Web Reputation Proxy Settings

If your endpoints connect to the Internet through a proxy server, you must identify that proxy and provide log-on credentials. The credentials will be used by those CPM clients that you target with this Action to connect to the Internet. Configure the Web Reputation proxy settings using either the Web Reputation Proxy Settings Wizard or the Web Reputation-Enable/Configure Proxy Settings Fixlet.

Configure the Web Reputation Proxy Settings Wizard

  1. From the IBM BigFix Console, click Endpoint Protection on the lower-left pane.
  2. From the upper-left navigation pane, go to Core Protection Module > Configuration > Web Reputation Proxy Settings > Web Reputation Proxy Settings Wizard. The Web Reputation Proxy Settings Wizard window opens.
  3. Click Use the following proxy settings.
  4. Either provide the necessary proxy settings information or click Use to reload previously configured settings.
  5. Click Create Configuration Task and deploy the proxy settings to the necessary clients.

Configure Web Reputation Proxy Settings Using the Fixlet

You will be prompted to provide a password for the proxy server. Be sure to encrypt the password using the utility provided in the Task before deploying the Task (user name and password will be visible in the Action’s Summary Details).
  1. From the BigFix Console, click Endpoint Protection on the lower-left pane.
  2. From the upper-left navigation pane, go to Core Protection Module > Common Tasks > Web Reputation.
  3. From the right pane, select Web Reputation - Enable/Configure Proxy Settings. A screen displaying the Task Description tab opens.
  4. Download and extract the encryption program, which will have a name such as: TMCPMEncrypt.exe utility tool.
    1. Run the program. At the prompt, type your password in the field.
    2. Copy the encrypted results (you will be prompted to paste them in later).

  5. Back in the Task Description window, below Actions, click the hyperlink. At the prompt, provide the following:
    • Proxy IP address or host name.
    • Proxy port.
    • User name for proxy authentication.
    • Encrypted password (paste the password you encrypted).

    The Take Action screen opens.

  6. In the Target tab, a list of endpoints that are running the CPM client appears.
  7. Select all applicable computers (those that are running WR) and then click OK.
  8. At the prompt, type your private key password and click OK.
  9. In the Action | Summary window that opens, monitor the "Status" and "Count" of the Action to confirm that it is "Running" and then "Completed."