Author Archives: admin

Wavecrest Computing Provides the Best All-around Customer Experience in the Web Security and Web-use Forensic Markets

Wavecrest Computing is the recognized leader in the Web security and Web-use forensic markets. We directly address our clients’ needs with over 17 years of experience developing and supporting Web Security and forensic solutions. We believe delivering the highest quality product at the industry’s most competitive pricing is fundamental to our success. Wavecrest is also proud to provide the best in-house, U.S. based technical support in the industry. Our customers know that they will receive courteous, personalized attention when they speak with our knowledgeable and skilled personnel. We are committed to making sure each and every customer has a successful experience using our products.

A long-standing customer, Karleen Carlson of Van Diest Supply Company, agrees. “When I seek out a company to provide a product or service, I want it all — a great product, a great price, a salesperson that is responsive and treats me like I am their only customer, and technical support that is intelligent, easy to access, and easy to understand. Wavecrest meets all of these criteria. We have used Cyfin, CyBlock ISA, CyBlock Software and CyBlock Cloud. Each of these products met our needs at a fraction of the cost of what the competitors are offering. Any pre-sales questions we had were answered promptly, and the Wavecrest technical support ranks in the top 5% of all technical support I have worked with in 29 years of being in IT.”

We know you will end up agreeing as well that ‘The Wavecrest Way’ is the right way. To gain a fuller understanding of Wavecrest’s product selection, we invite you to contact us personally or to take a moment to visit our Web site and download a product for a free evaluation. Our Technical Support Services are here to help throughout the evaluation process.

New User Interface Now Available in CyBlock/Cyfin Release 9.0.4

We are excited to announce the availability of a major release with a redesigned user interface and enhanced functionality in our products – CyBlock Software, CyBlock Appliance, and Cyfin. Some of the highlights of the enhancements are listed below within the new menu structure.

  • Rebranding
    • CyBlock Proxy has been renamed to CyBlock Software, and Cyfin Reporter to Cyfin.
    • Product version numbers have been consolidated, and all products now have the same version number.
  • Logon
    • A more secure logon is available. After logging on with the default password, you will be required to change your password on the Change Your Password screen. If you forget your password, a “Forgot password” link is available to reset your password to the default.
  • Menu Structure
    • Web Management (CyBlock). In this menu, you will find the Filtering features, such as Control Web Categories, Web Content, and Web Search, and Web Blocking Message. Bandwidth Management and the Client Download and Install screen for CyBlock Appliance are also in this menu.
      • You can now customize your blocking message using a Message Editor embedded in the interface. Previously, your HTML file would have to be modified outside the product. A Restore Default button allows you to revert to the Wavecrest default blocking message.
    • Data Management. This menu covers the screens for setting up, viewing, and revalidating log file data. The screens for enabling and configuring settings for the Report Database are in this menu as well as the screens for importing, viewing, and deleting the data.
    • User Management. This menu covers all aspects of managing users including adding groups and IDs, setting up and importing users from Active Directory, importing users from a text file, adding administrator and operator logon accounts, and authentication.
      • The Change Your Password screen lets you change your password at any time and requires your password to meet certain criteria.
    • Categorization. This menu contains all screens associated with the Wavecrest URL List including changing the location, downloading the list, checking the categories of URLs, adding custom categories, and selecting categories to display on reports.
    • Real-Time Monitors (CyBlock). In this menu, you will find the protocol (CyBlock Appliance), Web, and bandwidth monitors.
      • The Real-Time Web Monitor includes new options to display authentication challenge (407) requests and wrapped URLs. The settings and controls are now also available in a toolbar and can be changed while the monitor is gathering data in real time.
    • Reports (CyBlock Software and Cyfin). This menu covers running Dashboard Top and Trend charts, creating different types of reports, and viewing sample reports. The ability to customize or schedule a report has been consolidated with creating a report giving you a streamlined way to manage reports.
      • The Dashboard Top Coached Report is now available in CyBlock Appliance.
    • System Status. This menu covers system information that is intended for administrators’ use, such as server status and information, filter status (CyBlock), job queue, and policy reports.
      • New screens allow you to see array communication messages, dates and times of the URL List and product updates, product event errors and messages, and profiling information. The event and profiling logs are used by Technical Support for troubleshooting purposes.
    • Settings. In this menu, you will find those features that usually require a one-time setup, such as license information, product admin e-mail address, PAC file, SSL certificates, SSL inspection, array setup, memory settings, and report options.
      • (CyBlock Appliance) The Web Redirects screen allows you to redirect HTTP traffic from port 80 to port 8080 and also exclude IP addresses from being redirected.
    • Help.  Along with product documentation, Support screens, and contact information, the Help menu now contains the Category Descriptions and Check for Product Updates screens.

