Oct 5, 2018 — ETP updates
-
Updated acceptable use policy (AUP). In a policy configuration, new categories and detailed subcategories are available for SIA administrators to control the websites and content that end users can access in the corporate network.
-
New user interface for Locations and Policies. SIA now includes a new and improved user interface when configuring or modifying a location or policy. On the Locations or Policies pages, administrators can also now search for locations or policies.
-
New Client Connector reports. Client Connector area of the Utilities page now includes a new Reports subtab that contains more data about Client Connectors. In addition to pie charts that show errors and installed Client Connectors, a table is now available to show device information, software version, and the current status of installed Client Connectors. Administrators can also filter this data based on time, such as the most current data or data that was reported in the last day or month.
-
Assign delegated administrator role. SIA super administrators can now assign the delegated administrator role to SIA users. When enabled for your organization, this feature is available from the Delegated Access tab on the Utilities page (Configuration > Utilities). To enable this feature, contact your Akamai representative.
-
Assign locations to alert notifications. SIA super administrators can now assign specific locations to alert notification recipients. This allows administrators to define the locations that these recipients can receive information about. When enabled, this feature is available from the Communication tab of the Utilities page (Configuration > Utilities). To enable this feature, contact your Akamai representative.
-
Actions for File Sharing and Risky Domains. When SIA Proxy is enabled, you can select to allow or examine risky domains and file sharing domains. Risky domains are domains that may be a threat because they are newly registered or discovered. File sharing domains are domains of file sharing applications or services. You can select to Allow or Classify traffic to these domains.
-
Analyze policy action is now called Classify. The Classify action examines the full URL of a request. If a threat is discovered, a corresponding threat category is assigned to the URL. You can assign the Classify action to custom lists, risky domains, and file sharing domains.
-
Support for certificates in binary (.der) format. SIA Proxy requires that you create an Akamai certificate or generate a certificate signing request to submit a subordinate certificate that’s signed by your organization’s certificate authority (CA). These certificates function as TLS certificates for the SIA proxy to intercept suspicious traffic. SIA now allows you to generate and submit certificates in binary (.der) format.
-
Proxy logging modes now available. If SIA Proxy is enabled, administrators can select different logging levels to define some of the data that’s reported for HTTP or HTTPS traffic in SIA. This setting is available in a policy configuration. The default logging mode provides details that’s most helpful for investigating events.