Content Filtering and Optimizing Scans
234
ProSecure Unified Threat Management (UTM) Appliance
 To make changes to an existing application control profile:
1. In the Action column to the right of the application control profile, click the Edit table
button. The Add or Edit Application Control Profile screen displays (see Figure 128 on
page 229).
2. Modify the settings that you wish to change (see the previous procedure).
3. Click Apply to save your changes. The modified application control profile is displayed in
the Global Application Control Profile table or the Application Control Profiles table.
 To delete one or more application control profiles:
1. Select the check box to the left of each custom application control profile that you want
to delete, or click the Select All table button to select all custom application control
profiles. (You cannot delete the global application control profile.)
2. Click the Delete table button.
Set Exception Rules for Web and Application Access
You can set up to 200 exception rules for users and members of a group to allow access to
applications, file extensions and protocols, web categories, and URLs that you have blocked
for all other users. Or you can do it the other way around—block access to applications, file
extensions and protocols, web categories, and URLs that you have allowed access to for all
other users.
If you have not created a custom group, an exception rule can apply to either one of the
following groups or individual users:
• All users
• All authenticated users
• All unauthenticated users
• A local group or local user
• A group or users that is defined by its IP address
• A Lightweight Directory Access Protocol (LDAP) group or LDAP user
• A RADIUS VLAN group
To further refine exception rules, you can create custom groups that allow you to include a
combination of local groups and local users, groups and users that are defined by their IP
address, LDAP groups and users, and RADIUS groups and users. For more information, see
Configure Custom Groups on page 375.
Note: Users and groups to which access exception rules apply are not the
same as LAN groups. For information about how to specify
members of a LAN group and to customize LAN group names, see
Configure Authentication Domains, Groups, and Users on page 358.