Skip to main content
McAfee Enterprise MVISION Cloud

Authorized Override

You can configure session time for a session that allows authorized overriding.

When this session time has elapsed, a user request is blocked and a block message is displayed. The message also asks for the submission of a user name and password to start a new session.

These credentials must be those of an authorized user. For example, in a classroom situation, a user who gets blocked after the termination of an authorized override session could be a student, while the teacher is the authorized user.

Authentication of this user is performed according to the configured authentication method. However, when configuring this method, you cannot let it include an integrated authentication mode.

The block message also provides an option to specify the time length of the authorized override session for the user who was blocked.

The time length that is configured for this user should not exceed the time length configured for all other users as part of the module settings for authorized overriding.

You can configure authorized overriding in relation to the parameters used in the library rule set, such as URL categories, IP addresses, and user names. You can also create rules of your own using other parameters.

Configure authorized overriding

You can configure authorized overriding to restrict the web usage of your users, but allow the configured time limit to be passed by through the action of an authorized user.

  1. Select Policy | Rule Sets.
  2. On the rule sets tree, expand the rule set that contains rules for authorized overriding, for example, Authorized Override library rule set.
    The nested rule sets appear.
  3. Select the appropriate nested rule set, for example, Authorized Override With IP Configuration
    The general settings and rules of the rule set appear on the settings pane. 
  4. In the rule set criteria, click the appropriate blocking list name, for example, IP Block List for Authorized Override.
    The Edit List (Category) window opens.

     NOTE: A yellow triangle next to the list name means the list is initially empty and you need to fill the entries.

  1. Add the appropriate entries to the blocking list, for example, IP addresses. Then click OK to close the window.
  2. In the criteria for one of the rules, click the appropriate settings name, for example, IP Configuration.
    The Edit Settings window opens.
  3. Configure the appropriate parameters, for example, the session time. Then click OK to close the window.
  4. Click Save Changes.
  • Was this article helpful?