01.01.2013 Views

Web Gateway 7.1.5 Product Guide - McAfee

Web Gateway 7.1.5 Product Guide - McAfee

Web Gateway 7.1.5 Product Guide - McAfee

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Rules and rule sets<br />

Rule configuration 4<br />

Information about URL categories is retrieved by a special module from a Global Threat Intelligence<br />

server. The settings of this module are therefore specified in the criteria of the rule. You can configure<br />

these settings to modify the way the module retrieves the information, for example, by using Global<br />

Threat Intelligence information retrieved earlier on and stored in a local database of the appliance. This<br />

can reduce latency.<br />

Action<br />

If the URL belongs to a category on the blocking list, the blocking action is executed. The settings of the<br />

action specify that a block message is sent to the user who requested the URL and is affected by the<br />

blocking action.<br />

Process flow<br />

The blocking action also stops the filtering process completely. When the request for the URL is<br />

received on the appliance, it is processed in the request cycle. Since the request is not forwarded to a<br />

web server, no response needs to be processed and looking for embedded objects that might have<br />

been sent with a request is also not needed because the request is blocked anyway.<br />

Processing can therefore be stopped completely. It continues when the next request is received on the<br />

appliance.<br />

Block if virus was found (Sample rule)<br />

This rule can be included in a rule set for virus and malware filtering.<br />

Rule<br />

Name<br />

Block if virus was found<br />

Criteria Action<br />

Antimalware.Infected equals true –> Block<br />

In plain text, the rule could be rendered as follows:<br />

If a web object is infected, block it.<br />

Purpose of the rule<br />

This is a key rule of the filtering process on the appliance. It blocks access to web objects that are<br />

infected by viruses or other malware. It blocks this access in all cycles of the process.<br />

Whether an infected object is sent by a web server in response to a user request, or a user requests to<br />

upload an infected object from your network to the web, or an infected object is sent embedded with a<br />

request or response, all these attempts are blocked by the rule.<br />

Property and criteria<br />

The property used in the rule is Antimalware.Infected, which means “infected by a virus or other<br />

malware”. To detect an infection in a web object, a special module is needed, the Antivirus module (or<br />

engine). Settings for the modules are specified with the property.<br />

Action<br />

The blocking action that is executed if an infected object is detected affects the user who sent a request<br />

for access to the object. The action settings therefore specify that a message is sent to inform the user,<br />

in the same way, as it is done when a request is blocked by a URL filtering rule.<br />

Process flow<br />

Like in URL filtering, the blocking action of the virus and malware filtering rule stops the filtering<br />

process completely. When the next request is received on the appliance, the process continues.<br />

<strong>McAfee</strong> <strong>Web</strong> <strong>Gateway</strong> <strong>7.1.5</strong> <strong>Product</strong> <strong>Guide</strong> 107

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!