Mar 23, 2020 — ETP updates
General updates include:
-
Security patch upgrades for ETP Client. In an ETP Client configuration, you can select to automatically install security patch upgrades. Security patch upgrades address security vulnerabilities and apply changes that are necessary to support OS updates. If you don’t want to automatically install these updates, like a software upgrade, you can download a patch from SIA, test it, approve it, and select how you want to apply it across your network.
-
Revoke ETP Client. If a user reports a lost or compromised device, you can revoke ETP Client on that device. This operation is available in SIA on the Reports tab for ETP Client.
-
New policy tab name. The Akamai Security tab in a policy is now called Threat.
Features available to organizations that are participating in SIA beta include:
-
Unclassified traffic. An Unclassified Traffic setting is now available in a policy. A domain is considered unclassified if it does not appear in the acceptable use policy (AUP), a custom list, or in any threat list maintained by Akamai. As an SIA administrator, you can block this traffic or allow it to bypass SIA Proxy. If you are licensed for SIA Advanced Threat, you can select the Classify action to direct unclassified traffic to SIA Proxy.
Depending on the type of proxy you use, this configuration is recommended:
- For the selective proxy (forwards only risky web traffic), select Bypass.
- For the full web proxy, select Classify.
As a result of this enhancement, the Unclassified AUP category is no longer available.
-
Enable Forward Proxy removed in policy. The Enable Forward Proxy toggle is no longer shown in a policy. This setting is automatically enabled in the backend when you turn on SIA Proxy.
-
Origin Ports. In a policy, the new Origin Ports field allows you to enter the ports and ports ranges that you want to open for the full web proxy. By default, SIA allows connections to ports 80 to 84, 443, 4443, 8080, 8443, and 8888.
-
Enable ETP Client as Proxy policy setting. The new Enable ETP Client as Proxy policy setting allows you to define whether the ETP Client machine is configured as a web proxy. If you choose to make ETP Client a local web proxy, web traffic is directed from the client to SIA Proxy. This setting functions the same as the Configure ETP Client as a local computer web proxy setting in the ETP Client configuration (Utilities > ETP Client > Configuration). Your selection for the Enable ETP Client as Proxy setting takes precedence over the ETP Client configuration setting.
-
Permission required to access Summary of Proxy Activity and DNS Activity reports. To access the Summary of Proxy Activity and DNS Activity reports, you must be an SIA super administrator or a user who’s assigned a role with the etpRestrictedPageViewRole permission.
-
Proxy activity event reporting. If activity on the Proxy Activity report generated an event, the report now shows the Is Event field to indicate whether specific activity is also an event.
-
Dashboard shows total number of HTTP and HTTPS activity. The SIA Dashboard now reports the total number of HTTP and HTTPS activity in a summary graph. When a user clicks the provided graph, they are directed to the Proxy Activity report.
-
Update to configuring AUP exceptions. SIA now makes it easier for you to find and select the users and groups that can access a blocked category in an AUP. To select users, you can search for User IDs in the associated directory and in the search results, select the user. To select groups, you can search for groups and in a drop-down list, select the group.
If you try to find a user or group that does not exist in the directory, you can add the user or group to the AUP exception. To allow these users and groups to authenticate, you must also add these users and groups to the directory.