Mcafee Web Gateway 8.0.x Interface Reference Guide 1-2-2020
Mcafee Web Gateway 8.0.x Interface Reference Guide 1-2-2020
x Interface
Reference Guide
Contents
User interface 7
Main elements of the user interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Supporting configuration functions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Alerts tab. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Rule Sets tab. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Lists tab. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Settings tab. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Appliances tab. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
System settings 18
Anti-Malware system settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Central Management settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Coaching settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Date and Time settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
DNS settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
ePolicy Orchestrator settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
External Lists system settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
File Server settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Hybrid settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Kerberos Administration settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
License settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Network Interfaces settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Network Protection settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Port Forwarding settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Proxies settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Network Setup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
HTTP Proxy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
FTP Proxy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
ICAP Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
IFP Proxy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
SOCKS Proxy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Data Exchange Layer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Web Cache. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Timeouts for HTTP(S), FTP, ICAP, SOCKS, and UDP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
DNS Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
XMPP proxy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Advanced Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Periodic Rule Engine Trigger List. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
SNMP settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Static Routes settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Telemetry settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Tenant Info settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
User Interface settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Windows Domain Membership settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Module settings 70
Anti-Malware settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Gateway Anti-Malware settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Gateway ATD settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Authentication settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Authorized Override settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Azure Directory settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Cache settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Coaching settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Cloud Storage Encryption settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Data Loss Prevention (Classifications) settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Data Loss Prevention (Dictionaries) settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Data Trickling settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
File System Logging settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Hardware Security Module settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
ICAP Client settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Next Hop Proxy settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Progress Page settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
SSL Client Context with CA settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
SSL Client Context without CA settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
SSL Scanner settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
TIE Filter settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Stream Detector settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Time Quota settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
URL Filter settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Volume Quota settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
User interface
The table below describes the main elements of the user interface.
Option Definition
System Preferences Opens a window to let you configure settings for the browser
that you want to use when working with the user interface.
User Preferences Opens a window to let you configure settings for the user
interface and change your password.
Top-level menu bar Lets you select one of the following menus:
• Dashboard — For viewing information on events, web usage,
filtering activities, and system behavior
• Policy — For configuring your web security policy
• Configuration — For configuring the system settings of the
appliance
• Accounts — For managing administrator accounts
• Troubleshooting — For solving problems on the appliance
Tab bar Provides the tabs of the currently selected top-level menu.
The top-level menus have the following tabs:
• Dashboard
◦ Alerts
◦ Charts and Tables
• Policy
◦ Rule Sets
◦ Lists
◦ Settings
◦ Templates
• Configuration
◦ Appliances
◦ File Editor
• Accounts
◦ Administrator Accounts
The Troubleshooting top-level menu has no tabs.
Toolbar (on tab) Provides varying tools (depending on the selected tab).
Configuration pane Provides options for configuring the item that is currently
selected on the navigation pane.
Option Definition
Yellow triangle Appears attached to the name of a list that is still empty and
needs to be filled by you.
Some filter lists are created, but not filled by the policy
configuration wizard because they are too sensitive.
Yellow text insert Appears when you move your mouse pointer over an item on
the user interface providing information on the meaning and
usage of the item.
False icon Appears in a window when the input you entered is invalid.
Message text Appears with the False icon, providing information on your
invalid input.
Save Changes The button turns red when you change an item.
It turns gray again when you have saved your changes.
Red triangle Appears attached to tabs, icons, and list entries when you
have changed an item and not yet saved.
For example, when you have changed a rule, the red triangle
appears:
• In the row of the rule entry on the settings pane
• On the rule set icon
• On the projection of the Rule Sets tab
• On the Policy icon of the top-level menu bar
Alerts tab
The Alerts tab displays information on the status and alerts for an appliance. If the appliance is a node in a Central Management
cluster, information is also displayed for the other appliances that are nodes in the cluster.
Alerts tab
Element Description
Rule sets toolbar Items for working with the rule sets on the rule sets tree
Rule sets tree Tree structure displaying the rule sets of the appliance
configuration
Option Definition
Export Opens the Export Rule Set window for exporting a rule set to the
library or into a file.
Edit Opens the Edit Rule Set window for editing a selected rule set.
Move up Moves a rule set up among other rules sets on the same level.
Move down Moves a rule set down among other rule sets on the same
level.
Move out of Moves a rule out of its nesting rule set and onto the same
level as the nesting rule set.
Move into Moves a rule set out of its nesting rule set and into the rule
set following this rule set.
Expand all Expands all collapsed items on the rule sets tree.
Collapse all Lets all expanded items on the rule sets tree collapse.
Rules toolbar
The rules toolbar provides the following options.
Rules toolbar
Option Definition
Edit Opens the Edit Rule window for editing a selected rule.
Show details Shows (or hides) details of a rule entry including the criteria.
Lists tab
Use the Lists tab to work with lists.
Lists tab
Element Description
Lists toolbar Items for working with the lists on the lists tree
List entries toolbar Items for working with the entries of the currently selected
list
Lists toolbar
The lists toolbar provides the following options.
Lists toolbar
Option Definition
Edit Opens the Edit List window for editing a selected list .
Import Opens the file manager on your system to let you import a
list.
Export Opens the file manager on your system to let you export a list
that you have selected on the lists tree.
View Opens a menu to let you display the lists in different ways (A-
Z, Z-A, by list type, with or without list types for which
currently no lists exist).
Collapse all Lets all expanded items on the lists tree collapse.
Option Definition
Add Opens the Add <List type> window for adding a list entry, for
example, the Add String window.
Add multiple Opens the Add <List type> window for adding multiple list
entries if this is possible for a list type.
Edit Opens the Edit <List type> window for editing a selected list
entry, for example, the Edit String window.
Filter Input field for typing a filtering term to display only matching
list entries
Note: The filtering function works as soon as you type a
character in the field.
Append from file Imports and appends list from a file within your file system.
Settings tab
Use the Settings tab to work with settings for actions and modules (engines).
Element Description
Settings toolbar Controls for working with settings for actions and modules
(engines)
Settings toolbar
The settings toolbar provides the following options.
Settings toolbar
Option Definition
Add Opens the Add Settings window for creating new settings.
Edit Opens the Edit Settings window for editing existing settings.
Collapse all Lets all expanded items on the settings tree collapse.
Appliances tab
Use the Appliances tab to configure settings for the system of a Web Gateway appliance.
Appliances tab
Element Description
Appliances tree Tree structure of appliances with the system settings for each
appliance
Appliance toolbar Toolbar with items for working with a selected appliance
(appears when an appliance is selected on the appliances
tree)
Appliances toolbar
The appliances toolbar provides the following options.
Appliances toolbar
Option Definition
Add/Join Opens the Add/Join Appliance window where you can include an
appliance as a node in a Central Management cluster.
To include an appliance, you can do one of the following
• Add an appliance to a cluster on the user interface of a
different appliance that is already a node of the cluster
• Join an appliance to a cluster on its own interface
Note: A cluster CA (certificate authority) must exist in both
cases on an appliance that is to be included in the cluster.
Update engines Updates DAT files with virus signatures and other filtering
information for all appliances in a Central Management
cluster.
Option Definition
Network group Provides a list for selecting a network group that an appliance
is assigned to.
Appliance toolbar
The appliance toolbar provides the following options.
Appliance toolbar
Option Definition
Rotate and push logs Rotates log files on an appliance and pushes them to the
destination that is specified within the Log File Manager settings.
Option Definition
Number of threads for AV scanning Sets the number of anti-malware working threads that are
available on an appliance.
The number you specify here applies to both the threads that
forward requests and responses to threads of the scanning
modules and the scanning module threads themselves.
For example, if you specify 25, there will be 25 threads for
forwarding and 25 for scanning.
Use at least as many AV threads as the number of CPU cores available When selected, the number of AV threads use for scanning
activities is at least the same as the number of available CPU
cores.
Maximum number of jobs in the queue Limits the number of requests or responses that can be
moved to the anti-malware queue as jobs for the scanning
modules.
Number of seconds a scanning job stays in the queue before being removed Limits the time (in seconds) that elapses before a request or
response is removed from the anti-malware queue if it has
not been forwarded for scanning.
Option Definition
IP addresses and ports of this node for Central Management communication Provides a list for entering the IP addresses and port numbers
that a node uses to communicate with other nodes in a
Central Management configuration.
Timeout for distributing messages to other nodes Limits the time (in seconds) that is allowed for another node
to respond to a message from the current node to the
specified value.
The time can range from 10 to 600 seconds.
It is set on a slider scale.
The following table describes the elements of an entry in the IP addresses and ports list.
Option Definition
Option Definition
Multiplier for timeout when distributing over multiple nodes Sets a factor for increasing the time interval that has been
configured under Timeout for distributing messages to other nodes in
the Central Management Settings section.
Increasing the time interval gives messages more time to
proceed from one node to another, from there to the next
node, and so on.
The interval can be increased by a value between 1 and 2.
The value is set on a slider scale.
Node priority Sets the priority that a node takes within a node group
The highest priority is 1.
If the configuration data on a node is no longer synchronized
with that of other nodes, for example, because the node has
been down for some time, the node receives the most recent
configuration data from the node with the highest priority.
If this is not your intention, make sure that all nodes have the
same priority, which is also the recommended setting.
The priority of a node can range from 1 to 100.
It is set on a slider scale.
Allow a GUI server to attach to this node When selected, a server providing an additional user interface
for the appliance is allowed to connect to the node.
Allow to attach a GUI server from non-local host When selected, a server with an additional user interface that
is not running on the current node is allowed to connect to
the node.
GUI control address Specifies the IP address and port number the additional user
interface uses for connecting to the current node.
GUI request address Specifies the IP address and port number of this server used
when sending requests to it.
Use unencrypted communication When selected, messages sent from this node to other nodes
in the configuration are not encrypted.
However, authentication using certificates is still performed.
This option is not selected by default.
Note:
Enable IP checking for other nodes When selected, the IP address can be verified when messages
are sent from this node to other nodes in the configuration.
This function is intended to increase web security, but can
lead to problems for some network setups, for example, NAT
setups.
Allowed time difference Limits the time difference (in seconds) allowed for accepting
configuration changes to the specified value.
The number of seconds can range from 10 to 600.
It is set on a slider scale.
Enable version checking for other nodes When selected, the version of the appliance software is
checked before configuration changes are distributed
between nodes.
Configuration changes are not distributed to a node if the
version of the appliance software on this node does not
match the version on the node that distributes the changes.
• Level of version check – Sets a level of thoroughness when
verifying the version of the appliance software.
The level is set on a slider scale. It can take the following
values:
• 1 – Only major version number (7 in 7.3.0) must match.
• 2 – Minor version number (3 in 7.3.0) must also match.
• 3 – Feature version number (0 in 7.3.0) must also match.
• 4 – Maintenance version number (if any, for example, 1 in
7.3.0.1.2) must also match.
• 5 – Hotfix version number (if any, for example, 2 in 7.3.0.1.2)
must also match.
• 6 – Build number (for example, 14379) must also match.
Option Definition
Group runtime Determines the group of a node, in which runtime data can
be shared with all nodes in the group, for example, time
quotas.
Group network Determines the group of a node, in which the node can
immediately connect to all other nodes in the group
A node can be a member of more than one network group.
The following table describes the elements of a list entry in the group network list.
Option Definition
Option Definition
Allow to download updates from the internet When selected, database updates are downloaded from the
internet.
Allow to download updates from other nodes When selected, database updates are downloaded from other
nodes in a Central Management configuration.
Update interval Limits the time (in minutes) that elapses before database
information is again updated to the specified value.
The time is set on a slider scale.
Allowed values range from 15 to 360.
CRL update interval Limits the time (in hours) that elapses before certificate
revocation lists used in filtering SSL-secured web traffic are
updated to the specified value.
This update uses a method that differs from those of other
updates and must therefore be configured separately.
The time is set on a slider scale
Allowed values range from 3 to 168.
Enable update proxies When selected, proxies are used for performing updates.
The proxies are configured in the Update proxies (fail over) list.
These proxies are also used when the MLOS operating system
of a Web Gateway appliance is updated.
Update proxies (fail over) Provides a list for entering the proxies that are used for
performing updates.
The proxies are used in failover mode. The first proxy on the
list is tried first and only if the configured timeout has elapsed
is the next proxy tried.
Option Definition
Port Specifies the port on a proxy that listens for update requests.
Option Definition
Allow to upload updates to other nodes When selected, updated database information can be
uploaded from the appliance (as a a node in a Central
Management configuration) to other nodes.
The first time an update starts, it should wait an appropriate time before Limits the time (in seconds) that elapses before an update is
starting started to the specified value.
Allowed values range from 5 to 1200.
The first time an automatic update starts, it uses the startup interval to update Limits the time (in seconds) that elapses between attempts to
start an automatic update for the first time to the specified
value.
During an update, the coordinator subsystem, which stores
updated information on the appliance, tries to connect to the
appliance core, where the modules reside that use this
information.
A low value for this interval can therefore speed up updates
because it reduces the time the coordinator might have to
wait until the core is ready to receive data.
Allowed values range from 5 to 600.
Try to update with start interval Limits the number of attempts (1 to 9) the appliance makes
when trying to start an update to the specified value.
Use alternative URL Specified the URL of an update server that is used instead of
the default server.
Enter a special custom parameter sequence for an update server Updates of URL filtering information are taken from the URL
filter database server that is specified by the URL entered
here.
No updates should be made in defined time window Provides a list for entering daily time slots during which no
updates of database information should be made.
The following table describes the elements of an entry in the time slot list.
Option Definition
Start of time slot (hour) Sets the hour when a daily time slot begins.
Start of time slot (minute) Sets the minute in an hour when a daily time slot begins.
Start of time slot (second) Sets the second in a minute when a daily time slot begins.
End of time slot (hour) Sets the hour when a daily time slot ends.
End of time slot (minute) Sets the minute in an hour when a daily time slot ends.
End of time slot (second) Sets the second in a minute when a daily time slot ends
Option Definition
Allow to download customer subscribed lists When selected, customer subscribed lists can be downloaded
from the current appliance.
If the appliance is a node in a Central Management
configuration and this option is also selected on other nodes,
one of the nodes will download the lists.
If you want a particular node to download the lists, you need
to make sure the option is deselected on every other node.
When a node is restarted and one or more subscribed lists
are configured on this node, list content is downloaded to
ensure a valid configuration.
Note: The download is performed regardless of whether this
download option is selected or not.
When a node is added to a configuration with other nodes
that have subscribed lists configured, list content is
downloaded for these lists onto the new node.
To reduce internal traffic, the download is performed without
prior communication with other nodes.
Note: The download is performed regardless of whether this
download option is selected or not.
Option Definition
Manual Engine Update Updates database information for modules used in the
filtering process immediately.
Database information is only updated for the modules on the
appliance you are currently working on.
Option Definition
Keep saved configuration folders for a minimal time Limits the time (in days) that configuration file folders are at
least stored on disk to the specified value.
The number of days can range from 1 to 100.
Keep minimal number of configuration folders Limits the number of configuration file folders that are at
least stored on disk at any time to the specified value.
The number can range from 1 to 100.
Keep minimal number of packed folders Limits the number of packed configuration file folders that
are at least stored on disk at any time to the specified value.
Configuration folders are packed when the minimal time
configured for storing them on disk has elapsed and the
minimal number of folders stored on disk at any time would
be exceeded if they were stored unpacked any longer.
The number of folders can range from 1 to 100.
Option Definition
Option Definition
Start job Specifies the time setting for starting a scheduled job, for
example, hourly, daily, once.
Start job immediately if it was not started at its original schedule Lets a scheduled job start immediately if this has not
happened according to the originally configured schedule.
When this job has finished run job with ID Provides the ID of a job that is run immediately after this job.
Time Settings
Option Definition
(Time parameter settings) Settings specifying the parameters for a time setting, for
example, the minute in an hour when a job scheduled for
hourly execution should be started
Which time parameter settings are shown depends on the
selected time setting.
For example, if you have selected Hourly, you can configure
the minute in an hour, but not the day in a month.
• Minute — Sets a minute in an hour
• Hour — Sets an hour on a day
• Day of month — Sets a day in a month
• Enter day of week — Provides a list for setting a day in a week
• Month — Sets a month in a year (specified by a number from
1 to 12)
• Year — Sets a year (four digits)
Start job immediately if it was not started at its original schedule When selected, a scheduled job is started immediately if this
has not happened according to the originally configured
schedule.
This can be the case, for example, when an appliance is
temporarily shut down due to overload and a job was
scheduled to run during this downtime.
The job is then executed as soon as the appliance is up again.
Option Definition
When this job has finished run job with ID Provides the ID of a scheduled job that is to run immediately
after the job configured here has finished.
For this job, you must have configured the Activated by other job
time setting.
Execute job on remote node Provides a list for selecting other nodes of the configuration
to execute a scheduled job.
The list displays the host names for the other nodes.
The scheduled job that you configure on this appliance is
executed with its time and parameter settings on the selected
node or nodes.
A message is sent to the other node or nodes to inform them
about the scheduled job.
Option Definition
Use most recent configuration When selected, the scheduled job creates a backup from the
most recent appliance configuration
Format: |<path name>/<file name with extension>
Backup configuration path Specifies the name of the path to the folder where the
configuration is stored that should be used for the backup.
Format: /opt/mwg/storage/default/configfolder
This setting is only available when Use most recent configuration is
deselected.
Save configuration to path Specifies the path and file name for a backup configuration.
Format: /<path name>/<file name with file name extension>
Option Definition
Restore backup from file Specifies the path and file name for the file that should be
used to restore a backup.
Format: |<path name>/<file name with extension>
Only restore policy When selected, a scheduled job backs up only settings related
to the web security policy that was implemented on an
appliance.
Other settings, for example, settings needed for connecting
an appliance to a network are not restored.
Lock storage during restore When selected, no other files can be stored on the appliance
until the scheduled job has completely restored the backup
configuration.
Option Definition
File to upload Specifies the path and file name for a file that should be
uploaded.
Format: |<path name>/<file name with extension>
Destination to upload file to Specifies the name of the path to the server that a file should
be uploaded to under the HTTP or HTTPS protocol and the
file name for storing the file on the server.
Format: http|https: //<URL>/<file name with extension>
Enable basic authentication When selected, basic authentication is required for uploading
a file.
Option Definition
URL to download Specifies a URL for the location of a file that should be
downloaded under the HTTP or HTTPS protocol and the name
of the file.
Format: http|https: //<URL>/<file name with extension>
Save downloaded file to Specifies a path to the location where a downloaded file
should be stored and the file name for storing the file.
Format: |<path name>/<file name with extension>
Coaching settings
The Coaching settings are used for configuring the module that handles coaching.
Option Definition
Option Definition
Enable time synchronization with NTP servers When selected, the appliance uses time servers under the
NTP (Network Time Protocol) for time synchronization.
The system time of the appliance is then synchronized with
the time on the NTP servers. This will fail, however, if the delta
between both times is too big.
Tip: Best practice: Restart the appliance after configuring
time synchronization with NTP servers. When the appliance
restarts, it sets system time to the time on the NTP servers.
NTP server list Provides a list for entering the servers that are used for time
synchronization under the NTP protocol.
The list elements are as follows:
• String — Specifies the name of an NTP server.
• Comment — Provides a plain-text comment on an NTP server.
Option Definition
Current date and time Provides items for setting date and time of the appliance
system.
• Date — Enables you to enter a date by typing it in the field or
using a calendar.
• Calendar icon — Opens a calendar for selecting a date.
After selecting a date on the calendar and clicking OK, the
date appears in the date field.
• Time — Lets you specify a time by typing it.
The system time of an appliance is then synchronized with
the time on the NTP servers. This will fail, however, if the delta
between both times is too big.
Tip: Best practice: Restart the appliance after configuring
time synchronization with NTP servers. When the appliance
restarts, it sets system time to the time on the NTP servers.
Set now Sets the date and time you have entered into the
corresponding fields.
Option Definition
Primary domain name server Specifies the IP address of the first server.
Secondary domain name server Specifies the IP address of the second server.
Tertiary domain name server Specifies the IP address of the third server.
Option Definition
ePO user account Specifies a user name for the account that allows the retrieval
of monitoring data from an appliance.
Enable data collection for ePO When selected, monitoring data for the McAfee ePO server is
collected on an appliance.
Data collection interval in minutes Limits the time (in minutes) that elapse between data
collections.
The time is set on a slider scale, ranging from 10 minutes to 6
hours.
Option Definition
ePO host name Specifies the host name that Web Gateway uses when
connecting to a McAfee ePO server.
ePO user account Specifies a name for the user account that Web Gateway
submits when connecting to a McAfee ePO server.
Rejoining ePO for DXL communication When clicked, rejoins communication with the McAfee ePO
server to complete the setup.
A message informs you of the result.
Global Configuration
Setting for the internal cache on the appliance that stores external list data
Global Configuration
Option Definition
Flush External Lists Cache Removes the data that is stored in the internal cache.
Time before retry after failure Limits the time (in seconds) that the External Lists module
remembers a failure to retrieve data from a particular
external source to the specified value.
The module will not perform retries for a source as long as it
remembers the failure.
We recommend that you keep the default value or modify it
according to the requirements of your network.
This way you avoid adding load by constant retries to a web
server that is already overloaded.
Option Definition
File system allowed for file data access Specifies the path that leads to the folder for storing external
lists within your local file system.
External lists that data is retrieved from must be stored in this
folder.
Otherwise an attempt to retrieve the data will lead to an
access-denied error.
Note: When external list data is retrieved from an SQLite
database, the path specified here is the path to the folder
within your local file system that contains the database.
Option Definition
Check SSL certificate identity When selected, a certificate that a web server submits in SSL-
secured communication under the HTTPS protocol is verified
The verification is performed according to the SSL scanning
rules that are implemented on the appliance.
This can, for example, lead to an error if the web server uses
a self-signed certificate.
Option Definition
Enable dedicated file server port over HTTP When selected, the dedicated HTTP file server ports that are
configured on an appliance are enabled.
HTTP connector Specifies a dedicated HTTP port for connecting to the file
server.
You can enter more than one port here, separating entries by
commas. Ports can range from 1024 to 65335.
To set up ports within the range from 1 to 1023, you can
create a port forwarding rule.
Together with a port, you can enter an IP address. This means
connecting to a file server on an appliance over this port
requires that you specify both the port and this IP address.
For example, there are two interfaces for connecting on an
appliance with these IP addresses:
eth0: 192.168.0.10, eth1: 10.149.110.10
You enter this under HTTP connector:
4711, 192.168.0.10:4722
Then connecting to a file server on the appliance over port
4711 is allowed using both IP addresses, whereas connecting
over port 4722 requires that IP address 192.168.0.10 is used.
Restricting connections in this way might be useful, for
example, if you want to set up an intranet.
Enable dedicated file server port over HTTPS When selected, the dedicated HTTPS file server ports that are
configured on an appliance are enabled.
HTTPS connector Specifies a dedicated HTTPS port for connecting to the file
server.
You can enter more than one port here, separating entries by
commas. Ports can range from 1024 to 65335.
To set up ports within the range from 1 to 1023, you can
create a port forwarding rule.
Enable protection against cross-site scripting When selected, the communication with the file server is
protected against cross-site scripting.
When a cross-site scripting attack is launched, malicious
JavaScript code is inserted into messages that are sent during
the communication.
Adding the following header to messages prevents the
execution of this attack:
Header name: X-XSS-Protection
Header value: 1
Enable protection against clickjacking When selected, the communication with the file server is
protected against clickjacking.
When a clickjacking attack is launched, messages that are
sent during the communication are embedded in iFrames,
which can be used to steal data.
Adding the following header to messages prevents the
execution of this attack:
Header name: X-Frame-Options
Header value: DENY
Hybrid settings
When configured, the hybrid settings allow Web Gateway to connect to and communicate with McAfee WGCS.
Hybrid synchronization
The Web Gateway policy is synchronized with McAfee WGCS at the interval you specify in the hybrid settings. You can also
perform synchronization manually. Manual synchronization doesn't affect the synchronization interval or schedule which
continues as before.
Option Definition
Synchronize policy to Cloud When selected, allows you to configure the Web Hybrid settings
and enables the hybrid solution.
Appliance for Synchronization From the drop-down list, select the Web Gateway appliance
whose policy you want synchronized with McAfee WGCS.
If you are running multiple appliances in a Central
Management cluster, this setting ensures that the McAfee
WGCS policy is always synchronized with the same appliance.
Cloud administrator account name Specifies your McAfee ePO Cloud user name.
Cloud administrator account password Specifies your McAfee ePO Cloud password.
To change the password, click Set, then enter the new
password and click OK.
Local policy changes will be uploaded within the same interval as defined Specifies the synchronization interval.
below Default: 15 minutes (recommended)
Range: 10–60 minutes
Option Definition
Verify server certificate on SSL connections When selected, Web Gateway verifies the proxy server
certificate for SSL connections.
Use a proxy for synchronization When selected, allows you to configure the proxy server
settings. When the settings are configured, the Web Gateway
policy is pushed to McAfee WGCS through the proxy server.
Proxy host Specifies the IP address or host name of the server which is
used as a proxy.
Proxy port Specifies the port number on the proxy server that listens for
Web Gateway requests to transfer synchronization data.
Default: 8080
Proxy user Specifies the user name that Web Gateway sends to the
proxy server when transferring synchronization data.
Proxy password Specifies the password that Web Gateway sends to the proxy
server when transferring synchronization data.
To change the password, click Set, then enter the new
password and click OK.
Kerberos Administration
Option Definition
Key tab file Specifies the file that contains the master key required to
access the Kerberos server.
You can type a file name or use the Browse button to browse to
the file and enter its name in the field.
When a ticket is issued for authentication according to the
Kerberos method, the master key is read on the appliance
and used to verify the ticket.
If you are running a load balancer that directs web requests
to the appliance, tickets are issued for the load balancer and
verified on the appliance. It is then not checked whether a
request is directed to the appliance.
Maximal time difference between appliance and client Limits the time (in seconds) that the system clocks on the
appliance and its clients are allowed to differ to the specified
value.
Configuring Kerberos as the authentication method can lead
to problems when particular browsers are used for sending
requests:
• When the Microsoft Internet Explorer is used in a version
lower than 7.0, Kerberos authentication might not be
possible at all.
• When this explorer runs on Windows XP, Kerberos
authentication might not work as expected.
• When Mozilla Firefox is used, Kerberos authentication must
be configured in the browser settings to enable this
authentication method.
Enable replay cache When selected, a ticket that is issued for authentication
cannot be used more than once.
Note: Selecting this option reduces authentication
performance
License settings
The License settings are used for importing a license to an appliance. Information about the license is shown together with these
settings, and options for reviewing the agreements on license and data usage.
License Administration
Settings for importing a license
Option Definition
Import license Provides the options that are required for importing a license.
I have read and accept the end user license agreement Provides a link to the End User License Agreement and a
checkbox to select after reading the document.
To import a license, the checkbox must be selected, otherwise
the import options remains grayed out.
License file Shows the name and path of the license file that has been
selected after browsing the local file system.
When the name and path appear in this field, more license
information is shown under License information.
The license is activated by clicking Save Changes.
Browse Opens the local file system to let you browse for a license file.
License Information
Information about an imported license and an option for reviewing the Data Usage Statement
License Information
Option Definition
Features Lists the features of Web Gateway that are covered by the
license.
I have read and understood the data usage statement Provides a link to the Data Usage Statement.
Option Definition
Host name / Fully qualified domain name Specifies the host name of an appliance.
The name must be specified as fully qualified domain name.
Default gateway (IPv4) Specifies the default gateway for web traffic under IPv4.
Default gateway (IPv6) Specifies the default gateway for web traffic under IPv6.
Enable these network interfaces Provides a list of network interfaces that are available for
being enabled or disabled.
The eth0 network interface is by default included in the list
and enabled.
Add VLAN Opens a window for adding a network interface for VLAN
traffic.
Note: You can use this option to run VLANs under IPv4 or
IPv6.
To add a network interface, you specify a number as its ID
and click OK.
The interface name is composed of two parts, separated by a
dot.
The first part is the name and number of the interface that is
enabled in the list of available network interfaces. The second
part is the number that you specify.
For example, if the eth0 interface is enabled and you specify 1,
a network interface for VLAN traffic is added as eth0.1. It is
initially not enabled.
The range of numbers for VLAN network interfaces is 1–4094.
Note:
After adding one or more network interfaces for VLAN traffic,
you must also add their IDs to the parameters of the port
redirects for the network mode that you are using, for
example, the transparent bridge mode.
The window for adding or editing port redirects provides the
Optional 802.1Q VLANs field for entering VLAN IDs. Separate
multiple entries by commas.
The following tables describe the options on the IPv4, IPv6, and Advanced tabs.
IPv4
Option Definition
Default route Specifies the default route for web traffic using the network
interface (manually configured).
IPv6
Tab for configuring network interfaces under IPv6
IPv6
Option Definition
Default route Specifies a default route for web traffic using the network
interface (manually configured).
Advanced
Tab for configuring advanced network interface functions.
Note: The tab provides different options when the currently selected network interface is a bonding interface. These options are
described in a second table.
Advanced
Option Definition
Media Lets you select additional media for use with a network
interface.
• Automatically detect — Media for use with a network interface
are automatically detected if available in the network
environment of an appliance.
• 1000BaseT-FD, 1000Base-HD, ... — The selected media item is
used with a network interface.
Bond enabled When selected, the currently selected network interface, for
example, eth2, is configured as a bonded interface that is
subordinated to a bonding interface.
• Name — Specifies the name of the bonding interface.
The following table describes the options provided on the Advanced tab when a bonding interface is selected.
Advanced
Option Definition
Option Definition
Enable network protection When selected, the settings configured in the following for
network protection are enabled.
Input policy Lets you select the action taken on incoming traffic.
Incoming traffic can either be dropped or accepted.
Allow Ping requests When selected, the appliance accepts and answers Ping
requests.
Exceptions from default policy Provides a list for entering the network devices that send
traffic to an appliance.
Traffic from these devices is not handled according to the
rules that are currently implemented. When these rules drop
incoming traffic, traffic sent from the devices listed here is
accepted and vice versa.
The following table describes an entry in the list of exceptions from the default policy.
Option Definition
Port Forwarding
Settings for configuring port forwarding rules
Port Forwarding
Option Definition
The following table describes an entry in the list of port forwarding rules.
Option Definition
Source host Specifies the IP address of a host that is the source of web
traffic in a port forwarding rule.
Target port Specifies the port that web traffic from the source host is
forwarded to.
Destination host Specifies the IP address of the host that is the destination of
web traffic sent from the source host.
Destination port Specifies the port on the destination host used for listening to
web traffic coming in from the source host.
Option Definition
Enable extended connection logging When selected, all logs for port forwarding are stored on the
appliance system under /var/log/mwg_fwd.log.
The logging options that you configure here apply to all port
forwarding that performed under the configured port
forwarding rules.
Customize extended logging fields When selected, the input fields for configuring the type of
data that should be logged become accessible.
Log on success Lets you enter the type of data to be logged when web traffic
is successfully forwarded.
You can enter one or more of the following data types by
typing them in capital letters, separated by commas: PID,
HOST, USERID, EXIT, DURATION, TRAFFIC.
Log on failure Lets you enter the type of data to be logged when forwarding
web traffic failed.
You can enter one or more of the following data types by
typing them in capital letters, separated by commas: HOST,
USERID, ATTEMPT.
HOST data is logged by default.
Proxies settings
Proxies settings are used for configuring proxies.
Network Setup
Settings for implementing a network mode
When a network mode is selected, specific settings for this mode appear below these settings.
Network Setup
Option Definition
Proxy (optional WCCP) When selected, the explicit proxy mode is used and WCCP
services can redirect web traffic to an appliance.
Proxy HA When selected, the explicit proxy mode with High Availability
functions is used.
HTTP Proxy
Settings for running a proxy on an appliance under the HTTP protocol.
This protocol is used for transferring web pages and other data (also providing SSL encryption for enhanced security).
HTTP Proxy
Option Definition
Enable HTTP proxy When selected, a proxy is run on an appliance under the
HTTP protocol.
HTTP Port Definition list Provides a list for entering the ports on an appliance that
listen to client requests.
Anonymous login for FTP over HTTP Specifies the user name for logging on as an anonymous user
when requests are transmitted to an FTP server by an HTTP
proxy on an appliance.
Password for anonymous login for FTP over HTTP Sets a password for a user name.
Add Via HTTP header When selected, a Via HTTP header is added to a request that
is processed on an appliance.
This option is selected by default.
Adjust content-type header for requests to archives (depending on the content When selected, a content-type header in a request for access
encoding) to an archive file is adjusted if this header does not match the
content encoding that was detected for the archive.
Host header has priority over original destination address (transparent proxy) When selected, requests that are sent to the proxy on an
appliance in transparent proxy mode are recognized as traffic
in explicit proxy mode and processed accordingly.
Requests can, for example, be received on an appliance in
transparent mode when they have been forwarded by a load
balancer. If the proxy does not recognize the requests as
traffic in explicit proxy mode, they will be forwarded to the
web without filtering.
This option is only available if the explicit proxy mode is not
already configured on an appliance.
If the option is available, it is selected by default.
The following table describes an entry in the HTTP port definition list.
