Internet monitor SpIDer Gate scans HTTP traffic and blocks transferring objects that may pose a threat to computer’s security.
SpIDer Gate restricts access to non-recommended websites, and websites known as infection sources, and webpages that violate copyright laws.
Also, SpIDer Gate allows to restrict access to Internet resources by categories, for example, gambling, weapons, drugs, and so on.
SpIDer Gate settings for computers running macOS are available in the SpIDer Gate for workstations section, for macOS Server—in the SpIDer Gate for servers section.
General
•Use the Enable SpIDer Gate option to enable HTTP-traffic scan. •Enable the Use heuristic analysis option to use heuristic analysis for detecting unknown threats. •In the Scanning time of one element field, specify the maximum time for scanning a file. Value 0 means that time to scan one file is unlimited.
|
Increasing the time for scanning a single file may slow down the computer and increase the overall scanning time.
|
Actions
•Enable the Scan received files option to scan files received from the Internet for viruses and other threats. •In the Block files and Additionally block lists, select types of incoming malicious objects which will be blocked by SpIDer Gate. Web filtering
•Enable the Scan URL option to scan Internet resources by categories. •Enable the Block non-recommended websites option to restrict access to the websites with unreliable content (suspected of phishing, password theft, and so on). •Enable the Block URLs listed due to a notice from copyright owner option to restrict access to the websites with content that infringes copyright (according to the copyright owners of this content). Among such websites are pirated sites, file reference directories, file hosting services, and so on. •In the Block websites from the following categories list, select the categories of websites you need to block access to.Website categories
Category
|
Description
|
Adult content
|
Websites that contain pornographic or erotic materials, dating sites, etc.
|
Violence
|
Websites that encourage violence or contain materials about various fatal accidents, etc.
|
Weapons
|
Websites that describe weapons and explosives or provide information on their manufacturing.
|
Gambling
|
Websites that provide access to online games of chance, casinos, auctions, including sites for placing bets, etc.
|
Drugs
|
Websites that promote use, production or distribution of drugs, etc.
|
Obscene language
|
Websites that contain the obscene language (in titles, articles, etc.).
|
Chats
|
Websites that offer a real-time transmission of text messages.
|
Terrorism
|
Websites that contain aggressive and propaganda materials or terroristic attacks descriptions, etc.
|
Email
|
Websites that offer the possibility of free registration of a web mailbox.
|
Social networks
|
Different social networks: general, professional, corporate, interest-based; thematic dating sites.
|
|
•In the White list/Black list sections, add the paths to the websites you need to allow/restrict access to.Details
a)To add a certain website, enter its URL (for example, www.example.com). This allows access to all webpages located on this website. b)To allow access to websites whose URL contains a certain text, enter this text in the input field. For example, if you enter example, then the access to example.com, example.test.com, test.com/example, test.example222.ru, and others will be granted. c)To allow access to websites within a particular domain, enter the domain name with a period (.) character, for example, .com. This allows access to all webpages located on this domain. If the domain name includes a forward slash (/), the substring before the slash is considered a domain name, while the substring after the slash is considered a part of address for the websites that you want to access within this domain. For example, if you enter example.com/test, such webpages as example.com/test11, template.example.com/test22, and so on will be processed.
d)To add certain websites to the exclusions, enter the mask of their names. Masks will be added in the mask://... format. A mask denotes the common part of object names, at that:
▪The asterisk (*) character replaces any, possibly empty, sequence of characters. ▪The question mark (?) replaces any, including an empty, character (one). Examples:
•mask://*.com/ or .com—enable opening of all the domain .com websites; •mask://mail—enable opening of all websites whose names contain the word “mail”; •mask://???.com—enable opening of all the domain .com websites, whose names consist of three characters or less. |
|
Your input may be unified. For example: the http://www.example.com address will be transformed into www.example.com.
Containers
In this section, you can specify the maximum nesting level for containers. If the nesting level is higher than the specified value, the container will be ignored during the scan. Value 0 means that nested objects will not be scanned.
In the Maximum compression ratio field, specify the maximum compression ratio for compressed objects (a ratio of source object size to compressed size). If compression ratio of an object is greater than the specified value, the object will be ignored when scanning.
Additional
•The Log level option defines the log verbosity level that is used for SpIDer Gate messages logging. •The Logging method option defines the logging method for SpIDer Gate. The following values are allowed: ▫Auto—use the logging method which is defined in Dr.Web settings for all components of the solution. ▫Syslog—use the syslog system service to store SpIDer Gate log messages. If you select this method, specify the value of Syslog facility parameter. It defines the label (or subsystem) which is used by syslog to save messages from SpIDer Gate. ▫Path—use the separate specified file to store SpIDer Gate log messages. If you select this method, specify a path to the file in the Log file field.
|