Mar 23, 2020 — ETP updates

General updates include:

  • Security patch upgrades for ​ETP Client​. In an ​ETP Client​ configuration, you can select to automatically install security patch upgrades. Security patch upgrades address security vulnerabilities and apply changes that are necessary to support OS updates. If you don’t want to automatically install these updates, like a software upgrade, you can download a patch from ​SIA​, test it, approve it, and select how you want to apply it across your network.

  • Revoke ​ETP Client​. If a user reports a lost or compromised device, you can revoke ​ETP Client​ on that device. This operation is available in ​SIA​ on the Reports tab for ​ETP Client​.

  • New policy tab name. The Akamai Security tab in a policy is now called Threat.

Features available to organizations that are participating in ​SIA​ beta include:

  • Unclassified traffic. An Unclassified Traffic setting is now available in a policy. A domain is considered unclassified if it does not appear in the acceptable use policy (AUP), a custom list, or in any threat list maintained by Akamai. As an ​SIA​ administrator, you can block this traffic or allow it to bypass ​SIA​ Proxy. If you are licensed for ​SIA​ Advanced Threat, you can select the Classify action to direct unclassified traffic to ​SIA​ Proxy.

    Depending on the type of proxy you use, this configuration is recommended:

    • For the selective proxy (forwards only risky web traffic), select Bypass.
    • For the full web proxy, select Classify.

    As a result of this enhancement, the Unclassified AUP category is no longer available.

  • Enable Forward Proxy removed in policy. The Enable Forward Proxy toggle is no longer shown in a policy. This setting is automatically enabled in the backend when you turn on ​SIA​ Proxy.

  • Origin Ports. In a policy, the new Origin Ports field allows you to enter the ports and ports ranges that you want to open for the full web proxy. By default, ​SIA​ allows connections to ports 80 to 84, 443, 4443, 8080, 8443, and 8888.

  • Enable ​ETP Client​ as Proxy policy setting. The new Enable ​ETP Client​ as Proxy policy setting allows you to define whether the ​ETP Client​ machine is configured as a web proxy. If you choose to make ​ETP Client​ a local web proxy, web traffic is directed from the client to ​SIA​ Proxy. This setting functions the same as the Configure ​ETP Client​ as a local computer web proxy setting in the ​ETP Client​ configuration (Utilities > ​ETP Client​ > Configuration). Your selection for the Enable ​ETP Client​ as Proxy setting takes precedence over the ​ETP Client​ configuration setting.

  • Permission required to access Summary of Proxy Activity and DNS Activity reports. To access the Summary of Proxy Activity and DNS Activity reports, you must be an ​SIA​ super administrator or a user who’s assigned a role with the etpRestrictedPageViewRole permission.

  • Proxy activity event reporting. If activity on the Proxy Activity report generated an event, the report now shows the Is Event field to indicate whether specific activity is also an event.

  • Dashboard shows total number of HTTP and HTTPS activity. The ​SIA​ Dashboard now reports the total number of HTTP and HTTPS activity in a summary graph. When a user clicks the provided graph, they are directed to the Proxy Activity report.

  • Update to configuring AUP exceptions. ​SIA​ now makes it easier for you to find and select the users and groups that can access a blocked category in an AUP. To select users, you can search for User IDs in the associated directory and in the search results, select the user. To select groups, you can search for groups and in a drop-down list, select the group.

    If you try to find a user or group that does not exist in the directory, you can add the user or group to the AUP exception. To allow these users and groups to authenticate, you must also add these users and groups to the directory.