Web filtering When the users of your network send requests for web access, Web Gateway filters these requests, as well as the responses that are sent back from the web. Embedded objects sent with requests and responses are also filtered. Web filtering is controlled by rules, which you can review and modify to let them suit your web security policy. The following fields of web security are covered by default rule sets on Web Gateway: Anti-malware filtering — Blocks access to web objects that are infected by viruses and other malware using the Gateway Anti-Malware default rule set. URL filtering — Blocks or allows access to web objects with particular URLs URL filtering is covered by two default rule sets: URL Filtering and Dynamic Content Classification. Media type filtering — Blocks or allows access to web objects that belong to particular media types using the Media Type Filtering default rule set. Global whitelisting — Allows access to web objects before any of the rules for the above filtering methods are applied using the Global Whitelist default rule set. The SSL Scanner rule set is already provided for SSL scanning in the default system, but not yet enabled. SSL scanning enables the filtering of requests that are sent on SSL-secured connections. You can implement web filtering rules to enhance web filtering on these and other fields of web security. by importing suitable rule sets from the rule set library. This library offers, for example, rule sets for application and HTML filtering. Anti-malware filtering Anti-malware filtering ensures that the users of your network cannot access web objects that are infected by viruses and other malware. The filtering process detects infections and blocks access accordingly. URL filtering URL filtering ensures that the users of your network cannot access web objects that are considered a risk for web security or are not allowed for other reasons. Media type filtering Media type filtering ensures that the users of your network cannot access media that belong to particular types, such as images, audio, or streaming media, when these types are not allowed under your web security policy. Application filtering Application filtering ensures that the users of your network cannot access unwanted applications, which could be, for example, Facebook, Xing, and others. The filtering process application names and reputation scores and blocks access accordingly. Filtering can also be applied to individual functions of applications. Streaming media filteringStreaming media filtering ensures that web objects of this media type are detected when they are received on Web Gateway and handled according the configured rules. Global whitelisting Global whitelisting ensures that all further filtering is skipped for the web objects that are whitelisted, so access to them cannot be blocked. SSL scanning SSL scanning ensures that SSL-secured web traffic can be processed and made available to other filtering functions. Hardware Security Module Use of a Hardware Security Module (HSM) enhances security when dealing with private keys for the certificates that are exchanged between clients and servers in SSL-secured communication. Advanced Threat Defense After a web object has been scanned by Web Gateway for infections by viruses or other malware, it can additionally be scanned by the McAfee® Advanced Threat Defense (Advanced Threat Defense) web security product. Data loss prevention Data loss prevention (DLP) ensures that sensitive content is not allowed to leave your network. The prevention process detects this content and blocks traffic going out to the web accordingly. Using an on-premise DLP server from the cloud You can perform DLP filtering using an on-premise DLP server with an ICAP client that runs in the cloud.