Additional Network Settings
FAQs
How do I set up Content Restrictions?
-
Tap the toggle of the following restrictions to enable or disable:
-
Safe Search: filters out potentially oFensive and inappropriate search results
-
YouTube Restrictions: filters out potentially mature and inappropriate video content
-
Block DNS over HTTPS: prevents resolving encrypted DNS requests
-
Does not prevent encrypted website traFic (e.g., https://abc.xyz)
-
-
Block iCloud Private Relay: prevents routing web traFic through Apple’s iCloud service
-
-
Tap Content Restrictions
-
Tap the dropdown menu to select a preset grouping of content categories
-
Alternatively, tap the toggle of individual categories to enable restricting that type of content
-
-
Tap Applications
-
Search for specific mobile applications
-
Tap the mobile application to set restrictions
-
Block: total restriction
-
Always allow: no restriction
-
Allow for: restricted after a set amount of usage
-
-
Tap the X to remove the mobile application restriction
-
-
Tap Websites
-
Enter a website URL and tap the + button to set restrictions
-
Tap Block or Always Allow
-
Tap the X to remove the website restriction
-
What is the Trusted List?
-
A list of website URLs that have been designated as trusted and will not be monitored for cyberthreats
-
You should only add URLs to the Trusted List when you are confident that they are safe
How do I set up the Trusted List?
-
Tap Trusted Websites
-
To add a website, tap the + button, enter the website URL, and tap Save
-
Website URLs in the Trusted List will not be monitored for cyberthreats
-
You should only add URLs when you are confident that they are safe
-
What is the Skip Devices feature?
-
Selecting a Device bypasses Network Security by disabling packet inspection of its network traFic
-
Skipped Devices will not trigger any Security Alerts
How do I set up Skipped Devices?
-
Tap Skipped Devices
-
To select or deselect a Device, tap the checkbox next to a Device
What are Intrusion Settings?
-
The Intrusion Prevent System provides options that enhance cybersecurity monitoring and protection
How do I set up Intrusion Settings?
-
Tap Intrusion Settings
-
Tap the checkbox of the following Intrusion Settings:
-
IPS Protocol Anomaly: monitors your network activity for known behavior that could be indicative of a cyberattack
-
IPS Port-Scan-Defense: detects and blocks malicious actors scanning your system for open network ports
-
-
Tap Save
What information is available in Additional Details?
-
Total viruses detected
-
Total intrusions
-
Total web threats
-
Network Security uptime
-
Packets analyzed today
-
Last updated date/time