Overview of Web Gateway A McAfee® Web Gateway appliance is installed as a gateway that connects your network to the web and filters the traffic that goes out and comes in. Filtering web traffic Following the implemented web security rules, Web Gateway filters the requests that users send to the web from within your network, and the responses that are sent back from the web. Embedded objects sent with requests or responses are also filtered. Malicious and inappropriate content is blocked, while useful matter is allowed to pass through. This figure provides an overview of the filtering process. Filtering web traffic 1 – Your network 2 – Web Gateway 3 – Web Sends requests to the web. Filters requests and responses. Sends responses to your network. Filtering on premise and in the cloud Web Gateway is part of an integrated solution known as McAfee® Web Protection (Web Protection). This solution provides protection against threats that arise when users of your organization access the web from inside or outside your local network. Users who access the web from inside your local network are often referred to as on-premise users. Outside access happens when users of your organization work on systems that are not connected to this network, for example, while they travel or work at home. These users are often referred to as cloud users. McAfee® Web Gateway Cloud Service (McAfee® WGCS) is the part of the solution that protects web usage by cloud users. As an integrated solution, Web Protection allows you to enforce the same security policy for web access by both on-premise and cloud users. Key features of Web Gateway Filtering web traffic is a complex process. The key features of Web Gateway contribute to it in different ways. How Web Gateway works A Web Gateway appliance uses several subsystems to provide filtering and other functions, based on its operating system. Protecting personal data When Web Gateway performs its monitoring activities, it also captures personal data and stores it in log files. You can view all collected data there and protect it according to the security policy of your organization.