There are quite a few variables involved in the policies, so I will try to bring you up to speed in an educational sense by creating some scenario and common logic problems, and maybe you can help yourself? If you have any problems then let the forum know.
1. We begin by keeping things very simple, and since you have not told the forum how you authenticate your users (if you even do??), what connection methods you have available, whether the Guest account is enabled and a "grey" area where we do not know if you are using the BAN list tab or the Advanced tab in the WWW Policy as well as System Policies, then I am going to presume you are using the "Assumed by IP Address" authentication method and only have the WWW Proxy Server as access to the internet for web pages; i.e. no NAT or WinGate Internet Client or SOCKS, and you are only using the BAN tab in either policies, and the Guest account is enabled.
(p.s. that information I expect is probably not realistic for most people to details but even just a little bit more extra information helps a lot)
a) Right click the existing WWW Proxy Server, and select New --> WWW Proxy Server. Give it a unique name e.g. WWW Test, and change the port number to one that is not in use.
b) Navigate to WWW Test --> Policies and set the Default Rights (System Policies) drop down menu to "Are ignored".
c) Click Add, Everyone, User may be assumed. OK back to the Gatekeeper interface.
d) Go to a LAN Client, update their proxy server port to this new one you created and confirm it works.
2. Place a restriction on the Everyone group.
a) Navigate to the WWW Test --> Policies and double click the "Everyone" group that you created in 1. above.
b) Navigate to the BAN tab of the Everyone group and enter the following.
This criterion is met if HTTP URL Contains google.com
This criterion is met if HTTP URL Contains microsoft.com
c) OK back to the Gatekeeper interface then go to the LAN Client and confirm they cannot access those sites.
3. Common logic error scenario.
a) Navigate to the WWW Test --> Policies and add in a *second "Everyone" group, User may be unknown.
b) Ok back to the GateKeeper interface.
c) Go to that LAN Client using that proxy port, and test.
RESULT --> Everyone has full access and does not need to be authenticated. Because the second "Everyone" group has full unauthenticated access i.e. The policy with the most access will override the policy with the least access.
4. Test how this WWW Test policy interacts with the Default Rights (System Policies). First I need to cover the three options of how the WWW Proxy Server will interact with the Default Rights (System Policies)
"Must also be granted": If the e.g. WWW Proxy Server policy allows access to this service, then it must also be checked in the System Polices before it is allowed.
"May be used instead": If the e.g. WWW Proxy Server policy denies the request, then check if the System Policies allow it; if it does, allow the user to access.
"Are ignored": Do not check the System Policies to check if this user is allowed/denied to access to the WWW Proxy Server.
a) Remove the *second Everyone group from WWW Test --> Policies.
b) Set the Default Rights (System Policies) to "May be used instead"
c) OK back to the Gatekeeper interface and then test.
RESULT --> I presume your System Policies will not be banning microsoft.com and google.com, and has the correct authentication level set - hence the user should have full access to those two sites.
5. Test how this WWW Test policy interacts with the Default Rights (System Policies) when "Must also be granted" is used.
a) Within the WWW Test --> Policies, set the Default Rights (System Policies) to "Must also be granted"
b) OK back to the Gatekeeper interface then Test
RESULT --> Since the "Must also be granted" is selected, then as mentioned above if the WWW Proxy Server policy allows access to this service, then it must also be checked in the System Polices before it is allowed. *Hence if it is denied access within the WWW Proxy Server, the System Policies will not even be checked.
Extra information:
I) If you do have the NAT or WinGate Internet Client (WGIC) or SOCKS as connection methods available to LAN Clients, then to have the WWW Proxy to control webpage access through those connection methods then turn on an intercept for port 80 (Regardless to what port the actual WWW Proxy is listening on) in the WWW Proxy Server --> Sessions. That intercept for port 80 will detect any other connection method to the internet passing through WinGate on port 80, and push it up through the WWW Proxy Server so the user get the web page access policies applied, data scanning plugins, selected gateway etc...
II) The authentication methods that can be used in WinGate and the authentication level expected are listed in this post:
http://forums.qbik.com/viewtopic.php?p=28893#28893