Policy configuration To protect your network against threats arising from the web, Web Gateway enforces a web security policy, which is implemented during the initial setup. You can configure this policy later on to adapt it to your requirements.. When performing this configuration, you are dealing with several fields of web security that your policy should cover. You can also extend the filtering process and make it suitable for cloud use. Web security policy — A web security policy is made up of rules, which are grouped in rule sets on Web Gateway When a situation arises where a rule applies, it performs an action to handle this situation. The situation can be an immediate threat, for example, a virus in a file that a user who works within your network attempts to download. In this case, the rule would block the attempt. Other situations might be that a user requests access to an online shopping site during work hours or tries to download a very large streaming file. Both activities could be blocked by suitable rules. You can modify all rules in the rule sets on Web Gateway to let them perform the actions that you consider appropriate. When a rule performs an action, the user who requested web access can be informed about this action by a message. For example, the user can be told that a request was blocked because a file that was requested for downloading is malware-infected. Cloud use — The rules of your web security policy are applied to the traffic that is created by the web usage of the users of your organization. Unless you configure it differently, however, the rules are only applied to the web usage of those users who access the web from inside your local network. This kind of usage is also known as on-premise use. You can, however, enable one or more rule sets for cloud use. This means that the rules in these rule sets are also enforced when users of our organization access the web from outside your local network. Working with rules A web security policy is implemented on Web Gateway, which includes various rules. When a situation arises where a rule applies, it performs an action. You can configure this policy by modifying its rules to adapt them to the needs of your organization. Rule sets Rules are grouped and included in rule sets on the appliance. A rule can never stand on its own, it must be included in a rule set. Default rule set system Several rule sets that cover important fields of web security are by default implemented in the rule set system of a on the appliance after its initial setup. Rule set libraries The built-in and online libraries provide rule sets for importing into your rule set system. Rule set views The user interface provides two kinds of views for a rule set, the key elements view and the complete rules view. Filtering process A filtering process is performed on the appliance that uses the implemented rules to ensure web security for your network. Working with Web Gateway using a browser without Java support You can work with the interface of Web Gateway through a browser that requires no Java support. Related conceptsWorking with rulesRule setsDefault rule set systemRule set librariesRule set viewsFiltering processComplete rulesRelated tasksEnable a rule set for cloud useRelated informationUser messages
Policy configuration To protect your network against threats arising from the web, Web Gateway enforces a web security policy, which is implemented during the initial setup. You can configure this policy later on to adapt it to your requirements.. When performing this configuration, you are dealing with several fields of web security that your policy should cover. You can also extend the filtering process and make it suitable for cloud use. Web security policy — A web security policy is made up of rules, which are grouped in rule sets on Web Gateway When a situation arises where a rule applies, it performs an action to handle this situation. The situation can be an immediate threat, for example, a virus in a file that a user who works within your network attempts to download. In this case, the rule would block the attempt. Other situations might be that a user requests access to an online shopping site during work hours or tries to download a very large streaming file. Both activities could be blocked by suitable rules. You can modify all rules in the rule sets on Web Gateway to let them perform the actions that you consider appropriate. When a rule performs an action, the user who requested web access can be informed about this action by a message. For example, the user can be told that a request was blocked because a file that was requested for downloading is malware-infected. Cloud use — The rules of your web security policy are applied to the traffic that is created by the web usage of the users of your organization. Unless you configure it differently, however, the rules are only applied to the web usage of those users who access the web from inside your local network. This kind of usage is also known as on-premise use. You can, however, enable one or more rule sets for cloud use. This means that the rules in these rule sets are also enforced when users of our organization access the web from outside your local network. Working with rules A web security policy is implemented on Web Gateway, which includes various rules. When a situation arises where a rule applies, it performs an action. You can configure this policy by modifying its rules to adapt them to the needs of your organization. Rule sets Rules are grouped and included in rule sets on the appliance. A rule can never stand on its own, it must be included in a rule set. Default rule set system Several rule sets that cover important fields of web security are by default implemented in the rule set system of a on the appliance after its initial setup. Rule set libraries The built-in and online libraries provide rule sets for importing into your rule set system. Rule set views The user interface provides two kinds of views for a rule set, the key elements view and the complete rules view. Filtering process A filtering process is performed on the appliance that uses the implemented rules to ensure web security for your network. Working with Web Gateway using a browser without Java support You can work with the interface of Web Gateway through a browser that requires no Java support. Related conceptsWorking with rulesRule setsDefault rule set systemRule set librariesRule set viewsFiltering processComplete rulesRelated tasksEnable a rule set for cloud useRelated informationUser messages