![](http://pdfasset.owneriq.net/f/a3/fa37ca3d-3c44-45c6-805a-3701a8763a70/fa37ca3d-3c44-45c6-805a-3701a8763a70-bg5.png)
8E6 TECHNOLOGIES, PROXYBLOCKER USER GUIDE v
CONTENTS
INTRODUCTORY SECTION ...............................................1
8e6 ProxyBlocker ........................................................................1
About this User Guide ................................................................1
How to Use this User Guide .......................................................3
Conventions ......................................................................................3
Terminology ......................................................................................4
Overview ......................................................................................9
Environment Requirements .....................................................10
Workstation Requirements ..............................................................10
Network Requirements ....................................................................10
Chapter 1: Filtering Operations ...............................................11
Invisible Mode .................................................................................11
Global Group ............................................................................13
Static Filtering Profiles ..............................................................16
Master IP Group Filtering Profile.........................................16
IP Sub-Group Filtering Profile .............................................16
Individual IP Member Filtering Profile .................................16
Global Filtering Profile.........................................................17
Override Account Profile .....................................................17
Time Profile.........................................................................17
Lock Profile .........................................................................17
8e6 Supplied Categories.....................................................19
Custom Categories .............................................................19
Rules ........................................................................................20
Minimum Filtering Level ............................................................20
Filter Settings ............................................................................21
Filtering Rules .................................................................................22
Filtering Levels Applied ............................................................22
Chapter 2: Logging and Blocking ............................................25
Web Access Logging ......................................................................25
How IM and P2P Blocking Works .............................................26