Option Definition
Listener address Specifies the IP address and port number for a port that
listens to HTTP requests.
Serve transparent SSL connections When selected, SSL-encrypted data can also be transferred
using this proxy.
Ports treated as SSL Provides a list of ports that handle incoming data as SSL-
encrypted.
Entries in this list are separated by commas. The list includes
port 443 by default.
Transparent common name handling for proxy requests When selected, common names sent within a request to the
proxy are handled transparently.
McAfee Web Gateway uses passive FTP over HTTP connections When selected, data can be transferred in FTP passive mode
using HTTP connections.
Accept Proxy Protocol header When selected, a Proxy Protocol header sent by a proxy
forwarding web server data downstream is processed on Web
Gateway.
FTP Proxy
Settings for running a proxy on an appliance under the FTP protocol
This protocol is used for transferring files, using separate connections for control functions and data transfer.
Note:
When a file is uploaded to the web from an FTP client and processed on Web Gateway, you can send progress indicators to the
client by inserting the FTP Upload Progress Indication event into a suitable rule.
This will prevent a timeout on the client when processing takes more time, for example, due to scanning the file for infections by
viruses and other malware.
FTP Proxy
Option Definition
Enable FTP proxy When selected, a proxy is run on an appliance under the FTP
protocol.
FTP port definition list Provides a list for entering the ports on an appliance that
listen to client requests.
Allow character @ in FTP server user name (Authentication using USER When selected, this character is allowed in a user name.
ftpserveruser@ftpserver)
Enable authentication using USER proxyuser@ftpserveruser@ftpserver When selected, this syntax is allowed for a user name.
Enable authentication using USER ftpserveruser@proxyuser@ftpserver When selected, this syntax is allowed for a user name.
Enable customized welcome message When selected, you can edit the welcome message that is
shown to a user who sends a request for web access under
the FTP protocol.
Type the welcome message into the Customized welcome message
text field, using the appropriate values for the variables that
are contained in the message.
Welcome to §MWG-ProductName$ $MWG-Version$ - build
$MWG.BuildNumber$
Running on $System.HostName$ - $System.UUID$
$Proxy.IP$:$Proxy.Port$
Select the command to be used for next-hop proxy login Allows you to select the command that Web Gateway sends
for logon when connecting to a next-hop proxy under the FTP
protocol.
The following commands can be selected:
• SITE
• OPEN
• USER@Host
Option Definition
Listener address Specifies the IP address and port number for a port that
listens to FTP requests.
Data port Specifies the port number of a port that is used for handling
data transfer under the FTP protocol.
Port range for client listener Configures a range of numbers for ports that listen to FTP
requests received from clients.
The range is configured by specifying port numbers for its
beginning and end.
Port range for server listener Configures a range of numbers for ports that listen to FTP
responses received from web servers that requests were
forwarded to.
Allow clients to use passive FTP connections When selected, requests can be sent from clients using
passive connections under the FTP protocol.
McAfee Web Gateway uses same connections (active/passive) as clients When selected, Web Gateway uses the same type for
does forwarding web traffic as a client that sent a request to Web
Gateway.
McAfee Web Gateway uses passive FTP connections When selected, Web Gateway can forward web traffic using
passive connections under the FTP protocol.
Note: When the FTP-over-HTTP mode is configured, Web
Gateway always uses active connections to reach out to the
FTP server even if this checkbox is selected.
ICAP Server
Settings for running an ICAP server on an appliance that modifies requests and responses in communication with ICAP clients
ICAP Server
Option Definition
ICAP Port Definition list Provides a list for entering the ports on an appliance that
listen to requests from ICAP clients.
When multiple ICAP servers are configured on different
appliances within your network, requests coming in from
ICAP clients are distributed among these servers in round-
robin mode.
The following table describes an entry in the ICAP port definition list.
Option Definition
Listener address Specifies the IP address and port number for a port on the
ICAP server that listens for requests from ICAP clients.
Send early 204 responses When selected, these responses are sent.
Include Realm into authentication attributes When selected, the realm is included in the attributes that are
evaluated during the authentication process that is
performed in ICAP communication.
Wait for complete ICAP request When selected, an ICAP request is only processed after it has
been completely received on the ICAP server, depending,
however, on what you select from the following.
• Never — Processing never waits until a request has been
completely received.
• Only for REQMOD requests — Processing only waits if a request
was sent in REQMOD mode.
• Only for FTP requests — Processing only waits if an FTP request
was sent.
• Always — Processing always waits until a request has been
completely received.
Maximum concurrent REQMOD connections Limits the number of connections that can run in REQMOD
mode at the same time.
The default maximum number is 100.
Maximum concurrent RESPMOD connections Limits the number of connections that can run in RESPMOD
mode at the same time.
The default maximum number is 400.
Subject, Issuer, Validity, Extensions, Fingerprint, Key These fields display information about the server certificate
that is currently in use.
IFP Proxy
Settings for running a proxy on an appliance under the IFP protocol
This protocol is used for transferring web pages.
IFP Proxy
Option Definition
Enable IFP proxy When selected, a proxy is run on an appliance under the IFP
protocol.
IFP port definition list Provides a list for entering the ports on an appliance that
listen to client requests for the IFP proxy.
Maximum number of concurrent IFP requests allowed Limits the number of IFP requests that are processed at the
same time to the specified value.
You can use this setting to prevent an overloading of the IFP
proxy.
The following table describes an entry in the IFP port definition list.
Option Definition
Listener address Specifies the IP address and port number for a port that
listens for IFP requests.
Send error message as redirect When set to true, a user who sent a request is informed, for
example, about a blocking of the request, by redirecting the
request to an error message page.
Otherwise the relevant information is sent as a normal
message under the IFP protocol.
SOCKS Proxy
Settings for running a proxy on an appliance under the SOCKS (sockets) protocol
SOCKS Proxy
Option Definition
Enable SOCKS proxy When selected, a proxy is run on an appliance under the
SOCKS protocol.
SOCKS port definition list Provides a list for entering the ports on an appliance that
listen to client requests for the SOCKS proxy.
The following table describes an entry in the SOCKS port definition list.
Option Definition
Listener address Specifies the IP address and port number of a port that
listens for SOCKS requests.
Port range for UDP Sets the range of ports used for listening to requests sent
under the UDP protocol when a SOCKS proxy is configured.
Option Definition
Time to wait for replies to DXL service requests Sets the time (in seconds) that Web Gateway waits for a
response after sending a request to DXL service.
The default waiting time is 60 seconds.
Subscription Topics Provides a list of topics that a security product can subscribe
to for receiving messages about these topics.
The following tables describe entries in the Subscription Topics and Services lists.
Option Definition
Option Definition
Web Cache
Setting for enabling the web cache on a Web Gateway appliance
Web Cache
Option Definition
Option Definition
Initial connection timeout Sets the time (in seconds) that is allowed to elapse before a
newly opened connection is closed if no request is received.
Connection timeout Sets the time (in seconds) that is allowed to elapse before a
connection is closed if a client or web server remains inactive
during an uncompleted connection request communication.
Client connection timeout Sets the time (in seconds) that is allowed to elapse between
one request and the next before a connection from an
appliance to a client is closed.
Maximum idle time for unused HTTP server connections Sets the time (in seconds) that is allowed to elapse between
one request and the next before a connection from an
appliance to a server under the HTTP protocol is closed.
UDP timeout (inactivity timeout) Sets the time (in seconds) that is allowed to elapse between
one request and the next before a connection from an
appliance to a client under the UDP protocol is closed.
DNS Settings
Settings for handling queries to a domain name system server (DNS server).
DNS Settings
Option Definition
IP protocol version preference Lets you select the protocol version that is preferred when
retrieving IP addresses from a DNS server.
• Same as incoming connection — When selected, the protocol
version is used that is already in use on the incoming
connection.
• IP4 — When selected, this protocol version is used.
• IP6 — When selected, this protocol version is used.
• Use other protocol version as fallback — When selected, the other
protocol version is used if using the preferred version
resulted in a failure.
When this option is selected, you can also configure the
following.
◦
Minimal TTL for DNS cache Sets a minimum time (in seconds) that must have elapsed
before data stored in the DNS cache is deleted.
Maximal TTL for DNS cache Set a maximum time (in seconds) that must have elapsed
before data stored in the DNS cache is deleted.
XMPP proxy
When filtering instant messaging communication on an appliance, one of the methods you can use is to set up a proxy under the
XMPP (Extensible Messaging and Presence Protocol).
This protocol is also known under the name of Jabber. It is used, for example, to participate in Facebook chats or Google talk
going on between an XMPP client and server.
You can configure settings for the XMPP proxy on the user interface under Configuration → Proxies.
When the SSL Scanner rule set is not enabled on an appliance, traffic going on between an XMPP client and this appliance is not
encrypted, but filtered by all rules that are enabled on the appliance. If the client does not accept unencrypted traffic, the
connection is closed.
When the SSL Scanner rule set is enabled, traffic is encrypted and inspected using SSL scanning to make it available for filtering
by other rules on the appliance.
Advanced Settings
Settings for advanced proxy functions
Advanced Settings
Option Definition
Maximum number of client connections Limits the number of connections between a proxy on an
appliance and its clients.
Specifying 0 means that no limit is configured.
Handle responses from server (content-encoding) Provides options for handling the content in the body of a
response from a web server that is forwarded to a client by
Web Gateway.
The content can be handled differently depending on
whether it is compressed, for example, when GZIP encoding
has been applied, or not.
Compressed content can be extracted to allow access,
inspection, and other treatment according to the rules that
are configured on Web Gateway.
Forwarding to the client is only performed if and to the extent
that the rules allow it.
• Extract but do not compress — Compressed content is extracted
and forwarded uncompressed to the client. Uncompressed
content is forwarded as it is.
• Extract and compress if server response is compressed — Compressed
content is extracted and compressed again before
forwarding it to the client. Uncompressed content is
forwarded as it is.
Handle compressed requests from client Provides options for handling requests that were received in
compressed format from a client of Web Gateway.
• Ignore — The compressed content is not extracted and
filtered, and the request is forwarded to the web server in
compressed format.
• Extract — The compressed content is extracted, so it can be
filtered, but not compressed again before it is eventually
forwarded to the web server.
• Extract and compress again — The compressed content is
extracted, so it can be filtered, and compressed again
before it is eventually forwarded to the web server.
Number of working threads Specifies the number of threads used for filtering and
transmitting web objects when a proxy is run on an appliance.
Number of threads for AV scanning Specifies the number of threads used to scan web objects for
infections by viruses and other malware when a proxy is run
on an appliance.
Use TCP no delay When selected, delays on a proxy connection are avoided by
not using the Nagle algorithm to assemble data packets.
This algorithm enforces that packets are not sent before a
certain amount of data has been collected.
Maximum TTL for DNS cache in seconds Limits the time (in seconds) that host name information is
stored in the DNS cache.
Timeout for errors for long running connections Sets the time (in hours) that a long-running connection to
another network component is allowed to remain inactive
before Web Gateway closes the connection.
The default time is 24 hours.
Check interval for long running connections Sets the time (in minutes) that elapses between check
messages sent over a long-running connection.
Maximum amount of data per connection or request Sets the amount of data (in MB) that can be sent on a long-
running connection to another network component before
Web Gateway closes the connection.
The default amount is 10,240 MB.
This setting prevents the performance of a Web Gateway
appliance from being impacted by long-running connections
that carry a very high data load.
Data load is measured as follows for the different connection
protocols to determine whether the maximum amount has
been reached.
• HTTP, HTTPS (with content inspection), ICAP, and similar
protocols: Data load is measured for every request that is
sent on a connection.
• SOCKS (when the underlying protocol is not followed),
tunneled HTTP, HTTPS (without content inspection), and
similar protocols: Data load is measured for a connection as
a whole.
• FTP: Data load is measured for the data connection.
When the connection is closed, an error is generated, which
can be handled by the rules in an Error Handler rule set.
The following properties are then set to the value of the
measured data to be available for the error handling rules:
Bytes.ToClient, Bytes.ToServer, Bytes.FromClient,
Bytes.FromServer.
Volume interval for connections Sets the volume interval for long-running connections.
Bypass RESPmod for responses that must not contain a body When selected, responses sent in communication under the
ICAP protocol are not modified according to the RESPMOD
mode if they do not include a body.
Call log handler for progress page updates and objects embedded in error When selected, the rules in the log handler rule set that is
templates implemented on the appliance are processed to deal with the
specified updates and objects.
Allow connections to use local ports using proxy When selected, local ports can be used for requests on an
appliance that a proxy is run on.
Use virtual IP as the Proxy.IP property value When selected, the value for the Proxy.IP property in High
Availability mode is a virtual IP address for all nodes in a
configuration.
It is the virtual IP address that is used by clients to connect to
the proxy.
When the director node redirects a request sent from a client
to a scanning node, this address is the value of the Proxy.IP
property also on the scanning node (not the physical address
of the scanning node).
HTTP(S): Remove all hop-by-hop headers When selected, hop-by-hop headers are removed from
requests received on an appliance that an HTTP or HTTPs
proxy is run on.
HTTP(S): Inspect via headers to detect proxy loops When selected, via headers in requests received on the
appliance that an HTTP or HTTPS proxy is run on are
inspected to detect loops.
HTTP(S): Host from absolute URL has priority over host header When selected, the host names corresponding to absolute
URLs in requests received on an appliance that an HTTP or
HTTPS proxy is run on are preferred to the host names
contained in the request headers.
Encode own IP address in progress page ID to enable non-sticky load When selected the own IP address is encoded in the progress
balancers page ID.
HTTP(S): Maximum size of a header Sets a limit to the size (in MB) for the header of a request or
response sent in HTTP(S) traffic.
The default size is 10 MB.
Limit for working threads doing IO in web cache Sets a limit to the number of working threads for the web
cache.
The default number is 25.
Progress page limit Sets a limit to the size (in KB) of the progress page.
The default size is 40,000 KB.
Enable TCP window scaling When selected, the window for receiving data packages at the
TCP communication level is increased by the scaling factor
that you specify under TCP window scale.
Note:
This option is enabled by default.
If you disable the option, it means that there is no window
scaling. Disable the option only if you really want to configure
the receive window in this way.
TCP window scale (format: 0-14) Sets the size of the window for receiving data packages on the
TCP communication level.
The initial size of the receive window can be scaled using a
scaling factor that is calculated by taking base 2 to the power
of the value that you specify here.
For example, if you specify 1, the scaling factor is 2^1 = 2,
which means the window size is doubled.
The range of values that you can specify is 0–14.
If you specify 0, it yields 1 as the scaling factor. It means that
you want to leave the initial size of your receive window as it
is.
It still allows, however, the use of window scaling for the
receive window of the communication partner.
The default value is 2.
Option Definition
Enable Periodic Rule Engine Trigger List When selected, connections to the web servers specified in
list called URL definition list are set up in regular intervals.
The interval for each web server connection is also specified
on the list.
When the interval has elapsed, the rule processing module
(rule engine) on an appliance is called, a connection to the
web server is set up, and data is downloaded from the web
server and passed on to the rule engine for processing.
Data is only downloaded under the HTTP and HTTPS
protocols.
Web servers that connections are set up to in this way include
next-hop proxy servers and other servers used for providing
particular services in the web.
URL definition list Provides a list of web servers that a connection can be set up
to.
The following table describes a list entry in the URL definition list.
Option Definition
Host Specifies the IP address and port number or the URL of a web
server that a connection can be set up to.
Trigger interval Specifies the interval (in seconds) that elapses before the next
attempt to set up a connection to a web server.
Option Definition
Listener address list Provides a list for entering the ports that listen to client
requests.
Option Definition
Listener address Specifies the IP address and port number of a listener port.
The following two listener ports are available on an appliance and entered in this list by default.
• UDP — 0.0.0.0:161
• UDP — 0.0.0.0:9161
Option Definition
Contact person Specifies the name of the person who administers the SNMP
functions of the monitored system.
Option Definition
SNMP v2c When selected, system events are monitored under version
2c of SNMP.
Communities for SNMPv1 and SNMPv2c access Provides a list for entering the user communities who are
allowed access to SNMP information under versions 1 and 2c
of SNMP.
SNMP v3c When selected, system events are monitored under version 3
of SNMP.
SNMP v3 users Provides a list for entering the users who are allowed access
to SNMP information under version 3 of SNMP
The following tables describe the entries in the list of user communities and the list of SNMP v3 users.
Option Definition
Allowed root OID Identifies the item on the MIB tree that is the beginning of the
information with allowed access.
If * or no value is specified here, access to all information is
allowed.
Allowed from Specifies the host name or IP address of a host system that
access to SNMP information is allowed from.
A range of IP addresses in an IP subnet can also be specified
here to allow access from them.
To specify this range, you must specify the IP address of the
subnet, which is also known as the network prefix, and its bit-
length, separated by a slash:
<network prefix/bit-length>
Example: 192.168.1.184/29
The IP address or prefix of the subnet is the IP address
immediately preceding the first IP address that serves to
identify a host system within the subnet.
For example, if you have a subnet with the following IP
addresses:
192.168.1.185
192.168.1.186
192.168.1.187
then 192.168.1.184 is the IP address or prefix of this subnet.
Option Definition
User name Specifies the name of a user who is allowed access to SNMP
information.
Allowed root OID Identifies the item on the MIB tree that is the beginning of the
information with allowed access.
If * or no value is specified here, access to all information is
allowed.
Option Definition
Trap sinks Provides a list for entering the host systems, known as trap
sinks, that receive messages about system events from the
SNMP agent on an appliance.
Option Definition
Host name or IP address Specifies the host name or IP address of a host system that
receives SNMP messages, which are known as traps.
Community string Specifies the string used for authenticating a user community
to let it access SNMP information, for example, public.
Send SNMP v2c traps When selected, messages can be sent under version v2c of
the SNMP protocol.
Option Definition
Static Routes
Settings for static routes under IPv4 or IPv6
Static Routes
Option Definition
Static routes list Provides a list of static routes for transmitting web traffic
under IPv4 or IPv6.
Option Definition
Destination Specifies the IP address and (optionally) net mask of the host
that is the destination of a static route.
Gateway Specifies the IP address of the gateway for routing web traffic
from the appliance to a host.
Source-based routing
Settings for source-based routing under IPv4 or IPv6
Source-based routing
Option Definition
Source-based routing for IPv4 When selected, source-based routing is performed under
IPv4.
Source-based routing for IPv6 When selected, source-based routing is performed under
IPv6.
Static source routing table number Provides a list of entries for source routing tables that are
used to route the traffic that is sent and received through the
management user interface.
Source-based routing list for IPv4 Provides a list of routing entries for the traffic that is sent and
received through the management user interface.
These routing entries are for a network where IPv4 is
followed.
Source-based routing list for IPv6 These routing entries are for a network where IPv6 is
followed.
The following table describes an entry in the list for static source routing tables.
Option Definition
Source information to look up routing table Specifies the source IP address of the traffic that is routed
according to the configured static source routing table.
Routing table number Specifies the number of the routing table for routing the
traffic that is sent and received through the management
user interface.
The following table describes an entry in the list for source-based routing under IPv4.
Option Definition
Destination Specifies the IP address range (in CIDR notation) for the
destinations of the traffic that is sent through the
management network interface.
Routing table number Specifies the number of the routing table for routing the
traffic that is sent and received through the management
user interface.
Gateway Specifies the IP address of the gateway for the traffic that is
sent and received through the management network
interface.
Option Definition
Destination Specifies the IP address range (in CIDR notation) for the
destinations of the traffic that is sent through the
management network interface.
Routing table number Specifies the number of the routing table for routing the
traffic that is sent and received through the management
user interface.
Gateway Specifies the IP address of the gateway for the traffic that is
sent and received through the management network
interface.
Telemetry settings
The Telemetry settings are used for configuring the collection of feedback data about web objects that are potentially malicious,
as well as about policy configuration.
Feedback Settings
Settings for collecting feedback data
Note: You can separately enable or disable each of the following options.
Feedback Settings
Option Definition
Send feedback to McAfee about system information and suspicious URLs to When selected, feedback data is collected and sent to special
improve its threat prediction and protection services McAfee feedback servers.
McAfee collects this data to analyze it and improve the threat
prediction and protection features of Web Gateway.
For more information, see the Data Usage Statement.
Send feedback to McAfee about potentially malicious websites When selected, relevant data for virus and malware filtering is
collected and sent to a special McAfee feedback server.
Send feedback to McAfee about dynamically classified websites When selected, relevant data for classifying websites is
collected and sent to a special McAfee feedback server.
Send feedback to McAfee about policy configuration to improve the product When selected, relevant data for policy configuration is
collected and sent to a special McAfee feedback server.
Further Information
Option Definition
Data Usage Statement Provides a link to the data usage statement, which explains:
• What McAfee uses collected feedback data for
• What data is collected
• How data collection can be turned off for different types of
data
Note: The data usage statement has also been presented to
you at the initial setup of the appliance.
Advanced Settings
Advanced settings for collecting feedback data
Advanced Settings
Option Definition
Use upstream proxy When selected, a proxy server is used to send feedback data
to McAfee.
IP or name of the proxy Specifies the IP address or host name of the proxy server.
Port of the proxy Specifies the port number of the port on the proxy server that
listens for requests to send feedback data.
The port number can range from 1 to 65635.
The default port number is 9090.
User name Provides the user name that is required for logging on to the
proxy server.
Choose feedback server When selected, an IP address and port number can be
configured for the server that feedback data is sent to.
Port of the server Specifies the port number of the port on the feedback server
that listens for requests to send data.
The port number can range from 1 to 65635.
The default port number is 443.
Tenant ID Configuration
Settings for configuring a tenant ID
Option Definition
Tenant ID generation status information Provides information about the generation status of the
tenant ID.
Show Provisioning Key Lets the provisioning key, which is used for generating the
tenant ID, appear in the provisioning key field.
Open cloud ePO and generate activation key. Provides information about how to continue with creating the
tenant ID.
Activation key field Shows the activation key for the tenant ID that you have
created by working with McAfee ePO and pasted into this
field.
UI Access
Settings for configuring access to the interface of an appliance
UI Access
Option Definition
HTTPS client certificate connector Provides options for configuring a client certificate connector.
• Enable client certificate authentication — When selected, client
certificate authentication can be performed.
• HTTPS connector for client certificate authentication — Specifies a port
for connecting to the interface when client certificate
authentication is performed.
You can enter more than one port here, separating entries
by commas. Ports can range from 1024 to 65335.
Entering a port together with an IP address can be done in
the same way as under HTTP connector and has the same
meaning.
• Redirect target after authentication — When selected, a request is
redirected after client certificate authentication has
successfully been performed.
• Redirection host and port — Specifies the host system and the
port on the system that requests are redirected to.
Option Definition
Allow browser to save login credentials When selected, credentials submitted by a user for logging on
to the interface are saved by the browser.
Restrict browser session to IP address of user When selected, a session for working with the interface is
only valid as long as the IP address of the client that the user
started this session from remains the same.
Let user decide to restrict session for IP address or not When selected, it is up to the user who started a session for
working with the interface whether it should be valid only for
the IP address of the client that the session was started from.
Allow multiple logins per login name When selected, more than one user can log on to the
interface under the same user name and password.
Use HTTPOnly session cookies (applet loading may take longer) When selected, HTTPOnly cookies are used for a session with
the user interface.
Enable protection against cross-site scripting and clickjacking When selected, the page used by the administrator for
logging on to the interface of a Web Gateway appliance from
a browser is protected against a common type of attack.
The attack can be performed by combining two methods. Two
HTTP headers are added when the page is sent to the
browser to prevent these methods from being executed.
• Cross-site scripting — Malicious JavaScript code is inserted
in the page, which is executed when the administrator
responds to a prompt on the page, for example, by entering
a user name.
Adding the following header to messages prevents the
execution of this attack:
Header name: X-XSS-Protection
Header value: 1
• Clickjacking — The page is embedded in an iFrame, which
can be used to steal the data that is entered on the page.
Adding the following header to messages prevents the
execution of this attack:
Header name: X-Frame-Options
Header value: DENY
Maximum number of active applet users Limits the number of users that can be logged on to the
interface at the same time.
The maximum number of users is 20 by default.
Option Definition
Subject, Issuer, Validity, Extensions Provide information about the certificate that is currently in
use.
Import Opens the Import Certificate Authority window for importing a new
certificate.
Option Definition
Browse Opens the local file manager to let you browse for and select
a certificate file.
Browse Opens the local file manager to let you browse for and select
a private key file.
Import Opens the Import Certificate Authority window for importing a new
certificate.
Browse Opens the local file manager to let you browse for and select
a certificate chain file.
After importing a certificate with a certificate chain, the
certificate chain is displayed in the Certificate chain field of the
User Interface Certificate settings.
Memory Settings
Settings for the memory that is available when working with the interface of an appliance
Memory Settings
Option Definition
Amount of maximum memory available for GUI applet Limits the amount of memory (in MiB) that is available for the
interface applet.
The range for the available maximum is 100–999 MiB.
The available maximum is 512 MiB by default.
Amount of maximum memory available for MWG UI backend Limits the amount of memory (in MiB) that is available for the
backedn of the interface.
The range for the available maximum is 100–9999 MiB.
If no value is specified here, the default maximum of 512 MiB
is configured.
REST Settings
Settings for configuring use of the REST interface to work with an appliance
REST Settings
Option Definition
Maximum size of a REST request Limits the size (in MiB) of a request that is sent to the REST
interface.
Note: The maximum amount of memory that is available
when working with the REST interface is 200 MiB.
The maximum size of a request is 2 MiB by default.
Maximum memory per REST session Limits the amount of memory (in MiB) that is available for a
session when working with the REST interface.
Note: The maximum amount of memory that is available
when working with the REST interface is 200 MiB.
The maximum amount of memory for a session is 10 MiB by
default.
Maximum number of active REST users Limits the number of users that can work with the REST
interface at the same time.
The maximum number of users is 20 by default.
Join Domain
Settings for joining an appliance to a Windows domain
Option Definition
McAfee Web Gateway account name Specifies the name of an account for an appliance.
Timeout for requests to this NTLM domain Limits the time (in seconds) that elapses before processing
stops for a request sent from an appliance to a domain
controller if no response is received to the specified value.
Wait time for reconnect to domain controller Specifies the time (in seconds) that elapses before another
attempt is made to connect to a domain controller after a
previous attempt failed.
The allowed range is from 5 to 300 seconds.
Configured domain controllers Provides a list for entering the domain controllers that an
appliance can connect to in order to retrieve authentication
information.
Entries must be separated by commas.
Number of active domain controllers Maximum number of configured domain controllers that can
be active at the same time
The allowed range is from 1 to 10.
Anti-Malware settings
The Anti-Malware settings are the settings for the Anti-Malware module, which handles the scanning of web objects for infections by
viruses and other malware.
Instances of the Anti-Malware settings include the following:
• Gateway Anti-Malware settings — Default settings
• Gateway ATD settings — Available after importing the Advanced Threat Defense rule set
These settings differ from the default settings not only in that different values are configured for some options. They also have
options that do not exist under the default settings and lack others that do exist there.
Option Definition
Full McAfee coverage: The recommended high-performance configuration When selected, the McAfee Gateway Anti-Malware engine and
the McAfee Anti-Malware engine are active.
Web objects are then scanned using:
Proactive methods + Virus signatures
This option is selected by default.
Layered coverage: Full McAfee coverage plus specific Avira engine features When selected, the McAfee Gateway Anti-Malware engine, the
— minor performance impact McAfee Anti-Malware engine, and, for some web objects, also
the third-party Avira engine are active.
Web objects are then scanned using:
Proactive methods + Virus signatures + Third-party module
functions for some web objects
Duplicate coverage: Full McAfee coverage and Avira engine — less When selected, the McAfee Gateway Anti-Malware engine, the
performance and more false positives McAfee Anti-Malware engine, and the third-party Avira engine
are active.
Web objects are then scanned using:
Proactive methods + Virus signatures + Third-party module
functions
Avira only: Only uses Avira engine — not recommended When selected, only the Avira engine is active.
Web objects are then scanned using:
Third-party module functions
Stop virus scanning right after an engine detected a virus When selected, engines stop scanning a web object as soon
as one of them has detected an infection by a virus or other
malware.
Option Definition
Advanced Settings
Advanced settings for all scanning submodules.
Advanced Settings
Option Definition
Enable GTI file reputation queries When selected, information on the reputation of files
retrieved from the Global Threat Intelligence system is
included in the scanning result.
Enable heuristic scanning When selected, heuristic scanning methods are applied to
web objects.
Option Definition
Enable detection for potentially unwanted programs When selected, web objects are also scanned for potentially
unwanted programs.
Enable mobile code scanning When selected, mobile code is scanned in general.
Individual settings can be configured under Scan the following
mobile code types.
Enable removal of disinfectable content detected in HTML documents by When selected, the content described here can be removed.
mobile code filter
Enable Payload Heuristics When selected , the McAfee Gateway Anti-Malware engine
uses the highly proficient heuristics known as Payload
Heuristics for scanning web objects.
If this option is enabled, the scanning engine adds a
watermark to the URLs of executables and similar web
objects, for example, dynamic link libraries that are contained
within web pages.
When these URLs are forwarded from the appliances to the
appropriate web servers, these watermarks need to be
removed.
An event in a rule that is contained in a library rule set,
removes the watermarks by rewriting the URLs. The rule set
name is Payload Heuristic - Rewrite Watermarked URLs.
You need to import this rule set and place it at the top of the
rule set tree.
When the following mobile code types are selected, they are scanned.
Windows executables Once downloaded from the web or received by email, these
executables can become a threat when launched because
they run with all the privileges of the current user.
Java applets Java applets can be embedded in web pages. Once activated,
they can run at different permission levels, based on a digital
certificate and the user’s choice.
Java applications Java applications run stand-alone with all privileges of the
current user.
ActiveX controls ActiveX controls can be embedded in web pages and office
documents. Once activated, they run with all privileges of the
current user.
Visual Basic script Visual Basic script code can be embedded in web pages or in
emails.
Visual Basic for applications Visual Basic macros can be embedded in office documents
created with Word, Excel, or PowerPoint.
When the following types of behavior are selected, web objects showing this behavior are blocked.
Data theft: Backdoor Malicious applications grant an attacker full remote access
and control to a victim’s system through existing or newly
created network channels.
Data theft: Keylogger Malicious applications hook into the operating system to
record and save keyboard strokes.
The captured information, such as passwords, is sent back to
the attacking party.
Data theft: Password stealer Malicious applications gather, store, and leak sensitive
information, such as the system configuration, confidential
data, credentials, and other data for user authentication.
System compromise: Code execution exploit Exploits for vulnerabilities in client applications, such as
browsers, office programs, or multi-media players, allow an
attacker to run arbitrary code on the compromised system.
System compromise: Browser exploit Exploits for vulnerabilities in browser applications and plug-
ins allow an attacker to run arbitrary code, steal sensitive
data, or escalate privileges.
Viral Replication: Network worm Malicious applications or device drivers self-replicate using
email, the internet, peer-to-peer networking, or by copying
themselves onto removable media such as USB devices.
Viral Replication: File infector virus Self-replicating applications infect existing files on the hard-
disk, embedding viral code in order to spread through the
newly infected host file.
System compromise: Trojan downloader Malicious applications or script code download and execute
additional payload from the web.
System compromise: Trojan dropper Malicious applications carry hidden payload, extract, and
launch it upon execution.
System compromise: Trojan proxy Malicious applications allow to relay potentially malicious
hidden network activities through the compromised system.
Web threats: Infected website Websites contain injected malicious script code or request
additional malicious code as soon as it is opened in a
browser.
The initial infection could have taken place through an SQL
injection attack against the web server.
Stealth activity: Code injection Applications copy their code into other, often legitimate
processes, which results in a hijacking of the respective
privileges and trust.
This technique is typically employed by malware that tries to
hide its presence on compromised systems and to evade
detection.
Detection evasion: Obfuscated code Applications consist of highly scrambled or encrypted code,
so malicious code portions are hard to detect.
Detection evasion: Packed code Applications have their content compressed by a run-time
packer or protector. This changes the way the content looks,
so it is harder to classify.
Data theft: Spyware Applications track and analyze user behavior and activities,
steal sensitive data, and leak this data to the attacker’s
servers.
Web threats: Vulnerable ActiveX controls ActiveX controls appearing on web pages that are restricted
to other on-browser usage present potential vulnerabilities.
Potentially unwanted: Suspicious activity Potentially malicious code shows either non-standard or not
fully trusted behavior.
Potentially unwanted: Deceptive behavior Messages mislead the user, play missing code tricks, and fake
alerts.
These threats could tell users that their systems are infected
with spyware and promote fake AV applications for cleaning.
Potentially unwanted: Redirector Redirecting code forwards users visiting a website to other,
potentially malicious locations.
This behavior is often caused by an infection of a previously
legitimate website.
Potentially unwanted: Direct kernel communication Applications directly communicate with a Windows kernel or
in kernel mode, trying, for example, to install a root kit or to
destabilize the system.
Potentially unwanted: Privacy violation Potentially malicious code accesses sensitive or private data,
which can result in eavesdropping clipboard content or in
reading registry keys.
Option Definition
Maximum size of archive member Limits the size (in MB) of a member in an archive that the
Avira engine scans for infections.
If an archive member exceeds this size, it is not scanned and
the archive is blocked.
The default size limit is 1024 MB.
Option Definition
Full McAfee coverage: The recommended high-performance configuration When selected, the McAfee Gateway Anti-Malware engine is
active.
