The Web Filter Connector requires administrator rights for installation and is installed system-wide.
The ConnectorID is required for the installation, which can either be transferred via command line parameters or entered in an enclosed connector.cfg, which is evaluated during the installation.
Manual installation with parameters
msiexec /i Webfilter ConnectorSetup.msi [/qn] connectorId = 10000000-0001 [/l * v log.txt]
/qn - silently installs the MSI package
/l * v log.txt - MSI log outputs in the corresponding file
Installation via software distribution group policy
The MSI package can be installed via software distribution using group guidelines.
To do this, save the MSI package on a network share that can be reached by the target computers (or similar) and put the connector.cfg file, which contains the connectorID, in the same directory. The installation is carried out by computer. To do this, assign all the desired computer accounts to an OU and assign a new or existing group policy to this OU. Then edit this group policy and add the Web Filter Connector Setup MSI package under Computer Configuration > Policies > Software Settings.
With gpupdate/force you can force the updating of all group policies.
Configuration
During the installation, entries are made in the registry with which the Web Filter Connector can be configured.
All registry keys are stored as follows:
HKEY_LOCAL_MACHINE\software\Wow6432Node\cloud-security.net\Webfilter Connector
32 bit: HKEY_LOCAL_MACHINE\software\cloud-security.net\Webfilter Connector
64 bit: HKEY_LOCAL_MACHINE\software\cloud-security.net\Webfilter Connector
Fields:
- connectorId: Is transmitted to the server by the Web Filter Connector and is used for authentication
- active: activates (1) / deactivates (0) the Web Filter Connector, standard is activated (1)
- debug: activated (1) / deactivated (0) the debug logging, standard is deactivated (0)
- additionalIps: IPs of additional proxy servers to which the Web Filter Connector should react. These should either be left empty or a comma-separated list of IPs should be used (comma only, no further separators!)
- additionalPorts: Additional ports to be processed
Debug outputs are written to %LOCALAPPDATA%\Webfilter Connector, except for:
WindowsXP:
C:\Documents and Settings\{user}\Local Settings\Application Data\Webfilter Connector
Windows 7:
C:\Users\{user}\AppData\Local\Webfilter Connector
Note: The Web Filter Connector installs it's DLL(s) in the Windows directory.
Windows x86 :
WINDOWS\System32\Webfilter Connector32.dll
Windows x64:
WINDOWS\System32\Webfilter Connector64.dll
WINDOWS\SysWoW64\Webfilter Connector32.dll
How do I test the functionality?
The functionality can be tested by
- Under Control Panel >Programs and Applications it is checked whether the Cloud Security Connector is offered for deinstallation
- Surfed the Internet (with Proxy.pac also configured beforehand) and a page forbidden in the categories is called up. A message should then appear there, including the login name of the user (which was transmitted through the Web Filter Connector).
Note: In the event of an error, you can use the generated log file log.txt in the Hornetsecurity Connector
Send download directory to Hornetsecurity.