01.01.2013 Views

Web Gateway 7.1.5 Product Guide - McAfee

Web Gateway 7.1.5 Product Guide - McAfee

Web Gateway 7.1.5 Product Guide - McAfee

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

About rule sets<br />

Rules and rule sets<br />

About rule sets 4<br />

<strong>Web</strong> security rules are grouped and contained in rule sets on the appliance. This section provides some<br />

general information about these rule sets and the rule set systems they are included in.<br />

After the initial setup, a system of rule sets is implemented on the appliance. If you use the policy<br />

creation wizard, this system will match your selections. Rules, rule sets and filter lists are then<br />

implemented according to the type of your organization, your region, and the strictness you want to<br />

impose on the users of your network. If you choose not to make such selections, the default rule set<br />

system is implemented.<br />

In both cases, you can review and modify what has been implemented. You can modify rule sets and<br />

individual rules, including the filter lists, the settings of the modules used in the filtering process, and<br />

the settings of the actions that are triggered when rules apply.<br />

You can edit or delete all these items, move rules and rule sets to different positions, copy rules to<br />

insert them into other rule sets, and create new items of all types. You can also import rule sets from<br />

the internal library, move them to other positions, and modify them.<br />

Rules in rule sets<br />

A rule cannot stand on its own, it must be included in a rule set. A rule set can include just a single rule<br />

or several of them or one or more nested rule sets. If it includes nested rule sets, it can, but need not<br />

include individual rules on the same level as the nested rule sets.<br />

Rule sets usually include rules that work together to provide a particular function for ensuring web<br />

security. For example, a virus and malware filtering rule set might include a rule that blocks infected<br />

rule sets and one or several others that whitelist objects to let them skip the blocking rule and ensure<br />

users can access them.<br />

Another rule set might filter URLs and include rules for blocking individual URLs and URL categories, as<br />

well as whitelisting rules.<br />

You can modify the implemented system and group rules in rule sets to build functional units in<br />

whatever way is suitable for your network.<br />

Rule set cycles<br />

Rule sets are processed, with their rules, in the three cycles of the filtering process. A rule set can be<br />

processed in any combinations of these cycles, for example, only in the request cycle, in the response<br />

and embedded objects cycle, and also in all three cycles.<br />

The cycles of a rule set are at the same time those of the individual rules contained in it. A rule cannot<br />

differ with regard to cycles from its rule set.<br />

Rule set criteria<br />

Like rules, rule sets have criteria and are applied if these match. A rule set has criteria in addition to the<br />

criteria of its individual rules and usually these criteria differ from each other. For a rule to apply, both<br />

its own criteria and the criteria of its rule set must match.<br />

Rule set library<br />

The rule set library provides rule sets for you to import into your implemented rule set system. You can<br />

do this to add a function that is missing in your system or when the implemented rule sets do not suit<br />

your network in all respects.<br />

<strong>McAfee</strong> <strong>Web</strong> <strong>Gateway</strong> <strong>7.1.5</strong> <strong>Product</strong> <strong>Guide</strong> 91

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!