This option is selected by default.
Layered coverage: Full McAfee coverage plus specific Avira engine features When selected, the McAfee Gateway Anti-Malware engine
— minor performance impact and, for some web objects, also the third-party Avira engine
are active.
Duplicate coverage: Full McAfee coverage and Avira engine — less When selected, the McAfee Gateway Anti-Malware engine and
performance and more false positives the third-party Avira engine are active.
Avira only: Only uses Avira engine — not recommended When selected, only the Avira engine is active.
McAfee Advanced Threat Defense only: Send files to an MATD appliance for When selected, only scanning by Advanced Threat Defense is
deep analysis through sandboxing active.
Note: This option is by default selected.
Stop virus scanning right after an engine detected a virus When selected, engines stop scanning a web object as soon
as one of them has detected an infection by a virus or other
malware.
MATD Setup
Common part of the settings for configuring the use of Advanced Threat Defense
MATD Setup
Option Definition
User name Specifies the user name that Web Gateway submits when
trying to connect to Advanced Threat Defense.
Server list Provides a list of servers that Advanced Threat Defense runs
on.
List of certificate authorities Provides a drop-down list for selecting a list of known
certificate authorities
These certificate authorities will be used to refer to when
communication between Web Gateway and Advanced Threat
Defense is going on in SSL-secured mode under the HTTPS
protocol.
Severity threshold to indicate a malicious file Sets a threshold for the severity grade of the malicious
features that is detected in a web object, for example, a file,
when scanned by Advanced Threat Defense.
If this threshold is reached, the object is classified as
malicious and the value of the Antimalware.Infected property is set
to true.
The threshold is set on slider scale with values ranging from 0
to 5 (very high severity).
Reuse previous detection, McAfee Web Gateway will retrieve latest report When selected, the severity grade that was found for a web
from MATD based on the hash of the file object at its last scanning by Advanced Threat Defense is used
for classifying it as malicious or not.
When this option is selected, the following option becomes
accessible.
Maximum detection age Sets the maximum time (in minutes) that a severity grade for
a web object can be used to classify the object as malicious or
not.
The allowed time range is 1 to 999999 minutes.
The default maximum time is 30 minutes.
Reuse running task if same sample is analyzed When selected, a running task is used for evaluation if it is the
same web object that is analyzed.
Send client IP to MATD server When selected, the IP address of a client that has sent a
request for downloading a web object is sent to the server on
which Advanced Threat Defense is running.
Option Definition
Network Setup
Settings for configuring the connection to the server that Advanced Threat Defense runs on
Network Setup
Option Definition
Connection timeout Sets the time (in seconds) that elapses before the connection
to a server is closed when no response is received from it.
The default time is 5 seconds.
Scan timeout Sets the time (in minutes and seconds) that Advanced Threat
Defense is allowed for scanning a web object.
If this time is exceeded, Web Gateway records it as an error.
Minutes — Time allowed in minutes
Seconds — Time allowed in seconds
Poll interval Sets the time interval (in seconds) that elapses before the
next attempt is made to retrieve information from Advanced
Threat Defense about the progress made in scanning a web
object.
The default time is 20 seconds.
Authentication settings
The Authentication settings are the settings for the Authentication module, which handles authentication of users and user groups.
Authentication Method
Settings for selecting an authentication method.
Authentication Method
Option Definition
Authentication Test
Settings for testing whether a user with given credentials would be authenticated.
Authentication Test
Option Definition
Option Definition
Proxy Realm Specifies the location of the proxy that receives requests from
users who are asked to authenticate.
Authentication attempt timeout Limits the time (in seconds) that elapses before the
authentication process terminates if not completed
successfully to the specified value.
Authentication cache TTL Limits the time (in minutes) that authentication information is
stored in the cache to the specified value.
Option Definition
Send domain and machine name to the client When selected, the names of the appliance and its domain
are sent to the client that a user who is to be authenticated
sent a request from.
An appliance can, however, be joined to more than one
domain, so different domain names can be used when
connecting to a client, which can lead to problems with user
authentication.
Sending a particular domain name to the client might result in
an authentication failure because a particular user name is
unknown in this domain.
Web browsers do usually not require domain name
information, but some third-party applications that Web
Gateway works with might require it.
So we recommend proceeding as follows:
• If an appliance has been joined to only one domain: Select
this option.
• If an appliance has been joined to more than one domain:
Leave this option deselected.
There are, however, applications that require this option to be
selected anyway. Otherwise they will close the connection to
Web Gateway
This applies, for example, to some .NET based applications as
well as to some popular open-source products, such as the
Cntlm proxy.
Default NTLM domain Specifies the name of the default Windows domain used for
looking up authentication information.
This is one of the domains you have configured on the
Appliances tab of the Configuration top-level menu.
Get global groups When selected, information on global user groups is searched
for on the Windows domain server.
Get local groups When selected, information on local user groups is searched
for on the Windows domain server.
Prefix group name with domain name (domain\group) When selected, the name of the Windows domain appears
before the name of the user group when authentication
information on this group is sent from the domain server.
Enable basic authentication When selected, the basic NTLM authentication method is
applied to authenticate users.
Information that a user submits for authentication is then
sent in plain-text format (less secure) to the Windows domain
server.
Enable integrated authentication When selected, the integrated NTLM authentication method
is applied to authenticate users.
Information that a user submits for authentication is then
encrypted before it is sent to the Windows domain server.
NTLM cache TTL Limits the time (in seconds) that authentication information is
stored in this cache to the specified value.
International text support Specifies a set of characters used by default for a request sent
from a client, for example, ISO-8859-1.
Option Definition
Use secure agent connection When selected, the connection used for communicating with
the NTML Agent is SSL-secured
Authentication connection timeout in seconds Limits the time (in seconds) that elapses before the
connection to the NTLM Agent is closed if no activities occur
on it to the specified value.
Agent Definition Provides a list for entering the agents that are involved in
performing NTLM authentication.
Default NTLM domain Specifies the name of the default Windows domain used for
looking up authentication information.
This is one of the domains you have configured on the
Appliances tab of the Configuration top-level menu.
Get global groups When selected, information on global user groups is searched
for on the Windows domain server.
Get local groups When selected, information on local user groups is searched
for on the Windows domain server.
Prefix group name with domain name (domain\group) When selected, the name of the Windows domain appears
before the name of the user group when authentication
information on this group is sent from the domain server.
Enable basic authentication When selected, the basic NTLM authentication method is
applied to authenticate users.
Information that a user submits for authentication is then
sent in plain-text format (less secure) to the Windows domain
server.
Enable integrated authentication When selected, the integrated NTLM authentication method
is applied to authenticate users.
Information that a user submits for authentication is then
encrypted before it is sent to the Windows domain server.
NTLM cache TTL Limits the time (in seconds) that authentication information is
stored in this cache to the specified value.
International text support Specifies a set of characters used by default for a request sent
from a client, for example, ISO-8859-1.
Option Definition
Send domain and machine name to the client When selected, the names of the appliance and the domain it
has been assigned to are sent to the client that a user who is
to be authenticated sent a request from.
Enable basic authentication When selected, the basic NTLM authentication method is
applied to authenticate users.
Information that a user submits for authentication is then
sent in plain-text format (less secure) to the Windows domain
server.
Enable integrated authentication When selected, the integrated NTLM authentication method
is applied to authenticate users.
Information that a user submits for authentication is then
encrypted before it is sent to the Windows domain server.
NTLM cache TTL Limits the time (in seconds) that authentication information is
stored in this cache to the specified value.
International text support Specifies a set of characters used by default for a request sent
from a client, for example, ISO-8859-1.
Option Definition
LDAP server(s) to connect to Provides a list for entering the LDAP servers that
authentication information is retrieved from.
List of certificate authorities Provides a list for entering the certificate authorities that
issue certificates when a Secure LDAP (S-LDAP) connection is
used for communication with an LDAP server.
International text support Specifies a set of characters used by default for a request sent
from a client, for example, ISO-8859-1.
Enable LDAP version 3 When selected, version 3 of the LDAP protocol is used.
Note: If you want to configure Secure LDAP authentication,
also known as LDAPS, it is this LDAP version that you must
use.
This version is by default selected.
Allow LDAP library to follow referrals When selected, the lookup of user information can be
redirected from the LDAP server to other servers.
Connection live check Limits the time (in minutes) that elapses between checks to
see whether the connection to the LDAP server is still active
to the specified value.
LDAP operation timeout Limits the time (in seconds) that elapses before the
connection to the LDAP server is closed if no communication
occurs to the specified value.
Base distinguished name to user objects Specifies the Distinguished name (DN) in the directory on an
LDAP server where the lookup of user attributes should
begin.
Map user name to DN When selected, the name of the user who asks for
authentication must map to a DN (Distinguished Name).
This name identifies the user in the directory on the LDAP
server
Filter expression to locate a user object Specifies a filtering term for restricting the lookup of user
attributes.
To substitute the user name in the filtering term, u% is used
as a variable.
Get user attributes When selected, user attributes are looked up on the LDAP
server to authenticate a user.
User attributes to retrieve Provides a list for entering the user attributes that should be
retrieved from an LDAP server.
Attributes concatenation string Specifies a string for separating user attributes found by a
lookup, for example, / (slash).
Get groups attributes When selected, user group attributes are also looked up on
the LDAP server to authenticate a user.
Base distinguished name to group objects Specifies the Distinguished name (DN) in the directory on the
LDAP server where the lookup of group attributes should
begin
Filter expression to locate a group object Specifies a filtering term for restricting the lookup of group
attributes.
To substitute the user name in the filtering term, u% is used
as a variable.
Group attributes to retrieve Provides a list for entering the group attributes that should be
retrieved from an LDAP server.
Digest Authentication
Settings for LDAP digest authentication.
Digest Authentication
Option Definition
User attribute with password hash Specifies the attribute of a user entry on the LDAP server that
stores the value for the authentication hash.
Nonce maximal use count Sets a limit to repeated uses of the nonce (number only once)
that is transmitted in the authentication process and required
as a parameter for calculating the authentication hash.
The maximum number of times that a nonce can be used by
default is 100.
Nonce maximal TTL Sets a limit to the time period (in minutes) that a nonce
remains valid.
The maximum time that a nonce can remain valid by default
is 30 minutes.
Enable digest URI check When selected, a check is performed to ensure that the URL
that a client sends as a parameter for calculating the
authentication hash is the same as the URL that this client
sends in its request for accessing a particular destination in
the web.
If this check fails, the request is blocked.
As this check might also fail due to problems with the
different formats that the browsers on the clients use for
sending URLs, it is optional.
The check is enabled by default.
Allow digest authentication only When selected, digest authentication must always be
performed if a user is to be authenticated under the LDAP
authentication method.
Option Definition
LDAP server(s) to connect to Provides a list for entering the eDirectory servers that take
the role of LDAP servers in providing authentication
information.
List of certificate authorities Provides a list for entering the certificate authorities that
issue certificates when a Secure LDAP (S-LDAP) connection is
used for communication with an LDAP server.
International text support Specifies a set of characters used by default for a request sent
from a client, for example, ISO-8859-1.
Enable LDAP version 3 When selected, version 3 of the LDAP protocol is used.
Allow LDAP library to follow referrals When selected, the lookup of user information can be
redirected from an LDAP server to other servers.
Connection live check Limits the time (in minutes) that elapses between checks to
see whether the connection to an LDAP server is still active to
the specified value.
LDAP operation timeout Limits the time (in seconds) that elapses before the
connection to an LDAP server is closed if no communication
occurs to the specified value.
eDirectory network address attribute Specifies the name of the attribute that provides the network
addresses used for an eDirectory server
eDirectory network login time attribute Specifies the name of the attribute that provides the logon
time used on an eDirectory server.
eDirectory network minimal update interval Specifies the time that elapses (in seconds) before
information from an eDirectory server is updated.
Base distinguished name to user objects Specifies the Distinguished name (DN) in the directory on an
LDAP server where the lookup of user attributes should
begin.
Map user name to DN When selected, the name of the user who asks for
authentication must map to a DN (Distinguished Name). This
name identifies the user in the directory on the LDAP server.
Filter expression to locate a user object Specifies a filtering term for restricting the lookup of user
attributes.
To substitute the user name in the filtering term, u% is used
as a variable.
Get user attributes When selected, user attributes are looked up on the LDAP
server to authenticate a user.
User attributes to retrieve Provides a list for entering the user attributes that should be
retrieved from an LDAP server.
Attributes concatenation string Specifies a string for separating user attributes found by a
lookup, for example, / (slash).
Get groups attributes When selected, user group attributes are also looked up on
the LDAP server to authenticate a user.
Base distinguished name to group objects Specifies the Distinguished name (DN) in the directory on an
LDAP server where the lookup of group attributes should
begin.
Filter expression to locate a group object Specifies a filtering term for restricting the lookup of group
attributes.
To substitute the user name in the filtering term, u% is used
as a variable.
Group attributes to retrieve Provides a list of group attributes that should be retrieved
from an LDAP server.
Option Definition
RADIUS server definition Provides a list for entering the RADIUS servers that
authentication information is retrieved from.
Default domain name Specifies the name of the domain that information is
retrieved from if no other domain is specified.
Radius connection timeout in seconds Limits the time (in seconds) that elapses before the
connection to the RADIUS server is closed if no traffic occurs
to the specified value.
International text support Specifies the set of characters used by default for a request
sent from a client, for example, ISO-8859-1.
Value of attribute with code Sets the code value for the attribute retrieved with the user
group information, according to RFC 2865.
For example, 25 is the code for the “class” attribute.
Vendor specific attribute with vendor ID Sets the Vendor ID that is required for retrieving vendor-
related data in the search for user group information.
According to RFC 2865, the vendor ID is a part of the vendor
attribute, followed by a number of subattributes. Its code
value is 26.
Vendor subattribute type Sets a code value for the type of subattributes included in a
vendor attribute. according to RFC 2865.
Since not all vendors adhere to this structure, we recommend
to specify 0 as value here. This allows the authentication
module to retrieve all available vendor information.
Option Definition
Extract group membership IDs from the ticket When selected, information to identify the groups that a user
is a member of is retrieved from the ticket that is used in the
process of authenticating users under the Kerberos
authentication method.
When this option is selected, the following option becomes
accessible.
Look up group names via NTLM When selected, the names of the groups that a user is a
member of are retrieved using the NTLM authentication
method.
Option Definition
Authentication server URL Specifies the URL of a server that is used under this method
to look up authentication information.
Store authentication result in a cookie When selected, the information retrieved from the
authentication server is stored in a cookie
If cookie authentication is implemented, the cookie is added
to the next request sent by the respective user, so that this
user need not authenticate again.
Allow persistent cookie for the server When selected, a cookie can be used persistently for sending
multiple requests to the authentication server
Cookie TTL for the authentication server in seconds Limits the time (in seconds) that a cookie sent with a request
to the server is stored to the specified value.
Option Definition
OTP server Specifies the IP address and port number of the OTP server
that Web Gateway connects to when authenticating a user
under the One-Time Password authentication method.
Communicate with SSL and trust certificate below When selected, communication with the OTP server is
performed using an SSL-secured connection.
When this option is selected, the information in the following
four fields is no longer grayed out and the Import button below
these fields becomes accessible.
The fields provided detailed information about the certificate
that is currently used in SSL-secured communication with the
OTP server.
• Subject — Provides general information about the certificate.
◦
Common Name (CN) — Specifies the common name
of the certificate.
By default, this name is localhost.
◦
Organization (O) — Specifies the organization of the
certificate.
By default, the organization is OTP Server.
◦
WS client name Specifies the user name for Web Gateway in communication
with the OTP server.
OTP message Specifies the prefix to messages that are sent from the OTP
server to Web Gateway and the delimiters that include a
message.
By default a message looks like this:
OTP for MWG: $$<OTP message>$$
Option Definition
Keep domain in group name When selected, domain information contained in the name of
a user group is kept.
This option is selected by default.
Remove custom headers used for authentication When selected, headers contained in the information that is
submitted for authentication are removed.
This option is selected by default.
Export MCP credentials to XML file Lets you export the credentials that are submitted when
performing the SWPS (McAfee Client Proxy) authentication
method.
By default a message looks like this:
OTP for MWG: $$<OTP message>$$
Advanced Parameters
Setting for configuring advanced authentication.
Note:
This is setting is the same for all authentication methods. Its description is therefore also provided at the beginning of this
description of the authentication settings, after the description of the common settings.
Advanced Parameters
Option Definition
Always evaluate property value When selected, a new evaluation to assign a value to a
property is performed each time a rule containing this
property is processed.
If a value has been stored for a property in the cache, it is not
used.
While it is normally recommended to let cache values be used
to improve performance, there can be situations where the
new evaluation of a property is required.
In these situations, the same property is used more than once
within the authentication rules and with the same settings of
the Authentication module. A new evaluation ensures the
most current value is assigned to the property each time.
Option Definition
Application Settings
Settings for the application that is registered at a Microsoft Application Registration Portal to represent Web Gateway in
communication with an Azure AD.
Application Settings
Option Definition
Redirect URI Identifies a location that a request for accessing the Azure AD
is redirected to.
Search Parameters
Settings for the parameters used when searching for user group information in an Azure AD.
Search Parameters
Option Definition
Map user name to UPN When selected, a user name is mapped accordingly.
Filter expression to locate a user object Specifies a term that serves as a filter when searching for a
user name.
Within this term use {user} to substitute the user name, for
example:
mailnickname eq '{user}'
Group name Specifies the name of the group that is searched for.
Default: displayName
Use cache When selected, user group information that is searched for is
stored and retrieved from a cache.
Cache entry TTL Limits the time (in minutes) that an entry remains in the
cache.
Default: 30 minutes
Network Setup
Settings for the network setup that is configured to enable the retrieval of user group lists from an Azure AD.
Option Definition
Use system proxy list to connect to MS Graph API When selected, the proxies that have been configured for
Web Gateway on an appliance system and entered in a list are
used when setting up a connection for retrieving user group
information from an Azure AD.
TCP timeout Limits the time (in seconds) that a TCP connection is kept
open if no traffic occurs in the process of retrieving user
group information.
Default: 5 seconds
Search operation timeout Limits the time (in seconds) that elapses before a search
operation performed to retrieve user group information is
terminated.
Default: 10 seconds
Retry interval if token request fails Specifies the time that must elapse after a failed token
request before a new request is performed in the process of
retrieving user group information.
Default: 15 seconds
List of certificate authorities Provides a list of certificate authorities that are used for
securing the communication performed to retrieve user
group information under HTTPS.
Clicking Add or Edit opens windows for adding or editing the
list.
Revocation checking method order Allows you to choose the order in which to use the OCSP and
CRL methods for checking whether a certificate has been
revoked.
• OCSP, CRL
• CRL, OCSP
Treat OCSP response 'unknown' as revoked When selected, a certificate is considered as revoked if the
response to an OCSP query is that its revocation status is
unknown.
Default: 30 minutes
Cache settings
The Cache settings are module (engine) settings for configuring the behavior of the web cache on Web Gateway.
The following particular settings are provided for the Cache module after the initial setup.
• Cache HTTP — Default settings
Coaching settings
The Coaching settings are used for configuring the module that handles coaching.
Option Definition
Encryption Parameters
Settings for encrypting and decrypting cloud storage data
Encryption Parameters
Option Definition
Option Definition
Tracking policy Sets the scope of the search for sensitive or inappropriate
content in the body text of requests and responses.
The search is carried out for all classifications that have been
selected. You can, however, configure it in the following ways:
• Minimum — The search stops when an instance of sensitive
or inappropriate content has been found for a particular
classification or if no instance could be found. It is then
continued for the next classification.
This goes on until all classifications have been processed.
• Maximum — The search tries to find all instances of
sensitive or inappropriate content for a particular
classification. When the search is completed for a
classification, it continues with the next.
This goes on until all classifications have been processed.
DLP Classifications Provides a list for selecting entries in classification lists from
the system lists provided under DLP Classification on the lists
tree.
Option Definition
Advanced Parameters
Settings for configuring advanced functions for data loss prevention
Advanced Parameters
Option Definition
Reported context width Limits the number of characters shown around a matching
term in a list to the specified value.
The matching term is the value of the
DLP.Classification.Matched.Terms property.
Context list size Limits the number of matching terms shown in a list to the
specified value.
The matching terms are the values of the
DLP.Classification.Matched.Terms property.
Option Definition
Tracking policy Sets the scope of the search for sensitive or inappropriate
content in the body text of requests and responses.
The search is carried out for all dictionary entries that have
been created. It can, however, be configured in the following
ways:
• Minimum — The search stops when an instance of sensitive
or inappropriate content has been found for a particular
dictionary entry or if no instance could be found. It is then
continued for the next entry.
This goes on until all entries have been processed.
• Maximum — The search tries to find all instances of
sensitive or inappropriate content for a particular dictionary
Option Definition
Text or wildcard expression Specifies a text string or wildcard expression that is sensitive
or inappropriate content or matches with it.
Advanced Parameters
Settings for configuring advanced functions for data loss prevention
Advanced Parameters
Option Definition
Reported context width Limits the number of characters shown around a matching
term in a list to the specified value.
The matching term is the value of the
DLP.Dictionary.Matched.Terms property-
Context list size Limits the number of matching terms shown in a list to the
specified value.
The matching terms are the values of the
DLP.Classification.Matched.Terms property.
Option Definition
Size of first chunk Specifies the size (in bytes) of the first chunk of a web object
that is forwarded using the data trickling method.
Forwarding rate Specifies the portion of a web object that is forwarded every
five seconds.
Option Definition
Enable header writing When selected, the header below is added to all log files.
Encrypt the log file When selected, log files are stored encrypted.
First password, Repeat password Sets a password for access to encrypted log files.
[Optional] Second password, Repeat password Sets a second password for access to encrypted log files.
HSM Server
Settings for implementing an HSM solution on the Web Gateway appliance that you are currently configuring
HSM Server
Option Definition
Start local HSM server When selected, an HSM solution for storing and loading keys
is implemented on this appliance.
Other Web Gateway appliances in your network can connect
to this appliance as clients.
The appliance then takes the role of as server towards these
clients.
Keys to be loaded Provides a list of IDs for the private keys that are stored on a
Hardware Security Module and can be loaded from there.
For every key that you want to use, you must add the key ID in
string format to this list.
Note: The key IDs are configured when private keys are
generated on the Hardware Security Module.
Allow local connections When selected, connections are allowed for using the
functions of a Hardware Security Module on the appliance
that you are currently configuring.
Allow remote connections When selected, connections are allowed for letting other
appliances that are configured as clients of this appliance use
the functions of a Hardware Security Module.
HSM server port definition list Provides a list of the ports on the appliance that takes the role
of a server towards other appliances.
Permitted clients Provides a list of other appliances in your network that run as
clients of this appliance.
These tables describe the entries in the key list and the lists of HSM server ports and permitted clients.
Option Definition
String Specifies the key ID for a private key that is stored on the
Hardware Security Module.
Option Definition
Listener address Specifies the IP address and port number of a port on the
appliance that takes the role of a server towards other
appliances.
Option Definition
Server Identification
Settings for the certificate that an appliances submits when taking the role of a server towards other appliances that run as its
clients
Note:
A certificate issued by the McAfee root CA is provided by default after the initial setup of a Web Gateway appliance.
We recommend that you replace this certificate by a certificate of your own.
Server Identification
Option Definition
Subject, Issuer, Validity, Extensions, Private key These fields provide information on the server certificate that
is currently in use.
Server certificate Provides buttons for performing various activities that are
related to a server certificate:
• Generating a certificate
• Importing a certificate
• Exporting a certificate
• Exporting a certificate key
HSM Client
Settings for configuring an appliance as client of an appliance that has an HSM solution implemented
HSM Client
Option Definition
Use remote HSM server When selected, this appliance runs a client of another
appliance that has an HSM solution implemented.
Option Definition
Client Identification
Settings for the certificate that this appliance submits when connecting as a client to an HSM server
Note:
A certificate issued by the McAfee root CA is provided by default for this client after the initial setup of a Web Gateway appliance.
We recommend that you replace this certificate by a certificate of your own.
Client Identification
Option Definition
Subject, Issuer, Validity, Extensions, Private key These fields provide information on the client certificate that
is currently in use.
Client certificate Provides buttons for performing various activities that are
related to a client certificate:
• Generating a certificate
• Importing a certificate
• Exporting a certificate
• Exporting a certificate key
Troubleshooting
Settings for troubleshooting the use of a Hardware Security Module
Troubleshooting
Option Definition
Write connection traces When selected, traffic on the connections set up for using the
functions of a Hardware Security Module are traced.
ICAP Service
Settings for ICAP servers that the ICAP client on an appliance sends requests to.
ICAP Service
Option Definition
List of ICAP Servers Provides a list for selecting a list of servers that are used in
ICAP communication.
Add Opens the Add List window to let you add a list of ICAP servers.
Edit Opens the Edit List window to let you edit a list of ICAP servers.
Select deployment type for these settings Allows you to select the type of deployment for the Web
Gateway appliance that you want to run an ICAP client on.
You can select one of the following deployment types:
• On premise — Web Gateway is deployed on premise.
• Cloud only — Web Gateway is deployed in the cloud.
• Hybrid — Web Gateway is deployed as a hybrid solution,
which combines on-premise and cloud use.
Exclude below user-defined ICAP request header(s) Drops authentication headers that are included by default
when an ICAP client sends a request to an ICAP server.
Configuring this option is useful because some ICAP servers
don't accept lengthy authentication headers in a request and
respond with an error message.
Note: This option can be configured for on-premise and
cloud use.
You can drop either or both of these headers:
• X-Authenticated-User — When selected, requests to an ICAP
server are forwarded without this header.
• X-Authenticated-Groups — When selected, requests to an ICAP
server are forwarded without this header.
The following table describes an entry for an ICAP server in the list.
Option Definition
URI Specifies the URI for an ICAP server using the following
format:
icap[s]://<IP address>|<fully qualified domain
name>[:<port>][/<ICAP method>]
The list contains the following entry for an ICAP server by
default:
icap://0.0.0.0:1344
Respect max concurrent connections limit When selected, the ICAP client on the appliance does not
open more connections at the same time for sending
requests than the ICAP server can handle.
Option Definition
Enable server certificate verification When selected, certificate verification is performed in Secure
ICAP (ICAPS) communication.
Note: This option can be configured for on-premise and
cloud use.
This allows you to implement certificate verification, for
example, in the communication between an ICAP client
running in the cloud and a DLP server that runs on-premise
on a Web Gateway appliance taking the role of an ICAP server.
To perform this verification, the ICAP client checks whether
the certificate sent by the DLP server (ICAP server) is included
in a list of trusted server certificates.
Server certificate list Provides a list of trusted server certificates for performing
verification in Secure ICAP communication.
There is no list available by default.
Add Opens the Add List window where you can add a list of server
certificates.
Note: The ICAP client does not accept any server certificate
that has a private key with a format of less than 2048 bit.
Edit Opens the Edit List window where you can edit a list of server
certificates.
Option Definition
List of next-hop proxy servers Provides a list for selecting a next-hop proxy server list.
Round robin When selected, the Next Hop Proxy module uses the next-hop
proxy following the one in the list that has been used last.
When the end of the list has been reached, the first next-hop
proxy in the list is again selected.
Fail over When selected, the Next Hop Proxy module tries the first
next-hop proxy in the list first.
If the first next-hop proxy fails to respond, it is retried until
the configured retry maximum has been reached. Then the
second next-hop proxy in the list is tried, and so on, until a
server responds or all are found to be unavailable.
Sticky When selected, the Next Hop Proxy module uses the same
next-hop proxy over a time period that you can also
configure.
Minimum time for stickiness Sets the period of time (in seconds) that the same next-hop
proxy is used for forwarding a request.
The default time period is 300 seconds.
Proxy style requests When selected, requests in proxy style are forwarded to the
requested web servers using next-hop proxies.
This options is selected by default.
Option Definition
Templates Provides settings for the templates that are used by the
progress page.
Templates
Settings for the templates used by the progress page
Templates
Option Definition
Template name for progress bar page Provides a list for selecting a template.
• Add — Opens the Add Template window for adding a
template.
• Edit — Opens the Template Editor for editing a template,
Template name for download finished page Provides a list for selecting a template.
• Add — Opens the Add Template window for adding a
template
• Edit — Opens the Template Editor for editing a template
Template name for download canceled page Provides a list for selecting a template.
• Add — Opens the Add Template window for adding a
template.
• Edit — Opens the Template Editor for editing a template.
Timeouts
Settings for the timeouts that are related to the progress page
Templates
Option Definition
Delay for redirects to progress page Limits the time (in seconds) that elapses before the progress
page appears to the specified value.
File availability time before download Limits the time (in minutes) that elapses before a file is no
longer available to a user before the download to the
specified value.
File availability time after download Limits the time (in minutes) that elapses before a file is no
longer available to a user after the download to the specified
value.
Option Definition
(Current certificate and default root certificate authority) Under Subject, Issuer, and other field names. information about
the certificate is provided that is currently sent to the clients
of an appliance in SSL-secured communication.
Information is also provided about the root certificate
authority (root CA) that signed this certificate.
After the initial setup, the certificate is signed by the default
root certificate authority. This certificate authority is McAfee.
The certificate is therefore called a self-signed certificate, as
McAfee signed a certificate for one of their own products.
Certificate Authority Provides several options for performing activities that are
related to a certificate authority.
• Generate New — Opens a window for generating a new
certificate authority.
• Import — Opens a window for importing a certificate
authority.
The window provides an option for importing a file with
information about a certificate authority and the certificate
that was signed by it.
Additionally, you can include a file with information about
the chain of certificate authorities that were involved in the
validation process.
Note:
The file with information about the certificate chain can be a
file that you created and stored in the file system before.
In this case, the file will contain information about the
following:
◦ The certificate that an appliance sends as server
to its clients
◦ The intermediate certificate authorities, one of
which signed the certificate, while the others each
validated another certificate authority
◦ The root certificate authority, which is the first
instance that validated another certificate
authority
When importing a certificate chain file, you must make sure
that it only contains information about the intermediate
certificate authorities.
All other information must be removed from the file.
Otherwise the import will fail.
• Export — Lets you browse to a location within your file
system that you can export a certificate authority file to.
• Export key — Lets you browse to a location within your file
system that you can export the key file for a certificate
authority to.
Send certificate chain When selected, the appliance sends information on the chain
of certificates and certificate authorities that were involved in
the process of validating a certificate with this certificate to its
clients.
To retrieve this information, you must include the certificate
chain when using the option for importing a certificate
authority.
The appliance sends the certificate that is configured here as
a server to its clients. The certificate is therefore also referred
to as the server certificate.
Use custom domain key When selected, a key is sent with the certificate that you have
configured on your own.
This key is used for sending certificates throughout the
domain of a Web Gateway appliance.
Custom domain key Provides the following options for handling a custom domain
key.
• Import Key — Lets you browse to a location within your file
system that you can import a custom domain key file from.
• Export Key — Lets you browse to a location within your file
system that you can export a custom domain key file to.
RSA server key size Limits the size of the key file for a certificate.
Certificates that are signed by the CA are valid for Limits the time (in days) that a certificate signed by the
certificate authority configured here is valid.
Client cipher list Specifies a string of Open SSL symbols used for decrypting
client data.
Include OCSP responder URL When selected, a URL for sending responses to OCSP queries
is included in the Authority Information Access (AIA) field of
the certificate to enable the retrieval of information about
revoked certificates.
Include CRL distribution point When selected, a URL for accessing CRL lists is provided on
the certificate to enable the retrieval of information about
revoked certificates.
SSL session cache TTL Limits the time (in seconds) that SSL session parameters are
stored in the cache.
Perform insecure renegotations When selected, Web Gateway renegotiates the parameters for
the SSL-secured communication even if this is insecure to do.
Send empty plain-text fragment When selected, an empty plain-text fragment is sent with the
certificate to the clients.
Allow legacy signatures in the handshake When selected, legacy signatures are allowed in the initial
handshake.
SSL protocol version Selects the version of the protocol that the SSL scanning
module follows when dealing with handshakes.
• TLS 1.2 — When selected, TLS (Transport Layer Security)
version 1.2 is used.
• TLS 1.1 — When selected, TLS (Transport Layer Security)
version 1.1 is used.
• TLS 1.0 — When selected, TLS (Transport Layer Security)
version 1.0 is used
• SSL 3.0 — When selected, SSL version 3.0 is used.
Option Definition
Select server certificate by host or IP Provides a list of certificates that are sent to the clients and
the host systems that they have been retrieved from. A host
system is identified by a host name or an IP address.
The certificates are sent from an appliance in its role as a
server to the clients. The certificates are therefore referred to
as server certificates.
Option Definition
Host Specifies the host name or IP address of the host system that
a certificate is retrieved from.
Option Definition
SSL Scanner functionality applies only to client connection When selected, traffic is only processed using the SSL
scanning functions on the connection from an appliance to its
clients.
Client cipher list Specifies a string of Open SSL symbols used for decrypting
client data.
SSL session cache TTL Limits the time (in seconds) that SSL session parameters are
stored in the cache.
Perform insecure renegotations When selected, Web Gateway renegotiates the parameters for
the SSL-secured communication even if this is insecure to do.
Send empty plain-text fragment When selected, an empty plain-text fragment is sent with the
certificate to the clients.
SSL protocol version Selects the version of the protocol that the SSL Scanner
module follows when dealing with handshakes.
