corresponding logs and reports. HTTP Inspection notifications are also available to inform end-users why their actions on the Web are being blocked.
HTTP Inspection Policies
Add an HTTP Inspection Policy: Select Accounts
Add an HTTP Inspection Policy: Specify Rules
Add an HTTP Inspection Policy: Specify Exceptions
HTTP Inspection Filters
Add an HTTP Inspection Filter
Edit an HTTP Inspection Filter