Last Updated: 1/22/2020 12:11:00 AM
Name |
Type |
Description |
Length |
---|---|---|---|
policy.approvals.approved[].id |
integer |
application or file in Spyware/Grayware approved list |
e.g., 11679 |
policy.approvals.approved[].name |
string |
As above |
e.g., ADW_AADB |
policy.approved_blocked_url.approved.urls[] |
string |
Approved URL |
e.g., "http://www.trendmicro.com/*" |
policy.approved_blocked_url.blocked.blocked_urls[] |
string |
Blocked URLs |
e.g., "http://www.blocked.com/*" |
policy.approved_blocked_url.enabled |
integer |
Customize approved/blocked URLs for this group (Windows) |
1 = true; 0 = false |
policy.behavior_monitoring.approved_list[] |
string |
Approved program which can be started even if it violates a monitored change. |
e.g., "C:\Program Files\MSN Messenger\MSVS.exe" |
policy.behavior_monitoring.bhvs.behaviors[].action |
integer |
Action for the monitored change |
0 = Always allow, 1 = Ask when necessary, 2 = Always block |
policy.behavior_monitoring.bhvs.behaviors[].enabled |
integer |
Monitor a possible change |
1 = true; 0 = false |
policy.behavior_monitoring.bhvs.behaviors[].event |
integer |
The monitored change |
11=Duplicated System File, 2=Hosts File Modification, 16=Suspicious Behavior, 4=New Internet Explorer Plugin, 5=Internet Explorer Setting Modification, 8=Security Policy Modification, 3=Program Library Injection, 6=Shell Modification, 7=New Service, 10=System File Modification, 9=Firewall Policy Modification, 14=System Process Notification, 1=New Startup Program |
policy.behavior_monitoring.bhvs.behaviors[].msg.description |
string |
Description of the monitored change |
e.g., Many malicious programs... |
policy.behavior_monitoring.bhvs.behaviors[].msg.event |
integer |
The monitored change |
Refer to policy.behavior_monitoring.bhvs.behaviors[].event |
policy.behavior_monitoring.bhvs.behaviors[].msg.name |
string |
The name of the monitored change |
e.g., Duplicated System File |
policy.behavior_monitoring.bhvs.behaviors[].msg.popup_templ |
string |
The popup messag of the monitored change |
e.g., $PIMAGE$ ($PID$) is attempting... |
policy.behavior_monitoring.block_list[] |
string |
Blocked program which can never be started. |
e.g., "C:\Program Files\MSN Messenger\MSVS.exe" |
policy.behavior_monitoring.enable_intuit |
integer |
Enable Intuit QuickBooks protection |
1 = true; 0 = false |
policy.behavior_monitoring.enable_pem |
integer |
Enable Event Monitoring |
1 = true; 0 = false |
policy.behavior_monitoring.enable_adc |
integer |
Enable Ransomware Protection - document protection against unauthorized encryption or modification |
1 = true; 0 = false |
policy.behavior_monitoring.enable_dre |
integer |
Enable Ransomware Protection - automatically back up and restore files modified by suspicious programs |
1 = true; 0 = false |
policy.behavior_monitoring.enable_srp |
integer |
Enable Ransomware Protection - blocking of processes commonly associated with ransomware |
1 = true; 0 = false |
policy.behavior_monitoring.enable_umh |
integer |
Enable Ransomware Protection - program inspection to detect and block compromised executable files |
1 = true; 0 = false |
policy.behavior_monitoring.enabled |
integer |
Enable Behavior Monitoring (Windows) |
1 = true; 0 = false |
policy.behavior_monitoring.locale |
string |
Locale |
e.g., en-us |
policy.behavior_monitoring.td.enable_td |
integer |
Enable Malware Behavior Blocking for known and potential threats |
1 = true; 0 = false |
policy.behavior_monitoring.td.td_mode |
integer |
Threat-level scanning options that Malware Behavior Monitoring provides |
0 = Known threats, 1 = Known and potential threats |
policy.client_privileges.behavior_monitoring.display_tab |
integer |
Display Behavior Monitoring tab on clients and allow clients to customize the lists |
