- Log on the WFBS console then click Security Settings.
- On the client tree, select the group that you want to configure, then click Configure. For example, click Server and then click Configure.
- Click Antivirus/Anti-spyware on the side menu.
- Scroll down and then click the [+] button beside Exclusions.
- Select the Enable Exclusions checkbox.
- Make sure the checkbox for Do not scan directories where Trend Micro products are installed is enabled.
- To exclude specific folders or directories, under "Do not scan the following directories", type the directory path (e.g. C:\temp) then click Add. Note that all subdirectories inside the directory you specify will also be excluded from scanning.
- To exclude a specific file, under "Do not scan the following files", type its path and filename (e.g. C:\temp\temp.log) then click Add.
- To exclude a specific file type, under "Do not scan files with the following extensions", select the file type from the list then click Add.
- If the file type is not in the list, you can type the extension then click Add.
- Click Save.
Access Denied (policy_denied). Your system policy has denied access to the requested URL. For assistance, contact your network support team.
While browsing the internet, you may encounter the message: "Access Denied (policy_denied). Your system policy has denied access to the requested URL. For assistance, contact your network support team." This message indicates the internet traffic is being filtered. The most common source of an internet traffic filter is in corporate environments that use a proxy server or a firewall appliance designed to filter web traffic. Some businesses are configured as satellite locations using a VPN tunnel. In these configurations, the VPN may be configured to filter internet traffic. In rare instances, the Internet Service Provider is filtering internet traffic. Typically though, your IT Department or a Network Management Team has configured your internet traffic to be filtered. Isolating Source of Web Filtering In an environment that is unmanaged and the source of the filtering is unknown, following are some steps you may wish to peform: Th...
Comments
Post a Comment