To see the full release notes for your product, visit our Support Web site. You can download the latest release by going to the Administration – Product Update screen in your Cyfin or CyBlock product.

For additional assistance, please contact us.

CyBlock Mobile Security App is Now Available for Cloud Customers

Now available for cloud customers, CyBlock Mobile Security App for iPhone and iPad devices. CyBlock Mobile Security App, a companion to the easy-to-implement CyBlock Web Security Cloud, benefits Cloud customers of all sizes and quickly safeguards their mobile devices. CyBlock App enables your employees to work efficiently and securely while accessing the internet on their mobile devices . Easily enforce your company’s AUP on iOS devices by defining one or more Web-use policies to successfully address Web security threats, Internet abuse, legal liability, and workforce productivity.

“Mobile security is a top concern for our clients. The introduction of CyBlock Mobile Security App provides our clients with the tools to continue providing a secure and productive environment for their ever-growing distributed workforce.” CEO – Dennis McCabe

New CyBlock and Cyfin Releases Now Available

We recently released the following new versions of CyBlock and Cyfin:

  • CyBlock Software 6.8.3a
  • CyBlock Appliance 6.8.3a
  • CyBlock Cloud 7.0.3a
  • Cyfin 8.8.3a

To see the full release notes for your product, visit our Web site or Support Forum. For versions 8.8.3a and 6.8.3a, you can download the latest release by going to the Administration – Product Update screen in your Cyfin or CyBlock product.

For additional assistance, please contact us.

Viewing Exceeded IDs for Your License

When you run a report and it shows that you have exceeded your license limit, you can determine the reason by viewing the idnir.txt file. The idnir.txt file is generated when your license limit has been exceeded and is located in the …\wc\cf\db folder for Cyfin or the …\wc\cyblock\db folder for CyBlock Software.

The idnir.txt file will show all the IDs that exceeded your license limit and were not in the report you ran.

You can determine whether these IDs are internal users, external IP addresses, or other extraneous types of IDs. Viewing this file will allow you to assess whether you have a logging issue or whether your number of licensed users needs to be increased.

To increase your number of licensed users, please contact Wavecrest Sales toll-free at (877) 442-9346, Ext. 3, or send an e-mail to sales@wavecrest.net.

For additional assistance, please contact Technical Support at (321) 953-5351, Ext. 4 or support@wavecrest.net.

CyBlock Web Security Solution is now available in the Cloud

 Melbourne, FL, Dec. 9, 2013 (GLOBE NEWSWIRE) — Wavecrest Computing, the makers of CyBlock, have just announced the availability of a Cloud version of CyBlock. Now companies have access to the most popular and solid Web Security solution in the Cloud.

CyBlock Cloud Web Security is an easy-to-implement solution that benefits organizations of all sizes and quickly safeguards your network. Whether you have branch offices, remote users, or just one location, CyBlock Cloud protects your company and its employees allowing you to take advantage of time and money savings. Enforce your company’s AUP by defining one or more Web-use policies to successfully address Internet abuse, legal liability, workforce productivity, and Web security threats.

“We are very excited to be extending our product line into the Cloud market. Now, new and existing customers who are considering a cloud solution have one less worry. Starting today they can access an industry tested and proven solution with a successful 13 year track record. CyBlock Cloud is a perfect addition to Wavecrest’s line of industry leading Web Security Solutions.” CEO – Dennis McCabe

Wavecrest Computing has been the recognized leader in Web-access security and Web-usage forensics solutions for the last 16 years. Our scalable filtering and forensic reporting analysis products are designed to enable organizations to successfully address Internet abuse, legal liability, workforce productivity, and Web security threats. Wavecrest Computing’s client list includes well-known corporations such as Edward Jones, General Electric, Lockheed Martin, Blue Cross Blue Shield, MillerCoors, Rolex, Siemens, and others.

Link to Press Release.

Thanksgiving and Cyber Monday Approach: Watch Your Employees

Door-busters, Black Friday, Cyber Monday: According to Visa, 140 million people plan to shop over Thanksgiving weekend this year – a significant decrease from the 247 million who did so in 2012. Nonetheless, 37% of Americans said they will shop on Black Friday, while 34% plan to shop on Cyber Monday. And that means security risk for companies, whose employees will undoubtedly be shopping online during work hours.