1 = true; 0 = false |
policy.client_privileges.client_security.degree |
integer |
Select High or Normal security level for clients. (High: Restrict access privileges to Client/Server Security Agents files and registries, Normal: Retain normal access privileges to Client/Server Security Agents files and registries) |
1 = High, 0 = Normal |
policy.client_privileges.firewall.display_tab |
integer |
Display Firewall on drop-down list under Security Protection tab on clients |
1 = true; 0 = false |
policy.client_privileges.firewall.enable_switching |
integer |
Allow clients to enable/disable firewall |
1 = true; 0 = false |
policy.client_privileges.mail_scan.allow_configure |
integer |
Allow clients to configure real-time scan for POP3 mail |
1 = true; 0 = false |
policy.client_privileges.scan_settings.allow_enable_scheduled_scan |
integer |
Allow clients to enable/disable Scheduled Scan |
1 = true; 0 = false |
policy.client_privileges.scan_settings.allow_postpone_scheduled_scan |
integer |
Allow clients to postponse Scheduled Scan |
e.g., 0 |
policy.client_privileges.scan_settings.allow_stop_scheduled_scan |
integer |
Allow clients to skip and stop Scheduled Scan |
1 = true; 0 = false |
policy.client_privileges.scan_settings.display_manual_scan_tab |
integer |
Allow clients to modify Manual Scan settings |
1 = true; 0 = false |
policy.client_privileges.scan_settings.display_realtime_scan_tab |
integer |
Allow clients to modify Real-time scan settings |
1 = true; 0 = false |
policy.client_privileges.scan_settings.display_scheduled_scan_tab |
integer |
For inernal use only |
|
policy.client_privileges.scan_settings.enable_scheduled_scan_warning |
integer |
For inernal use only |
|
policy.client_privileges.update_settings.disable_upgrade |
integer |
Allow clients to disable regular Agent upgrade and hotfix deployment |
1 = true; 0 = false |
policy.client_privileges.url_filtering.continue_browsing |
integer |
Allow clients to continue browsing a restricted URL until the computer is restarted |
1 = true; 0 = false |
policy.client_privileges.wtp.allow_edit_approved_url_list |
integer |
Grant clients the privilege to edit approved URL list |
1 = true; 0 = false |
policy.client_privileges.wtp.continue_browsing |
integer |
Allow clents to continue browsing a malicious URL until the computer is restarted |
1 = true; 0 = false |
policy.client_privileges.additional_service.bm.enable_bm_on_desktops |
integer |
Enable Behavior Monitoring on desktops |
1 = true; 0 = false |
policy.client_privileges.additional_service.bm.enable_bm_on_servers |
integer |
Enable Behavior Monitoring on servers |
1 = true; 0 = false |
policy.device_control.dac_item[].action |
integer |
policy.device_control.dac_item is a list for two settings: 1. whether to allow or block the AutoRun function {"action": 2, "enabled": 0, "event": 5} = Block the autorun function on USB storage devices, {"action": 0, "enabled": 0, "event": 5} = Otherwise; 2. Select the permissions for USB devices. {"action": 0, "enabled": 0, "event": 1} = Full access, {"action": 2, "enabled": 0, "event": 1} = List device content only, {"action": 4, "enabled": 0, "event": 1} = Read, {"action": 5, "enabled": 0, "event": 1} = Modify, {"action": 6, "enabled": 0, "event": 1} = Read and Execute" |
e.g., To block the autorun function on USB storage devices and select the permission, Read and Execute, for USB devices. {'dac_item': [{"action": 2, "enabled": 0, "event": 5}, {"action": 6, "enabled": 0, "event": 1}]} |
policy.device_control.dac_item[].enabled |
integer |
As above |
|
policy.device_control.dac_item[].event |
integer |
As above |
|
policy.device_control.enabled |
integer |
Enable device control (Windows) |
1 = true; 0 = false |
policy.device_control.exception_list[].item |
string |