• TLS 1.2 — When selected, TLS (Transport Layer Security)
version 1.2 is used.
• TLS 1.1 — When selected, TLS (Transport Layer Security)
version 1.1 is used.
• TLS 1.0 — When selected, TLS (Transport Layer Security)
version 1.0 is used.
Option Definition
SSL scanner function Selects the function that is performed by the SSL Scanner
module.
• Certificate verification — When selected, the module verifies
certificates submitted in SSL-secured communication.
• SSL inspection — When selected, the module inspects the
content of web objects transmitted in SSL-secured
communication.
• Identify and bypass Skype for Business traffic — When selected, web
traffic going on over the Skype for Business communication
tool is exempted from any SSL scanning.
SSL protocol version When selected, the module inspects the content of web
objects transmitted in SSL-secured communication.
• TLS 1.0 — When selected, TLS (Transport Layer Security)
version 1.0 is used.
• SSL 3.0 — When selected, SSL version 3.0 is used.
Server cipher list Specifies a string of Open SSL symbols used for decrypting
server data.
The SSL Scanner module uses different strings for default
certificate verification and for verifying certificates from
servers that do not support the EDH (Ephemeral Diffie-
Hellman) method.
SSL session cache TTL Limits the time (in seconds) for keeping the parameter values
of a session in SSL-secured communication stored in the
cache to the specified value.
Allow handshake and renegotiation with servers that do not implement RFC When selected, the SSL Scanner module performs these
5746 activities also in communication with web servers that fail to
comply with the specified standard.
Option Definition
Use alternative handshake settings after handshake failure When selected, the SSL Scanner module uses alternative
parameter values after the first attempt to perform a
handshake in SSL-secured communication has failed.
SSL protocol version Selects the version of the protocol the SSL Scanner module
follows when it performs an alternative handshake.
• TLS 1.0 — When selected, TLS (Transport Layer Security)
version 1.0 is used
• SSL 3.0 — When selected, SSL version 3.0 is used
Server cipher list Specifies a string of Open SSL symbols used for decrypting
server data.
The SSL Scanner module uses different strings for default
certificate verification and for verifying certificates from
servers that do not support the EDH (Ephemeral Diffie-
Hellman) method.
Streaming Detector
Setting for the module that calculates streaming media probabilities
Streaming Detector
Option Definition
Minimal probability Sets the probability (in percent, specified by a number from 0
to 100) that is sufficient for a web object to be considered as
streaming media.
Option Definition
Time quota per day (week, month) When selected, the quota that is configured in the next
section applies to the selected time unit.
Session time When selected, the quota that is configured in the next
section applies to the session time.
Option Definition
Hours Sets the allowed hours per day, week, month, or for the
session time.
Minutes Sets the allowed minutes per day, week, month, or for the
session time.
Option Definition
Time quota per day (week, month) Shows the allowed time per day, week, or month.
Extended List
Settings for extended lists.
Extended List
Option Definition
Use the extended list Provides a list for selecting an extended list.
Add Opens the Add List window for adding an extended list.
Edit Opens the Edit List (Extended List) window for editing the selected
extended list.
Rating Settings
Settings for retrieving rating information on URLs based on categories and reputation scores.
Option Definition
Search the CGI parameters for rating When selected, CGI parameters are included in the search for
information.
CGI (Common Gateway Interface) parameters in a URL trigger
scripts or programs when the URL is accessed. Information on
CGIs is considered when categorizing a URL.
Search for and rate embedded URLs When selected, embedded URLs are included in the search
for information and rated.
Information on an embedded URL is considered when
categorizing the embedding URL.
Note: Searching for embedded URLs can impact
performance.
Do a forward DNS lookup to rate URLs When selected, a DNS lookup is performed for a URL that no
relevant information has been found for.
The IP address that was looked up is used for another search.
Do a backward DNS lookup for unrated IP-based URLs When selected, a backward DNS lookup, based on its IP
address, is performed for a URL that no relevant information
has been found for.
The host name that was looked up is used for another search.
Use the built-in keyword list When selected, the built-in keyword list is included in the
search.
Disable local GTI database When selected, no information about web reputation and
categories is retrieved from the local Global Threat
Intelligence database..
Use online GTI web reputation and categorization services if local rating yields When selected, information on URL categories and reputation
no result scores is only retrieved from the Global Threat Intelligence
service if the search in the internal database yielded no
results.
Use default server for online GTI web reputation and categorization services When selected, the appliance connects to the default server
for retrieving information on URL categories and reputation
scores from the Global Threat Intelligence system.
• IP of the server — Specifies the IP address of the server used to
connect to the Global Threat Intelligence system when the
default server is not used.
Format: <domain name> or <IPv4 address> or <IPv4
address mapped to IPv6 address>
Regular IPv6 addresses cannot be specified here.
• Port of the server — Specifies the port number of the port on
this server that listens to requests from the appliance.
Allowed range: 1–65535
Enabke the Dynamic Content Classifier if GTI web categorization yields no When selected, the Dynamic Content Classifier is involved in
result the URL filtering process if a search performed by the Global
Threat Intelligence service yielded no results.
Advanced Settings
Option Definition
Treat connection problems to the cloud as errors When selected, problems arising on the connection from the
appliance to the Global Threat Intelligence server are logged
as errors.
Properties for error handling are set and eventually rules
from an Error Handler rule set are executed.
Do a backward DNS lookup also for private addresses When selected, private IP addresses are included in the
backward DNS lookup.
Excluding these addresses from the lookup leads to an
increase in performance for URL filtering.
This option is disabled by default.
The lookup includes the following types of addresses:
• IPv4
◦ Private addresses
◦ Zeroconf addresses
• IPv6
◦ Link local addresses
◦ Site local addresses
◦ Unique local addresses
Proxy SettingsSettings for configuring a proxy the appliance can use to connect to the Global Threat Intelligence
service.
Option Definition
Use upstream proxy When selected, the appliance uses a proxy for connecting to
the Global Threat Intelligence server on which lookups for
URL category information, also known as “in-the-cloud”
lookups, can be performed.
IP or name of the proxy Specifies the IP address or host name of the proxy.
Port of the proxy Specifies the number of the port on the proxy that listens for
lookup requests from the appliance.
User name Specifies a user name for the appliance when logging on to
the proxy.
Connect to GTI cloud via host name also when a proxy is configured When selected, Web Gateway connects to a cloud service for
performing GTI lookups using the host name of the server
where the cloud service resides, regardless of whether a
proxy is also configured..
Try to bypass the proxy if unreachable When selected, Web Gateway tries to bypass a proxy that has
been set up if this proxy cannot be reached.
Trust server certificate When selected, a certificate sent under HTTPS by a cloud
service for performing GTI lookups is trusted on Web
Gateway.
• Subject, Issuer, Validity, Extensions, Fingerprint, Private Key — Provide
information about the certificate that is sent by the cloud
service..
• Import — Opens a window for importing a server certificate..
Provide client certificate When selected, Web Gateway provides a certificate when
connecting as a client under HTTPS to a cloud service for
performing GTI lookups.
• Subject, Issuer, Validity, Extensions, Fingerprint, Private Key — Provide
information about the certificate that Web Gateway sends
to the cloud serviice.
• Import, Export, Export Key — Open windows for importing a
client certificate and for exporting a client certificate and
key.
Option Definition
Enable logging When selected, URL filtering activities are logged on the
appliance.
If this option is not selected, the following logging options are
grayed out.
(Log area) Provides a set of options for including different areas of URL
filtering activities into the logging.
• LOG_AREA_ALL — When selected, all URL filtering activities
are logged.
• LOG_AREA_NETWORK — When selected, activities regarding
the network connections used for URL filtering are logged.
• LOG_AREA_DATABASE_SEARCH — When selected, activities
regarding the retrieval of data for URL filtering from the
internal database are logged.
• LOG_AREA_DNS — When selected, activities regarding a DNS
lookup that is performed for URL filtering are logged.
Option Definition
Connection count (maximum) Limits the number of connections that can be active at the
same time.
Maximum number of connections by default: 4
Option Definition
Volume quota per day (week, month) When selected, the quota that is configured in the next
section applies to the selected time unit
Session time When selected, the quota that is configured in the next
section applies to the session time
Volume for . . .
Settings for volume quotas that apply to the selected time unit or the session time
The heading of this section varies according to what you selected in the preceding section.
For example, if you selected Volume quota per week, the heading reads Volume for Volume Quota per Week.
However, if you selected Session Time, the heading reads Hours and Minutes.
Volume for . . .
Option Definition
Option Definition
Volume quota per day (week, month) Shows the allowed volume per day, week, or month.
Authenticate settings
The Authenticate settings are used for configuring the way the Authenticate action is executed when a filtering rule with that
action applies.
Option Definition
McAfee Web Reporter block reason ID Provides a numerical value that identifies a block reason.
Block settings
The Block settings are used for configuring the way the Block action is executed when a filtering rule with that action applies.
Option Definition
McAfee Web Reporter block reason ID Provides a numerical value that identifies a block reason.
Redirect settings
The Redirect settings are used for configuring the way the Redirect action is executed when a filtering rule with that action
applies.
Redirect Settings
Settings for configuring user messages and a block reason for logging purposes
Redirect Settings
Option Definition
User-defined URL When selected, the redirecting URL must be specified by you
McAfee Web Reporter block reason ID Provides a numerical value that identifies a block reason.
Criteria – Always
Write access.log
The rule uses an event to fill a log file entry with parameter values relating to requests sent by users, such as user names or
request headers.
The log file entry is specified as a parameter in both events. The log that stores the log file is specified by the settings of the
write event.
The logging rule applies whenever a request for access to the web is received.
The two rule events for filling and writing a log entry are then executed.
Option Definition
Media types to insert Clicking Edit opens a window to let you edit the Advanced Threat
Defense Supported Media Types list that is used by a rule.
Only web objects that belong to media types on this list will
additionally be scanned by Advanced Threat Defense if also
the other criteria are met.
You can add, modify, and remove entries on the list.
Option Definition
Settings Clicking Edit opens a window to let you edit the settings for the
Anti-Malware module when it runs with the module components
that are usually available on Web Gateway.
This scanning is performed before any scanning by Advanced
Threat Defense. Depending on the result of this scanning,
additional scanning by Advanced Threat Defense is
performed or not.
Option Definition
Settings Clicking Edit opens a window to let you edit the settings for the
Anti-Malware module on Web Gateway when the scanning is
actually performed by Advanced Threat Defense.
The rule set criteria specifies that the rule set applies if the following is true:
• As a result of previous scanning by the anti-malware engines on Web Gateway, the probability that a web object is malicious
equals or exceeds 60 percent
• The media type of the object is on the list of supported types for scanning by Advanced Threat Defense.
The rule set contains the following rules.
The rule enables an event that lets a page be shown to indicate the progress made when a web object is downloaded to a
client.
The rule uses the Antimalware.Infected property to check whether a web object, for example, a file, is infected by a virus or other
malware.
If the object is found to be infected, the process of forwarding the object to the requesting client is blocked and a block
message is shown to the user who requested access to the object.
Criteria – Always
Criteria – Always
The rule uses the Application.Name property to check whether the name of an application is contained in a specified list. If it is,
it blocks a request for this application.
Application.HighRisk equals true AND Application.Name is in list Web Browsing and Web Conferencing –> Block<Default>
The rule uses the Application.HighRisk property to check the reputation score of an application and the Application.Name property
to check whether the name of this application is contained in a specified list. If the reputation score reaches or exceeds the
high-risk level and the application name is also on the list, it blocks a request for this application.
The rule uses the Application.To String property to check whether the name of an application is equal to a specified string. For
this purpose, the name of the application is converted into a string. If the converted application name equals the specified
string, a request for the application is blocked.
Criteria – Always
Cycle – Responses
The rule uses the Application.Name property to check whether the name of an application is contained in a specified list. If it is,
it blocks a request for this application.
Application.HighRisk equals true AND Application.Name is in list Web Browsing and Web Conferencing –> Block<Default>
The rule uses the Application.HighRisk property to check the reputation score of an application and the Application.Name property
to check whether the name of this application is contained in a specified list. If the reputation score reaches or exceeds the
high-risk level and the application name is also on the list, it blocks a request for this application.
The rule uses the Application.To String property to check whether the name of an application is equal to a specified string. For
this purpose, the name of the application is converted into a string. If the converted application name equals the specified
string, a request for the application is blocked.
Complete rules of the ATD - Offline Scanning with Immediate File Availability rule set
When working with the complete rules of the ATD - Offline Scanning with Immediate File Availability rule set, all rules and rule elements of
this rule set can be viewed and configured.
After importing this rule set, the following two rule sets are implemented and appear on the rule sets tree:
• ATD - Init Offline Scan
• ATD - Handle Offline Scan
A rule set with the name ATD - Offline Scanning with Immediate File Availability is not implemented.
The rule set criteria specifies that the rule set applies if the following is true:
• As a result of previous scanning by Web Gateway, the probability that a web object is malicious equals or exceeds 60 percent.
• The media type of the object is on the list of supported types for scanning by Advanced Threat Defense.
• The web object does not exceed a particular size.
The rule set contains the following rule.
When this rule is processed, all data related to the request for web access that has been sent to Web Gateway is recorded,
including the response that was received from the requested web server. The response usually includes in its body the
requested web object, for example, a file. The body with the web object is stored on Web Gateway.
An internal request is also created within Web Gateway to initiate the scanning by Advanced Threat Defense. Web Gateway
then waits for an answer to this internal request to see whether the request is accepted and the scanning will be
performed.
The time that Web Gateway waits for this answer is measured in seconds and a parameter of the
Antimalware.MATD.InitBackgroundScan property. By default, this time is 5 seconds. You can configure this time by editing the
property parameter.
If no answer to the internal request is received within the configured time, the property is set to false, so this criteria
matches and the rule applies. A message is then sent to inform the administrator that the additional scanning by Advanced
Threat Defense could not be executed.
If the answer is received within the configured time, the web object is forwarded to the user.
Further handling of the additional scanning is performed by the next rule set..
The rule set criteria specifies that the rule set applies if the value of the Antimalware.MATD.IsBackgroundScan is true.
It is true if the additional scanning by Advanced Threat Defense has successfully been initiated by the rule in the preceding rule
set . In this case, the data that was recorded and stored by this rule is used by Advanced Threat Defense to scan a requested web
object.
The rule set contains the following rules.
The rule uses the Antimalware.Infected property to check whether a web object, for example, a file, is infected by a virus or
other malware. The scanning that is required for this check is performed under the Gateway ATD settings, which means it is
carried out by Advanced Threat Defense.
For this purpose, the previously stored web object is forwarded from Web Gateway to Advanced Threat Defense.
If the scanning result is that the web object is infected, this is recorded by a statistics counter.
When the rule is processed, it is checked whether the value of the Antimalware.Infected property is true.
If it is, it means the scanning that was performed by Advanced Threat Defense has found a web object to be infected by a
virus or other malware.
A warning message is then created and sent to the administrator for the network of the user who sent the request to access
the web object. The message contains information on the request that was recorded by the rule of the preceding rule set.
Stop cycle
This rule stops the processing cycle. It is always executed after the preceding rules have been processed.
The rule set criteria specifies that the rule set applies to SSL-secured communication and to any other communication, which
does not use the CONNECT command at the beginning.
The following rule sets are nested in this rule set:
• Authorized Override With URL Configuration
• Authorized Override With IP Configuration
This rule set is not enabled initially.
• Authorized Override With Authenticated User Configuration
This rule set is not enabled initially.
Criteria – URL.Categories<Default> at least one in list URL Categories Blocklist for Authorized Override
The rule set criteria specifies that the rule set applies when a user sends a request for a URL that falls into a category on the
blocking list for authorized overriding related to URL categories.
The rule set contains the following rules:
The rule redirects a request to let a user again access a web object after session time has been exceeded and the
credentials the user submitted to continue with a new session have been validated.
The rule uses the Quota.AuthorizedOverride.SessionExceeded property to check whether the configured session time has been
exceeded for a user. If it has, the user’s request for web access is blocked.
The URL Category Configuration settings, which are specified with the property, are the settings of the module that handles
authorized overriding.
The rule set criteria specifies that the rule set applies when a user sends a request from a client with an IP address that is on the
blocking list for authorized overriding related to IP addresses.
The rules in this rule set are the same as in the Authorized Override with URL Configuration rule set, except for the module
settings in the rule criteria, which are IP Configuration.
Nested library rule set – Authorized Override With Authenticated User Configuration
The rule set criteria specifies that the rule set applies when a request is sent by a user whose user name is on the blocking list for
authorized overriding related to user names.
The rules in this rule set are the same as in the Authorized Override with URL Configuration rule set, except for the module
settings in the rule criteria, which are Authenticated User Configuration.
The rule set criteria specifies that the rule set applies to SSL-secured communication and to any other communication, which
does not use the CONNECT command at the beginning.
The following rule set is nested in this rule set: Blocking Sessions With URL Configuration
Criteria – URL.Categories<Default> at least one in list URL Categories Blocklist for Blocking Sessions
The rule set criteria specifies that the rule set applies when a user sends a request for a URL that falls into a category on the
blocking list for blocking sessions related to URL categories.
The rule set contains the following rules:
The rule uses the BlockingSession.IsBlocked property to check whether a blocking session has been activated for a user who
sends a request. If it has, the request is blocked.
Activate blocking session if category is in list Category List for Blocking Sessions
URL.Categories<Default> at least one in list Category List for Blocking Session –> Continue — BlockingSession.Activate<Blocking
Session Configuration>
The rule uses the URL.Categories property to check whether a URL that a user requests access to falls into a category on the
blocking list maintained especially for blocking sessions. If it falls into a category on the list, a blocking session is activated
for the user.
The BlockingSession.Activate event is used to activate the blocking session. The event settings are specified with the event.
URL.Host equals “127.0.0.1” OR URL.Host equals “[::1]” –> Stop Cycle – Enable SSL Client Context<Default CA> – Enable SSL
Scanner <Certificate verification without edh>
The rule uses the URL.Host property to identify the host of a requested URL, based on the IP address of the host.
If this address is 127.0.0.1, the host of the requested URL is the appliance. When the ePO server sends a request to connect
to the appliance, it uses this address.
So if 127.0.0.1 is the requested address, the rule applies and stops all further processing in the request cycle. This way the
CONNECT request is allowed to pass through.
The next step in this process is sending and verifying certificates. The rule includes an event to enable the sending of a client
certificate that is issued by the default certificate authority.
You can modify the event settings to have the certificate issued by another authority.
When certificate verification has been completed, the SSL-secured communication can go ahead.
Key elements of the Bypass Microsoft (Office 365) Services rule set
The key elements of the rules that handle bypassing for Office 365 and other Microsoft services are related to the individual
services that requests and responses are sent to and received from.
Option Definition
Bypass Exchange Online, Bypass Microsoft Federation Gateway, and When selected, a request from a client of Web Gateway to
other options for handling Microsoft services bypassing access Exchange Online or another Microsoft service is
forwarded to the service unfiltered.
When a response is received from the service, it is also
passed on to the client unfiltered.
None of these options is enabled by default.
Criteria – Always
The rule uses the Cycle.Name property to find out whether processing on Web Gateway is currently going on in the response
cycle.
It also uses a user-defined property to check whether the response that is processed in this cycle was triggered by a client
requesting access to Office 365 or any of several other Microsoft services.
If such a request is received on Web Gateway, a particular rule that is processed in the request cycle sets the user-defined
property to true. The current rule checks whether the property is actually set this way in the response cycle, using the
second part of its criteria.
If both criteria parts match, the rule applies and the response cycle is stopped. The response is then forwarded to the
requesting client without filtering.
Note:
All rules that follow the first rule in the rule set work in a similar way. They ensure that a request sent by a client of Web Gateway
to a particular Microsoft service is forwarded to this service unfiltered.
Each of them also sets the property that is evaluated by the first rule to true after receiving such a request.
The first of these subsequent rules is explained here as an example in full detail. A summary is then given for all other rules.
URL.Destination.IP is in range list Exchange Online IP Addresses OR URL.Destination.IP is in range list Exchange Online Protection P Addresses OR
URL.Host matches in list Exchange Online URLs – Stop Cycle – Set User-Defined.Shortcut_Microsoft_Service = true
The rule uses the URL.Destination.IP and URL.Host properties to find out whether the IP address and URL that are sent with a
request are on particular lists.
If they are, the request cycle is stopped and the request is forwarded to the requested destination, which is the Microsoft
Exchange Online service.
The User-Defined.Shortcut_Microsoft_Service property is then set to true by an event. The property is evaluated in the response cycle
by the first rule in the rule set.
Similar to the Bypass Exchange Online rule, these rules use the URL.Destination.IP property or the URL.Host property or both (in one
case also the URL property) to find out whether the IP addresses or URLs that are sent with requests are on particular lists.
The lists vary with each rule depending on the respective service.
If the IP addresses or URLs are found on the lists, the request cycle is stopped and the request is forwarded to the
requested destination, which is one of the Microsoft services.
The User-Defined.Shortcut_Microsoft_Service property is then set to true by an event. The property is evaluated in the response cycle
by the first rule in the rule set.
Criteria – Always
The rule uses an event to set the default password for Web Gateway as the password that is used when data is encrypted.
Enable encryption
The rule uses the CloudEncryption.IsEncryptionSupported property to check whether encryption of data can be performed.
If this is the case, an event is used to perform the encryption.
Enable decryption
The rule uses the CloudEncryption.IsDecryptionSupported property to check whether decryption of data can be performed.
If this is the case, an event is used to perform the decryption.
The rule uses the CloudEncryption.IsDecryptionSupported property to check whether a decryption of cloud storage data
was performed.
If this is the case, an event is used to modify the Content-Type field in the header of the response that was sent to deliver
the data to Web Gateway. Cloud storage services set this field by default to application/octet-stream, as they are not able to
recognize real media types when data is encrypted. The MediaType.Header.FixContentType event sets the field to a value for a
real media type.set to the value
This rule fixes the issue that cloud storage services set this field by default to application/octet-stream, as they cannot
recognize different media types when data is encrypted. The MediaType.Header.FixContentType event sets the field to a value
for the real media type.
A second event is used to write this entry into the log called Encryption Log, which is specified by the event settings. Since
data is written into the log in encrypted format, you need a password to access it (default password: webgateway).
Cookie authentication with SAML back end and fixed ACS URL rule set
To support SAML authentication using an external Identity Provider, Web Gateway performs the Service Provider role. The rules
in this rule set support this SAML scenario.
Library rule set – Cookie authentication with SAML back end and fixed ACS URL
Criteria – Always
Criteria Always
Action Continue
This rule secures all HTTP communication with the SSL protocol using the default certificate that comes with Web Gateway or
one that you import. To configure the SSL certificate, click <Default Without CA>.
Nested library rule set – Intercept SAML assertion if IdP uses a fixed ACS URL
Criteria Always
Action Continue
The proxy retrieves the SAML response and RelayState parameter from the POST form sent by the external Identity Provider. It
stores the response in the Authentication.Token property and the RelayState in the property Authentication.SAML.RelayState. When the
Identity Provider does not support dynamic URLs, the proxy uses the URL returned in the RelayState to restore the dynamic
authentication server URL.
Criteria Always
After restoring the dynamic authentication server URL, the proxy redirects the SAML assertion (stored in the Authentication.Token
property) to the authentication server and sets the HTTP status code to 200 (OK). To provide custom settings for logging
purposes, click <SAMLRedirectToAuth>.
Criteria –
Authentication.IsServerRequest equals false AND (
Connection.Protocol equals "HTTP" OR
Connection.Protocol equals "HTTPS") AND
Command.Name does not equal "CONNECT" AND
Command.Name does not equal "CERTVERIFY"
Criteria Always
Action Continue
The P3P string is required for the Platform for Privacy Preferences Project (P3P). The string must match the privacy settings in the
user's browser. If the P3P string is not updated as shown in the table and the browser is Internet Explorer, processing fails.
Criteria Always
Events None
The authentication server redirects the authenticated user with a cookie through the proxy to the requested application. To
provide custom settings for logging purposes, click <Redirect Back From Authentication Server>.
Criteria – Always
Events None
The proxy checks that the URL of the external Identity Provider making a request matches one of the URLs in the SAML IdP Whitelist.
Note: To add URLs to the whitelist, click SAML IdP Whitelist.
Redirect clients that do not have a valid cookie to the authentication server
Events None
If the request from the external Identity Provider does not include a valid cookie, the proxy redirects the request to the
authentication server. To configure a different authentication method, click <Local Cookie Authentication Server>. To provide custom
settings for logging purposes, click <Default>.
Criteria – Always
This rule set contains the following nested rule set: Authentication server request.
Events None
The authentication server redirects users having a valid cookie to the proxy. To change the cookie checking settings used by the
authentication server, click <Authentication Server - Cookie Check>. To provide custom settings for logging purposes, click <Redirect Back
From Authentication Server>.
Criteria Always
Action Continue
You can configure a static ACS URL for external Identity Providers who do not support dynamic URLs in this rule. If set, this value
must match the ACS URL value configured in the SAML Response settings.
The authentication server sends the RelayState parameter and SAML authentication request in a POST form to the external
Identity Provider. The RelayState parameter saves the value of the authentication server URL at the time the request is created.
The request is created using values configured in the Web Gateway interface. The authentication server then sets the HTTP
status code to 200 (OK). To change the SAML authentication request configuration, click <SAML Request> in this event.
Action Continue
This rule retrieves the SAML response in the POST form sent by the external Identity Provider and stores it in the Authentication.Token
property. It parses the response and returns a TRUE value if the response is valid and a FALSE value if it is not. To change the
SAML authentication response configuration, click <SAML Response>.
Events None
After the SAML response is parsed, this rule checks the value of the property Authentication.IsAuthenticated. If the property is false, the
SAML response is invalid and processing of the response is blocked. To provide custom settings for logging purposes, click
<Authorized Only>.
Criteria Always
Action Continue
Events None
If the user name property is empty, this rule blocks processing of the response. To provide custom settings for logging purposes,
click <Authorized Only>.
Criteria Always
Action Continue
The P3P string is required for the Platform for Privacy Preferences Project (P3P). The string must match the privacy settings in the
user's browser. If the P3P string is not updated as shown in the table and the browser is Internet Explorer, processing fails.
Criteria Always
Events None
According to the final rule in the rule set, the authentication server redirects the authenticated user back to the proxy. To provide
custom settings for logging purposes, click <Redirect Back From Authentication Server>.
Criteria – Always
The rule set criteria specifies that the rule set applies when a request is processed on the appliance.
The rule set contains the following rules:
The rule uses the DLP.Classification.BodyText.Matched property to check whether the body of the request that is currently
processed contains text that is considered to be sensitive content. This text could, for example, be in a file that uploading to
the web is requested for.
Text is considered to be sensitive content according to the HIPAA health care regulations. Use of the relevant information is
configured as part of the module settings, which are specified after the property name.
If there is sensitive content in the text of a request body, the request is blocked. The settings of the Block action specify a
message to the requesting user.
The rule also uses an event to count blocking due to a data loss prevention match.
The rule uses the DLP.Classification.BodyText.Matched property to check whether the body of the request that is currently
processed contains text that is considered to be sensitive content. This text could, for example, be in a file that uploading to
the web is requested for.
If there is sensitive content in the text of a request body, the request is blocked. The settings of the Block action specify a
message to the requesting user.
The rule also uses an event to count blocking due to a data loss prevention match.
The rule uses the DLP.Classification.BodyText.Matched property to check whether the body of the request that is currently
processed contains text that is considered to be sensitive content. This text could, for example, be in a file that uploading to
the web is requested for.
Text is considered to be sensitive content according to the regulations of the Sarbanes-Oxley (SOX) act on public company
accountability. Board meeting minutes would, for example, be sensitive content under this act. Whether there is sensitive
content in a text, is detected using appropriate information in the same way as for the HIPAA-related rule.
If there is sensitive content in the text of a request body, the request is blocked. The settings of the Block action specify a
message to the requesting user.
The rule also uses an event to count blocking due to a data loss prevention match.
The rule set criteria specifies that the rule set applies when a response is processed on the appliance.
The rule set contains the following rule:
Acceptable use
The rule uses the DLP.Classification.BodyText.Matched property to check whether the body of the response that is currently
processed contains text that is considered to be sensitive content. This text could, for example, be in a file that is sent in
response to a download request.
The module that ls called by the rule to find out whether there is inappropriate content in the response body uses
appropriate information from classification lists. Use of these lists is configured as part of the module settings, which are
specified after the property name.
The rule also uses an event to count blocking due to a data loss prevention match.
Data Loss Prevention (DLP) with ICAP for Cloud rule set
The Data Loss Prevention (DLP) with ICAP for Cloud rule set is a library rule set. It is used for data loss prevention in the cloud.
When working with this rule set, you can use different views:
• Key elements view — Allows you to configure key elements of the rules in this rule set.
Key elements are those parts of the rules that you will most likely want to work with when configuring your policy for a
particular field of web security. You can also enable or disable some rules in this view.
• Complete rules view — Allows you to view all rules in the rule set and to configure all their elements, including the key
elements.
You can also enable or disable, move, copy, or delete any of the existing rules, as well as create new rules in this view.
Complete rules of the Data Loss Prevention (DLP) with ICAP for Cloud rule set
When working with the complete rules of the Data Loss Prevention (DLP) with ICAP for Cloud rule set, all rules and rule elements of this
rule set can be viewed and configured.
Library rule set – Data Loss Prevention (DLP) with ICAP for Cloud
Criteria — URL.Host does not equal “ ” AND Cycle.TopName equals "Request" AND InTheCloud equals true
The rule set criteria specifies that the rule set applies if all of these criteria match:
• A host name can be found for a URL that is sent in a request to the appliance.
• The processing cycle that is currently performed is the request cycle.
• The rule set is applicable for cloud use
The rule set contains the following rules.
Body.Size equals 0 AND ListOfString.IsEmpty(URL.Parameters) equals true –> Stop Rule Set
The rule uses the Body.Size property to check whether a request has a body that is empty. It also uses the ListOfString.IsEmpty
property to check whether a request has URL parameters.
If one of the two parts of this criteria is matched, processing of the rule set stops and the request is not forwarded to the
ICAP server.
The rule uses the Body.Size property to check whether the body of a request does not exceed 50 MB. If it does, processing of
the rule set stops and the request is not forwarded to the ICAP server.
In the rule set criteria, the size of a request body that must not be exceeded is specified in bytes.
The rule uses the Command.Name property to check whether the command that is sent with a request is GET. If it is, processing
of the rule set stops and the request is not forwarded to the ICAP server.
The rule event always sets the name of the currently used authentication method as the value of a user-defined property to
store it, so it can be restored after this name has temporarily been replaced with "NTLM".
Authentication.Method does not equal "NTLM" AND Authentication.Method does not equal "LDAP" AND Authentication.Method does not equal "Radius" –>
Continue — Set Authentication.Method = "NTLM"
The rule uses the Authentication.Method property to check whether the authentication method that is currently in use is NTLM,
LDAP or Radius. These methods are compatible with using ICAP in a DLP configuration.
If a different method is used, which would not be compatible, the rule event replaces this method with "NTLM" by setting
the value of Authentication.Method accordingly.
When a request has passed filtering according to the first two rules of the rule set, it is forwarded to the ICAP server. If this
has been done, the value of the ICAP.ReqMod.Satisfaction property is true.
The rule checks whether this is the case for a request and if it is, stops processing the current cycle, as no more processing
of the rules in this cycle is required after forwarding a request to the ICAP server.
The rule event always sets the name that was stored using the user-defined property to the value of the Authentication.Method
property. The name of the authentication method is this way restored to its original value.
The rule is only processed if the proceeding rule, which stops processing the remaining rules in the cycle, has not applied.
This means no ICAP communication is performed and the original authentication method, which might not be ICAP-
compatible, can be used again.
Criteria – Always
The rule set criteria specifies that the rule set applies when the value of the Error.ID property is 20000, which indicates a
malfunction of the proxy module.
The rule set contains the following rule.
When the rule is executed, it stops the current processing cycle. The rule is always executed when the criteria of its rule set
is matched. Stopping the processing cycle prevents the connection from being closed in the course of further rule
processing.
Monitoring
This nested error handler rule set handles measures taken when an incident occurs that involves the appliance system.
The rule set criteria specifies that the rule set applies when the value of the Incident.ID property is 5, which indicates an incident
that involves the appliance system.
The following rule sets are nested in this rule set:
• Check CPU Overload
The rule set criteria specifies that the rule set applies when the value of the Statistics.Counter. GetCurrent property for CPU load
is 95 or higher. This value indicates the percentage of the maximum load that the CPU is currently running with.
The Statistics module, which provides the value, runs with default settings, as is specified after the CPU Load property parameter.
The rule set contains the following rules.
The rule is always executed when the criteria of its rule set is matched.
The rule then uses an event to set a user-defined property to a chain of values that make up a message text about the CPU
overload.
The Continue action lets processing continue with the next rule.
The Send SNMP trap rule and other rules in the rule set are always executed when the rule set criteria is matched.
The rules then use different events for taking measures to make the administrator aware of the CPU overload.
The rule set criteria specifies that the rule set applies when the value of the Statistics.Counter. GetCurrent property for web
cache usage is 95 or higher.This value indicates the percentage of the maximum allowed usage of the web cache that is currently
in use.
The Statistics module, which provides the value, runs with default settings, as is specified after the WebCacheDiskUsage property
parameter.
