CONTENTSiv M86 S ECURITY, R3000 E VALUATION GUIDEHow to test the Safe Search Enforcement feature ..........................................................24Search Engine Keyword Filtering ...........................................................................................25How to configure Search Engine Keyword Filtering ........................................................25How to test Search Engine Keyword Filtering .................................................................26Attachment filtering ................................................................................................................27How to configure attachment filtering ..............................................................................27How to test attachment filtering .......................................................................................28Wildcard filtering .....................................................................................................................28How to configure wildcard filtering ...................................................................................29How to test wildcard filtering . ...........................................................................................30Configure, test, block services. ................................................................................... 31Anonymous proxies ................................................................................................................31How to configure anonymous proxies .............................................................................31How to test anonymous proxies ......................................................................................32Block IM, P2P applications and streaming media ..................................................................33Configure IM, P2P, streaming media blocking .................................................................33How to test for IM ............................................................................................................34How to test for P2P ..........................................................................................................34How to test for streaming media ......................................................................................34Real Time Probes and X-Strikes Blocking.................................................................. 35Real Time Probes feature ......................................................................................................35How to configure Real Time Probes ................................................................................35How to test Real Time Probes .........................................................................................36X-Strikes feature ....................................................................................................................37How to configure the X-Strikes feature ............................................................................37How to test X-Strikes .......................................................................................................40