Malware Prevention: Frequently Asked Questions

  1. How is a website determined to be distributing malicious software?
  2. The proxy server's list of blocked websites is continuously updated using information from the Trend Micro Smart Protection Network. The Trend Micro Smart Protection Network uses a global network of threat intelligence sensors to continually update e-mail, web, and file reputation databases in the cloud.

  3. The proxy server blocked access to a website I need to do my job. How can I get access?
  4. Contact the Service Desk and ITS will work with you to try to find a solution. Please note that no exceptions to the proxy blacklist will be made.

  5. Will going through the proxy slow down my Internet access or the time it takes for pages to load?
  6. Our testing has shown that there is no perceptible difference between access via the proxy or without it.

  7. Does the proxy keep track of where I go on the Internet?
    • The UC Electronic Communications Policy allows monitoring and other techniques to ensure the security and integrity of the network.
    • Only blocked access will be logged; allowed access will not be logged.
    • Blocked access logs will be retained for a maximum of 2 weeks.
    • Strict configuration management practices will be used to ensure that unsanctioned changes to the proxy server are not made.
    • Management access to the proxy server environment will be restricted to 3 network support staff members.
    • Changes to the proxy server configuration will be documented, approved by the appropriate manager, tracked by the ticketing system, and verified.