The rule set contains the following rules.
The rule is always executed when the criteria of its rule set is matched.
The rule then uses two events to set user-defined properties. One of these properties is set to the number of requests that
are currently processed on the appliance per second. The other is set to a chain of values that make up a message text
about the web cache usage..
The Continue action lets processing continue with the next rule.
The Send SNMP trap rule and other rules in the rule set are always executed when the rule set criteria is matched.
The rules then use different events for taking measures to make the administrator aware of the web cache usage.
The rule set criteria specifies that the rule set applies when the value of the Statistics.Counter. GetCurrent property for requests
is 480,000 or higher. This value is the number of requests that are currently processed one an appliance per second.
The Statistics module, which provides the value, runs with default settings, as is specified after the HttpRequests property
parameter.
The rule set contains the following rules.
The rule is always executed when the criteria of its rule set is matched.
The Continue action lets processing continue with the next rule.
The Send SNMP trap rule and other rules in the rule set are always executed when the rule set criteria is matched.
The rules then use different events for taking measures to make the administrator aware of the request overload.
Criteria – Incident.ID greater than or equals 501 AND Incident ID less than or equals 600
The rule set criteria specifies that the rule set applies when the value of the Incident.ID property is within the range of incidents
that involve the Log File Manager.
The rule set contains the following rules.
The rule is always executed when the criteria of its rule set is matched.
The rule then uses an event to set a user-defined property to a chain of values that make up a message text on the
remaining number of days for your license.
The Continue action lets processing continue with the next rule.
The Create syslog entry rule and other rules in the rule set check the value of the Incident.ID property in the same way as
the Create notification message rule and use different events to take measures if this value is 501.
Criteria – IIncident.OriginName equals “Updater” OR Incident.ID equals 850 OR Incident.ID equals 851 OR Incident.ID equals 940
OR Incident.ID equals 941 OR Incident.ID equals 1050 OR Incident.ID equals 1051 OR Incident.ID equals 1650 OR Incident.ID equals
1651
The rule set criteria specifies that the rule set applies when the update module is specified by the value of the
Incident.OriginName property or the value of the Incident.ID property is one of those hat involve the update module.
The rule set contains the following rules.
The rule is always executed when the criteria of its rule set is matched.
The rule then uses an event to set a user-defined property to a chain of values that make up a message text about the
update incident. The message includes values for several incident properties.
The Continue action lets processing continue with the next rule.
The Create syslog entry rule and other rules in the rule set use different events to take measures if the respective rule
criteria is matched.
The rule set criteria specifies that the rule set applies when the value of the Incident.ID property is 200, which indicates that the
remaining number of days for your licence has been checked.
The rule set contains the following rules.
The rule checks whether the value of the Incident.ID property is 501, which indicates that the Log File manager could not
push a log file.
If this is the case, the rule uses an event to set a user-defined property for sending a notification message to a string value
that is the text of this message.
The Continue action lets processing continue with the next rule.
The Create syslog entry rule and other rules in the rule set use different events to take measures if the respective rule
criteria is matched.
Criteria – Always
The rule blocks access to all web objects when the value of the Error.ID property is 14000, which indicates an error that
prevents the Anti-Malware module (also known as engine) from loading.
The rule blocks access to all web objects when the value of the Error.ID property is 14001, which indicates all connections to
the Anti-Malware module (also known as engine) are currently in use and the module is overloaded.
Criteria – Error.ID greater than or equals 15000 AND Error.ID less than or equals 15999
The rule set criteria specifies that the rule set applies when the value of the Error.ID property lies within the specified range,
which is the range for errors related to URL filtering.
The rule set contains the following rules.
Error.ID equals 15000 OR Error.ID equals 15002 OR Error.ID equals 15004 OR Error.ID equals15005 –> Block<Cannot Load URL
Filter>
The rule blocks all requests for web access when the value of the Error.ID property is one of those specified in the rule
criteria. These values indicate errors that prevent the URL Filter module (also known as engine) from loading.
The rule is always executed when its rule set applies and the rule preceding it in the rule set has not been executed. The
rule then blocks all requests for web access.
Criteria – Always
Always block
The rule blocks access to all web objects when an internal error occurs.
The rule in this rule set is for handling internal errors on the appliance. It is executed at the time when an internal error
occurs, which can, of course, not be predicted and can happen at any time during the filtering process or not at all. In this
sense, processing the rule is not part of the normal process flow.
After executing the blocking, the rule stops all further processing of rules for the requests,responses, or embedded objects
that were being filtered when the internal error occurred.
This way it is ensured that no malicious or inappropriate web objects enter your network or leave it while the appliance is
not fully available.
Option Definition
Composite Opener settings Clicking Edit makes the Composite Opener settings available for
editing.
Block encrypted media types When selected, a rule is enabled that blocks encrypted media
types.
Block multipart media types When selected, a rule is enabled that blocks multipart media
types.
Block corrupted media types When selected, a rule is enabled that blocks corrupted media
types.
Criteria – Always
The rule uses the Enable Composite Opener event to enable the Composite Opener on Web Gateway for file opening.
The rule uses the Body.IsEncryptedObject property to check whether a requested media type is encrypted.
If it is, the request is blocked and not passed on to the requested web server.
The rule uses the Body.IsMultiPartObject property to check whether a requested media type is a multipart object.
If it is, the request is blocked and not passed on to the requested web server.
The rule uses the Body.IsMultiPartObject property to check whether a requested media type is a multipart object.
If it is, the request is blocked and not passed on to the requested web server.
Option Definition
User agent whitelist Clicking Edit opens a window to let you edit the User Agent
Whitelist that is used by a rule.
You can add, modify, and remove entries on the list.
URL host whitelist Clicking Edit opens a window to let you edit the URL Host Whitelist
that is used by a rule.
You can add, modify, and remove entries on the list.
Scanning Options
Key elements for the scanning activities of the Anti-Malware module.
Option Definition
Remove partial content for HTTP requests When selected, a rule is enabled that removes the
specification in an HTTP or HTTPS request for accessing only a
part of the content of a web object and lets the request ask
for the complete content.
If a web object, for example, a file, is delivered completely by
the web server in question, it can also be scanned completely
on Web Gateway. A complete scan can detect infections that
might not be noticed if only a part of the web object was
scanned.
Block partial content for FTP requests When selected, a rule is enabled that blocks FTP requests for
access to only a part of the content of a web object.
Under the FTP protocol. it is not possible to remove a
specification in a request for access to only a part of the
content of a web object. For this reason it might be advisable
to block such requests.
Use the Media Stream Scanner When selected, the Media Stream Scanner scans and delivers
web objects that are streaming media chunk-by-chunk, to
speed up the process.
The proactive functions of the McAfee Gateway Anti-Malware
engine are used for the scanning, but the other engines that
are available for this purpose on Web Gateway are not
involved.
Option Definition
Enable Anti-Malware scanning When selected, a rule is enabled that calls the Anti-Malware
module, which scans web objects for infections by viruses
and other malware.
Settings Clicking Edit opens a window to let you edit the settings for the
Anti-Malware module.
Criteria – Always
Header.Request.Get (“User-Agent”) matches in list User Agent WhiteList –> Stop Rule Set
The rule uses the Header.Request.Get property to check the user agent information that is sent with the header of a request.
If the user agent in question is on the specified whitelist, processing of the rule set stops, so the blocking rule at the end of
the rule set is not processed.
A parameter of the property specifies that it is the user agent information that must be checked when the rule is processed.
Note: Using this rule alone for whitelisting will cause a security problem because usually a client can set whatever user
agent it prefers.
URL.Host matches in list Anti-Malware URL Whitelist –> Stop Rule Set
The rule uses the URL.Host property to check whether a given URL matches one of the entries on the specified whitelist.
If it does, processing of the rule set stops and the blocking rule at the end of the rule set is not processed.
You can use this rule to exempt web traffic from filtering when the hosts of the URLs involved are well-known web servers
for which it is safe to assume that they spread no viruses and other malware.
Whitelisting increases performance because it avoids the effort of scanning the respective web objects.
Cycle.TopName equals “Request” AND (Connection.Protocol equals “http” OR Connection.Protocol equals “https”) –> Continue –
Header.RemoveAll (“Range”)
The rule uses the Cycle.TopName and Connection.Protocol properties to check whether the current processing cycle is the
request cycle and whether a request is sent in HTTP or HTTPS mode.
If this is the case, the Header.RemoveAll event modifies the request by removing the specification that only partial content is
requested. A request for complete content is then forwarded to the relevant web server and eventually received from there,
so that the complete content of a web object can be processed on the appliance.
For example, a complete archive can be opened and scanned for viruses and other malware. Malicious content that is
distributed over several parts of a file can be detected by scanning the complete file, while it could go unnoticed if only parts
of the file were scanned.
The Continue action lets processing continue with the next rule.
Cycle.TopName equals “Request” AND Connection.Protocol equals “ftp” AND Command.Categories contains “Partial” –>
Block<Partial Content Not Allowed>
This allows Web Gateway to detect an FTP request for partial content and block it.
Unlike with HTTP or HTTPS requests, an FTP request for partial content cannot be modified to make it a request for
complete content. However, security problems would arise if partial content was accepted on the appliance, which are the
same as the ones that were explained in the comment on the rule for blocking HTTP and HTTPS requests.
Start Media Stream Scanner on streaming media and skip anti-malware scanning
Cycle.Name equals "Response" AND StreamDetector.IsMediaStream<Default Streaming Detection> equals true –> Stop Rule Set –
Enable Media Stream Scanner
The rule uses the Cycle.Name property to check whether processing is in the response cycle and the
StreamDetector.IsMediaStream property to check whether the web object that is sent in response to Web Gateway is
streaming media.
If both are the case, processing of the rule set stops, so the remaining rule is not processed, and an event is used to start
the Media Stream Scanner.
The rule uses the Antimalware.Infected property to check whether a given web object is infected by a virus or other malware.
When the Anti-Malware module is called to scan the object, it runs with the Gateway Anti-Malware settings, as specified with
the property. These settings let the module use all its three submodules and their methods to scan web objects.
If the module finds that a web object is infected, processing of all rules stops and the object is not passed on further. Access
to it is blocked this way.
In a request cycle, the infected web object is not passed on to the web. In the response and embedded object cycles, it is
not passed on to the user who requested it.
The rule also uses an event to count blocking due to virus and malware infections.
The event parameters specify the counter that is incremented and the size of the increment. The event settings specify the
settings of the Statistics module, which executes the counting.
Criteria – Always
The rule set contains the rules that are also contained in the default Gateway Anti-Malware rule set, as well the following rules, which
are needed to enable the integrated filtering.
Note: This rule set is provided only in the complete rules view.
MediaType.EnsuredTypes at least one in list Executables AND TIE.Filereputation<TIE Reputations> greater than or equals 70 AND TIE.Filereputation<TIE
Reputations> less than or equals 99 –> Stop Rule Set
The rule uses the MediaType.EnsuredTypes property to check whether a given web object is an executable file by looking it up in
a list.
It also uses the TIE.Filereputation property to check whether the file reputation score for this object, which is retrieved from a
TIE server, is between 70 and 99. This score means that the object is not considered malicious.
When the TIE.Filter module is called to retrieve the file reputation, it runs with the TIE.Reputation settings, as specified with the
property.
If all parts of the criteria match, processing of the rule set stops and the rules that follow this rule in the rule set are skipped.
Skipping these rules means that the object is not scanned and filtered by the submodules of the Anti-Malware module on Web
Gateway, which include the Gateway Anti-Malware (GAM) and Avira engines.
TIE.Filereputation<TIE Reputations> equals 50 AND TIE.Filereputation<TIE Reputations> greater than 0 –> Continue
The rule uses the TIE.Filereputation property to check whether the file reputation score for this object, which is retrieved from a
TIE server, equals 50, which means the reputation is not known.
When the TIE.Filter module is called to retrieve the file reputation, it runs with the TIE.Reputation settings, as specified with the
property.
If the criteria matches, processing continues, which means the rule does not take any particular action on objects with
unknown reputations.
TIE.Filereputation<TIE Reputations> less than or equals 30 AND TIE.Filereputation<TIE Reputations> greater than 0 –> Block<TIE Reputation>
The rule uses the TIE.Filereputation property to check whether the file reputation score for this object, which is retrieved from a
TIE server, is between 30 and 0, which means it is considered malicious.
When the TIE.Filter module is called to retrieve the file reputation, it runs with the TIE.Reputation settings, as specified with the
property.
In a request cycle, the infected web object is not passed on to the web. In the response and embedded object cycles, it is
not passed on to the user who requested it. The action settings specify a message to this user.
MediaType.EnsuredTypes at least one in list Executables AND Antimalware.Infected<Gateway Anti-Malware with TIE> equals true AND
Antimalware.Proactive.Probability<Gateway Anti-Malware with TIE> greater than or equals 60 AND Antimalware.Proactive.Probability<Gateway Anti-Malware
with TIE> less than 80 –> Block<Virus Found> – Statistics.Counter.Increment (“BlockedByAntiMalware”,1)<Default> – TIE: Report File Reputation (30)
The rule uses the MediaType.EnsuredTypes property to check whether a given web object is an executable file by looking it up in
a list.
It also uses the Antimalware.Infected and Antimalware.Proactive.Probability properties to find out whether this object is infected by a
virus or other malware and whether the probability that it is infected is between 60 and 80, which means it is likely that it is
malicious.
When the Anti-Malware module is called to scan the object and rate its malware probability, it runs with the Gateway Anti-Malware
with TIE settings, as specified with the properties.
These settings let the module use both its submodules, the Gateway Anti-Malware (GAM) engine and the Avira engine, and
their methods to scan web objects.
If all parts of the criteria match, processing of all rules stops and the object is not passed on further. Access to it is blocked
this way.
In a request cycle, the infected web object is not passed on to the web. In the response and embedded object cycles, it is
not passed on to the user who requested it. The action settings specify a message to this user.
The rule also uses an event to count blocking due to virus and malware infections. The event parameters specify the
counter that is incremented and the size of the increment. The event settings specify the settings of the Statistics module,
which executes the counting.
The rule uses another event to notify the TIE server that there is a high probability that the scanned object is malicious.
Corresponding to this high probability grade, a low reputation score is sent to the TIE server.
MediaType.EnsuredTypes at least one in list Executables AND Antimalware.Infected<Gateway Anti-Malware with TIE> equals true AND
Antimalware.Proactive.Probability<Gateway Anti-Malware with TIE> greater than or equals 80 AND Antimalware.Proactive.Probability<Gateway Anti-Malware
with TIE> less than 90 –> Block<Virus Found> – Statistics.Counter.Increment (“BlockedByAntiMalware”,1)<Default> – TIE: Report File Reputation (15)
The rule uses the MediaType.EnsuredTypes property to check whether a given web object is an executable file by looking it up in
a list.
It also uses the Antimalware.Infected and Antimalware.Proactive.Probability properties to find out whether this object is infected by a
virus or other malware and whether the probability that is infected is between 80 and 90, which means it is very likely that it
is malicious.
These settings let the module use both its submodules, the Gateway Anti-Malware (GAM) engine and the Avira engine, and
their methods to scan web objects.
If all parts of the criteria match, processing of all rules stops and the object is not passed on further. Access to it is blocked
this way.
In a request cycle, the infected web object is not passed on to the web. In the response and embedded object cycles, it is
not passed on to the user who requested it. The action settings specify a message to this user.
The rule also uses an event to count blocking due to virus and malware infections. The event parameters specify the
counter that is incremented and the size of the increment. The event settings specify the settings of the Statistics module,
which executes the counting.
The rule uses another event to notify the TIE server that there is a very high probability that the scanned object is malicious.
Corresponding to this very high probability grade, a very low reputation score is sent to the TIE server.
MediaType.EnsuredTypes at least one in list Executables AND Antimalware.Infected<Gateway Anti-Malware with TIE> equals true AND
Antimalware.Proactive.Probability<Gateway Anti-Malware with TIE> greater than or equals 90 –> Block<Virus Found> – Statistics.Counter.Increment
(“BlockedByAntiMalware”,1)<Default> – TIE: Report File Reputation (1)
The rule uses the MediaType.EnsuredTypes property to check whether a given web object is an executable file by looking it up in
a list.
It also uses the Antimalware.Infected and Antimalware.Proactive.Probability properties to find out whether this object is infected by a
virus or other malware and whether the probability that is infected is greater than or equals 90, which means it is almost
sure that it is malicious.
When the Anti-Malware module is called to scan the object and rate its malware probability, it runs with the Gateway Anti-Malware
with TIE settings, as specified with the properties.
These settings let the module use both its submodules, the Gateway Anti-Malware (GAM) engine and the Avira engine, and
their methods to scan web objects.
If all parts of the criteria match, processing of all rules stops and the object is not passed on further. Access to it is blocked
this way.
In a request cycle, the infected web object is not passed on to the web. In the response and embedded object cycles, it is
not passed on to the user who requested it. The action settings specify a message to this user.
The rule also uses an event to count blocking due to virus and malware infections. The event parameters specify the
counter that is incremented and the size of the increment. The event settings specify the settings of the Statistics module,
which executes the counting.
The rule uses another event to notify the TIE server that it is almost sure that the scanned object is malicious.
Corresponding to this extremely high probability grade, an extremely low reputation score is sent to the TIE server.
The rule uses the Antimalware.Infected property to check whether a given web object is infected by a virus or other malware.
When the Anti-Malware module is called to scan the object, it runs with the Gateway Anti-Malware with TIE settings, as specified with
the property.
These settings let the module use both its submodules, the Gateway Anti-Malware (GAM) engine and the Avira engine, and
their methods to scan web objects.
If the module finds that a web object is infected, processing of all rules stops and the object is not passed on further. Access
to it is blocked this way.
In a request cycle, the infected web object is not passed on to the web. In the response and embedded object cycles, it is
not passed on to the user who requested it. The action settings specify a message to this user.
The rule also uses an event to count blocking due to virus and malware infections. The event parameters specify the
counter that is incremented and the size of the increment. The event settings specify the settings of the Statistics module,
which executes the counting.
Note: The rule does not notify the TIE server of any scanning results.
Criteria – Always
The rule uses the Client.IP property to check whether the IP address of a client that a request was sent from is on the
specified whitelist.
The rule uses the URL.Host property to check whether the host that a URL sent in a request provides access to is on the
specified whitelist.
If it is, the rule applies and stops the current processing cycle. The request is then forwarded to the web server that is the
requested host.
Option Definition
Media types to block Clicking Edit opens a window to let you edit the Upload Media Type
Block List that is used by a rule.
You can add, modify, and remove entries on the list.
Option Definition
Media types to block Clicking Edit opens a window to let you edit the Download Media
Type Block List that is used by a rule.
You can add, modify, and remove entries on the list.
Block undetectable media types When selected, a rule is enabled that blocks media if no type
could be detected for them.
Block unsupported media types When selected, a rule is enabled that blocks media if it
belongs to a type that cannot be handled on Web Gateway.
Block streaming media When selected, a rule is enabled that blocks media if it is
streaming media.
Criteria – Always
This nested rule set blocks the upload of media belonging to particular media types. It is processed in request cycles when
users request to upload media to the web, as well as in embedded object cycles when objects are embedded in media.
Criteria – Always
Media.TypeEnsuredTypes at least one in list Upload Media Type Blocklist –> Block<Media Type (Block List)> —
Statistics.Counter.Increment (“BlockedByMediaFilter”, 1)<Default>
The rule uses the Media.TypeEnsuredTypes property to check for media that have their type ensured if they are on the specified
list. If they are, access to the media type is blocked and processing rules stops.
The rule uses an event to count blocking due to media type filtering. The event parameters specify the counter that is
incremented and the size of the increment. The event settings specify the settings of the Statistics module, which executes
the counting.
This nested rule set blocks the download of media belonging to particular media types. It is processed in response cycles
when web servers send media in response to user requests for downloading them, as well as in embedded object cycles
when objects are embedded in media.
Criteria – Always
Media.TypeEnsuredTypes at least one in list Download Media Type Blocklist –> Block<Media Type (Block List)> —
Statistics.Counter.Increment (“BlockedByMediaFilter”, 1)<Default>
The rule uses the Media.TypeEnsuredTypes property to check for media that have their type ensured if they are on the
specified list. If they are, access to the media type is blocked and processing rules stops.
The rule uses an event to count blocking due to media type filtering. The event parameters specify the counter that is
incremented and the size of the increment. The event settings specify the settings of the Statistics module, which executes
the counting.
Processing continues with the next request that is received on the appliance.
Criteria – Always
The Single Sign On rule set contains the following nested rule sets:
• Select Services
• SSO Management
◦ HTTPS Handling
◦ Launchpad
◦ OTP Authentication
◦ Get Login Action
◦ Get Attributes on Premise
◦ Get Attributes in the Cloud
Criteria – Always
Action Continue
If the user is authenticated, the Single Sign On module retrieves the specified list of cloud services, which the user is then allowed to
access.
The Single Sign On module executes the event with the following properties and settings:
• "defaultIDP" — Specifies the domain in the credential store where user account information is stored.
• Authentication.UserName — Specifies the name of the authenticated user.
• Default SSO Services — Specifies a list of services that the authenticated user is allowed to access.
• The following options form one parameter in JSON format:
◦ "label" — Specifies the type of account: individual or shared.
◦ "permit-usage" — Allows you to permit, deny, or require OTP authentication for access to the services on the list by the
authenticated user. To configure access, specify the following values respectively: "yes", "no", or "otp".
◦ "permit-management" — Allows you to permit, deny, or require OTP authentication for access to account management
functions by the authenticated user. To configure access, specify the following values respectively: "yes", "no", or
"otp".
Add OTP secured SSO services (individual accounts, use after OTP authentication)
Action Continue
If the user is authenticated, the Single Sign On module retrieves the specified list of cloud services. The user is allowed to access or
manage these OTP-secured services after authenticating again with a one-time password entered on the launchpad.
The module executes the event with the following properties and settings:
• "defaultIDP" — Specifies the domain in the credential store where user account information is stored.
• Authentication.UserName — Specifies the name of the authenticated user.
• OTP Secured SSO Services — Specifies a list of services that the authenticated user is allowed to access after authenticating again
with a one-time password.
• The following options form one parameter in JSON format:
◦ "label" — Specifies the type of account: individual or shared.
◦ "permit-usage" — Allows you to require OTP authentication for access to the services on the list by the authenticated
user. Value: "otp"
◦ "permit-management" — Allows you to require OTP authentication for access to account management functions by the
authenticated user. Value: "otp"
• <Default> — Specifies settings for connecting to the SSO service provided by Web Gateway.
Criteria Always
Action Continue
The Single Sign On module retrieves the specified list of cloud services, which authenticated users of the shared account are then
allowed to access.
• "defaultIDP" — Specifies the domain in the credential store where user account information is stored.
• "sharedAccounts" — Specifies a shared account.
• Shared SSO Services — Specifies a list of services, which authenticated users of the shared account are allowed to access.
Action Redirect
If the SSO Host to Service ID Mapping includes the host name configured for the requested cloud service, the request is redirected to
the URL configured for that service.
The Single Sign On module constructs the redirect URL from the specified string values and the following properties and settings:
• SSO.ManagementHost — Specifies the host name of the SSO service provided by Web Gateway.
• <Default> — Specifies settings for connecting to the SSO service provided by Web Gateway.
• Map.GetStringValue (SSO Host to Service ID Mapping, URL.Host) — Looks up the host name of the requested service in the SSO Host to Service
ID map and returns the Service ID of that service.
Criteria – Always
Enable SSL
If an SSO connection is required, this rule stops the request cycle. The Single Sign On module provides an SSL certificate and
enables content inspection.
The module executes the events with the following settings:
• <Launchpad certificate> — Specifies the SSL certificate and settings. This certificate can be the default or one that you import.
• <Enable Content Inspection> — Specifies the settings that enable content inspection by the SSL Scanner module.
Action Redirect<Default>
If the connection protocol is HTTP, the Single Sign On module sets the SSO protocol to "https" and the SSO request is redirected to
the requested URL.
The rule executes the redirect action with the following settings:
<Default> — Specifies settings for connecting to the SSO service provided by Web Gateway.
Criteria – Always
Create launchpad
If the requested URL specifies the SSO service or the launchpad, this rule generates the launchpad using the following settings:
<SSO Launchpad> — Specifies the language and template settings used to generate the launchpad.
Note: We recommend that you do not modify the launchpad settings.
The Single Sign On module sets the HTTP status code to 200 (OK).
If the requested URL specifies the SSO logon page, this rule generates the logon page, including the JavaScript, using the
following settings:
<SSO Login Page> — Specifies the language and template settings used to generate the logon page.
Note: We recommend that you do not modify the logon page settings.
This rule applies when the requested URL specifies the SSO logon page using the format "/login-<Service ID>" instead of the
default format that the SSO service is expecting: "/login?service=<Service ID>". This rule generates the logon page using the
following settings:
<SSO Login Page> — Specifies the language and template settings used to generate the logon page.
Note: We recommend that you do not modify the logon page settings.
The Single Sign On module rebuilds the requested URL using the default format and sets the HTTP status code to 200 (OK).
Note: Some SAML services do not allow query parameters in the IdP URL when single sign-on is SP-initiated.
The rules in this rule set are executed when the SSO action requires OTP authentication.
Action Continue
Events Authentication.SendOTP<OTP>
If there is a request for a one-time password from an authenticated user, the Single Sign On module sends the password to the
user. The types of OTP requests are:
• "requestOTP" — The user requests the one-time password through the McAfee OTP server.
• "pledgeOTP" — The user requests the one-time password through Pledge, an OTP client running locally on a computer or mobile
device.
The module executes the event with the following settings:
<OTP> — Specifies settings for OTP authentication.
If there is a request for a one-time password from an authenticated user, this rule stops the request cycle. The Single Sign On
module generates a response containing the OTP context in a JSON object. The OTP context is provided in a header field when
the McAfee OTP Server responds with a one-time password.
The module executes this event with the following settings:
<OTP> — Specifies settings for OTP authentication.
The module sets the HTTP status code to 403 (Forbidden).
Events HTTP.GenerateResponse
("{"authentication-required":"delivered-otp"}")
HTTP.SetStatus (403)
If OTP authentication fails, this rule stops the request cycle. The Single Sign On module generates a response specifying the
authentication result and method. The method, delivered OTP, specifies delivery of the one-time password by the McAfee OTP
Server.
The module executes this event with the following settings:
<OTP> — Specifies settings for OTP authentication.
The module sets the HTTP status code to 403 (Forbidden).
Note: Enable this rule if one-time passwords are delivered by McAfee OTP Server.
Events HTTP.GenerateResponse
("{"authentication-required":"generated-otp"}")
HTTP.SetStatus (403)
Criteria Always
Action Continue
The Single Sign On module retrieves information about the connector to the service the user is requesting and stores it as a JSON
object in a local variable named sso-conn-info. This information includes the following:
• Name (string) — Specifies a user-defined name for the cloud connector.
• Service ID (string) — Uniquely identifies the cloud service or application.
• Type (string) — Specifies the authentication method used by the cloud service.
Values: HTTP, SAML2
• Inline (Boolean) — If true, the cloud connector supports a dynamic HTTP cloud service, which requires single sign-on in proxy
or inline mode.
• Deprecated (Boolean) — If true, the cloud connector is no longer supported.
Events None
If the cloud connector type is HTTP, this rule stops the Get Login Action rule set.
Events None
This rule checks the "service" and "usage" parameters to verify that the user has the right to access the requested service or
application. If the "service" parameter is empty or the "usage" parameter is set to "no", this rule blocks access to the requested
service.
This rule is executed with the following settings:
• <Default> — Specifies settings for connecting to the SSO service provided by Web Gateway.
• <SSO: User Has No Access To Service> — Specifies the language and template settings used to generate the block message for the
user.
Criteria – InTheCloud equals false AND JSON.AsString (JSON.GetByName (User-Defined.sso-conn-info, "type")) does not equal "HTTP"
Criteria Always
Action Continue
The Single Sign On module fetches information about the user from an external LDAP data source through the Authentication filter.
It then stores the information as a JSON object in a local variable named sso-user-data. The user information consists of the
attribute name-value pairs expected by the SAML service or application.
This event is executed with the following settings:
<LDAP Authentication> — Specifies the Authentication module settings configured for the external LDAP data source.
Criteria Always
Action Continue
The Single Sign On module fetches information about the user from an external LDAP data source through the External Lists module.
It then stores the information as a JSON object in a local variable named sso-user-data. The user information consists of the
attribute name-value pairs expected by the SAML service or application.
This event is executed with the following settings:
<LDAP Source> — Specifies the External Lists module settings configured for the external LDAP data source.
Criteria – InTheCloud equals true AND JSON.AsString (JSON.GetByName (User-Defined.sso-conn-info, "type")) does not equal "HTTP"
Action Continue
This rule only applies when the user is authenticated, the user name is an email address, and the sso-user-data variable is empty.
The rule stores the attribute name-value pair formed by "mail" and the user's email address as a JSON object in the sso-user-data
variable.
Criteria – Always
If the cloud connector type is SAML2, this rule stops the request cycle. The Single Sign On module generates a response containing
the user information needed for completing single sign-on to the requested SAML service or application.
This event is executed with the following settings:
<Default> — Specifies settings for connecting to the SSO service provided by Web Gateway.
Criteria — Always
If the cloud connector type is IceToken, this rule stops the request cycle. The Single Sign On module generates a response
containing the user information needed for completing single sign-on to the requested service or application.
This event is executed with the following settings:
<Default> — Specifies settings for connecting to the SSO service provided by Web Gateway.
Criteria – Always
Events None
Criteria Always
This rule blocks access to a requested resource, when the resource does not exist, and is executed with the following settings:
<File Not Found> — Specifies the language and template settings used to generate the block message for the user.
The Single Sign On module sets the HTTP status code to 404 (Not Found).
Criteria – Always
Criteria Always
Action Continue
Events SSO.ProcessFormLogin<Default>
Criteria — Always
This rule set is part of the default rule set system, but not enabled by default.
Always –> Continue — Enable SSL Client Context with CA <Default CA>
The rule enables the use of a server certificate that is sent to a client.
The event settings specify the McAfee Web Gateway root certificate authority (CA), which is implemented on the appliance
after the initial setup, as the default issuer of this certificate.
The Continue action lets processing continue with the next rule.
Tunneled hosts
The rule lets requests for access to hosts with a URL that is on the specified whitelist skip HTTPS scanning.
URL.Port is not in list Allowed Connect Ports –> Block<Connect not allowed>
The rule blocks requests with destination ports that are not on the list of allowed CONNECT ports.
Enable certificate verification without EDH for hosts in no-EDH server list
URL.Host is in list No-EDH server –> Block<Connect not allowed> Stop Rule Set — Enable SSL Scanner<Certificate Verification
without edh>
The rule enables the certificate verification for requests sent from a host on the non-EDH (Ephemeral Diffie-Hellman) server
list.
The event settings specify running in verification mode for the SSL Scanner module and a special cipher string for data
encryption on non-EDH hosts.
Always –> Stop Rule Set — Enable SSL Scanner<Default certificate verification>
The event settings specify that the SSL Scanner module runs in verification mode.
The rule criteria specifies that the rule set applies if a request is received on the appliance that contains the CERTVERIFY
command, which is sent to request the verification of a certificate.
The following rule sets are nested in this rule set:
• Verify Signature Algorithms
• Verify Common Name (Proxy Setup)
The rule set contains the following rules:
The settings in the property specify a list for the module that checks the certificate authorities.
The rule blocks a certificate chain if one of the included certificates has been revoked.
The settings in the property specify a list for the module that checks the certificate authorities.
The rule blocks a certificate chain if the revocation status of at least one certificate is unknown or if the certificate chaiin is
incomplete.
The settings in the property specify a list for the module that checks the certificate authorities.
The rule blocks a certificate chain if none of the certificate authorities (CAs) issuing the included certificates is a known CA.
The settings in the property specify a list for the module that checks the certificate authorities.
The rule blocks a certificate chain if the first known CA that was found is not trusted.
The settings in the property specify a list for the module that checks the certificate authorities.
Criteria – Always
The rule criteria specifies that the rule set applies for all requests that are received.
The rule uses the SSL.Server.Certificate.SignatureMethod and SSL.Server.CertificateChain.SignatureMethods properties to check whether a
signature algorithm for a certificate that was sent with a request is on both of the two lists referred to in the rule criteria.
If a signature algorithm is on these lists, processing of the rule set stops, so the blocking rule that follows this rule is not
processed anymore.
The rule blocks any request that has passed the filtering that was performed when processing the preceding rule. This
means that blocking will occur whenever a signature algorithm is not on the lists used in that rule.
The rule criteria specifies that the rule set applies if a request is received on a connection used in SSL-secured communication
and verification of the common name is not performed in transparent mode.
The rule set contains the following rules:
The rule allows a request if the URL of the requested host is the same as the common name in the certificate.
Certificate.SSL.CN.HasWildcards equals true AND URL.Host matches.Certificate.SSL.CN.ToRegex(Certificate.SSL.CN) –> Stop Rule Set
The rule allows requests to hosts sending certificates that have wildcards in their common names matching the URLs of the
hosts.
To verify that a common name containing wildcards matches a host, this name is converted into a regular expression.
The rule allows requests to hosts with alternative common names in their certificates if the host matches at least one of
them.
