HomeHome ArticlesArticles Most Popular ArticlesMost Popular Articles Most Helpful ArticlesMost Helpful Articles Request New ArticleRequest New Article
RSS Feeds
DrillDown Icon Table of Contents
DrillDown Icon Knowledge Base Information
DrillDown Icon Cyberoam Network Security Appliances (UTM and NGFW)
DrillDown Icon Security Advisory - Heartbleed Vulnerability in OpenSSL
DrillDown Icon Best Practices & Policies
DrillDown Icon Protect Your Cyberoam Appliances from Power Fluctuations
DrillDown Icon Technical Library
DrillDown Icon Deployment
DrillDown Icon Registration & Licensing
DrillDown Icon System
DrillDown Icon Objects
DrillDown Icon Network
DrillDown Icon Identity
DrillDown Icon Firewall
DrillDown Icon VPN
DrillDown Icon IPS
DrillDown Icon Web Filter
DrillDown Icon Application Filter
DrillDown Icon Block Google Drive
DrillDown Icon Block Skype
DrillDown Icon Block UltraVPN
DrillDown Icon Block Browser-based File Transfer
DrillDown Icon Block Gmail Web Chat
DrillDown Icon Block High Risk Applications with Cyberoam’s Proactive Protection Model
DrillDown Icon Block Internet Download Manager (IDM) in Cyberoam
DrillDown Icon Block LinkedIn Applications in Cyberoam
DrillDown Icon Block Facebook Applications in Cyberoam
DrillDown Icon Block P2P Applications in Cyberoam
DrillDown Icon How to enable Application Classification in Cyberoam? What is the advantage of enabling it?
DrillDown Icon Web Application Firewall (WAF)
DrillDown Icon IM
DrillDown Icon Quality of Service (QoS)
DrillDown Icon Anti Virus
DrillDown Icon Anti Spam
DrillDown Icon Logs & Reports
DrillDown Icon Clients
DrillDown Icon Tech Notes
DrillDown Icon Cyberoam Maintenance
DrillDown Icon Compatibility
DrillDown Icon Archives
DrillDown Icon Visio Stencils
DrillDown Icon Product Technical Support
DrillDown Icon Cyberoam Virtual Security
DrillDown Icon Cyberoam iView
DrillDown Icon Cyberoam Central Console
DrillDown Icon Cyberoam's On-Cloud Management Service
  Subscribe Print PreviewPrint Current Article and All Sub-Articles
Rate Icon Rate Icon Rate Icon Rate Icon Rate Icon
Block Internet Download Manager (IDM) in Cyberoam
Applicable Version: 10.00 onwards

Internet Download Manager (IDM)
is one such Multi threaded application which breaks file in to many small parts and starts downloading parallel which  increase download speeds by up to 5 times. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use. Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads.

This article explains how to block Internet Download Manager in Cyberoam.


To Block Internet Download Manager in Cyberoam


Web and Application Filter Module Subscribed


The entire configuration is to be done from Web Admin console. Access Web Admin console with user having “Administrator” profile.

Follow the below given steps to Block Internet Download Manager in Cyberoam.

Step 1: Create Application Filter Policy

Application Filter Policy controls user’s application access. It specifies which user has access to which applications and allows defining powerful security policies based on almost limitless policy parameters.

Add Application Filter Policy

Go to Application Filter à Policy à Policy and click on “Add” button to add an application filter policy with the following parameters.

Parameters Description






Name to identify the Policy. Duplicate names are not allowed.


Allow All

Here all the applications would be allowed, but some defined categories will be blocked

Click OK and the Application Filter Policy ‘BlockIDM’ will be created successfully.

Appliance is shipped with the following predefined policies for applications: Allow All and Deny All. These two predefined policies are immediately available for use until configured otherwise. You can also define custom policies to define different levels of access for different users to meet your organization’s requirements. 

Step 2: Add Application Filter Policy Rules

Application Filter Policy rules can be added to custom application filter policies.

Add Rules

Click the Edit icon  in the Manage column against the Application Filter Policy to which rules are to be added. Click on ‘Add’ button to add application filter policy rules.

Parameters Description
Click OK and the Application Filter Policy Rule will be created successfully. 

Step 3: Apply Application Filter Policy to User

  • Go to Identity à Users à User.
  • Select user to apply Application Filter policy created in Step 1. Under Policies Section, select ‘BlockIDM’ for Application Filter.
  • Click OK button to update.

Click OK and the policy will be applied to user and the user will be updated successfully.

Above configuration will Block access to IDM Application for user ‘John’.


In this article policy has been applied on user. Policy can also be applied on Groups and Firewall.
                                                                                                                                       Document Version: 1.0–19/01/2012
Article ID: 2194

How helpful was this information?
Poor Below Average Average Above Average Very High
Provide suggestions for article improvment. Please provide your email address if you wish to receive mail updates on your suggestion.
 Get a new challenge
Write the characters in the image above