Web filtering When the users of your network submit requests for web access, Web Gateway filters these requests, according to the web security policy that is implemented. The filtering also covers responses that are sent back from the web as well as embedded objects sent with requests and responses. Default filtering Web filtering includes several fields of web security. Some of them are covered by default rule sets on Web Gateway. Anti-malware filtering — Protects your network against viruses and other malware. Filtering is performed based on the results achieved by scanning web objects, for example, files sent from a web server in response to a request. URL filtering — Controls access to web objects based on evaluating their URLs. URLs are categorized and can be allowed or blocked according when categories are considered to convey inappropriate content. Media type filtering — Controls access to web objects based on recognizing the media types that they belong to, for example, to exclude downloads consuming overmuch bandwidth. The following process enhances web filtering to allow for a better user experience: Global whitelisting — Excludes objects that are not considered a risk to web security from web filtering to ensure that users can access them. A default rule set is also provided for this process after the initial setup. Extended filtering Web filtering can be extended by running filtering processes in additional fields of web security. HTTPS filtering — Filters web traffic that is secured under HTTPS. A rule set is provided for this filtering process after the initial setup, but it is not enabled by default. To set up more filtering processes, you can import rule sets from the built-in or the online library, or create individual rules that you insert in existing rule sets. For example, you can import rule sets to cover these fields of web security: Application filtering — Controls access to applications. Data loss prevention — Ensures that sensitive data is not allowed to leave your network. There is no default or library rule set for the following process, but you can set it up by creating individual filtering rules and inserting them in other rule sets. Streaming media filtering — Controls access to streaming media. You can also modify existing rule sets or create rule sets of your own to cover any field of web security in the way you consider most appropriate. Anti-malware filtering Anti-malware filtering ensures that the users of your network cannot access web objects that are infected by viruses and other malware. The filtering process detects infections and blocks access accordingly. URL filtering URL filtering ensures that the users of your network cannot access web objects that are considered a risk for web security or are not allowed because they contain inappropriate subject matter or for other reasons. Media type filtering Media type filtering ensures that the users of your network can only access media belonging to types that are allowed under your web security policy. For example, access to streaming media might not be allowed because it consumes too many resources. Application filtering Application filtering ensures that the users of your network cannot access unwanted applications, which could be, for example, Facebook, Xing, and others. The filtering process application names and reputation scores and blocks access accordingly. Filtering can also be applied to individual functions of applications. Streaming media filteringStreaming media filtering ensures that media of this type is detected when it is received on Web Gateway and handled according to your web security policy. Global whitelisting Global whitelisting ensures that all further filtering is skipped for the web objects that are whitelisted, so access to them cannot be blocked. SSL scanning SSL scanning ensures that SSL-secured web traffic can be processed and made available to other filtering functions on Web Gateway. This scanning mode is also known as HTTPS scanning. Hardware Security Module Use of a Hardware Security Module (HSM) enhances security when dealing with private keys for the certificates that are exchanged between clients and servers in SSL-secured communication. Advanced Threat Defense After a web object has been scanned by Web Gateway for infections by viruses or other malware, it can additionally be scanned by the McAfee® Advanced Threat Defense (Advanced Threat Defense) web security product. Data loss prevention Data loss prevention (DLP) ensures that sensitive content is not allowed to leave your network. The prevention process detects this content and blocks traffic going out to the web accordingly. Using an on-premise DLP server from the cloud You can perform DLP filtering using an on-premise DLP server with an ICAP client that runs in the cloud.
Web filtering When the users of your network submit requests for web access, Web Gateway filters these requests, according to the web security policy that is implemented. The filtering also covers responses that are sent back from the web as well as embedded objects sent with requests and responses. Default filtering Web filtering includes several fields of web security. Some of them are covered by default rule sets on Web Gateway. Anti-malware filtering — Protects your network against viruses and other malware. Filtering is performed based on the results achieved by scanning web objects, for example, files sent from a web server in response to a request. URL filtering — Controls access to web objects based on evaluating their URLs. URLs are categorized and can be allowed or blocked according when categories are considered to convey inappropriate content. Media type filtering — Controls access to web objects based on recognizing the media types that they belong to, for example, to exclude downloads consuming overmuch bandwidth. The following process enhances web filtering to allow for a better user experience: Global whitelisting — Excludes objects that are not considered a risk to web security from web filtering to ensure that users can access them. A default rule set is also provided for this process after the initial setup. Extended filtering Web filtering can be extended by running filtering processes in additional fields of web security. HTTPS filtering — Filters web traffic that is secured under HTTPS. A rule set is provided for this filtering process after the initial setup, but it is not enabled by default. To set up more filtering processes, you can import rule sets from the built-in or the online library, or create individual rules that you insert in existing rule sets. For example, you can import rule sets to cover these fields of web security: Application filtering — Controls access to applications. Data loss prevention — Ensures that sensitive data is not allowed to leave your network. There is no default or library rule set for the following process, but you can set it up by creating individual filtering rules and inserting them in other rule sets. Streaming media filtering — Controls access to streaming media. You can also modify existing rule sets or create rule sets of your own to cover any field of web security in the way you consider most appropriate. Anti-malware filtering Anti-malware filtering ensures that the users of your network cannot access web objects that are infected by viruses and other malware. The filtering process detects infections and blocks access accordingly. URL filtering URL filtering ensures that the users of your network cannot access web objects that are considered a risk for web security or are not allowed because they contain inappropriate subject matter or for other reasons. Media type filtering Media type filtering ensures that the users of your network can only access media belonging to types that are allowed under your web security policy. For example, access to streaming media might not be allowed because it consumes too many resources. Application filtering Application filtering ensures that the users of your network cannot access unwanted applications, which could be, for example, Facebook, Xing, and others. The filtering process application names and reputation scores and blocks access accordingly. Filtering can also be applied to individual functions of applications. Streaming media filteringStreaming media filtering ensures that media of this type is detected when it is received on Web Gateway and handled according to your web security policy. Global whitelisting Global whitelisting ensures that all further filtering is skipped for the web objects that are whitelisted, so access to them cannot be blocked. SSL scanning SSL scanning ensures that SSL-secured web traffic can be processed and made available to other filtering functions on Web Gateway. This scanning mode is also known as HTTPS scanning. Hardware Security Module Use of a Hardware Security Module (HSM) enhances security when dealing with private keys for the certificates that are exchanged between clients and servers in SSL-secured communication. Advanced Threat Defense After a web object has been scanned by Web Gateway for infections by viruses or other malware, it can additionally be scanned by the McAfee® Advanced Threat Defense (Advanced Threat Defense) web security product. Data loss prevention Data loss prevention (DLP) ensures that sensitive content is not allowed to leave your network. The prevention process detects this content and blocks traffic going out to the web accordingly. Using an on-premise DLP server from the cloud You can perform DLP filtering using an on-premise DLP server with an ICAP client that runs in the cloud.