In certain scenarios, it may be necessary to disable the WFP driver. This Knowledge Base article provides instructions on how to disable this driver and outlines the features that will be affected upon disabling this functionality.


We can disable our filtering by injecting a file to our install location called disablefilter, if present our client will not engage the WFP drivers. If you wish to re enable inspection, simply remove this file.


Features Affected by Disabling HTTPS Inspection:


Disabling HTTPS inspection in Senso will result in the loss of the following features:


Dedicated Teacher Machine: The Dedicated Teacher Machine feature will be affected. For more information on this feature, refer to Dedicated Teacher PC.


Broadcast Screen: The ability to select own screen through the "My Computer" option will not be present. However, adding the teacher's device to the group can mitigate this issue, as the user will be able to tick their own device as a broadcaster.


Website Logs and Control: Senso will no longer record visited URLs or have the ability to control website access, such as blocking specific websites.


Application Control: While application logs will still be collected, the ability to enforce restrictions on application access will be disabled.


Packet/IP Level Inspection: Any Senso functionality requiring packet or IP level inspection will fail. The SensoWFP driver is responsible for this functionality.


Disabling HTTPS Inspection:


Disabling HTTPS inspection in Senso is achieved by executing a PowerShell script that creates a specific file in the Senso installation directory. Follow the steps below to disable HTTPS inspection;

If you are licensed for "Command Prompt" Module, you can apply directly to a device:


1. Open the CMD module

2. Select target devices

3. Run the following command :

echo >"C:\Program Files\Renato\senso.cloud\disablefilter"


4. Restart the Senso service or device

This can also be configured as a policy to run across all devices if required , this will require licensing for "Remote Script" module


1. Create a new policy container 


2. Select Remote Script from the drop down options

3. Select .ps1 as the type and populate with the below script

$BlankFile = "c:\program files\renato\senso.cloud\disablefilter"
$FileExists = Test-Path $BlankFile

if($FileExists -eq $True){
Return}
else {
New-Item -path "C:\program files\renato\senso.cloud" -Name "disablefilter" -itemtype file}
Start-Sleep -s 10
Restart-Service "senso.cloud.service"



This can also be ran locally on devices directly in CMD or Powershell:

1. Open PowerShell or CMD with administrator privileges.

2. Copy and paste the following command into the  console:

echo >"C:\Program Files\Renato\senso.cloud\disablefilter"


3. Execute by pressing Enter.


4. Restart the Senso service or device


Conclusion:


Disabling Network inspection in Senso is a straightforward process that involves running a PowerShell script. However, it's important to be aware of the features that will be affected upon disabling this functionality. Follow the steps outlined in this article carefully and consider the implications before proceeding with disabling HTTPS inspection in Senso. If you require further assistance or have any questions, please contact Senso support for guidance.
 

Re-enabling Senso HTTPs


To re-enable HTTPs if previously disabled, we simply need to remove the disablefilter file from the device. Please ensure you have disabled any scripts to apply this file other wise it will re populate.

To remove, we can achieve this manually via CMD :

del "C:\Program Files\Renato\senso.cloud\disablefilter"

Or to remove via Script or apply to a group :

$BlankFile = "c:\program files\renato\senso.cloud\disablefilter"

$FileExists = Test-Path $BlankFile

 

if($FileExists -eq $False){

Return

}

else {

Remove-Item -Path $BlankFile -Force

}

Start-Sleep -Seconds 10

Restart-Service "senso.cloud.service"