Block incident
If any of the rules for allowing matching common names applies, processing of the rule set stops and this rule is not
processed. Otherwise, requests are blocked by this rule because it is then a common name mismatch.
Content Inspection
This nested rule set completes the handling of a CERTVERIFY call. It lets some requests skip content inspection according to
particular criteria and enables inspection for all others.
The rule criteria specifies that the rule set applies if a request is received on the appliance that contains the CERTVERIFY
command, which is sent to request the verification of a certificate.
The rule set contains the following rules:
Connection.SSL.Transparent equals false AND URL.Host matches in list SSL Inspection Whitelist –> Stop Rule Set
The rule lets requests sent to whitelisted hosts skip content inspection. It applies only in non-transparent mode.
Connection.SSL.Transparent equals true AND Certificate.SSL.CN matches in list SSL Inspection Whitelist –> Stop Rule Set
The rule lets requests with whitelisted common names in their certificates skip content inspection. It applies only in
transparent mode.
The rule lets requests skip inspection if they require the use of client certificates.
The event settings specify that the SSL Scanner module runs in inspection mode.
If any of the rules for skipping content inspection applies, processing of the rule set stops and this last rule, which enables
the inspection, is not processed. Otherwise, content inspection is enabled by this rule.
Criteria — Connection.SSL.TransparentCNHandling equals true AND Command.Name does not equal “CONNECT” AND
Command.Name does not equal “CERTVERIFY”
The rule criteria specifies that the rule set applies if a request is received on a connection used in SSL-secured communication
and verification of the common name is performed in transparent mode.
The rule set contains the following rules:
The rule allows a request if the URL of the requested host is the same as the common name in the certificate.
Certificate.SSL.CN.HasWildcards equals true AND URL.Host matches.Certificate.SSL.CN.ToRegex(Certificate.SSL.CN) –> Stop Rule Set
The rule allows requests to hosts sending certificates that have wildcards in their common names matching the URLs of the
hosts.
To verify that a common name containing wildcards matches a host, this name is converted into a regular expression.
Block incident
If any of the rules for allowing matching common names applies, processing of the rule set stops and this rule is not
processed. Otherwise, requests are blocked by this rule because it is then a common name mismatch.
The SSO.LogAttributes property is a JSON object containing the SSO request attributes shown in the following table. The SSO Log rule
set generates the SSO access log and optionally the SSO trace log from the attributes in the JSON object.
SSO.LogAttributes property
config Specifies the name of the settings used by the internal action
performed in response to the SSO request.
origin Specifies the source of the values that the proxy copies to the
SSO.LogAttributes property. The source can be one of the
following SSO components:
• SSO.Client — The proxy copies the values provided by the
client (browser) to this property without checking them first.
• SSO.Proxy — The proxy checks the values provided by the
client (browser) before copying them to this property.
SSO.Client values are used by developers when testing and
debugging SSO features and are included in the SSO trace log.
level Specifies the log level. Only SSO requests having a log level of
four or less are included in the SSO access log. SSO requests
having a log level higher than four are also included in the
SSO trace log, which is more detailed.
The log levels are:
• Off (0) — Logging is turned off.
• Error (1, 2) — Only error messages are logged.
• Info (3, 4) — Error and info messages are logged to the SSO
access log file.
• Full (5, 6) — All messages are logged to the SSO trace log file.
service Specifies the name of the cloud service in the SSO request.
outward Specifies whether Web Gateway performs the web server role
or the web server is external to Web Gateway. This attribute
has one of the following values:
• FALSE — Web Gateway is the destination of the SSO request
and creates the SSO response. In this case, Web Gateway
performs the role of a web server. For example, Web
Gateway performs the web server role when the user
accesses the launchpad.
• TRUE — The SSO request is directed to an external web
server, which creates the SSO response. In this case, Web
Gateway does not perform the role of a web server.
Criteria – JSON.AsString (JSON.GetByName (SSO.LogAttributes, "origin")) matches SSO.Proxy* AND JSON.AsNumber (JSON.GetByName
(SSO.LogAttributes, "level")) less than or equals 4
Write sso_access.log
Criteria Always
Action Continue
This rule creates the SSO access log entry, then writes the entry to the SSO access log file. The rule creates the log entry by
retrieving the following information in string format and concatenating the strings:
• Date and time stamp in Web Reporter format
• User name
• Client IP address (if it exists)
• Status code in the response (if it exists)
• First line of the SSO request header
• Type of SSO request (action)
• Name of the cloud service in the SSO request (service)
• Description of the SSO request (message)
Note: To open and configure the file system log settings, click <SSO Access Log>.
Criteria – Always
Criteria Always
Action Continue
This rule sets the SSO trace log entry equal to the date and time stamp in Web Reporter format.
Criteria Always
Action Continue
This rule adds the SSO log attributes in string format to the existing SSO trace log entry.
Action Continue
If the SSO request is handled by an external web server, this rule adds the first line of the request header to the SSO trace log
entry.
Add firstline
Criteria Always
Action Continue
This rule is disabled by default. When enabled, it adds the first line of the SSO request header to the SSO trace log entry for
external and internal requests.
Write sso_trace.log
Criteria Always
Action Continue
Criteria – Always
Events None
If the SSO request is handled by Web Gateway internally, this rule stops the current cycle of the SSO Log rule set. This action
prevents internal SSO requests from being logged to the general access log.
Note: For this rule to be effective, you must add the SSO Log rule set to the Log Handler tree above the Default logging rule set.
The rule set criteria specifies that the rule set applies to SSL-secured communication and to any other communication, which
does not use the CONNECT command at the beginning.
The following rule sets are nested in this rule set:
• Time Quota With URL Configuration
• Time Quota With IP Configuration
This rule set is not enabled initially.
• Time Quota With Authenticated User Configuration
This rule set is not enabled initially.
Criteria – URL.Categories<Default> at least one in list URL Categories Blocklist for Time Quota
The rule set criteria specifies that the rule set applies when a user sends a request for a URL that falls into a category on the
blocking list for time quotas related to URL categories.
The rule set contains the following rules:
The rule redirects a request to let a user again access a web object after session time has been exceeded and the user has
chosen to continue with a new session.
The rule uses the Quota.Time.SessionExceeded property to check whether the configured session time has been exceeded for
a user. If it has, the user’s request for web access is blocked.
The URL Category Configuration settings, which are specified with the property, are the settings of the module that handles
time quotas.
The rule uses the Quota.Time.Exceeded property to check whether the configured time quota has been exceeded for a user.
If it has, the user’s request for web access is blocked.
The URL Category Configuration settings, which are specified with the property, are the settings of the module that handles
time quotas.
The rule set criteria specifies that the rule set applies when a user sends a request from a client with an IP address that is on the
blocking list for time quotas related to IP addresses.
Nested library rule set – Time Quota With Authenticated User Configuration
The rule set criteria specifies that the rule set applies when a request is sent by a user whose user name is on the blocking list for
time quotas related to user names.
The rules in this rule set are the same as in the Time Quota with URL Configuration rule set, except for the module settings that
appear in the rule criteria, which are Authenticated User Configuration.
General rule
The URL Filtering rule set includes a general rule and two nested rule sets for performing different kinds of URL filtering.
The general rule is by default processed before the work flow continues with the nested rule sets.
Name
The rule uses an event to set a user-defined property for indicating whether the URL filtering rules were already processed for a
given request to false.
The property serves as a flag, which is checked at the beginning of each of the two nested rule sets. When the first nested rule
set is processed, a rule in this rule set the flag to true.
When processing of the first rule set is completed or the rule set was not processed because its criteria was not matched, the
value of the flag is checked in the criteria of the second rule set.
If the value of the flag is true, the second rule set is not processed, as URL filtering has already been performed under the rules
of the first rule set. Otherwise, the second rule set is processed.
Option Definition
User groups to include Clicking Edit opens a window where you can edit a string list of
user groups that URL filtering is to be performed for.
Users to include Clicking Edit opens a window where you can edit a string list of
users that URL filtering is to be performed for.
IP ranges to include Clicking Edit opens a window where you can edit a list of IP
address ranges that URL filtering is to be performed for.
Basic Filtering
Key elements for performing basic URL filtering.
Basic Filtering
Option Definition
URL whitelist Clicking Edit opens a window to let you edit the URL whitelist
that is used by a rule.
You can add, modify, and remove entries on the list.
URL blocklist Clicking Edit opens a window to let you edit the URL blocklist
that is used by a rule.
You can add, modify, and remove entries on the list.
URL category blocklist Clicking Edit opens a window to let you edit the URL category
blocklist that is used by a rule.
You can add, modify, and remove entries on the list.
SafeSearch
Key elements for integrating SafeSearch in the URL filtering process.
SafeSearch
Option Definition
Enable SafeSearch When selected, a rule is enabled that controls the SafeSearch
part of the URL filtering process.
SafeSearch settings Clicking Edit opens a window to let you edit the settings for the
SafeSearch Enforcer module (or engine).
This module handles the integration of the SafeSearch
Enforcer, which is an additional web security product, in the
URL filtering process on Web Gateway.
GTI reputation
Option Definition
Block URLs with a High Risk reputation When selected, a rule is enabled that blocks URLs with a
reputation score that lets them appear to be a high or
medium risk to web security.
The reputation score of a URL is established by the Global
Threat Intelligence service, which is provided by McAfee. It is
retrieved from this service by the URL Filter module.
Uncategorized URLs
Key element for handling URLs that could not be categorized during the URL filtering process.
Uncategorized URLs
Option Definition
Uncategorized URLs Selecting Block enables a rule that blocks requests for access
to web objects with URLs that could not be categorized during
the URL filtering process.
Selecting Allow means that no action is executed by this rule.
URL filtering continues with processing the next rule.
The rule uses the URL property to check whether a given URL is on the specified whitelist. If it is, processing of the rule set
stops and the blocking rules that follow the whitelisting rule are not processed.
You can use this rule to exempt URLs from filtering to make sure they are available to the users of your network and do not
get blocked by any of the following blocking rules. Whitelisting also increases performance because it avoids the effort of
retrieving information about the respective URLs.
The rule also uses an event to count blocking due to virus and malware infections. The event parameters specify the
counter that is incremented and the size of the increment. The event settings specify the settings of the Statistics module,
which executes the counting.
Enable SafeSearchEnforcer
The rule enables the SafeSearchEnforcer, which is an additional module for filtering access to web sites with adult content.
The enabling is done by executing an event. The settings of the module are specified with the event.
The rule uses the List.OfCategory.IsEmpty property, which has the URL.Categories property as a parameter, to check whether
the list of categories for categorizing a URL is empty. This would mean that the URL is uncategorized, as it could not be
assigned to any of the existing categories. Specifying the URL.Categories property as a parameter ensures that it is a
particular list of categories that is checked. It is the list that is the value of this property.
To provide a list of categories as the value for the URL.Categories property, the URL Filter module is called, which retrieves
this list from the Global Threat Intelligence system. The module runs with the specified Default settings.
If a URL is uncategorized, processing of the rule set stops and the blocking rules that follow this rule are not processed. The
request for the URL is forwarded to the appropriate web server and, unless access to the URL is blocked in the response or
embedded object cycle, the user is allowed to access the web object that was requested by submitting the URL.
The rule uses the URL.Categories property to check whether one of the categories a given URL belongs to is on the specified
blocking list. The URL Filter module, which is called to retrieve information on these categories, runs with the Default
settings, as specified with the property.
If one of the URL’s categories is on the list, processing of all rules stops and the request for access to the URL is not passed
on to the appropriate web server. Access to it is blocked this way.
The URLBlocked action settings specify that the user who requested this access is notified of the blocking.
The rule also uses an event to count blocking due to URL filtering in the same way as the blocking rule for individual URLs in
this rule set.
The rules uses the URL.IsHighRisk property to find out whether a URL has a reputation that lets access to it appear as a high
risk. If the value for this property is true, processing of all rules stops and the request for access to the URL is not passed on
to the appropriate web server. Access to it is blocked this way.
The reputation score is retrieved by the URL Filter module, which runs with the settings specified after the property.
The URLBlocked action settings specify that the user who requested this access is notified of the blocking.
The rule also uses an event to count blocking due to URL filtering in the same way as the blocking rule for individual URLs in
this rule set.
Basic Filtering
Key elements for performing basic URL filtering.
Basic Filtering
Option Definition
URL whitelist Clicking Edit opens a window to let you edit the URL whitelist
that is used by a rule.
You can add, modify, and remove entries on the list.
URL blocklist Clicking Edit opens a window to let you edit the URL blocklist
that is used by a rule.
You can add, modify, and remove entries on the list.
URL category blocklist Clicking Edit opens a window to let you edit the URL category
blocklist that is used by a rule.
You can add, modify, and remove entries on the list.
SafeSearch
Key elements for integrating SafeSearch in the URL filtering process.
SafeSearch
Option Definition
Enable SafeSearch When selected, a rule is enabled that controls the SafeSearch
part of the URL filtering process.
SafeSearch settings Clicking Edit opens a window to let you edit the settings for the
SafeSearch Enforcer module (or engine).
This module handles the integration of the SafeSearch
Enforcer, which is an additional web security product, in the
URL filtering process on Web Gateway.
GTI reputation
Key element for evaluating reputation scores retrieved from the Global Threat Intelligence service within the URL filtering
process.
Option Definition
Block URLs with a High Risk reputation When selected, a rule is enabled that blocks URLs with a
reputation score that lets them appear to be a high or
medium risk to web security.
The reputation score of a URL is established by the Global
Threat Intelligence service, which is provided by McAfee. It is
retrieved from this service by the URL Filter module.
Uncategorized URLs
Key element for handling URLs that could not be categorized during the URL filtering process.
Uncategorized URLs
Option Definition
Uncategorized URLs Selecting Block enables a rule that blocks requests for access
to web objects with URLs that could not be categorized during
the URL filtering process.
Selecting Allow means that no action is executed by this rule.
URL filtering continues with processing the next rule.
The rule uses the URL property to check whether a given URL is on the specified whitelist. If it is, processing of the rule set
stops and the blocking rules that follow the whitelisting rule are not processed.
You can use this rule to exempt URLs from filtering to make sure they are available to the users of your network and do not
get blocked by any of the following blocking rules. Whitelisting also increases performance because it avoids the effort of
retrieving information about the respective URLs.
The rules uses the URL property to check whether a given URL is on the specified blocking list. If it is, processing of all rules
stops and the request for access to the URL is not passed on to the appropriate web server. Access to it is blocked this way.
The rule also uses an event to count blocking due to virus and malware infections. The event parameters specify the
counter that is incremented and the size of the increment. The event settings specify the settings of the Statistics module,
which executes the counting.
Enable SafeSearchEnforcer
The rule enables the SafeSearchEnforcer, which is an additional module for filtering access to web sites with adult content.
The enabling is done by executing an event. The settings of the module are specified with the event.
The rule uses the List.OfCategory.IsEmpty property, which has the URL.Categories property as a parameter, to check whether
the list of categories for categorizing a URL is empty. This would mean that the URL is uncategorized, as it could not be
assigned to any of the existing categories. Specifying the URL.Categories property as a parameter ensures that it is a
particular list of categories that is checked. It is the list that is the value of this property.
To provide a list of categories as the value for the URL.Categories property, the URL Filter module is called, which retrieves
this list from the Global Threat Intelligence system. The module runs with the specified Default settings.
If a URL is uncategorized, processing of the rule set stops and the blocking rules that follow this rule are not processed. The
request for the URL is forwarded to the appropriate web server and, unless access to the URL is blocked in the response or
embedded object cycle, the user is allowed to access the web object that was requested by submitting the URL.
The rule uses the URL.Categories property to check whether one of the categories a given URL belongs to is on the specified
blocking list. The URL Filter module, which is called to retrieve information on these categories, runs with the Default
settings, as specified with the property.
If one of the URL’s categories is on the list, processing of all rules stops and the request for access to the URL is not passed
on to the appropriate web server. Access to it is blocked this way.
The URLBlocked action settings specify that the user who requested this access is notified of the blocking.
The rule also uses an event to count blocking due to URL filtering in the same way as the blocking rule for individual URLs in
this rule set.
The rules uses the URL.IsHighRisk property to find out whether a URL has a reputation that lets access to it appear as a high
risk. If the value for this property is true, processing of all rules stops and the request for access to the URL is not passed on
to the appropriate web server. Access to it is blocked this way.
The reputation score is retrieved by the URL Filter module, which runs with the settings specified after the property.
The URLBlocked action settings specify that the user who requested this access is notified of the blocking.
The rule also uses an event to count blocking due to URL filtering in the same way as the blocking rule for individual URLs in
this rule set.
The rule set criteria specifies that the rule set applies to SSL-secured communication and to other communication that does
not use the CONNECT command at the beginning.
The rule set criteria specifies that the rule set applies to SSL-secured communication and to any other communication, which
does not use the CONNECT command at the beginning.
The following rule sets are nested in this rule set:
• Volume Quota With URL Configuration
• Volume Quota With IP Configuration
This rule set is not enabled initially.
• Volume Quota With Authenticated User Configuration
This rule set is not enabled initially.
• Volume Quota With Media Type Configuration
This rule set is not enabled initially.
Criteria – URL.Categories<Default> at least one in list URL Categories Blocklist for Volume Quota
The rule set criteria specifies that the rule set applies when a user sends a request for a URL that falls into a category on the
blocking list for volume quotas related to URL categories.
The rule set contains the following rules:
Quota.Volume.lsActivationRequest<URL Category Configuration> equals true –> Redirect<Redirection After Volume Session
Activation>
The rule redirects a request to let a user again access a web object after session time has been exceeded and the user has
chosen to continue with a new session.
The URL Category Configuration settings, which are specified with the property, are the settings of the module that handles
volume quotas.
The rule uses the Quota.Volume.SessionExceeded property to check whether the configured session time has been exceeded
for a user. If it has, the user’s request for web access is blocked.
The URL Category Configuration settings, which are specified with the property, are the settings of the module that handles
volume quotas.
The rule uses the Quota.Volume.Exceeded property to check whether the configured volume quota has been exceeded for a
user. If it has, the user’s request for web access is blocked.
The URL Category Configuration settings, which are specified with the property, are the settings of the module that handles
volume quotas.
The rule set criteria specifies that the rule set applies when a user sends a request from a client with an IP address that is on the
blocking list for volume quotas related to IP addresses.
The rules in this rule set are the same as in the Volume Quota with URL Configuration rule set, except for the module settings
that appear in the rule criteria, which are IP Configuration.
Nested library rule set – Volume Quota With Authenticated User Configuration
The rule set criteria specifies that the rule set applies when a request is sent by a user whose user name is on the blocking list for
volume quotas related to user names.
The rules in this rule set are the same as in the Volume Quota with URL Configuration rule set, except for the module settings
that appear in the rule criteria, which are Authenticated User Configuration.
Nested library rule set – Volume Quota With Media Type Configuration
Criteria – MediaType.FromFileExtension at least one n list Media Type Blocklist for Volume Quota
The rule set criteria specifies that the rule set applies when a request is sent to access a web object belonging to a media type
that is on the blocking list for volume quotas related to media types.
The rules in this rule set are the same as in the Volume Quota with URL Configuration rule set, except for the module settings
that appear in the rule criteria, which are Media Type Configuration.
Criteria – Always
Criteria – Always
Skip caching URLs that are in Web Cache URL Bypass List
URL matches in list Web Cache URL Bypass List –> Stop Rule Set
The rule uses the URL property to check for requested URLs whether they are on the specified bypass list.
If they are, processing of the rule set stops. The rule that enables reading from the cache is then not processed.
The rule is always processed unless it is skipped because the bypassing rule placed before it in the rule set applies. It
enables the web cache, so objects stored in it can be read.
Write to Cache
This nested rule set enables the writing of web objects to the cache and forbids it for large objects, as well as for URLs and media
types on particular bypassing lists.
Criteria – Always
Cycles – Responses
Skip caching URLs that are in Web Cache URL Bypass List
URL matches in list Web Cache URL Bypass List –> Stop Rule Set
The rule uses the URL property to check for requested URLs whether they are on the specified bypass list.
If they are, processing of the rule set stops. The rule that enables reading from the cache is then not processed.
The web object is the one that is sent in response to a request to Web Gateway. Its size in bytes is submitted in the Content-
Length part of the header that is sent with the body of the object.
This part is configured as a parameter of the Header.Response.Get property, which lets the object size be retrieved as value of
this property. The StringToNumber property is used to convert the header part that contains the size in string format into a
numerical value.
If the number of bytes found in this way exceeds the number that is configured as the value of the operand, processing of
the rule set stops. The rule that enables reading from the cache is then not processed.
Skip caching media types that are in Web Cache Media Type Bypass List
URL matches in list Web Cache Media Type Bypass List –> Stop Rule Set
The rule uses the URL property to check for requested URLs whether they are on the specified bypass list.
If they are, processing of the rule set stops. The rule that enables reading from the cache is then not processed.
The rule is always processed unless it is skipped because the bypassing rule placed before it in the rule set applies. It
enables the web cache, so objects stored in it can be read.
System configuration
The following list is important for system configuration:
• List of open ports — Several network ports must be open on the firewall if one exists in a configuration to enable
communication between Web Gateway and update servers or databases outside the local network.
Policy configuration
The following lists are important for policy configuration:
• List of actions — Actions are configured in web security rules to protect your network against threats arising from the web.
• List of block reason IDs — Block reason IDs are configured in block messages to identify the reasons why user requests for
web access were blocked.
• List of error IDs — Error IDs are configured in the criteria of web security rules to identify errors when measures are taken for
handling them.
• List of events — Events are configured in web security rules to let activities happen in addition to the execution of rule actions.
• List of incident IDs — Incident IDs are configured in the criteria of web security rules to identify incidents when measures are
taken for handling them.
• List of operators — Operators are configured in the criteria of web security rules to create meaningful connections between
properties and their values on one side and operands on the other.
• List of properties — Properties are configured in the criteria of web security rules and evaluated in rule processing to
determine whether criteria matches and rules apply.
• List of statistics counters — Statistics counters are configured in the events of web security rules to record the execution of
rule actions.
Direction
Port Transport protocol Application protocol Destination Use Note
Inbound
22 TCP SSH Local Admin secure shell
Inbound
161 TCP/UDP SNMP Local SNMP
Inbound
1080 TCP SOCKS Local SOCKS proxy
Inbound
1344 TCP ICAP Local ICAP
Inbound
2000-20000 TCP FTP Local Passive FTP data From
connection FTP
client
to
Inbound
2121 TCP FTP Local FTP control port
Inbound
4005 TCP IFP Local IFP
Inbound
4711 TCP HTTP Local Admin interface Also
REST
if
enabled
Inbound
4712 TCP HTTPS Local Admin interface Also
REST
if
enabled
Inbound
4713 TCP HTTP Local File server
Inbound
4714 TCP HTTPS Local File server
Inbound
5050 TCP Yahoo Local Yahoo proxy
Inbound
5190 TCP ICQ Local ICQ proxy
Inbound
5222 TCP XMPP Local XMPP (Jabber) proxy
Inbound
9090 TCP HTTP Local HTTP(S) proxy
Inbound
9393 TCP HTTPS Local Intel Active System
Console
Inbound
16000-17000UDP Local SOCKS-UDP relay
Inbound
20001-40000TCP FTP Local Active FTP data connection From
FTP
server
to
Web
Gateway
Bidirectional
520 UDP RIP Your RIP routers IP routing
Bidirectional
12346 TCP Proprietray Your Web Gateway Web Gateway cluster
appliances communication
Bidirectional IP Protocol 47 GRE Your Web Gateway WCCP and traffic tunneling
appliances and WCCP between Web Gateway
routers cluster nodes
Outbound
21 TCP FTP Arbitrary FTP servers File transfer protocol Active
and
passive
Outbound
25 TCP SMTP Your email server Email notifications
Outbound
53 TCP/UDP DNS Your DNS server Domain name system
Outbound
80 TCP HTTP appliance1.webwasher.com System update
appliance2.webwasher.com
Outbound
80, TCP HTTP(S) Arbitrary HTTP(S) servers User HTTP(S) traffic Other
443 ports
depending
on
configuratio
Outbound
80, TCP HTTP(S) Update servers Centralized Updater
443 (tau.mcafee.com, tau-
europe.mcafee.com, tau-
usa.mcafee.com, tau-
usa1.mcafee.com, tau-
usa2.mcafee.com, tau-
asia.mcafee.com, mwg-
update.mcafee.com)
CRL download servers,
OCSP requests, telemetry
Outbound
80, TCP HTTP(S) Your customer- Subscribed Lists Manager
443 maintained subscribed
lists servers
Outbound
80, TCP HTTP(S) Your scheduled-job Scheduled Job Manager
443 servers (upload,
download)
Outbound
123 TCP/UDP NTP Your NTP servers, Time synchronization
ntp.webwasher.com
Outbound
162 TCP/UDP SNMP Your SNMP trap sink SNMP traps
Outbound
389 TCP LDAP Your directory servers Directory service and
Active Directory
Outbound
443 TCP HTTPS tunnel.web.trustedsource.org
GTI cloud lookups
(default, can be (reputation, categories,
configured) geolocation, file
reputation)
Outbound
443 TCP HTTPS tunnel.web.trustedsource.org
GTI telemetry (Malicious
(default, can be URL feedback)
configured)
Outbound
514 TCP/UDP Syslog Your syslog servers Syslog
Outbound
636 TCP LDAP Your directory servers Secure directory and
Active Directory
Outbound
1344 TCP ICAP Your ICAP servers ICAP
Outbound
2020 TCP FTP Local Active FTP data connection From
(Source) Web
GatewayG
to
FTP
client
Outbound
8883 TCP DXL Connection to the DXL Communication between
broker Web Gateway and DXL
broker installed on ePO
Outbound
9111 TCP HTTP Pushing logs from Web
Gateway to CSR
Outbound
9112 TCP HTTPS Pushing logs from Web
Gateway to CSR
Outbound
9121 FTP Pushing logs from Web
Gateway to CSR
Outbound
Your TCP HTTP Your parent proxies HTTP proxy For
proxy user
ports traffic
and
various
internal
connection
(AV
update),
configured
individually
List of actions
The following table provides a list of the actions you can use in rules.
List of actions
Action Description
Stop Rule Set Stops processing the rules of the current rule set.
Continues processing with the next rule set.
0 Allowed
1 Internal error
161 Blocked due to web access not being allowed by Web Hybrid
201 Blocked due to the time quota session of a user having been
exceeded
202 Blocked due to the time quota for a user having been
exceeded
204 Blocked due to the volume quota for a user having been
exceeded
10057 ZombieRuleElemIsExecuted $rule$ (name: '$name$', id: '$id$') could not be executed because
it is a zombie. Reason: '$reason$'.
12001 CannotOpenFile Cannot open file '$name$' in mode '$mode$' with errno '$errno$'.
14001 AVScanFailedFull Cannot call McAfee Gateway Anti-Malware engine. All connections
in use.
15002 TSBinaryNotProperlyLoaded Binary could not be loaded from '$path$'. In function $func$.
15004 TSBinaryDoesNotExist Global Threat Intelligence system library is not yet available. In
function $func$.
15007 TSInsufficientSpace Insufficient space in buffer for Global Threat Intelligence system.
In function $func$.
15008 TSNetLookup Global Threat Intelligence system net error (code: TS_NET_ERROR).
In function $func$.
15009 TSCommonNetLookup Global Threat Intelligence system net error (code: $errorCode$). In
function $func$.
15010 TSPipe Cannot open Global Threat Intelligence system pipe. In function
$func$.
16002 ICAPBadResponse ICAP client filter error: ICAP server sent bad response.
16003 ICAPMaxConnectionLimit ICAP client filter error: Maximum number of connections reached.
16004 ICAPCannotConnectToServer ICAP client filter error: Cannot connect to ICAP server.
16005 ICAPCommunicationFailure ICAP client filter error: Failure in communication with ICAP server.
16006 ICAPSCertVerifyFailure SSL certificate verification failure with ICAP server: $server IP$
20001 CheckSizeOfConnection The maximum amount of data that can be sent on a long-running
connection has been exceeded.
25000 Unknown error happened An uncategorized error was encountered by the External Lists
module.
25001 Error during data fetch An uncategorized error was encountered by the External Lists
module during the data fetch.
25002 Error during data conversion An error occurred while external list data was converted.
25003 Too much data The configured limit for the number of list entries that can be
retrieved from an external source has been exceeded.
25004 Timeout during data fetch The configured timeout for retrieving external list data has
expired.
25005 Data access denied The rights required for accessing a source of external list data
have not been granted to the appliance.
25006 No such resource A source of external list data, for example, a file or web server,
could not be found.
26001 DLP engine not loaded The DLP engine could not be loaded.
27001 AppRisk database not available The AppRisk database is not available for filtering web traffic.
32002 Empty password is not allowed An empty password was submitted, for example, when passwords
were retrieved from an external data source.
32003 Invalid configuration for filter The settings of the module for encryption and decryption are
invalid. This error occurs very rarely. It could be caused by a
general issue with policy configuration on Web Gateway.
32004 Encryption failed: Unknown content type Data could not be encrypted because it was of an unknown type.
This could be caused by an invalid description for a cloud storage
service.
32005 Encryption failed: Parsing of message body The data sent in the body of an upload request is in multi-part/
failed form data format. Parsing this type of data, which is required for
encryption, is not supported on Web Gateway.
32006 Encryption failed: Fetching of file name The name of a file containing data that should be encrypted could
failed not be fetched.
32007 Encryption failed: Cipher NNNN is not The cipher that is provided for encrypting data is invalid. This is
supported very unlikely to happen, as the administrator selects the
encryption cipher from a pre-configured list.
32008 Encryption failed: Generation of salt failed The process of salt generation, which is required for encrypting
data, could not be performed successfully. This is usually caused
by an internal OpenSSL error.
32009 Encryption failed: Fetching of key failed The key that is required for encrypting data could not be fetched.
32010 Encryption failed: Initialization of The encryption process could not be initialized.
encryption failed
32011 Encryption failed: Data encryption failed An error occurred during the encryption process.
32012 Encryption failed: Finalization of decryption The encryption process could not be completed.
failed
32014 Decryption failed: Unknown content type Data could not be decrypted because it was of an unknown type.
This could be caused by an invalid description for a cloud storage
service.
32015 Decryption failed: Multi-part message body A cloud storage service sent data in the body of its response to a
is not supported download request that is in multi-part/form data format.
Decrypting this type of data is not supported on Web Gateway.
32016 Decryption failed: Cipher NNNN is not The cipher that is provided for decrypting data is invalid. This is
supported very unlikely to happen, as the administrator selects the
decryption cipher from a pre-configured list.
32017 Decryption failed: Fetching of key failed The key that is required for decrypting data could not be fetched.
32018 Decryption failed: Initialization of The decryption process could not be initialized.
decryption failed
32019 Decryption failed: Data decryption failed An error occurred during the decryption process.
32020 Decryption failed: Finalization of The decryption process could not be completed.
decryption failed
34000 Generic SSO filter error An error happened during the single sign-on process. Reason:
'General error...'
34001 Generic SSO filter error A user tried to get single sign-on access using a non-existing cloud
connector. Reason: 'No such connector'
34003 Generic SSO filter error No cloud connector was configured for the single sign-on process.
Reason: 'There is no connector catalog'
34004 SSO service mismatch error The value for a token did not match the value that was stored in a
cloud connector: Service mismatch. Token ID: '$tokenid$', Service
ID: '$serviceid$'
34005 SSO service not enabled A cloud application was not available for a user: Realm: '$realm$',
user: '$userid$', service ID: '$serviceid$'.
34006 SSO non-inline mode error A cloud application was not available in the non-proxy (non-inline)
mode of the single sign-on process: Service ID: '$serviceid$
34050 Credential store generic error See the error log for details.
34051 Credential store generic error This request is not allowed for current user.
34052 Credential store generic error The credential store request could not be created.
34060 Credential store server HTTP error The credential store server responded to a request with an HTTP
error. See the error log for details.
34070 Credential store server error The credential store server responded with an error. See the error
log for details. The log includes the error code returned by the
credential store server.
34080 Credential store connection error A credential store request failed because of a connection error.
See the error log for details.
34090 Credential store request error An internal error occurred while a credential store request was
performed. See the error log for details.
37002 Generic application filtering error A generic error occurred in application filtering. See the error log
for details.
List of events
The following table provides a list of the events you can use in rules.
List of events
Authentication.ClearMethodList
Clears the authentication methods list.
Authentication.ClearNTMLCache
Clears the NTML cache.
Authentication.GenerateICEResponse
Generates a token that is sent in response to McAfee
Cloud Identity Manager to enable seamless
authentication.
Bandwidth.FromClient Limits the speed of data transfer from a client to the String: Name of bandwidth class
appliance.
Bandwidth.FromServer Limits the speed of data transfer from a web server to String: Name of bandwidth class
the appliance.
Bandwidth.ToClient Limits the speed of data transfer from the appliance to String: Name of bandwidth class
a client.
Bandwidth.ToServer Limits the speed of data transfer from the appliance to String: Name of bandwidth class
a web server.
Body.ToFile Writes the body of the request or response that is String: Name of the file that the body is
currently processed to the specified file. written to
The file is stored in the directory /opt/mwg/log/debug/
BodyFilterDumps.
The body is written to the file only after it has been
completely loaded, even if the Body.ToFile event
occurred when only one or more chunks of the body
had been loaded.