Add a program to the exception list |
e.g., "C:\ex1.exe" |
policy.device_control.exception_list[].type |
integer |
As above |
|
policy.firewall.enable_alert_msg |
integer |
Enable alert message |
1 = true; 0 = false |
policy.firewall.enable_ids |
integer |
Enable Intrusion Detection System |
1 = true; 0 = false |
policy.firewall.enabled |
integer |
Enable firewall (Windows) |
1 = true; 0 = false |
policy.firewall.exceptions[].allow |
integer |
policy.firewall.exceptions is a list of firewall exceptions in order. allow is firewall exception action |
1 = Allow, 0 = Block |
policy.firewall.exceptions[].inbound |
integer |
Inbound traffic |
1 = true; 0 = false |
policy.firewall.exceptions[].ip_selection.ip_range.from |
string |
Start of IP range |
|
policy.firewall.exceptions[].ip_selection.ip_range.to |
string |
End of IP range |
|
policy.firewall.exceptions[].ip_selection.method |
integer |
Method of identifying clients |
1 = All IP addresses, 2 = Single IP, 3 = IP range |
policy.firewall.exceptions[].ip_selection.single_ip |
string |
The IP address of a particular client applied for the exception |
|
policy.firewall.exceptions[].name |
string |
Firewall exception name. |
A unique name for the exception. |
policy.firewall.exceptions[].outbound |
integer |
Outbound traffic |
1 = true; 0 = false |
policy.firewall.exceptions[].port_selection.method |
integer |
Method of identifying clients |
1 = All ports, 2 = Range, 3 = Specified ports |
policy.firewall.exceptions[].port_selection.port_range.from |
integer |
Start of port range |
|
policy.firewall.exceptions[].port_selection.port_range.to |
integer |
End of port range |
|
policy.firewall.exceptions[].port_selection.specific_ports[] |
integer |
Specified port |
e.g., 80 |
policy.firewall.exceptions[].protocol |
integer |
Traffic protocol |
0 = All, 1 = TCP/UDP, 2 = TCP, 3 = UDP, 4 = ICMP |
policy.firewall.level |
integer |
Firewall security level |
1 = High, 2 = Medium, 3 = Low |
policy.firewall.mode |
integer |
Firewall mode |
0 = Simple mode, 1 = Advanced mode |
policy.mail_scan.enable_realtime_scan |
integer |
Scan POP3 messages |
1 = true; 0 = false |
policy.mail_scan.enable_toolbar |
integer |
For internal use only |
e.g., 0 |
policy.manual_scan.settings.action.action_info[].first_action |
integer |
Action for threat |
For Virus Detections: 0 = Pass, 1 = Rename, 2 = Quarantine, 3 = Clean, 4 = Delete; For Spyware/Grayware Detections: 0 = Deny Access, 3 = Clean |
policy.manual_scan.settings.action.action_info[].second_action |
integer |
Action for uncleanable threat |
0 = Pass, 1 = Rename, 2 = Quarantine, 4 = Delete |
policy.manual_scan.settings.action.action_info[].threat |
integer |
Type of thread |
For Virus Detections: 0 = Joke, 1 = Worm/Trojans, 2 = Virus, 3 = Test virus, 4 = Packer, 5 = Probable virus/malware, , 99 = Other threats, 100 = Perform the same action for all detected threats, 6: Spyware/Grayware Detections |
policy.manual_scan.settings.action.backup_before_clean |
integer |
Backup detected file before cleaning |
1 = true; 0 = false |
policy.manual_scan.settings.action.scan_speed |
integer |
The period of time WFBS-SVC waits between scanning each file affects CPU usage. (High: scan files one after another without pausing, Medium: pause between file scans if CPU consumption is higher than 50%, and do not pause if 50% or lower, Low: pause between file scans if CPU consumption is higher than 20%, and do not pause if 20% or lower)" |
0 = High, 1= Medium, 2 = Low |
policy.manual_scan.settings.action.virus_detection_method |
integer |
Method for virus detections |
0 = ActiveAction, 1 = Perform the same action for all detected threats, 2 = Customized action for the following detected threats |
policy.manual_scan.settings.target.advanced.scan_boot |
integer |
Scan boot area |