To view the full article click here.

Changing the Password for Interactive Reports

Interactive Reporting allows users to get more detailed information on employee Web use by clicking a report’s elements. For example, from a high-level report such as Site Analysis, you can click an ID name, and a User Audit Detail report will automatically begin running on that user.

Interactive reports are delivered to recipients via a link in a report e-mail. A password is needed to retrieve the reports because they are password protected. The default password is “password;” however, this can be easily changed.

  1. Go to the Advanced Settings – Report Settings – Interactive Reports screen.

  1. In the Reports Password field, type the new password that you want to use.
  2. Click Submit.
  3. When an Interactive report is sent via e-mail to a recipient, the recipient will receive a link (or two links depending on server settings) to the report.
  4. To open the report, click the appropriate link. A screen is displayed to enter a password to retrieve the report.

  1. Type your new password and click Login.
  2. After the report is opened, click an ID name to get more details on a user’s Web activity. By clicking the ID name, a request is submitted to get a User Audit Detail report on that particular user, and the report for that user is displayed.

For additional assistance, please contact Technical Support at (321) 953-5351, Ext. 4 or support@wavecrest.net.

Wavecrest Computing celebrates 16 years

Wavecrest Computing celebrates 16 years of loyal customers who have helped the company become a strong, thriving, and innovative business. “What makes Wavecrest stand out from competitors is the on-going commitment to customers and customer service. When customers call, they talk to a real person and they receive personalized attention every time.” Read more about Wavecrest Computing’s products and history: https://www.globenewswire.com/news-release/2013/10/07/578419/10051153/en/Wavecrest-Computing-Celebrates-16-Years-of-Business.html

How to Properly Configure Windows Server 2012 and Windows Server 2008 R2

Configuring Windows Server 2012 and 2008 R2 to push out a group policy to all users can be challenging with Microsoft’s introduction of Group Policy Preferences. These preferences provide more than 20 Group Policy extensions that increase the number of configurable settings in a Group Policy object (GPO). Within most preference items, the configuration interface looks similar to the applicable user interface for configuring settings so the layout will be familiar. The guidelines to set up users’ browsers with a proxy configuration are alike for Internet Explorer 7, 8, 9, and 10, and the following instructions are for Internet Explorer 10.

  1. Go to Group Policy Management, and select the GPO to which you want to add the Internet Explorer 10 settings.
  2. Edit the GPO.
  3. In the Group Policy Management Editor, go to User Configuration, Preferences, Control Panel Settings, and then Internet Settings. If you have already created settings for Internet Explorer 7, 8, and 9, they will be displayed here.
  4. Right-click in the right-hand pane, select “New,” and then select “Internet Explorer 10.”
  5. In the New Internet Explorer 10 Properties dialog box, click the Connections tab, and then click LAN Settings.
  6. Under Proxy server, select the check box to enable the “Use a proxy server…” option.
  7. In the Address field, enter the IP address of your proxy server, and in the Port field, enter the port number.
  8. Now you need to enable the settings and apply them to all users. You can individually enable and disable underlined settings or settings preceded by a circle within a preference item. The underlining or circle of the setting indicates whether it is currently enabled or disabled.
    • A setting with a solid green underline or a green circle is enabled. The preference extension applies this setting’s value to the user or computer.
    • A setting with a dashed red underline or red circle with a slash is disabled. The preference extension does not apply this setting’s value to the user or computer.
  9. Press the following function keys to enable or disable the settings within a preference item. To select a setting, click the actual text of the setting or its text field.

      • F5 – Enable all settings on the current tab.
      • F6 – Enable the currently selected setting.
      • F7 – Disable the currently selected setting.
      • F8 – Disable all settings on the current tab.

    The following diagram illustrates how the function keys work.

  10. After enabling the settings, select the check box to enable the “Bypass proxy server…” option.
  11. Click OK, Apply, and then OK to save the changes. You will see the Internet Settings entry for Internet Explorer 10 along with Internet Explorer 7, 8, and 9, if they were previously created.

For additional assistance, please contact Technical Support at (321) 953-5351, Ext. 4 or support@wavecrest.net.

Sources:

https://blogs.technet.com/b/grouppolicy/archive/2008/10/13/red-green-gp-preferences-doesn-t-work-even-though-the-policy-applied-and-after-gpupdate-force.aspx

https://technet.microsoft.com/en-us/library/cc754299.aspx