To prevent the stored files from filling up the hard disk
of an appliance, enable their auto-deletion on the user
interface under Configuration → <appliance> → Log File
Manager → Advanced.
DSCP.Mark.Request Sets an IP address header field. Number: Value of the header field
This field is the DSCP header field. Setting this header
is also known as flagging.
The header can be evaluated by network devices
supporting DSCP (Differentiated Services Code Point)
for directing data packets sent from Web Gateway to a
requested web server.
Load balancing can, for example, be performed this
way.
The header can only be set for requests that are sent
over an HTTP or HTTPS connection.
Setting the header also works for tunneled SSL
connections. It can be set here immediately after the
CONNECT part of the process has completed.
The value that the header is set to can be a number
ranging from 0 to 63.
Note:
When using this header in configuring Web Gateway
and connected network devices, be sure not to impact
existing routes or connections.
When multiple requests are sent to a web server over
the same connection, a header value that is set at any
point within the processing cycle, for example, after
the CONNECT or CERTVERIFY part of this cycle, will be
used for directing the data packets of all following
requests.
So, when using the header, for example, in a rule for
handling streaming media, setting the header
inappropriately might lead to directing data packets in
a way that throttles the connection.
DSCP.Mark.Response Sets an IP address header field. Number: Value of the header field
This field is the DSCP header field. Setting this header
is also known as flagging.
The header can be evaluated by network devices
supporting DSCP (Differentiated Services Code Point)
Enable FTP Upload Progress Enables the sending of responses to an FTP client,
Indication stating that processing of a file that has been sent for
uploading to the web is still in progress.
This is intended to prevent a timeout on the FTP client
when processing on Web Gateway takes more time,
for example, due to scanning the file that should be
uploaded for infections by viruses and other malware.
Enable Media Stream Enables the Media Stream Scanner, which is provided
Scanner by the McAfee Gateway Anti-Malware engine.
Enable Outbound Source IP Enables the replacement of different outbound source List of string: List of IP addresses for
Override IP addresses by a single IP address. replacing other IP addresses in string
format
Enable RuleEngine Tracing Enables tracing of the activities that are completed by
the rule processing module (rule engine).
Enable SSL Client Context Enables sending of client certificates not issued by a
without CA certificate authority.
FileSystemLogging.WriteDebugEntry
Writes a debugging entry.
1. String: Debugging entry
2. Boolean: If true, entry is written to
stdout.
FileSystemLogging.WriteLogEntry
Writes an entry into a log. String: Log entry
HTMLElement.RemoveAttribute
Removes an attribute from an HTML element. String: Attribute name
HTMLElement.SetAttributeValue
Sets an attribute to a value.
1. String: Attribute name
2. String: Value to set attribute to
Header.Block.RemoveAll Removes all block headers with a given name from a String: Header name
request or response.
Header.ICAP.Response.AddMultiple
Adds a header with a list of values to an ICAP
response. 1. String: Header name
2. List of string: List of header values
Header.ICAP.Response.RemoveAll
Removes all headers with a given name from an ICAP String: Header name
response.
Header.RemoveAll Removes all headers with a given name from a String: Header name
request or response.
HTTP.GenerateResponse Generates a response to the request made in the String: Response body
request cycle.
HTTP.SetStatus Sets the HTTP status code at the end of the response Number: HTTP status code
cycle.
MediaType.Header.FixContentType
Replaces a media type header with an appropriate
header when it is found after inspection of the media
Notice Writes an entry with notice level into syslog. String: Log entry
PDStorage.AddGlobalData.Bool
Adds global variable of type Boolean.
1. String: Variable key
2. Boolean: Variable value
PDStorage.AddGlobalData.Category
Adds global variable of type Category.
1. String: Variable key
2. Category: Variable value
PDStorage.AddGlobalData.Dimension
Adds global variable of type Dimension.
1. String: Variable key
2. Dimension: Variable value
PDStorage.AddGlobalData.IPRange
Adds global variable of type IPRange.
1. String: Variable key
2. IPRange: Variable value
PDStorage.AddGlobalData.List.Category
Adds global variable of type List of Category.
1. String: Variable key
2. List of Category: Variable value
PDStorage.AddGlobalData.List.Hex
Adds global variable of type List of Hex.
1. String: Variable key
2. List of Hex: Variable value
PDStorage.AddGlobalData.List.MediaType
Adds global variable of type List of MediaType.
1. String: Variable key
2. List of MediaType: Variable value
PDStorage.AddUserData.List.IPRange
Adds user variable of type List of IPRange.
1. String: Variable key
2. List of IPRange: Variable value
PDStorage.AddUserData.List.MediaType
Adds user variable of type List of MediaType.
1. String: Variable key
2. List of MediaType: Variable value
PDStorage.AddUserData.List.Number
Adds user variable of type List of Number.
1. String: Variable key
2. List of Number: Variable value
PDStorage.AddUserData.List.String
Adds user variable of type List of String.
1. String: Variable key
2. List of String: Variable value
PDStorage.AddUserData.List.Wildcard
Adds user variable of type List of Wildcard Expression.
1. String: Variable key
2. List of Wildcard Expression: Variable
value
PDStorage.AddUserData.MediaType
Adds user variable of type MediaType.
1. String: Variable key
2. MediaType: Variable value
PDStorage.AddUserData.Number
Adds user variable of type Number.
1. String: Variable key
2. Number: Variable value
PDStorage.AddUserData.Wildcard
Adds user variable of type Wildcard Expression.
1. String: Variable key
2. Wildcard Expression: Variable value
PDStorage.DeleteGlobalData Deletes all permanently stored global variables of a String: Variable key
given type.
PDStorage.DeleteUserData Deletes all permanently stored user variables of a String: Variable key
given type.
ProtocolDetector.ApplyFiltering
Applies processing of web filtering rules on web traffic
that has been found to follow a protocol that is
supported on Web Gateway.
Stopwatch.Reset Sets an internal watch that measures processingtime String: Rule set name
for rule sets to zero.
Stopwatch.Start Starts an internal watch that measures processing String: Rule set name
time for rule sets.
Stopwatch.Stop Stops an internal watch that measures processing String: Rule set name
time for rule sets.
Throttle.Client Limits the speed (in Kbps) of data transfer from a Number: Speed limit
client to the appliance.
Throttle.Server Limits the speed (in Kbps) of data transfer from a web Number: Speed limit
server to the appliance.
TIE: Report File Reputation Sends a file reputation score to a TIE server. Number: File reputation score
20 RAID monitoring reported critical status or failure of one or more 1 Health Monitor 4 (or 3 for
hard disks. hard-disk
failure)
21 S.M.A.R.T health check reported an error on an HDD hard disk. 1 Health Monitor 4
26 A check has been executed to detect a BBU RAID error. The checking 1 Health Monitor 4
interval is 30 minutes.
201 The appliance has successfully completed all FIPS 140-2 self-tests. 2 Core 6
211 The maximum number of entries in dashboard report x has been 2 Statistics 4
exceeded.
301 Download of update files was stopped because there is not enough 3 Updater 3
disk space.
305 The update module could not connect to an update server. 3 Updater 3
500 The log manager experienced an unrecoverable internal error and 5 Log File Manager 2
will terminate.
501 Log File Manager failed to push log files. 5 Log File Manager 3
600 A yum update contained packages that require a restart of the 6 mwg-update 4
appliance to become effective.
621 A major distribution upgrade is in progress. The appliance will restart 6 mwg-dist-upgrade 4
automatically.
622 A major distribution upgrade failed. Check the upgrade log file. 6 mwg-dist-upgrade 3
666 A FIPS 140-2 self-test failed on node y. The node is running in non- 1 FIPS 0
FIPS mode.
700 The number of concurrent connections has exceeded the configured 2 Proxy 2
overload limit. The appliance has entered overload status. Requests
sent to the appliance are accepted with delay.
701 The appliance is in overload status for more than 30 seconds. 2 Proxy 2
Requests sent to the appliance are accepted with delay.
702 The appliance has left overload status. Requests sent to the appliance 2 Proxy 4
are again accepted without delay.
703 The number of concurrent connections has exceeded the configured 2 Proxy 4
high-load limit. The appliance has entered high-load status. Requests
sent to the appliance are accepted with a delay.
704 The appliance is in high-load status for more than 30 seconds. 2 Proxy 4
Requests sent to the appliance are accepted with a delay.
710 A next-hop proxy server is down and will not be available for n 2 Proxy 4
seconds.
711 The appliance could not connect to a next-hop proxy server. 2 Proxy 4
712 A next-hop proxy server has moved back from error status to normal 2 Proxy 6
operation.
740 The number of concurrent connections has exceeded the overload 2 Proxy 2
limit that is configured for an IFP proxy. Overload status has been
entered. New requests are not processed.
741 Overload status lasts more than 30 seconds for an IFP proxy. New 2 Proxy 2
requests are not processed.
742 Overload status has been left for an IFP proxy. Requests are again 2 Proxy 4
accepted without delay.
743 The number of concurrent connections has exceeded the high-load 2 Proxy 4
limit that is configured for an IFP proxy. High-load status has been
entered. New requests are not processed.
744 High-load status lasts more than 30 seconds for an IFP proxy. New 2 Proxy 4
requests are not processed.
750 A key for the HSM Agent could not be loaded due to an error on the 2 Proxy 2
appliance side.
751 A key for the HSM Agent could not be loaded due to an error on the 2 Proxy 2
agent side.
752 The ID of a key for an HSM Agent could not be retrieved due to an 2 Proxy 2
error on the appliance side.
753 The ID of a key for an HSM Agent could not be retrieved due to an 2 Proxy 2
error on the agent side.
761 WCCP could not start send and listerner threads. 2 Proxy 2
762 WCCP could not resolve the router address <host> 2 Proxy 3
763 WCCP could not join the multicast group <host> 2 Proxy 3
764 An error occurred when reading WCCP sockets or writing to them. 2 Proxy 3
766 WCCP message parsing failed and malformed packets were created. 2 Proxy 3
850 An update of the MGAM module for virus and malware filtering was 2 Anti-Malware Filter 6
successfully completed.
851 An update of the MGAM module for virus and malware filtering 2 Anti-Malware Filter 3
failed.
852 Download or verification of the update files for the MGAM module 2 Anti-Malware Filter 3
failed.
853 The version of the MGAM module for virus and malware filtering is up 2 Anti-Malware Filter 6
to date.
854 An update of the Avira module for virus and malware filtering was 2 Anti-Malware Filter 6
successfully completed.
855 An update of the Avira module for virus and malware filtering failed. 2 Anti-Malware Filter 3
856 Download or verification of the update files for the Avira module 2 Anti-Malware Filter 3
failed.
857 The version of the Avira module for virus and malware filtering is up 2 Anti-Malware Filter 6
to date.
902 The appliance could not connect to n servers for NTML 2 NTLM 4
authentication in Windows domain x. Authentication Filter
903 The appliance could not contact Windows domain x for NTLM 2 NTLM 3
authentication. Authentication Filter
910 The appliance is connected to the LDAP server with configuration ID 2 LDAP 6
n. Authentication Filter
912 The appliance was disconnected from the LDAP server with 2 LDAP 4
configuration ID n. Authentication Filter
913 The appliance could not connect to any LDAP server with 2 LDAP 3
configuration ID n. Authentication Filter
920 A response has been received from RADIUS server x after attempting 2 RADIUS 6
to start communication to retrieve information for authenticating Authentication Filter
users.
921 A response has again been received from RADIUS server x after 2 RADIUS 6
communication had been interrupted. Authentication Filter
932 The appliance has been disconnected from NTLM-Agent server x. 2 NTLM-Agent 3
Authentication Filter
1050 An update of the URL Filter module was successfully completed. 2 URL Filter 6
1052 Download or verification of update files for the URL Filter module 2 URL Filter 3
failed.
1650 An updated Certificate Revocation List was downloaded and loaded 2 Certificate Chain 6
successfully. Filter
1651 An updated Certificate Revocation List was downloaded, but could 2 Certificate Chain 4
not be loaded. Filter
1652 An updated Certificate Revocation List could not be downloaded. 2 Certificate Chain 3
Filter
1700 An admin user logged on successfully to the user interface. 7 User interface 4
1701 Logon of an admin user to the user interface failed. 7 User interface 3
1702 The IP address of a client that an end user sent a request from 7 User interface 4
changed.
1703 An admin user logged off successfully from the user interface. 7 User interface 6
1704 A logoff from the user interface was forced upon an admin user after 7 User interface 6
a restart of an appliance, a timeout, or a similar incident had
occurred.
1800 The number of entries that can be retrieved from an external list has 2 External Lists Filter 4
exceeded the configured limit.
1801 The amount of data of entries that can be retrieved from an external 2 External Lists Filter 4
list has exceeded the configured limit.
1802 An error occurred when data was retrieved from an external list. 2 External Lists Filter 4
1803 An error occurred when data that had been retrieved from an 2 External Lists Filter 4
external list was converted.
1804 A time-out occurred when data was retrieved from an external list. 2 External Lists Filter 4
1805 Permission to retrieve data from an external list was denied. 2 External Lists Filter 4
1806 A resource for retrieving external list data could not be found. 2 External Lists Filter 4
1850 An update of the database for application filtering was successfully 2 Application Control 6
completed.
1851 An update of the database for application filtering failed. 2 Application Control 3
1852 A download of the database for application filtering failed. 2 Application Control 3
1853 Status of the database for application filtering is up to date. 2 Application Control 6
1854 Loading the database for application filtering failed. 2 Application Control 3
1855 Loading the database for application filtering was successfully 2 Application Control 6
completed.
1950 An update of the Data Loss Prevention (DLP) module was successfully 2 Data Loss 6
completed. Prevention
1951 An update of the Data Loss Prevention (DLP) module failed. 2 Data Loss 3
Prevention
1952 Download or verification of the update files for the Data Loss 2 Data Loss 3
Prevention (DLP) module failed. Prevention
1953 Status of the Data Loss Prevention (DLP) is up to date. 2 Data Loss 6
Prevention
2001 An error occurred with the Stream Detector module. 2 Stream Detector 2
2101 The database for media type filtering could not be loaded. 2 Media Type Filter 2
2200 An update of the Dynamic Content Classifier was successfully 2 Dynamic Content 6
completed. Classifier
2202 A download or verification of the update files for the Dynamic 2 Dynamic Content 3
Content Classifier failed. Classifier
2350 An update of the files for the single sign-on process was successfully 3 Single Sign On 6
completed. Service
2351 An update of the files for the single sign-on process failed. 3 Single Sign On 3
Service
2352 A download or verification of the updated files for the single sign-on 3 Single Sign On 3
process failed. Service
2353 Status oft he files for the single sign-on process are up to date. 3 Single Sign On
Service
2800 The Update Certificate Authorities (CAs) are up to date. 2 Update CA plugin 6
2801 A download of the Update Certificate Authorities (CAs) failed. 2 Update CA plugin 3
2802 The Update Certificate Authorities (CAs) were succesfully updated. 2 Update CA plugin 6
2803 An update of the Update Certificate Authorities (CAs) failed. 2 Update CA plugin 3
3001 After incident 3000 occurred, all nodes in a Central Management 3 Central 6
configuration are again in synchronized status (with regard to storage Management
and configuration).
3005 At least one node in a Central Management configuration did not 3 Central 3
respond properly after shared data had been sent out. Management
The number of nodes not properly responding changes.
This incident is only recorded on the root node and only if the shared
data was intended for all nodes.
3006 After incident 3004 occurred, all nodes in a Central Management 3 Central 6
configuration responded properly again to the sending of shared Management
data.
3200 Sending lists to McAfee Web Gateway Cloud Service was successfully 3 Web Hybrid 6
completed.
3201 Sending lists to McAfee Web Gateway Cloud Service failed. 3 Web Hybrid 3
3205 Lists were successfully downloaded from McAfee Web Gateway Cloud 3 Web Hybrid 6
Service and stored.
3206 Lists could not be downloaded from McAfee Web Gateway Cloud 3 Web Hybrid 3
Service and stored.
3211 An error occurred with the API for McAfee Web Gateway Cloud 3 Web Hybrid 3
Service, for example, a mismatch of the API version.
3250 Status of synchronization with McAfee Web Gateway Cloud Service is 3 Web Hybrid 6
OK.
3300 The list for Web Service Access is not available for an unknown 2 Web Hybrid 2
reason.
3301 The list for Web Service Access does not exist. 2 Web Hybrid 2
3302 The settings for Web Service Access are not available for an unknown 2 Web Hybrid 2
reason.
3303 The settings for Web Service Access do not exist. 2 Web Hybrid 2
3400 A policy could not be synchronized to McAfee Web Gateway Cloud 8 SaaS Connector 3
Service.
3500 The Protocol Detector rule set could not be found and loaded. 2 Protocol Detector 2
Filter
3501 The Protocol Detector rule set was broken or corrupt and could not 2 Protocol Detector 2
be loaded. Filter
List of operators
Operator Description
all in list All values of the property must be entries in the list of the
operand.
Note: This operator is for use with values of the string type
only.
Example:
URL.Categories<Default> all in list Category Blocklist
The criteria matches if, for example, the values of
URL.Categories are Entertainment, Media Downloads, and Streaming
Media, and all of them are entries in the list Category Blocklist.
at least one in list One of the values of the property must be an entry in the list
of the operand.
Note: This operator is for use with values of the string type
only.
Example:
URL.Categories<Default> at least one in list Category Blocklist
The criteria matches if, for example, one of the values of
URL.Categories is Nudity and this is also an entry in the list Category
Blocklist.
contains The value of the operand must be a part of the value of the
property.
Note: This operator is for use with values of the string type
only. The string for the operand is submitted by typing it in a
suitable field of the user interface.
Example:
Authentication.UserGroups contains "Domain Users"
The criteria matches if the string "Domain Users" can be found in
the list of strings that are the values of Authentication.UserGroups.
does not contain The value of the operand must not be a part of the value of
the property.
Note: This operator is for use with values of the string type
only. The string for the operand is submitted by typing it in a
suitable field of the user interface.
Example:
Authentication.UserGroups does not contain "Domain Users"
The criteria matches if the string "Domain Users" cannot be
found in the list of strings that are the values of
Authentication.UserGroups.
does not equal The value of the property must not be the same as the value
of the operand.
does not match The value of the property must not be:
• the same as the value of the operand
• or: covered by the wildcard (regular or glob expression) that
is the value of the operand
Example:
URL.Host does not match *.mcafee.com
The criteria matches if the value of URL.Host is, for example,
www.cisco.com.
does not match in list The value of the property must not be:
• the same as one of the entries in the list of the operand
• or: covered by one of the wildcards (regular or glob
expressions) in the list of the operand
Example:
URL.Host matches in list URL.Whitelist
The criteria matches, for example, if the value of URL.Host is
www.mcafee.com, and this is not an entry in the list URL.Whitelist.
The criteria also matches if the value of URL.Host is
www.mcafee.com and no regular or glob expression that would
cover this value is found in the list URL.Whitelist.
equals The value of the property must be the same as the value of
the operand.
Example:
Antimalware.Infected<Gateway Anti-Malware> equals true
The criteria matches if the value of Antimalware.Infected is true.
Or:
Cycle.TopName equals "Request"
The criteria matches if the value of Cycle.TopName is "Request".
Note: Wildcards are not allowed as operands when this
operator is used. Even using a blank at the beginning or end
of an operand will prevent this operator from working
properly.
greater than The value of the property must be above the value of the
operand.
Example:
Body.Size greater than 20000000
The criteria matches if the value of Body.Size is, for example,
20000001 bytes.
greater than or equals The value of the property must be above or the same as the
value of the operand.
Example:
Body.Size greater than or equals 20000000
The criteria matches if the value of Body.Size is, for example,
20000001 or 20000000 bytes.
is in list The value of the property must be an entry in the list of the
operand.
Note: This operator is for use with values of the string type
only.
Example:
Client.IP is in list Allowed Clients
The criteria matches if, for example, the client IP address is
181.153.30.0 and this is an entry in the list Allowed Clients.
is in range list The value of the property must be within one of the ranges of
values that are entries in the list of the operand.
Note: This operator is for use with values of the string type
only.
Example:
Client.IP is in range list Anti-Malware Quarantine IPRange
The criteria matches if, for example, the client IP address is
207.183.100.0 and this value can be found within one of the
ranges of values in the list Anti-Malware Quarantine IPRange.
is not in list The value of the property must not be an entry in the list of
the operand.
Note: This operator is for use with values of the string type
only.
Example:
Client.IP is not in list Allowed Clients
The criteria matches if, for example, the client IP address is
174.199.0.0 and this is not an entry in the list Allowed Clients.
is not in range list The value of the property must not be within one of the
ranges of values that are entries in the list of the operand.
Note: This operator is for use with values of the string type
only.
Example:
Client.IP is not in range list Anti-Malware Quarantine IPRange
The criteria matches if, for example, the client IP address is
207.183.100.0 and this value is not found within any of the
ranges of values in the list Anti-Malware Quarantine IPRange.
less than The value of the property must be below the value of the
operand.
Example:
Body.Size less than 20000000
The criteria matches if the value of Body.Size is, for example,
19999999 bytes.
less than or equals The value of the property must be below or the same as the
value of the operand.
Example:
Body.Size less than or equals 20000000
The criteria matches if the value of Body.Size is, for example,
19999999 or 20000000 bytes.
none in list None of the values of the property must be entries in the list
of the operand.
Note: This operator is for use with values of the string type
only.
Example:
URL.Categories<Default> none in list Category Blocklist
The criteria matches if, for example, the values of
URL.Categories are Entertainment, Media Downloads, and Streaming
Media, and none of them can be found in the list Category
Blocklist.
List of properties
The following tables provides a list of the properties you can use in rules.
Order of properties
The properties are listed in alphabetical order. However, the listing takes into consideration the parts of the property names.
Name parts begin with a capital letter, in many cases they are also separated by periods.
For example, Body.HasMimeHeaderParameter is listed before Body.Hash.
Note: There are no properties with names that begin with K, O, V, X, Y, or Z.
Properties in context
You can easily find out about the rules and rule sets that use a property.
1. On the user interface, click Search, and under Search for objects referring to, select Property and the property you are interested in.
The rules that use the property are shown. For example, for Antimalware.Infected, the rule Block if virus was found is shown.
2. Select a rule and click Show in context.
The rule and the property are shown within in its rule set. For example, the rule for Antimalware.Infected is shown within the
Gateway Anti-Malware rule set.
Properties - A
The following table describes the properties that have names beginning with A.
Properties – A
Action.Names List of String List with names of the actions that were performed
when processing a request, including the response
received upon the request
Antimalware.Avira.VersionString String Version of the Avira engine that was used to perform
a scanning job
Antimalware.MATD.Hash String Hash value used to identify a file that was received
from a web server in response to a download request
and scanned by Advanced Threat Defense.
Antimalware.MATD.InitBackgroundScan
Boolean If true, data for the current transaction is recorded, Number:
including data that is related to a request for web Maximum
access and the response from the web server. number of
Antimalware.VirusNames List of String List with names of the viruses that a web object has
been found to be infected with
AnyText.Language String Name of the language that a given text is written in String: Text to
The languages are identified according to ISO-639-1. find language
name for
Authentication.FailureReason.Message
String Message text explaining the reason why
authentication has failed for a user
Authentication.GetAzureUserGroups List of String List of user groups that the authentication process is String: User
applied to, which is retrieved from an Azure AD. name
Note: This property is not SaaS-compatible. submitted by
Web Gateway
when
connecting to
an Azure AD
server
Authentication.GetUserGroups List of String List of user groups that the authentication process is
applied to
Note: This property is not SaaS-compatible.
Authentication.ICEToken.Audiences List List of audiences that are retrieved from an ICE token
Authentication.SAML.CreateAuthnRequest
see above HTTP POST Creates the SAML authentication request which is
form sent to the external Identity Provider and sets the
Authentication.SAML.IDPSSOEndpoint property to the
URL of the external Identity Provider.
Note: This property is not SaaS-compatible.
Authentication.SAML.ParseAuthnResponse
Authentication.SAML.RelayState String Stores the value of the ACS URL at the time that the
authentication server creates the SAML
authentication request. The authentication server
sends the RelayState parameter to the external
Identity Provider in the authentication request. The
Identity Provider returns the parameter unchanged in
the authentication response. The proxy can use the
value stored in the RelayState to construct the ACS
URL when the external Identity Provider does not
support dynamic URLs.
Note: This property is not SaaS-compatible.
Authentication.SOCKSKerberosProtectionLevel
see above Number Number representing the protection level that is used
when the SOCKS Kerberos authentication method is
configured
Authentication.UserGroups List of string List of user groups that the authentication process is
applied to
Properties - B
The following table describes the properties that have names beginning with B.
Properties – B
Body.ChangeHeaderMime Boolean If true, the header sent in MIME format with the body
of a web object has been changed.
Body.Equals Boolean If true, the body of a web object matches the pattern
specified by the property parameters. 1. Number:
Position of
byte where
pattern
begins
2. String:
Pattern
a. String
embedded
in double
quotes (“ ...”,
can also
contain hex
values
preceded by
\)
or:
Body.HasMimeHeader Boolean If true, the body of an extracted multi-part object sent String: Header
in MIME format has a specified header. name
Body.Hash String Hash value of the type specified by the property String: Hash
parameter for the body of a web object type
Hash types can be md5, sha1, sha256, sha512, and
others.
Body.HashSHA1 String Hash value of the SHA1 type for the body of a web
object
Body.IsAboveSizeLimit Boolean If true, the body of a web object is above a size limit.
Body.IsCompleteWithTimeout Boolean If true, the body of a web object has been completely Number: Time
sent to the appliance before the time (in milliseconds) allowed to
specified by the property parameter has elapsed. send object
completely)
Body.MimeHeaderValue String Value of a header in the body of a web object sent in String: Header
MIME format value
Body.NotEquals Boolean If false, the body of a web object matches the pattern
specified by the property parameters. 1. Number:
Position of
byte where
pattern
begins
2. String:
Pattern
a. String
embedded
in double
quotes (“ ...”,
can also
contain hex
values
preceded by
\)
or:
b. Sequence
of hex
values
Body.PositionOfPattern Number Position of the byte where the search for a pattern in
the body of a web object begins 1. String:
Returns -1 if the pattern is not found. Pattern to
search for
a. String
embedded
in double
quotes (“ ...”,
can also
contain hex
values
Body.UncompressedSize Number Size of the body of an archived web object (in bytes)
after having been extracted from the archive
Properties - C
The following table describes the properties that have names beginning with C.
Cache.AdditionalKey String Key that can be used in addition to the default key for
web caching
Cache.IsFresh Boolean If true, an object stored in the web cache has either
been downloaded from the web or has been verified.
Category.ToShortString String URL category converted into a string that is the Category:
category abbreviation Category to
convert
CloudEncryption.IsEncryptionSupported
Boolean If true, encryption can be performed for the data that
is uploaded to a cloud storage service with the
request that is currently processed.
The Cloud Storage Encryption module finds out whether
this is true by evaluating service description files for
cloud storage services and the settings that are
configured on Web Gateway, for example, the Cloud
CloudEncryption.IsDecryptionSupported
Boolean If true, decryption can be performed for the data that
is downloaded from a cloud storage service with the
request that is currently processed.
For the method of finding out whether this is true,
see the description of the
CloudEncryption.IsEncryptionSupported property.
Command.Categories List of String List of categories that a command belongs to, for
example, to the FTP command category
Connection.IPSec.Device String Name that you assign to the location of the IPsec
device on your network in the McAfee WGCS interface
Note: You can use this property when writing policy
rules for a hybrid deployment. For on-premise
deployments, this property retains its default value,
an empty string.
Connection.Protocol.Parent String The embedding protocol for the protocols that are
used in communication with the clients when Web
Gateway runs as a proxy under the SOCKS protocol.
This protocol is the SOCKS protocol, while various
protocols can be embedded, for example, HTTP or
HTTPS.
Connection.RunTime Number Time (in seconds) that a connection has been running
since it was opened until the current second
Connection.SSL.TransparentCNHandling
Boolean If true, communication on a connection is SSL-
secured and runs in transparent mode.
Connection.Socketmark Number Numerical value, which is the socket mark for the
socket of a connected client
Connection.Variables.GetStringValue String Object in string format, which is stored on Web String: Key to
Gateway as long as a given connection to a client identify stored
persists. string
The stored string can, for example, be the value of
another string-formatted property.
Connection.Variables.HasString Boolean If true, an object in string format is stored on Web String: Key to
Gateway as long as a given connection to a client identify stored
persists. string
The stored string can, for example, be the value of
another string-formatted property.
Properties - D
The following table describes the properties that have names beginning with D.
Properties – D
DateTime.Date.ToString String String representing current date (in the format String including
specified by the property parameters) the following
three parts:
1. %YYYY (for
the year)
or:
%YY (last
two digits)
or:
%Y (last two
digits, but
only one
digit if the
last two
digits begin
with 0, for
If no
parameter is
specified, the
format is:
%YYYY/
%MM /%DD
DateTime.GMTString.FromEpoch String String representing current time (in GMT format, Number:
converted from number of UNIX epoch seconds Current time in
specified by the property parameter) UNIX epoch
The property can be used with the seconds
DateTime.IsInRangeGMT property in a rule that checks
whether a time range has expired, for example, the
time range set for cookie expiration.
DateTime.ISOString.FromEpoch String String representing current time (in ISO format, Number:
converted from number of UNIX epoch seconds Current time in
specified by the property parameter) UNIX epoch
The property can be used with the seconds
DateTime.IsInRangeISO property in a rule that checks
whether a time range has expired, for example, the
time range set for cookie expiration.
DateTime.Time.ToString String String representing current time (in the format String including
specified by the property parameters) the following
three parts:
1. %h (for the
hour)
or:
%hh (with 0
inserted
before a
one-digit
hour)
2. %m (for the
minute)
or:
%mm
3. %s (for the
second)
or:
%ss
If no
parameter is
specified, the
format is:
%hh:%mm:%ss
DateTime.ToString String String representing current date and time (in the String including
format specified by the property parameters) the part of the
DateTime.Date.ToString
DLP.Classification.AnyText.Matched Boolean If true, a given text string is specified as sensitive or String: Text
inappropriate content by one or more entries in checked for
classification lists. being sensitive
or
inappropriate
DLP.Classification.AnyText.MatchedClassifications
see above List of String List of entries in classification lists that specify a given String: Text
text string as sensitive or inappropriate checked for
The list is filled when being sensitive
DLP.Classification.AnyText.Matched has been set to true. or
inappropriate
DLP.Classification.AnyText.MatchedTerms
see above List of String List of terms including a given text string that is String: Text
specified as sensitive or inappropriate by one or more checked for
entries in classification lists being sensitive
The list is filled when or
DLP.Classification.AnyText.Matched has been set to true. inappropriate
DLP.Classification.BodyText.MatchedClassifications
see above List of String List of entries in classification lists that specify the
sensitive or inappropriate content found in the body
text of requests or responses
The list is filled when
DLP.Classification.BodyText.Matched has been set to
true .
DLP.Classification.BodyText.MatchedTerms
see above List of String List of terms in request or response body text that are
sensitive or inappropriate content according to one
or more entries in classification lists.
The list is filled when
DLP.Classification.BodyText.Matched has been set to
true.
DLP.Dictionary.AnyText.Matched Boolean If true, a given text string is specified as sensitive or String: Text
inappropriate content on a dictionary list. checked for
being sensitive
or
inappropriate
DLP.Dictionary.AnyText.MatchedTerms
see above List of String List of terms including a given text string that is String: Text
specified as sensitive or inappropriate on a dictionary checked for
list being sensitive
The list is filled when DLP.Dictionary .AnyText.Matched or
has been set to true. inappropriate
DLP.Dictionary.BodyText.MatchedTerms
see above List of String List of the terms in request or response body text
that are sensitive or inappropriate content according
to the entries you made in a dictionary list
The list is filled when DLP.Dictionary.BodyText.Matched
has been set to true.
DNS.Lookup List of IP List of IP addresses found in a DNS lookup for a host String: Host
name name
DNS.Lookup.Reverse List of String List of host names found in a reverse DNS lookup for IP: IP address
an IP address
Properties - E
The following table describes the properties that have names beginning with E.
Properties – E
ExtLists.StringMap List of String List of strings representing map type pairs of keys as above
and values
Note: This property is not SaaS-compatible.
Properties - F
The following table describes the properties that have names beginning with F.
Properties – F
Properties - G
The following table describes the properties that have names beginning with G.
Properties – G
Properties - H
The following table describes the properties that have names beginning with H.
Properties – H
Header.Block.Get String First value found for a specified block header String: Header
name
Header.Block.GetMultiple List of String List of values found for a specified block header String: Header
name
Header.Get String First value found for the specified header in a request String: Header
or response that is processed on the appliance name
It depends on the current processing cycle whether it
is actually a request or response that contains the
header.
Header.GetMultiple List of String List of values found for a specified header in a String: Header
request or response that is processed on the name
appliance
It depends on the current processing cycle whether it
is actually a request or response that contains the
header.
Header.ICAP.Request.Get String First value found for a specified header in a request String: Header
sent in ICAP communication name
Note: This property is not SaaS-compatible.
Header.ICAP.Response.Get String First value found for a specified header in a response String: Header
received in ICAP communication name
Note: This property is not SaaS-compatible.