1 = true; 0 = false |
policy.manual_scan.settings.target.advanced.scan_bottrap |
integer |
Enable IntelliTrap (for antivirus) |
1 = true; 0 = false |
policy.manual_scan.settings.target.compress_layer_limit |
integer |
The number of layers of compressed files to scan |
|
policy.manual_scan.settings.target.exclusion.default_extensions |
string |
A list for selecting the extension to exclude from the scan |
e.g., '"",ACCDB,ACE' |
policy.manual_scan.settings.target.exclusion.enabled |
integer |
Enable Exclusions |
1 = true; 0 = false |
policy.manual_scan.settings.target.exclusion.exclude_extensions[] |
string |
File extension to exclude from the scan |
e.g., "JPG" |
policy.manual_scan.settings.target.exclusion.exclude_files[] |
string |
File to exclude from the scan |
e.g., "c:\\temp\\excldir\\ExcludeDoc.hlp" |
policy.manual_scan.settings.target.exclusion.exclude_folders[] |
string |
Directory to exclude from the scan |
e.g., "c:\\temp\\ExcludeDir" |
policy.manual_scan.settings.target.exclusion.exclude_trend_product |
integer |
Exclude the directories where Trend Micro products are installed |
1 = true; 0 = false |
policy.manual_scan.settings.target.method |
integer |
Method of identifying files to scan |
0 = All scannable files, 1 = IntelliScan, 2 = Scan files with the extensions defined in policy.manual_scan.settings.target.scan_extension_list |
policy.manual_scan.settings.target.scan_compressed |
integer |
Scan compressed files (for antivirus) |
1 = true; 0 = false |
policy.manual_scan.settings.target.scan_extension_list[] |
string |
file extension should be scanned |
e.g., "EXE" |
policy.manual_scan.settings.target.scan_network_folder |
integer |
Scan mapped drives and shared folders on the network (for antivirus) |
1 = true; 0 = false |
policy.realtime_scan.enabled |
integer |
Wether to enable real-time Antivirus/Anti-spyware (Windows) |
1 = true; 0 = false |
policy.realtime_scan.settings.action.action_info[].first_action |
integer |
Action for threat |
For Virus Detections: 0 = Pass, 1 = Rename, 2 = Quarantine, 3 = Clean, 4 = Delete; For Spyware/Grayware Detections: 0 = Deny Access, 3 = Clean |
policy.realtime_scan.settings.action.action_info[].second_action |
integer |
Action for uncleanable threat |
0 = Pass, 1 = Rename, 2 = Quarantine, 4 = Delete |
policy.realtime_scan.settings.action.action_info[].threat |
integer |
Type of thread |
For Virus Detections: 0 = Joke, 1 = Worm/Trojans, 2 = Virus, 3 = Test virus, 4 = Packer, 5 = Probable virus/malware, , 99 = Other threats, 100 = Perform the same action for all detected threats, 6: Spyware/Grayware Detections |
policy.realtime_scan.settings.action.backup_before_clean |
integer |
Backup detected file before cleaning |
1 = true; 0 = false |
policy.realtime_scan.settings.action.display_spyware_alert_msg |
integer |
Display an alert message on the device when a spyware is detected |
1 = true; 0 = false |
policy.realtime_scan.settings.action.display_virus_alert_msg |
integer |
Display an alert message on the device when a virus is detected |
1 = true; 0 = false |
policy.realtime_scan.settings.action.virus_detection_method |
integer |
Method for virus detections |
0 = ActiveAction, 1 = Perform the same action for all detected threats, 2 = Customized action for the following detected threats |
policy.realtime_scan.settings.target.advanced.enable_memory_scan |
integer |
Quarantine malware variants detected in memory |
1 = true; 0 = false |
policy.realtime_scan.settings.target.advanced.scan_bottrap |
integer |
Enable IntelliTrap (for antivirus) |
1 = true; 0 = false |
policy.realtime_scan.settings.target.advanced.scan_floppy |
integer |
Scan floppy drive system shutdown (for antivirus) |
1 = true; 0 = false |
policy.realtime_scan.settings.target.compress_layer_limit |
integer |
