Get access to immediate incident response assistance.
Eliminate active threats with 24/7 threat detection, investigation, and response.
Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.
Advance your cybersecurity program and get expert guidance where you need it most.
Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.
Prevent unauthorized access and exceed compliance requirements.
Stop email threats others miss and secure your organization against the #1 ransomware attack vector.
Prepare for the inevitable with 24/7 global breach response in-region and available on-site.
Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.
Using logs, it is possible to determine if cached content is provided to the user. If an object is served from a cache, there will be no record of the request in the logs. In order to see all transactions, it may be necessary to temporarily change the logging settings. Please note that increased logging can reduce performance, so it is important to change the logging settings back to their previous values when troubleshooting is complete.
The systems administrator should be aware of all caches that might prevent requests from reaching the scanner. The administrator should also know how to manage these caches. Common caches include:
When the Finjan system is implemented in proxy mode, one way to determine if a policy change took effect is to configure a browser to proxy directly through the Finjan proxy. This will eliminate the possiblility of interference from any network caching solutions. If a browser having a clear cache and configured to proxy directly to the Finjan system continues to receive the wrong policy, then the policy should be inspected once more. In environments that utilize different user policies, please verify that the correct policy is assigned to the test browser.Content received from Multiple Web HostsEven if the URL list entry matches the website shown in the browser's address bar, it is important to note that many web pages are built from content that comes from several websites. For example, on a news site, the initial links on the page might come from one server, while the dynamic content (links to new articles) might come from a different server in a completely different domain. Again, the logs should reveal which sites are involved in the transaction. As with caching, it may be necessary to temporarily increase the logging level to track the transactions associated with the web page. Once the all of the involved sites have been identified, the logs can be returned to their former settings and the policy can be modified appropriately to allow the desired page.VSOS8.3.x8.4.x8.5.0
To contact Trustwave about this article or to request support: