-
-
-
Web content filter device policy
This content has been machine translated dynamically.
Dieser Inhalt ist eine maschinelle Übersetzung, die dynamisch erstellt wurde. (Haftungsausschluss)
Cet article a été traduit automatiquement de manière dynamique. (Clause de non responsabilité)
Este artículo lo ha traducido una máquina de forma dinámica. (Aviso legal)
此内容已经过机器动态翻译。 放弃
このコンテンツは動的に機械翻訳されています。免責事項
이 콘텐츠는 동적으로 기계 번역되었습니다. 책임 부인
Este texto foi traduzido automaticamente. (Aviso legal)
Questo contenuto è stato tradotto dinamicamente con traduzione automatica.(Esclusione di responsabilità))
This article has been machine translated.
Dieser Artikel wurde maschinell übersetzt. (Haftungsausschluss)
Ce article a été traduit automatiquement. (Clause de non responsabilité)
Este artículo ha sido traducido automáticamente. (Aviso legal)
この記事は機械翻訳されています.免責事項
이 기사는 기계 번역되었습니다.책임 부인
Este artigo foi traduzido automaticamente.(Aviso legal)
这篇文章已经过机器翻译.放弃
Questo articolo è stato tradotto automaticamente.(Esclusione di responsabilità))
Translation failed!
Web content filter device policy
You can add a device policy in XenMobile to filter web content on iOS devices by using Apple’s auto-filter function with specific sites that you add to allow and block lists. This policy is available only on iOS 7.0 and later devices in Supervised mode. For information about placing an iOS device into Supervised mode, see To place an iOS device in Supervised mode by using the Apple Configurator.
Note:
- Android devices don’t support web content filtering.
- From iOS version 16.5 and later, the Web Content Filter device policy stops recognizing
https://localhost
in the allow list. This issue results in some apps becoming unresponsive. Also, adding a derivative of the URL such ashttp://localhost:
,http://localhost:*
, and so on to the allow list doesn’t resolve the issue.
To add or configure this policy, go to Configure > Device Policies. For more information, see Device policies.
iOS settings
- Filter type: Click Built-in or Plug-in in the drop-down list, and then follow the procedures that follow for the option you choose. The default is Built-in.
Built-in filter type
-
Web Content Filter
- Auto filter enabled: Whether to use the Apple auto-filter function to analyze websites for inappropriate content. The default is Off.
-
Permitted URLs: This list is ignored when Auto filter enabled is set to Off. When Auto filter enabled is set to On, the items in this list are always accessible whether the auto filter allows access or not. For each URL you want to add to the allow list, click Add and do the following:
- Type the URL of the permitted website. You must add
http://
orhttps://
before the web address. - Click Save to save the website to the allow list or click Cancel not to save it.
- Type the URL of the permitted website. You must add
-
Blacklisted URLs: Items in this list are always blocked. For each URL you want to add to the block list, click Add and do the following:
- Enter the URL of the website to be blocked. You must add
http://
orhttps://
before the web address. -
Click Save to save the website to the block list or click Cancel not to save it.
Note:
The XenMobile Server console includes the terms “blacklist” and “whitelist”. We are changing those terms in an upcoming release to “block list” and “allow list”.
- Enter the URL of the website to be blocked. You must add
-
Bookmark whitelist
-
Bookmark Whitelist: Specifies the sites that users can access. To enable access to websites, add their URL.
-
URL: The URL of each website that users can access. For example, to enable access to the Secure Hub store, add the XenMobile Server URL to the URL list. You must add
http://
orhttps://
before the web address. This field is required. - Bookmark folder: Enter an optional bookmark folder name. If this field is left blank, the bookmark is added to the default bookmarks directory.
-
Title: Enter a descriptive title for the website. For example, type “Google” for the URL
https://google.com
. - Click Save to save the website to the allow list or click Cancel not to save it.
-
URL: The URL of each website that users can access. For example, to enable access to the Secure Hub store, add the XenMobile Server URL to the URL list. You must add
-
Bookmark Whitelist: Specifies the sites that users can access. To enable access to websites, add their URL.
Plug-in filter type
- Filter name: Enter a unique name for the filter.
- Identifier: Enter the bundle ID of the plug-in that provides the filtering service.
- Service address: Enter an optional server address. Valid formats are IP address, host name, or URL.
- User name: Enter an optional user name for the service.
- Password: Enter an optional password for the service.
- Certificate: Click an optional identity certificate in the drop-down list that has to be used to authenticate the user to the service. The default is None.
- Filter WebKit traffic: Select whether to filter WebKit traffic.
- Filter Socket traffic: Select whether to filter socket traffic.
-
Custom Data: For each custom key you want to add to the web filter, click Add and then do the following:
- Key: Type the custom key.
- Value: Type a value for the custom key.
- Click Save to save the custom key or click Cancel not to save it.
-
Policy settings
-
Remove policy: Choose a method for scheduling policy removal. Available options are Select date and Duration until removal (in hours)
- Select date: Click the calendar to select the specific date for removal.
- Duration until removal (in hours): Type a number, in hours, until policy removal occurs. Only available for iOS 6.0 and later.
-
Remove policy: Choose a method for scheduling policy removal. Available options are Select date and Duration until removal (in hours)
Share
Share
In this article
This Preview product documentation is Citrix Confidential.
You agree to hold this documentation confidential pursuant to the terms of your Citrix Beta/Tech Preview Agreement.
The development, release and timing of any features or functionality described in the Preview documentation remains at our sole discretion and are subject to change without notice or consultation.
The documentation is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making Citrix product purchase decisions.
If you do not agree, select I DO NOT AGREE to exit.