The number of layers of compressed files to scan |
|
policy.realtime_scan.settings.target.condition |
integer |
Condition of identifying files to scan |
0 = Scan files being created, modified, or retrieved, 1= Scan files being retrieved, 3 = Scan files being created or modified |
policy.realtime_scan.settings.target.exclusion.default_extensions |
string |
A list for selecting the extension to exclude from the scan |
e.g., '",ACCDB,ACE' |
policy.realtime_scan.settings.target.exclusion.enabled |
integer |
Enable Exclusions |
1 = true; 0 = false |
policy.realtime_scan.settings.target.exclusion.exclude_extensions[] |
string |
file extension to exclude from the scan |
e.g., "JPG" |
policy.realtime_scan.settings.target.exclusion.exclude_files[] |
string |
File to exclude from the scan |
e.g., "c:\\temp\\excldir\\ExcludeDoc.hlp" |
policy.realtime_scan.settings.target.exclusion.exclude_folders[] |
string |
Directory to exclude from the scan |
e.g., "c:\\temp\\ExcludeDir" |
policy.realtime_scan.settings.target.exclusion.exclude_trend_product |
integer |
Exclude the directories where Trend Micro products are installed |
1 = true; 0 = false |
policy.realtime_scan.settings.target.method |
integer |
Method of identifying files to scan |
0 = All scannable files, 1 = IntelliScan, 2 = Scan files with the extensions defined in policy.realtime_scan.settings.target.scan_extension_list |
policy.realtime_scan.settings.target.scan_compressed |
integer |
Scan compressed files (for antivirus) |
1 = true; 0 = false |
policy.realtime_scan.settings.target.scan_extension_list[] |
string |
File extension to scan |
e.g., "EXE" |
policy.realtime_scan.settings.target.scan_network_folder |
integer |
Scan mapped drives and shared folders on the network (for antivirus) |
1 = true; 0 = false |
policy.scan_mode.mode |
integer |
Scan method (Windows) |
0 = Smart Scan, 1 = Conventional Scan |
policy.schedule.daily_hour |
integer |
The hour of the day Scheduled Scan runs |
1 to 24 |
policy.schedule.daily_min |
integer |
The minute of the hour Scheduled Scan runs |
0 to 60 |
policy.schedule.enabled |
integer |
Enable Scheduled Scan |
1 = true; 0 = false |
policy.schedule.frequency |
integer |
Frequency of scheduled Scan |
1 = Monthly, 2 = Weekly, 3 = Daily |
policy.schedule.monthly_data |
integer |
The day of the week Scheduled Scan runs |
1 to 31 |
policy.schedule.weekly_data |
integer |
The day of the month Scheduled Scan runs |
0 = Sun, 1 = Mon, 2 = Tue, 3 =Wed, 4 = Thu, 5 = Fri, 6 = Sat |
policy.scheduled_scan.settings.action.action_info[].first_action |
integer |
Action for threat |
For Virus Detections: 0 = Pass, 1 = Rename, 2 = Quarantine, 3 = Clean, 4 = Delete; For Spyware/Grayware Detections: 0 = Deny Access, 3 = Clean |
policy.scheduled_scan.settings.action.action_info[].second_action |
integer |
Action for uncleanable threat |
0 = Pass, 1 = Rename, 2 = Quarantine, 4 = Delete |
policy.scheduled_scan.settings.action.action_info[].threat |
integer |
Type of thread |
For Virus Detections: 0 = Joke, 1 = Worm/Trojans, 2 = Virus, 3 = Test virus, 4 = Packer, 5 = Probable virus/malware, , 99 = Other threats, 100 = Perform the same action for all detected threats, 6: Spyware/Grayware Detections |
policy.scheduled_scan.settings.action.backup_before_clean |
integer |
Backup detected file before cleaning |
1 = true; 0 = false |
policy.scheduled_scan.settings.action.display_spyware_alert_msg |
integer |
Display an alert message on the device when a spyware is detected |
1 = true; 0 = false |
policy.scheduled_scan.settings.action.display_virus_alert_msg |
integer |
Display an alert message on the device when a virus is detected |
1 = true; 0 = false |
policy.scheduled_scan.settings.action.scan_speed |
integer |
