Webwasher 6.0.1 Anti-Malware User's Guide - McAfee
Webwasher 6.0.1 Anti-Malware User's Guide - McAfee
Webwasher 6.0.1 Anti-Malware User's Guide - McAfee
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Content Security<br />
You can also configure some exceptions, as well as some enhancements<br />
to this general option:<br />
— But block if the script was originally encrypted<br />
To have originally encrypted script code blocked, make sure this radio<br />
button is checked.<br />
This is the default setting for originally encrypted script code.<br />
— Also mitigate if the script was originally encrypted, and deliver<br />
the decrypted script code<br />
To have this procedure applied to originally encrypted script code instead<br />
of blocking, check this radio button.<br />
— But allow if the script was originally encrypted<br />
To allow originally encrypted script code, check this radio button.<br />
— Forbid dynamic creation of inline framesBut allow if the script<br />
was originally encrypted<br />
To forbid this operation, make sure this checkbox is marked.<br />
The checkbox is marked by default.<br />
You can configure an exception from this enhancement to the general<br />
option:<br />
But allow if the source URL of the inline frame doesn’t look<br />
suspicious<br />
If you want to allow inline frames under this condition, make sure<br />
this checkbox is marked.<br />
The checkbox is marked by default.<br />
— Block whole web page upon policy violation, not only the hostile<br />
operation itself<br />
To have the whole Web page blocked, rather than just the hostile operation,<br />
mark this checkbox.<br />
• Emulate variables to reveal potentially obfuscated script code<br />
To emulate variables with this purpose, make sure this checkbox is marked.<br />
The checkbox is marked by default.<br />
4–51