Additional Network Settings

FAQs

How do I set up Content Restrictions?

  • Tap the toggle of the following restrictions to enable or disable:

    • Safe Search: filters out potentially oFensive and inappropriate search results

    • YouTube Restrictions: filters out potentially mature and inappropriate video content

    • Block DNS over HTTPS: prevents resolving encrypted DNS requests

      • Does not prevent encrypted website traFic (e.g., https://abc.xyz)

    • Block iCloud Private Relay: prevents routing web traFic through Apple’s iCloud service

  • Tap Content Restrictions

    • Tap the dropdown menu to select a preset grouping of content categories

    • Alternatively, tap the toggle of individual categories to enable restricting that type of content

  • Tap Applications

    • Search for specific mobile applications

    • Tap the mobile application to set restrictions

      • Block: total restriction

      • Always allow: no restriction

      • Allow for: restricted after a set amount of usage

    • Tap the X to remove the mobile application restriction

  • Tap Websites

    • Enter a website URL and tap the + button to set restrictions

    • Tap Block or Always Allow

    • Tap the X to remove the website restriction

What is the Trusted List?

  • A list of website URLs that have been designated as trusted and will not be monitored for cyberthreats

  • You should only add URLs to the Trusted List when you are confident that they are safe

How do I set up the Trusted List?

  • Tap Trusted Websites

    • To add a website, tap the + button, enter the website URL, and tap Save

    • Website URLs in the Trusted List will not be monitored for cyberthreats

    • You should only add URLs when you are confident that they are safe

What is the Skip Devices feature?

  • Selecting a Device bypasses Network Security by disabling packet inspection of its network traFic

  • Skipped Devices will not trigger any Security Alerts

How do I set up Skipped Devices?

  • Tap Skipped Devices

  • To select or deselect a Device, tap the checkbox next to a Device

What are Intrusion Settings?

  • The Intrusion Prevent System provides options that enhance cybersecurity monitoring and protection

How do I set up Intrusion Settings?

  • Tap Intrusion Settings

  • Tap the checkbox of the following Intrusion Settings:

    • IPS Protocol Anomaly: monitors your network activity for known behavior that could be indicative of a cyberattack

    • IPS Port-Scan-Defense: detects and blocks malicious actors scanning your system for open network ports

  • Tap Save

What information is available in Additional Details?

  • Total viruses detected

  • Total intrusions

  • Total web threats

  • Network Security uptime

  • Packets analyzed today

  • Last updated date/time