The period of time WFBS-SVC waits between scanning each file affects CPU usage. (High: scan files one after another without pausing, Medium: pause between file scans if CPU consumption is higher than 50%, and do not pause if 50% or lower, Low: pause between file scans if CPU consumption is higher than 20%, and do not pause if 20% or lower)" |
0 = High, 1= Medium, 2 = Low |
policy.scheduled_scan.settings.action.virus_detection_method |
integer |
Method for virus detections |
0 = ActiveAction, 1 = Perform the same action for all detected threats, 2 = Customized action for the following detected threats |
policy.scheduled_scan.settings.target.advanced.scan_boot |
integer |
Scan boot area |
1 = true; 0 = false |
policy.scheduled_scan.settings.target.advanced.scan_bottrap |
integer |
Enable IntelliTrap (for antivirus) |
1 = true; 0 = false |
policy.scheduled_scan.settings.target.compress_layer_limit |
integer |
The number of layers of compressed files to scan |
|
policy.scheduled_scan.settings.target.exclusion.default_extensions |
string |
A list for selecting the extension to exclude from the scan |
e.g., '",ACCDB,ACE"' |
policy.scheduled_scan.settings.target.exclusion.enabled |
integer |
Enable Exclusions |
1 = true; 0 = false |
policy.scheduled_scan.settings.target.exclusion.exclude_extensions[] |
string |
File extension to exclude from the scan |
e.g., "JPG" |
policy.scheduled_scan.settings.target.exclusion.exclude_files[] |
string |
File to exclude from the scan |
e.g., "c:\\temp\\excldir\\ExcludeDoc.hlp" |
policy.scheduled_scan.settings.target.exclusion.exclude_folders[] |
string |
Directory to exclude from the scan |
e.g., "c:\\temp\\ExcludeDir" |
policy.scheduled_scan.settings.target.exclusion.exclude_trend_product |
integer |
Exclude the directories where Trend Micro products are installed |
1 = true; 0 = false |
policy.scheduled_scan.settings.target.method |
integer |
Method of identifying files to scan |
0 = All scannable files, 1 = IntelliScan, 2 = Scan files with the extensions defined in policy.scheduled_scan.settings.target.scan_extension_list |
policy.scheduled_scan.settings.target.scan_compressed |
integer |
Scan compressed files (for antivirus) |
1 = true; 0 = false |
policy.scheduled_scan.settings.target.scan_extension_list[] |
string |
File extension to scan |
e.g., "EXE" |
policy.ts_toolbar.enable_keystroke_encryption |
integer |
For internal use |
|
policy.ts_toolbar.enable_page_rating |
integer |
For internal use |
|
policy.ts_toolbar.enable_wifi_advisor |
integer |
For internal use |
|
policy.url_filtering.business_hours.afternoon.enabled |
integer |
Define afternoon under business hours" |
1 = true; 0 = false |
policy.url_filtering.business_hours.afternoon.time_range.range_from |
integer |
Specify the time range of afternoon |
e.g., 46800 |
policy.url_filtering.business_hours.afternoon.time_range.range_to |
integer |
Specify the time range of afternoon |
e.g., 64800 |
policy.url_filtering.business_hours.days.fri |
integer |
Define Friday under business hours |
1 = true; 0 = false |
policy.url_filtering.business_hours.days.mon |
integer |
Define Monday under business hours |
1 = true; 0 = false |
policy.url_filtering.business_hours.days.sat |
integer |
Define Saturday under business hours |
1 = true; 0 = false |
policy.url_filtering.business_hours.days.sun |
integer |
Define Sunday under business hours |
1 = true; 0 = false |
policy.url_filtering.business_hours.days.thu |
integer |
Define Tuesday under business hours |
1 = true; 0 = false |
policy.url_filtering.business_hours.days.tue |
integer |
Define Thursday under business hours |
1 = true; 0 = false |
policy.url_filtering.business_hours.days.wed |
integer |
Define Wednesday under business hours |
1 = true; 0 = false |
policy.url_filtering.business_hours.morning.enabled |
integer |
Define morning under business hours" |
