Skip to content
Web Safety
Group Policy
Initializing search
Web Safety
Introduction
Features
How it Works
Installation
Installation
Installation Methods
Virtual Appliance
Virtual Appliance
Introduction
VMware vSphere/ESXi
Microsoft Hyper-V
IP Address
Login Credentials
Terminal Console
Build Artefacts
Maintenance
Manual Install
Manual Install
Introduction
Prepare OS
Install Squid
Install ClamAV
WebSafety Core
WebSafety UI
Timezone
Browser Settings
Browser Settings
Manual Settings
Automatic WPAD
Group Policy
Upgrades
HTTPS Decryption
HTTPS Decryption
How Decryption Works
Decryption Certificate
Install Decryption Certificate
Install Decryption Certificate
Download Decryption Certificate
Microsoft Windows
Microsoft Windows
Manual Installation
Group Policy
Intermediate Certificate
Apple
Apple
Apple MacOS
Apple IOS
Missing Certificate
Enable Decryption
Verify Decryption
Exclusions
Troubleshooting
Proxy Authentication
Proxy Authentication
Authentication Methods
IP Address Labelling
Local Users DB
Captive Portal
Captive Portal
Introduction
General Settings
Auth Backends
How it Works
Sessions
Limitations
Active Directory
Active Directory
Introduction
Assumptions
DNS Settings
Time Settings
Create User
Link to Domain
Kerberos Auth
NTLM Auth
Basic LDAP
Config Files
Verify Auth
Policy Groups
Troubleshooting
Web Filter
Web Filter
Introduction
Filtering Policy
Add Policy
Policy Members
Policy Exclusions
Advanced Settings
Blocking Ads
Blocking Sites
Dynamic Categorization
Online Privacy
Blocking Adult Content
Blocking Adult Content
Filtering Settings
Content Inspection
Safe Search
URL Heuristics
Blocking Files
YouTube Filtering
Bandwidth Limits
GEO-IP Blocking
Advanced ACLs
Bypassing Blocks
Custom Blocked Page
Definition Updates
Automation
Thread Protection
Thread Protection
Introduction
eCAP ClamAV
Chained ICAP
Safe Browsing
Traffic Monitor
Traffic Monitor
Introduction
Access Logs
Data Retention
Cron Reports
Statistics
Reporting
Realtime
History
Custom
Regenerate
Redundancy
Redundancy
Need for Redundancy
DNS Round Robin
HAProxy / PROXY Protocol
Configuration Sync
Consolidated Reporting
Limitations
Performance
Performance
Introduction
Prometheus
Grafana
Integrate
Exporter
Scrape Metrics
Dashboards
Alert Manager
Conclusion
FAQs
FAQs
Squid Proxy
Squid Proxy
Authentication
Authentication
Which Auth Scheme
Non Authenticated
Mix Authenticated
Mix Auth Modes
Transparent Auth
Basic LDAP
Wireshark Capture
Event 14 KDC
LDAP to LDAPS
LDAP to LDAPS
Introduction
Identify LDAP
Configure LDAPS
Switch to LDAPS
Disable LDAP
Network
Network
Non Standard Ports
Non FQDN Connections
Allow to Proxy FTP/SSH
Upstream Proxy
Admin UI Redirect
TLS Sync Error
Squid Proxy is Slow
DNS Caching
Host Header Forgery
Explicit vs Transparent
HTTPS Decryption
HTTPS Decryption
Non Root Certificate
Cannot Connect using HTTPS
No Decryption Settings
Still Decrypting
Unable to Get Issuer Cert
How to Build Squid
How to Build Squid
Update Packages
Install Build Tools
Build Squid
Use Repository
Web Filter
Web Filter
ICAP Error
Locked Policy
Block Unblocked Games
Global Exclusions
Traffic Monitor
Traffic Monitor
YouTube Videos Report
Admin UI
Admin UI
Default Credentials
Restart and Reload
Install License Key
Auto Logoff
Add More Users
Static Files
Cert and PEM Files
Own HTTPS Certificate
General Questions
General Questions
Testing Connectivity
Tcpdump on Squid
Disk Space
High CPU Usage
Tutorials
Tutorials
Introduction
Web Safety in Azure
Web Safety in Azure
Introduction
Deployment
Allow Connections
Browser Settings
Conclusions
Web Safety in Amazon AWS
Web Safety in Amazon AWS
Introduction
Deployment
Allow Connections
Browser Settings
Adjust IMDSv2 Meta
Conclusions
pfSense DNS/HTTPS Filter
pfSense DNS/HTTPS Filter
Introduction
pfSense Firewall
DNS Safety
Web Safety
Additional Steps
Conclusions
Transparent Squid on Mikrotik
Transparent Squid on Mikrotik
Introduction
Network Settings
Traffic Mangling
Traffic Routing
Transparent Squid
Verify Filtering
Conclusions
Policy Based Routing Squid
Policy Based Routing Squid
Introduction
Network Settings
Traffic Routing
Transparent Squid
Verify Filtering
Conclusions
Microsoft Entra ID with Squid
Microsoft Entra ID with Squid
Introduction
Deploy Web Safety
Post Deploy Config
Captive Portal
Verify Authentication
Conclusions
Google OAuth on Squid
Google OAuth on Squid
Introduction
Deploy Web Safety
Post Deploy Config
Captive Portal
Verify Authentication
Conclusions
Development
Versions
License Agreement
OpenSource Licenses
Other Projects
Group Policy Proxy Settings