01.01.2013 Views

Web Gateway 7.1.5 Product Guide - McAfee

Web Gateway 7.1.5 Product Guide - McAfee

Web Gateway 7.1.5 Product Guide - McAfee

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Web</strong> filtering<br />

Virus and malware filtering 6<br />

<strong>Gateway</strong> Antimalware<br />

This section explains the rules in a library rule set for virus and malware filtering.<br />

For general information on understanding and handling rules, see Rules and rule sets.<br />

Library rule set — <strong>Gateway</strong> Antimalware<br />

Criteria — Always<br />

Cycles — Requests (and IM), responses, embedded objects<br />

The rule set contains the following rules:<br />

Remove partial content for HTTP requests<br />

Cycle.TopName equals “Request” AND (Connection.Protocol equals “http” OR Connection.Protocol<br />

equals “https”) –> Continue — Header.RemoveAll (“Range”)<br />

The rule uses the Cycle.TopName and Connection.Protocol properties to check whether the current<br />

processing cycle is the request cycle and whether a request is sent in HTTP or HTTPS mode. If this<br />

is the case, the Header.RemoveAll event modifies the request by removing the specification that<br />

only partial content is requested.<br />

A request for complete content is then forwarded to the relevant web server and eventually<br />

received from there, so that the complete content of a web object can be processed on the<br />

appliance. For example, a complete archive can be opened and scanned for viruses and other<br />

malware. Malicious content that is distributed over several parts of a file can be detected by<br />

scanning the complete file, while it could go unnoticed if only parts of the file were scanned.<br />

The Continue action lets processing continue with the next rule.<br />

Block partial content for FTP requests<br />

Cycle.TopName equals “Request” AND Connection.Protocol equals “ftp” AND Command.Categories<br />

contains “Partial” –> Block<br />

The rule uses the Cycle.TopName, Connection.Protocol, and Command.Categories properties to<br />

check whether the current processing cycle is the request cycle, the request is sent in FTP mode,<br />

and the command category used for the FTP transfer contains Partial as a string. This allows the<br />

appliance to detect an FTP request for partial content and block it.<br />

Unlike with HTTP or HTTPS requests, an FTP request for partial content cannot be modified to<br />

make it a request for complete content. However, security problems would arise if partial content<br />

was accepted on the appliance, which are the same as the ones that were explained in the<br />

comment on the rule for blocking HTTP and HTTPS requests.<br />

The action settings specify a message to the requesting user.<br />

Allow if user agent matches User Agent Whitelist<br />

Header.Request.Get (“User-Agent”) matches in list User Agent WhiteList –> Stop Rule Set<br />

The rule uses the Header.Request.Get property to check the user agent information that is sent<br />

with the header of a request. If the user agent in question is on the specified whitelist, processing<br />

of the rule set stops, so the blocking rule of the rule set is not processed and cannot block the<br />

request.<br />

A parameter of the property specifies that it is the user agent information that must be checked<br />

when the rule is processed.<br />

Note: This rule is not enabled by default. Using this rule alone for whitelisting will cause a security problem<br />

because usually a client can set whatever user agent it prefers.<br />

<strong>McAfee</strong> <strong>Web</strong> <strong>Gateway</strong> <strong>7.1.5</strong> <strong>Product</strong> <strong>Guide</strong> 175

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!