1 = true; 0 = false |
policy.url_filtering.business_hours.morning.time_range.range_from |
integer |
Specify the time range of morning |
e.g., 32400 |
policy.url_filtering.business_hours.morning.time_range.range_to |
integer |
Specify the time range of morning |
e.g., 43200 |
policy.url_filtering.business_hours.timeofday_type |
integer |
Speficy work hours or choose all day (24 hours) for business hours |
0 = all day (24 hours); 1 = working hours |
policy.url_filtering.business_hours_2.time_slots[] |
integer |
Alternative way to specify the business hours |
|
policy.url_filtering.business_hours_2.type |
integer |
Alternative way to specify the business hours |
0 = all day, 1 = week day, 2 = from 9:00 to 18:00 every week day, 3 = specified |
policy.url_filtering.enabled |
integer |
Enable URL Filtering (Windows) |
1 = true; 0 = false |
policy.url_filtering.filter_rules.categories[].rules[].enable_business_hour |
integer |
Enable filter rule in business hours |
1 = true; 0 = false |
policy.url_filtering.filter_rules.categories[].rules[].enable_leisure_hour |
integer |
Enable filter rule in leisure hours |
1 = true; 0 = false |
policy.url_filtering.filter_rules.categories[].rules[].rule_id |
integer |
Filter rule of the sepcified URL category |
- Adult categoty: 1= Adult/Mature Content, 3 = Pornography, 4 = Sex Education, 5 = Intimate Apparel/Swimsuit, 6 = Nudity, 8 = Alcohol Tobacco, 9 = Illegal/Questionable, 10 = Tasteless, 11 = Gambling, 14 = Violence/Hate/Racism, 15 = Weapons, 16 = Abortion, 25 = Illegal Drugs, 26 = Marijuana; - Business categoty: 21 = Business/Economy, 31 = Financial Services, 32 = Brokerages/Trading, 45 = Job Search/Careers, 58 = Shopping, 59 = Auctions, 60 = Real Estate; - Communications and Search categoty: 24 = Internet Telephony, 40 = Search Engines/Portals, 41 = Internet Infrastructure, 42 = Blogs/Web Communications, 50 = Social Networking, 51 = Chat/Instant Messaging, 52 = Email, 53 = Newsgroups, 89 = Web Hosting; - General categoty: 27 = Education, 34 = Government/Legal, 35 = Military, 36 = Politics, 37 = Health, 38 = Computers/Internet, 46 = News/Media, 48 = Translators/Cached Pages, 49 = Reference, 67 = Vehicles, 90 = Unrated; - Internet Security categoty: 39 = Proxy Avoidance, 73 = Potentially Malicious Software, 74 = Spyware, 75 = Phishing, 76 = Spam, 77 = Adware, 78 = Malware Accomplice, 79 = Disease Vector, 80 = Cookies, 81 = Dialers, 82 = Hacking, 83 = Joke Program, 84 = Password Cracking, 84 = Password Cracking, 85 = Remote Access Program, 86 = Made for AdSense, 88 = Web Advertisement; - Lifestyle categoty: 18 = Recreation/Hobbies, 19 = Arts, 20 = Entertainment, 22 = Cult/Occult, 29 = Cultural Institutions, 30 = Activist Groups, 33 = Games, 44 = Alternative Journals, 47 = Personals/Dating, 54 = Religion, 55 = Personal Sites, 61 = Society/Lifestyle, 63 = Gun Clubs/Hunting, 64 = Restaurants/Food, 65 = Sports, 66 = Travel, 68 = Humor, 87 = For Kids; - Network Bandwidth categoty: 23 = Internet Radio and TV, 43 = Photo Searches, 56 = Personal Network Storage/File Download Servers, 57 = Peer-to-Peer, 69 = Streaming Media/MP3, 70 = Ringtones/Mobile Phone Downloads, 71 = Software Downloads, 72 = Pay to Surf |
policy.url_filtering.filter_rules.categories[].uc_type |
integer |
URL category |
1 = Adult, 2 = Business, 3 = Communications and Search, 4= General, 5 = Internet Security, 6 = Lifestyle, 7 = Network Bandwidth |
policy.url_filtering.level |
integer |
filter Strength of URL Filtering |
1 = High, 2 = Medium, 3 = Low, 4 = Custom |
policy.wtp.enable_bes |
integer |
Block pages containing malicious script |
1 = true; 0 = false |
policy.wtp.enabled |
integer |
Enable Web Reputation (Windows) |
1 = true; 0 = false |
policy.wtp.level |
integer |
Security level of Web Reputation |
1 = Low, 2 = Medium, 3 = High |