Proxies like those offered by vendors Blue Coat Systems Inc. and Websense Inc. are used by companies to restrict...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
access to the Web by both preventing employees from going to inappropriate sites and blocking them from inadvertently downloading malware. These products frequently are configured to block access to personal webmail like Hotmail, Yahoo and Google, which are often a source of malware. Companies also block personal email to prevent data leakage from employees that might try, either maliciously or inadvertently, to send out sensitive customer information or proprietary information.
Proxies usually come with a set of default configurations for blocking things like pornography or gambling, but can also be manually configured to include sites a company might deem as time wasters, such as shopping and social networking sites.
Usually, companies have written policies detailing what is appropriate Web usage; such a policy should be clearly communicated to employees with an explanation that all Web traffic is monitored by proxies.
What's odd is that login sites from Microsoft seem to be affected. But there is a pattern here. Since Hotmail is offered by MSN, a Microsoft product, it can be accessed with a Passport or Windows Live ID account, both also offered by Microsoft.
It's possible that the proxy configurations are blocking Passport, Live ID or other Microsoft single-sign on (SSO) IDs, which would block not only Hotmail but also any other Microsoft login. In an effort to block access to personal email, logins to Microsoft sites may have inadvertently been blocked, too.
First, check if the company is using a proxy product for restricting Web and webmail access, then check the settings to make sure Windows SSO products aren't being blocked as well.
Dig Deeper on Web Authentication and Access Control
Related Q&A from Joel Dubin
After a server room door has been compromised, finding a more secure solution is of utmost importance. Learn how to choose a server room door that ...continue reading
In the IAM world, what's the difference between access control and identity management. This IAM expert response explains how the two relate as well ...continue reading
When working with PeopleSoft and Unix, which single sign-on (SSO) vendors offer the most effective products? Learn how to choose an SSO product in ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.