01.01.2013 Views

Web Gateway 7.1.5 Product Guide - McAfee

Web Gateway 7.1.5 Product Guide - McAfee

Web Gateway 7.1.5 Product Guide - McAfee

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

6<br />

<strong>Web</strong> filtering<br />

Virus and malware filtering<br />

Virus and malware filtering rules<br />

This section explains in detail a blocking rule and a whitelisting rule for virus and malware filtering.<br />

Note: The rules are shown here in a notation that comes close to how they appear on the user interface.<br />

Blocking rule<br />

The following is an example of a blocking rule for virus and malware filtering.<br />

Name<br />

Block if virus was found<br />

Criteria Action<br />

Antimalware.Infected equals true –> Block<br />

In plain text, this rule can be rephrased as follows:<br />

If an object is infected by a virus or other malware, block access to it.<br />

The key element in the rule criteria is Antimalware.Infected. It is the property that is checked for a<br />

given web object. Antimalware.Infected is (“equals”) true if the object is actually infected by a virus or<br />

other malware. The Antimalware module is called to find out whether this is the case. If it is, the criteria<br />

is matched and the rule applies. The rule then executes its action, which is the Block action. It blocks<br />

access to the object.<br />

The Antimalware.Infected property has the <strong>Gateway</strong> Antimalware settings specified for it. This means<br />

the module that scans objects for infections runs with these settings. The settings determine, for<br />

example, which methods are used for the scanning.<br />

The Block action also has settings specified for it. These settings determine that a message is sent to a<br />

user who is affected by the action and what this message looks like. For this virus and malware filtering<br />

rule, the Virus Found settings are specified, which means that the message mentions an infection of the<br />

requested object as the reason for the blocking.<br />

Whitelisting rule<br />

The following is an example of a whitelisting rule for virus and malware filtering.<br />

Name<br />

Do not filter specific URLs<br />

Criteria Action<br />

URL matches in list Antimalware.URL Whitelist –> Stop Rule Set<br />

In plain text, this rule can be rephrased as follows:<br />

If a URL matches one of the entries on the whitelist for virus and malware filtering, do not process<br />

the virus and malware filtering rule set any further.<br />

The property in the rule criteria is URL. When the rule is processed, it is checked for a given URL<br />

whether it matches one of the entries in the list (“matches in list”) that is specified in the criteria as the<br />

Antimalware.URL Whitelist. If it does, the criteria matches and the rule applies.<br />

The rule then executes the Stop Rule Set action, which stops processing of the virus and malware<br />

filtering rule set and lets all rules of the rule set that follow this whitelisting rule be skipped, including<br />

the blocking rule (if placed behind this rule).<br />

174 <strong>McAfee</strong> <strong>Web</strong> <strong>Gateway</strong> <strong>7.1.5</strong> <strong>Product</strong> <strong>Guide</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!