Proxy settings tab

Proxy servers are used as part of internet security to hide internet users’ computers from the internet and improve access speed by caching commonly accessed sites.

If your network uses a proxy server, you can specify which proxy settings to use, the address of the proxy server, and whether to use authentication. Proxy information is stored in the AutoUpdate repository list (sitelist.xml). The proxy settings you configure here apply to all repositories in this repository list.

Note:

This feature is not available from the ePolicy Orchestrator Console. Access this feature from theVirusScan Console.

Option definitions

Option Definition
Don't use a proxy

Do not specify a proxy server.

Use Internet Explorer proxy settings

Use the proxy settings for the currently installed version of Internet Explorer.

Default = Use Internet Explorer proxy settings.

Manually configure the proxy settings

Configure the proxy settings to meet your specific needs.

Exceptions

Available only if you selected Manually configure the proxy settings.

Specify proxy exceptions. Click Exceptions to open the Proxy Exceptions dialog box:
  • Specify exceptions — Select this option to enter proxy exceptions.
  • Use semicolons (;) to separate entries — For example: internal1;internal2
HTTP

Type the address of the HTTP proxy server.

FTP

Type the address of the FTP proxy server.

Port

Type the port number of the HTTP or FTP proxy server.

Use authentication for HTTP

Use the specified credentials for accessing the HTTP proxy.

HTTP user name

Type the HTTP user name.

HTTP password

Type the HTTP password.

508 Resource Limit Is Reached

Resource Limit Is Reached

The website is temporarily unable to service your request as it exceeded resource limit. Please try again later.