Header.Request.Get String First value found for a specified header in a request String: Header
name
Header.Request.GetMultiple List of String List of values found for a specified header in a String: Header
request name
Header.Response.Get String First value found for a specified header in a response String: Header
name
Header.Response.GetMultiple List of String List of values found for a specified header in a String: Header
response name
Hex.ToString String Hex value converted into a string Hex: Hex value
to convert
Properties - I
The following table describes the properties that have names beginning with I.
Properties – I
ICAP.ReqMod.ResponseHeader.ExistsMatching
Boolean If true, a response sent from an ICAP server in
REQMOD mode contains a specified header and 1. String:
matches a given wildcard expression. Header
name
Note: This property is not SaaS-compatible.
2. Wildcard
expression
ICAP.ReqMod.ResponseHeader.Get String First value found for a specified header in a REQMOD String: Header
response name
Note: This property is not SaaS-compatible.
ICAP.ReqMod.ResponseHeader.GetMatching
String First value found for a specified header in a REQMOD
response that also matches a given wildcard 1. String:
expression Header
name
Note: This property is not SaaS-compatible.
2. Wildcard
expression
ICAP.ReqMod.ResponseHeader.GetMultiple
List of String List of values found for a specified header in a String: Header
REQMOD response name
Note: This property is not SaaS-compatible.
ICAP.ReqMod.ResponseHeader.GetMultipleMatching
List of String List of values found for a specified header in a
REQMOD response that also match a given wildcard 1. String:
expression Header
name
Note: This property is not SaaS-compatible.
2. Wildcard
expression
ICAP.RespMod.EncapsulatedHTTPChanged
Boolean If true, an ICAP server has changed the HTTP state for
a response sent in RESPMOD mode.
Note: This property is not SaaS-compatible.
ICAP.RespMod.ResponseHeader.Exists
Boolean If true, a response sent from an ICAP server in String: Header
RESPMOD mode contains a specified header. name
Note: This property is not SaaS-compatible.
ICAP.RespMod.ResponseHeader.ExistsMatching
Boolean If true, a response sent from an ICAP server in
RESPMOD mode contains a specified header that also 1. String:
matches a given wildcard expression. Header
name
Note: This property is not SaaS-compatible.
2. Wildcard
expression
ICAP.RespMod.ResponseHeader.Get String First value found for a specified header in a String: Header
RESPMOD response name
Note: This property is not SaaS-compatible.
ICAP.RespMod.ResponseHeader.GetMatching
String First value found in a RESPMOD response for a
specified header that also matches a given wildcard 1. String:
expression Header
name
Note: This property is not SaaS-compatible.
2. Wildcard
expression
ICAP.RespMod.ResponseHeader.GetMultiple
List of String List of values found for a specified header in a String: Header
RESPMOD response name
Note: This property is not SaaS-compatible.
ICAP.RespMod.ResponseHeader.GetMultipleMatching
List of String List of values found in a RESPMOD response for a
specified header that also matches a given wildcard 1. String:
expression Header
name
Note: This property is not SaaS-compatible.
Properties - J
The following table describes the properties that have names beginning with J.
Properties – J
JSON.AsBool Boolean Value of specified JSON element returned as Boolean JSON: Element
value
Note: The element value must be a Boolean value.
JSON.AsNumber Number Value of specified JSON element returned as number JSON: Element
Note: The element value must be a number in Long,
Double, or Hexadecimal format.
JSON.AsString String Value of specified JSON element returned as string JSON: Element
Note: The element value must be a string.
JSON.FromBool JSON JSON element value created from Boolean value Boolean:
Boolean value
to create JSON
element value
from
JSON.FromNumberList String JSON element value created from number list List of Number:
Number list to
create JSON
element value
from
JSON.FromString JSON JSON element value created from string String: String to
create JSON
element value
from
JSON.FromStringList JSON JSON element value created from string list List of String:
String list to
create JSON
element value
from
JSON.ReadFromString JSON JSON element created from specified string String: String to
create element
from
JSON.Size Number Number of elements in specified JSON object or array JSON: Object or
array
JSON.ToString String JSON element value converted into a string JSON: Element
Note: The element value can be a string or in any of value to
the other data formats for element values. convert
Properties - L
The following table describes the properties that have names beginning with L.
Properties – L
List.LastMatches String String containing all elements that have been found
to match when two lists are compared using an
operator such as at least one in list or all in list
Matches are only added to the list as long it has not
yet been decided whether the relationship between
the lists that the operator evaluates exists or not.
For example, list A contains the elements 1, 2, 3,
whereas list B contains 1, 2, 4.
Both lists are compared using the at least one in list
operator.
To find out that list A actually contains at least one
element of list B, the operator only needs to compare
element 1 in both lists and detect that they match.
List.LastMatches then contains 1 because it has been
found to be a match.
2 is also a match in the two lists, but is not contained
in List.LastMatches because it was not evaluated by
the operator and found to be a match.
It was not evaluated because the operator had
already found out after evaluating the 1 in both lists
that at least one element of list A was also in list B.
If the property String.BelongsToDomains has "true" as
its value, the string that is specified as its first
parameter is set as the value of List.LastMatches.
This means List.LastMatches then provides a string
that matched in a list of domain names, being either
the name of a domain or a subdomain.
List.OfCategory.ByName List of Category List of URL categories (specified by its name) String: List
name
List.OfCategory.Erase List of Category List of URL categories with specified category erased
1. List of
Category:
List with
category to
erase
2. Number:
Position of
category to
erase
List.OfCategory.EraseList List of Category List of URL categories with categories that are also on
other list erased 1. List of
Category:
List with
categories
to erase
2. List of
Category:
List of
List.OfCategory.GetElementRange List of Category List of URL categories extracted from other list
1. List of
Category:
List with
categories
to extract
2. Number:
Position of
first
category to
extract
3. Number:
Position of
last category
to extract
List.OfCategory.Insert List of Category List of URL categories with specified category inserted
1. List of
Category:
List to insert
category in
List.OfCategory.Join List of Category List of URL categories created by joining two lists
1. List of
Category:
First list to
join
2. List of
Category:
Second list
to join
List.OfCategory.Reverse List of Category List of URL categories that has its original order List of
reverted Category: List
in original
order
List.OfCategory.Sort List of Category List of URL categories sorted in alphabetical order List of
Category: List
to sort
List.OfCategory.ToShortString String List of URL categories converted into a list of their List of
abbreviated name forms Category: List
to convert
List.OfDimension.Reverse List of List of dimensions that has its original order reverted List of
Dimension Dimension: List
in original
order
List.OfHex.Append List of Hex List of hex values that a hex value is appended to
1. List of Hex:
List to
append Hex
value to
2. Hex: Hex
value to
append
List.OfHex.ByName List of Hex List of hex values specified by its name String: List
name
List.OfHex.Erase List of Hex List of hex values with specified value erased
1. List of Hex:
List with hex
value to
erase
2. Number:
Position of
hex value to
erase
List.OfHex.EraseElementRange List of Hex List of hex values with specified range of values
erased 1. List of Hex:
List with hex
values to
erase
2. Number:
Position of
first hex
value to
erase
3. Number:
Position of
last hex
value to
erase
List.OfHex.EraseList List of Hex List of hex values with values that are also on other
list erased 1. List of Hex:
List with hex
values to
erase
2. List of Hex:
List of hex
values to
erase on
first list
List.OfHex.GetElementRange List of Hex List of hex values extracted from other list
1. List of Hex:
List with hex
values to
extract
List.OfHex.Insert List of Hex List of hex values with specified value inserted
1. List of Hex:
List to insert
hex value in
2. Hex: Hex
value to
insert
List.OfHex.IsEmpty Boolean If true, the specified list is empty. List of Hex: List
to check for
being empty
List.OfHex.Join List of Hex List of hex values created by joining two lists
1. List of Hex:
First list to
join
2. List of Hex:
Second list
to join
List.OfHex.Reverse List of Hex List of hex values that has its original order reverted List of Hex: List
in original
order
List.OfHex.Sort List of Hex List of sorted hex values List of Hex: List
to sort
List.OfHex.ToString String List of hex values converted into a string List of Hex: List
to convert
List.OfIP.IsEmpty Boolean If true, the specified list is empty. List of IP: List
to check for
being empty
List.OfIP.Reverse List of IP List of IP addresses that has its original order reverted List of IP: List in
original order
List.OfIP.ToString String List of IP addresses converted into a string List of IP: List
to convert
List.OfIPRange.ByName List of IPRange List of IP address ranges specified by its name String: List
name
List.OfIPRange.Erase List of IPRange List of IP address ranges with specified range erased
1. List of
IPRange: List
with IP
address
range to
erase
2. Number:
Position of
IP address
range to
erase
List.OfIPRange.EraseElementRange List of IPRange List of IP address ranges with specified ranges erased
1. List of
IPRange: List
with IP
address
ranges to
erase
2. Number:
Position of
first IP
address
range to
erase
3. Number:
Position of
List.OfIPRange.EraseList List of IPRange List of IP address ranges with ranges that are also on
other list erased 1. List of
IPRange: List
with IP
address
ranges to
erase
2. List of
IPRange: List
of IP
address
ranges to
erase on
first list
List.OfIPRange.GetElementRange List of IPRange List of IP address ranges extracted from other list
1. List of
IPRange: List
with IP
address
ranges to
extract
List.OfIPRange.Insert List of IPRange List of IP address ranges with specified range inserted
1. List of
IPRange: List
to insert IP
address
range in
2. IPRange: IP
address
range to
insert
List.OfIPRange.Join List of IPRange List of IP address ranges created by joining two lists
1. List of
IPRange:
First list to
join
2. List of
IPRange:
Second list
to join
List.OfIPRange.Reverse List of IPRange List of IP address rangess that has its original order List of IPRange:
reverted List in original
order
List.OfIPRange.ToString String List of IP address ranges converted into a string List of IPRange:
List to convert
List.OfMediaType.ByName List of List of media types specified by its name String: List
MediaType name
List.OfMediaType.EraseList List of List of media types with types that are also on other
MediaType list erased 1. List of
MediaType:
List with
media types
to erase
List.OfMediaType.Reverse List of List of media types that has its original order reverted List of
MediaType MediaType: List
in original
order
List.OfNumber.ByName List of Number List of numbers specified by its name String: List
name
List.OfNumber.EraseList List of Number List of numbers with numbers that are also on other
list erased 1. List of
Number:
List with
numbers to
erase
2. List of
Number:
List of
numbers to
erase on
first list
List.OfNumber.Reverse List of Number List of numbers that has its original order reverted List of Number:
List in original
order
List.OfSSOConnectors.ByName List of List of cloud connectors specified by its name String: List
SSOConnector name
List.OfSSOConnectors.EraseElementRange
List of List of cloud connectors with specified range of
SSOConnector connectors erased 1. List of
SSOConnector:
List with
range of
cloud
connectors
to erase
List.OfSSOConnectors.EraseList List of List of cloud connectors with connectors that are also
SSOConnector on other list erased 1. List of
SSOConnector:
List with
cloud
connectors
to erase
2. List of
SSOConnector:
List of cloud
connectors
to erase on
first list
List.OfSSOConnectors.Exists Boolean If true, the list of cloud connectors with the specified String: List
name exists. name
List.OfSSOConnectors.GetElementRange
List of List of cloud connectors extracted from other list
SSOConnector 1. List of
SSOConnector:
List with
cloud
connectors
to extract
2. Number:
Position of
first cloud
connector to
extract
3. Number:
Position of
last cloud
connector to
extract
List.OfSSOConnectors.Reverse List of List of cloud connectors that has its original order List of
SSOConnector reverted SSOConnector:
List in original
order
List.OfString.ByName List of String List of strings specified by its name String: List
name
List.OfString.EraseElementRange List of String List of strings with specified range of strings erased
1. List of
String: List
with strings
to erase
2. Number:
Position of
first string to
erase
3. Number:
Position of
last string to
erase
List.OfString.EraseList List of String List of strings with strings that are also on other list
erased 1. List of
String: List
with strings
to erase
2. List of
String: List
of strings to
erase on
first list
List.OfString.JSON.AsStringList List of String List of strings created from the element values of a JSON: Array
JSON array
If a value is null, an empty string is created.
List.OfString.Reverse List of String List of strings that has its original order reverted List of String:
List in original
order
List.OfString.Sort List of String List of strings sorted in alphabetical order List of String:
List to sort
List.OfWildcard.ByName List of Wildcard List of wildcard expressions specified by its name String: List
Expression name
List.OfWildcard.EraseList List of Wildcard List of wildcard expressions with expressions that are
Expression also on other list erased 1. List of
Wildcard
Expression:
List with
wildcard
expressions
to erase
2. List of
Wildcard
Expression:
List of
wildcard
expressions
to erase on
first list
List.OfWildcard.GetElementRange List of Wildcard List of wildcard expressions extracted from other list
Expression 1. List of
Wildcard
Expression:
List with
wildcard
expressions
to extract
2. Number:
Position of
first
wildcard
expression
to extract
3. Number:
Position of
last wildcard
expression
to extract
List.OfWildcard.Reverse List of Wildcard List of wildcard expressions that has its original order List of Wildcard
Expression reverted Expression: List
in original
order
List.OfWildcard.ToString String List of wildcard expressions converted into a string - List of Wildcard
Expression: List
to convert
Properties - M
The following table describes the properties that have names beginning with M.
Properties – M
Map.ByName List of Already existing Map Type list that has the specified String: List
MapType name name
Map.DeleteKey List of Map Type list, in which the specified key and the
MapType related value are deleted 1. List of
MapType:
Map Type
list
2. String: Key
Map.GetKeys List of List of keys that are contained in the specified Map List of
MapTYpe Type list MapType: Map
Type list
Map.GetStringValue String String that is the value for the specified key in the
specified Map Type list 1. List of
MapType:
Map Type
list
2. String: Key
Map.HasKey Boolean If true, the specified key exists in the specified Map
Type list 1. List of
MapType:
Map Type
list
2. String: Key
Map.SetStringValue List of Map Type list, in which the specified value is set for
MapType the specified key 1. List of
MapType:
Map Type
list
2. String: Key
Map.Size Number Number of key-value pairs in the specified Map Type List of
list MapType: Map
Type list
MediaType.EnsuredTypes List of List of media types that are ensured for the
MediaType respective media with a probability of more than 50%
MediaType.FromFileExtension List of List of media types that are found using the file name
MediaType extension of the media
MediaType.FromHeader List of List of media types that are found using the content-
MediaType type header sent with the media
MediaType.IsText Boolean If true, the media that is being processed is of the text
type.
MediaType.MagicBytesMismatch Boolean If true, the media type specified in the header sent
with the media does not match the type that was
found on the appliance by examining the magic bytes
actually contained in the media.
MediaType.NotEnsuredTypes List of List of media types that are ensured for the
MediaType respective media with a probability of less than 50%
Properties - N
The following table describes the properties that have names beginning with N.
Properties – N
Properties - P
The following table describes the properties that have names beginning with P.
Properties – P
PDStorage.GetAllData List of String List containing all permanently stored data in string
format
Note: This property is not SaaS-compatible.
PDStorage.GetAllGlobalData List of String List containing all permanently stored global data in
string format
Note: This property is not SaaS-compatible.
PDStorage.GetAllUserData List of String List containing all permanently stored user data in
string format
Note: This property is not SaaS-compatible.
PDStorage.GetGlobalData.List.Category
List of Category Global variable of type List of Category String: Variable
Note: This property is not SaaS-compatible. key
PDStorage.GetGlobalData.List.Dimension
List of Global variable of type List of Dimension String: Variable
Dimension Note: This property is not SaaS-compatible. key
PDStorage.GetGlobalData.List.Hex List of Hex Global variable of type List of Hex String: Variable
Note: This property is not SaaS-compatible. key
PDStorage.GetGlobalData.List.IPRange
List of IPRange Global variable of type List of IPRange String: Variable
Note: This property is not SaaS-compatible. key
PDStorage.GetGlobalData.List.MediaType
List of Global variable of type List of MediaType String: Variable
MediaType Note: This property is not SaaS-compatible. key
PDStorage.GetGlobalData.List.Number
List of Number Global variable of type List of Number String: Variable
Note: This property is not SaaS-compatible. key
PDStorage.GetGlobalData.List.String List of String Global variable of type List of String String: Variable
Note: This property is not SaaS-compatible. key
PDStorage.GetGlobalData.List.WildcardExpression
List of Wildcard Global variable of type List of WildcardExpression String: Variable
Expression Note: This property is not SaaS-compatible. key
PDStorage.GetGlobalData.WildcardExpression
Wildcard Global variable of type WildcardExpression String: Variable
Expression Note: This property is not SaaS-compatible. key
PDStorage.GetUserData.List.Dimension
List of User variable of type List of Dimension String: Variable
Dimension Note: This property is not SaaS-compatible. key
PDStorage.GetUserData.List.Hex List of Hex User variable of type List of Hex String: Variable
Note: This property is not SaaS-compatible. key
PDStorage.GetUserData.List.IPRange List of IPRange User variable of type List of IPRange String: Variable
Note: This property is not SaaS-compatible. key
PDStorage.GetUserData.List.MediaType
List of User variable of type List of MediaType String: Variable
MediaType Note: This property is not SaaS-compatible. key
PDStorage.GetUserData.List.Number List of Number User variable of type List of Number String: Variable
Note: This property is not SaaS-compatible. key
PDStorage.GetUserData.List.String List of String User variable of type List of String String: Variable
Note: This property is not SaaS-compatible. key
PDStorage.GetUserData.List.WildcardExpression
List of Wildcard User variable of type List of WildcardExpression String: Variable
Expression Note: This property is not SaaS-compatible. key
PDStorage.GetUserData.WildcardExpression
Wildcard User variable of type WildcardExpression String: Variable
Expression Note: This property is not SaaS-compatible. key
PDStorage.HasGlobalData Boolean If true, permanently stored global data is available. String: Variable
Note: This property is not SaaS-compatible. key
PDStorage.HasUserData Boolean If true, permanently stored user data is available. String: Variable
Note: This property is not SaaS-compatible. key
Proxy.Outbound.Port Number Number of source port that Web Gateway uses when
connecting to web servers or next-hop proxies
Properties - Q
The following table describes the properties that have names beginning with Q.
Properties – Q
Quota.AuthorizedOverride.IsActivationRequest
Boolean If true, an authorized user has chosen to continue
with a authorized override session after session time
has been exceeded.
Note: This property is not SaaS-compatible.
Quota.AuthorizedOverride.IsActivationRequest.Strict
Boolean If true, an authorized user has chosen to continue
with an Authorized Override session and the request
for continuing the session applies to the current
settings.
Note: This property is not SaaS-compatible.
Quota.AuthorizedOverride.JS.ActivateSession
String String in JavaScript code calling the function that is
executed when an authorized user chooses to start a
new session by clicking the appropriate button in the
authorized override template.
The code is provided when the template is created
and displayed to the user.
Note: This property is not SaaS-compatible.
Quota.AuthorizedOverride.LastAuthorizedPerson
String User name of the last person who performed an
authorized override to provide additional session
time for a user
Note: This property is not SaaS-compatible.
Quota.AuthorizedOverride.RemainingSession
Number Remaining time (in seconds) for an authorized
override session
Note: This property is not SaaS-compatible.
Quota.AuthorizedOverride.SessionExceeded
Boolean If true, the time allowed for an authorized override
session has been exceeded.
Note: This property is not SaaS-compatible.
Quota.AuthorizedOverride.SessionLength
Number Time length (in seconds) for an authorized override
session
Note: This property is not SaaS-compatible.
Quota.Coaching.IsActivationRequest.Strict
Boolean If true, a user has chosen to continue with a Coaching
session and the request for continuing the session
applies to the current settings.
Note: This property is not SaaS-compatible.
Quota.Coaching.SessionExceeded Boolean If true, the time allowed for a coaching session has
been exceeded.
Note: This property is not SaaS-compatible.
Quota.Time.IsActivationRequest Boolean If true, a user has chosen to continue with a new time
session after session time has been exceeded.
Note: This property is not SaaS-compatible.
Quota.Time.RemainingDay Number Time (in seconds) remaining from the configured time
quota for the current day
Note: This property is not SaaS-compatible.
Quota.Time.RemainingDay.ReducedAtActivation
Number Time (in seconds) remaining from the configured time
quota for the current day when a user has just
started a session
Note: This property is not SaaS-compatible.
Quota.Time.RemainingDay.ReducedAtDeactivation
Number Time (in seconds) remaining from the configured time
quota for the current day when a user has just closed
a session
Note: This property is not SaaS-compatible.
Quota.Time.RemainingMonth Number Time (in seconds) remaining from the configured time
quota for the current month
Note: This property is not SaaS-compatible.
Quota.Time.RemainingMonth.ReducedAtActivation
Number Time (in seconds) remaining from the configured time
quota for the current month when a user has just
started a session
Note: This property is not SaaS-compatible.
Quota.Time.RemainingMonth.ReducedAtDeactivation
Number Time (in seconds) remaining from the configured time
quota for the current month when a user has just
closed a session
Note: This property is not SaaS-compatible.
Quota.Time.RemainingWeek Number Time (in seconds) remaining from the configured time
quota for the current week
Note: This property is not SaaS-compatible.
Quota.Time.RemainingWeek.ReducedAtActivation
Number Time (in seconds) remaining from the configured time
quota for the current week when a user has just
started a session
Note: This property is not SaaS-compatible.
Quota.Time.RemainingWeek.ReducedAtDeactivation
Number Time (in seconds) remaining from the configured time
quota for the current week when a user has just
closed a session
Note: This property is not SaaS-compatible.
Quota.Time.SessionExceeded Boolean If true, the time allowed for a time session has been
exceeded.
Note: This property is not SaaS-compatible.
Quota.Time.SizePerDay Number Time (in seconds) allowed per day under the
configured quota
Note: This property is not SaaS-compatible.
Quota.Time.SizePerMonth Number Time (in seconds) allowed per month under the
configured quota
Note: This property is not SaaS-compatible.
Quota.Time.SizePerWeek Number Time (in seconds) allowed per week under the
configured quota
Note: This property is not SaaS-compatible.
Quota.Volume.IsActivationRequest.Strict
Boolean If true, a user has chosen to continue a session when
the configured volume has been exceeded and the
request for continuing the session applies to the
current settings.
Note: This property is not SaaS-compatible.
Quota.Volume.SessionExceeded Boolean If true, the time allowed for a volume session has
been exceeded.
Note: This property is not SaaS-compatible.
Quota.Volume.SizePerDay Number Volume (in bytes) allowed per day under the
configured quota
Note: This property is not SaaS-compatible.
Quota.Volume.SizePerMonth Number Volume (in bytes) allowed per month under the
configured quota
Note: This property is not SaaS-compatible.
Quota.Volume.SizePerWeek Number Volume (in bytes) allowed per week under the
configured quota
Note: This property is not SaaS-compatible.
Properties - R
The following table describes the properties that have names beginning with R.
Properties – R
Reporting.URL.Categories List of Category List of all URL categories used on the appliance
Reporting.URL.Reputation List of Number List of all reputation score values used on the
appliance
Request.POSTForm.Get String Retrieves URL encoded data in the POST form sent by
the external Identity Provider.
Rules.EvaluatedRules List of String List of all rules that have been processed
Rules.EvaluatedRules.Names List of String List with names of all rules that have been processed
Rules.FiredRules.Names List of String List with names of all rules that have applied
Properties – S
SecureReverseProxy.EmbeddedProtocol
String Protocol of a URL in an HTTP request that is
embedded in an HTTPS request
Note: This property is not SaaS-compatible
SecureReverseProxy.EmbeddedURL String URL in an HTTP request that is embedded in an String: Host name of
HTTPS request the URL
This is the URL for the host specified by the value of
the SecureReverseProxy.EmbeddedHost property.
Note: This property is not SaaS-compatible
SecureReverseProxy.IsValidReverseProxyRequest
see above Boolean If true, the URL submitted in a request has the format
required in a SecureReverseProxy configuration.
Note: This property is not SaaS-compatible
SecureToken.IsValid Boolean If true, the specified token is valid and has not
expired. 1. String: Token to
Depending on the on the value of a parameter in the be checked
settings of the SecureReverse Proxy module, the 2. Number: Time (in
token string includes no time stamp. seconds) to
Expiration of the token is then not checked. elapse until the
token expires
SSL.Certificate.CN.ToWildcard Wildcard Common name in an SSL certificate converted into a String: Common
Expression wildcard expression name to convert
SSL.Server.Certificate.AlternativeCNs
see above List of Wildcard List of alternative common names for a web server as
Expression used in SSL certificates
SSL.Server.Certificate.CN.HasWildcards
see above Boolean If true, the common name for a web server in an SSL
certificate includes wildcards.
SSL.Server.Certificate.HostAndCertificate
see above HostAnd Host name and certificate for connecting to web
Certificate server in SSL-secured communication
SSL.Server.Certificate.OnlyCertificate
SSL.Server.Certificate.SignatureMethod
see above String Text describing the method used for signing the
certificate
SSL.Server.CertificateChain.AllRevocationStatusesKnown
SSL.Server.CertificateChain.ContainsExpiredCA
SSL.Server.CertificateChain.ContainsRevoked
SSL.Server.CertificateChain.FirstKnownCAIsTrusted
see above Boolean If true, a the certificate authority for issuing SSL
certificates that has been found first in a certificate
chain for a web server is trusted.
SSL.Server.CertificateChain.FoundKnownCA
see above Boolean If true, a known certificate authority for issuing SSL
certificates has been found in a certificate chain for a
web server.
SSL.Server.CertificateChain.IsComplete
Boolean If true, the chain of SSL certificates for a web server is
complete.
SSL.Server.CertificateChain.Issuer.CNsList of String List of common names for the issuers that issued an
SSL certificate in a certificate chain for a web server
The list is sorted in bottom-up order. It ends with the
common name of the issuer that issued the
certificate for the self-signed root certificate authority
(CA).
SSL.Server.CertificateChain.PathLengthExceeded
see above Boolean If true, the chain of SSL certificates for a web server
exceeds the allowed length.
SSL.Server.CertificateChain.SignatureMethods
see above List of String List of texts describing the methods used for signing
the certificates in the chain
SSL.Server.Handshake.CertificateIsRequested
SSO.GetConnectorInfo Variable Returns information about the SSO connector to the String: Service ID
service the user is requesting. This information is
stored as a JSON object in a local variable named sso-
conn-info.
Note: This property is not SaaS-compatible
SSO.GetDatFile String Retrieves the specified DAT file from the update String: Name of the
server and returns the contents of the file in a string. SSO DAT file
The Single Sign On module uses the collection of SSO
DAT files to create the launchpad.
Note: This property is not SaaS-compatible
SSO.GetServices JSON object Returns all information about the current user added Variable:
by the SSO Select Services rule set. This information is "conditions"
returned in JSON format and includes the names of
cloud services the user is allowed to access and all
account information.
Note: This property is not SaaS-compatible
SSO.LogProperties JSON object Stores information about each SSO request that is
used to generate the SSO access and SSO trace logs.
Note: This property is not SaaS-compatible
SSO.ManagementHost String Returns the host name of the SSO service specified in
the configuration. Typically, this value is the name of
the server hosting the SSO service provided by Web
Gateway.
Note: This property is not SaaS-compatible
SSO.OTPRequired Boolean Returns a true value if the SSO action requires OTP
authentication.
Note: This property is not SaaS-compatible
SSO.ProcessTask Boolean Processes common SSO tasks, such as credential Note: The
management, using the Single Sign On settings. If the parameters are
SSO tasks are processed successfully, this property passed in URLs.
returns a true value.
Note: This property is not SaaS-compatible
SSOConnector.ToString String Converts the name of a cloud connector to the String: Name of
Service ID that identifies the corresponding cloud cloud connector
service or application.
Stopwatch.GetMicroSeconds Number Time measured for rule set processing in String: Name of rule
microseconds set
Stopwatch.GetMilliSeconds Number Time measured for rule set processing in milliseconds String: Name of rule
set
String.Base64DecodeAsBinary String String of binary digits that is the result of decoding a String: String in
base-64 encoded string encoded format
String.Base64DecodeAsText String Text string that is the result of decoding a base-64 String: String in
encoded string encoded format
String.Base64Encode String String that is the result of using the base-64 encoding String: String to
method to encode a string encode
String.MakeAnonymous String String that has been made anonymous and requires String: String to
one or two passwords for reverting anonymization anonymize
The string that is to be anonymized is specified as a
parameter of the property.
The passwords are set within the Anonymization settings,
which are provided as settings of the property.
You can use the property in a rule to anonymize
sensitive data, for example, the user name that is
retrieved as the value of the Authentication.UserName
property.
An event in this rule sets the authentication property
to the value of String.MakeAnonymous, which takes the
authentication property as its parameter, so its value
is the anonymized user name.
After the set event has been executed, the
anonymized user name is also the value of
Authentication.UserName. Sensitive information is
protected this way.
For the rule to work, a rule with the authentication
property must have been processed before.
Otherwise the string that is to be anonymized would
not be known.
If no number is
specified, the
substring extends to
the end of the
original string
String.ToSSOConnector String Converts the Service ID that identifies a cloud service String: Service ID
or application to the name of the corresponding
cloud connector.
String.URLDecode String Standard format of a URL that was specified in String: URL in
encoded format encoded format
Properties - T
The following table describes the properties that have names beginning with T.
Properties – T
TIE.Filereputation Number File reputation score that has been retrieved from a
TIE server
Note: This property is not SaaS-compatible.
Properties - U
The following table describes the properties that have names beginning with U.
Properties – U
URL.CategoriesForURL List of Category List of URL categories that a specified URL belongs to String: URL in
string format
URL.CategorySetVersion Number Version number of the category set that is used for
URL filtering
URL.Geolocation String ISO 3166 code for the country where the host that a
URL belongs to is located
If a value is to be assigned to this property, the
following option of the settings for the URL Filter
module must be enabled:
Only use online GTI web reputation and categorization
services.
URL.Geolocation String Name of the country where the host that a given URL
belongs to is located
The URL is the URL that was sent with the request
that is currently processed.
The country is identified according to ISO 3166.
Note: The name can only be found if the following
option of the settings for URL filtering is selected:
Disable local GTI database
URL.GeolocationForURL String Name of the country where the host that a given URL String: URL that
belongs to is located country name
The URL is specified as a parameter of the property.
URL.Host.BelongsToDomains Boolean If true, a host that access was requested to by List of string:
submitting a particular URL belongs to one of the List of domain
domains in a list. names
The name of a host that was found to belong to one
of the domains is set as the value of the
List:LastMatches property.
You can use the URL.Host.BelongsToDomains property
to match anything to the domain name in a URL or
anything to the left of a dot of a domain name
(*.domain.com). Terms including the domain name
(*domain.com) are not counted as matches.
Example:
Domain List is the string list specified as the property
parameter. It contains the following entries (dots
preceding a domain name in a URL are omitted):
twitter.com
mcafee.com
dell.com
k12.ga.us
xxx
Then the criteria:
URL.Host.BelongsToDomains("Domain List") equals true
matches for the following URLs:
http://twitter.com
http://www.twitter.com
http://my.mcafee.com
http://my.support.dell.com
http://www.dekalb.k12.ga.us
any.site.xxx
but not for:
http://malicioustwitter.com
http://www.mymcafee.com
http://www.treasury.ga.us
Using this property avoids the effort of creating more
complicated solutions to accomplish the same, for
example:
• Using two entries in a list of wildcard expressions,
such as:
URL.HostIsIP Boolean If true, the URL that is submitted for access to a host
is an IP address.
URL.IsHighRisk Boolean If true, the reputation score of a URL falls in the high
risk range.
URL.ReputationForURL Number Reputation score for a given URL String: URL that
The URL is specified as a parameter of the property. reputation
score is to be
found for
URL.ReputationStringForURL String Reputation score for a given URL String: URL that
The URL is specified as a parameter of the property. reputation
score is to be
found for
URL.SmartMatch Boolean If true, a URL matches one or more of the URL parts List of String:
that are specified in string format in any of the entries List with parts
in the list of URL parts that is given as the parameter of URLs in
of this property string format
Note: Use of a very long string list here can impact
performance.
An entry in this string list must specify at least the
domain or the path part of a URL as a substring. It can
specify both.
The domain part matches also if a URL only contains
a subdomain of the specified domain.
For the path part, it is sufficient if the beginning of the
path in a URL matches it.
Additionally, a list entry can specify the protocol and
port of a URL.
The value of the property is true if a URL matches the
domain or the path part (or both) in an entry of the
string list and also matches the protocol part (if
specified) and the port part (if specified).
If a port is specified in an entry of the string list, but
not in the URL, there is no match.
For example, with the following URL:
http://www.mycompany.com/samplepath/xyz
The below list entries will produce matches or not as
follows:
mycompany.com (match)
http://mycompany.com (match)
https://mycompany.com (no match)
http://www.mycompany.com/ (match)
host.mycompany.com (no match)
http://www.mycompany.com:8080/ (no match)
http://www.mycompany.com/samplepath/ (match)
/samplepath/ (match)
mycompany.com/samplepath/ (match)
com (match)
You can use this property to search for matches in a
complex URL whitelist or blocklist, for example, in a
list that contains both entries for URL hosts and for
complete URLs.
Properties - W
The following table describes the properties that have names beginning with W.
Properties – W
Name Description
CloudEnc.DecryptionBytesAll Number of bytes for all web objects that cloud decryption
was applied to
CloudEnc.DecryptionErrorsAll Number of bytes for all web objects that had cloud decryption
resulting in an error
CloudEnc.DecryptionHitsAll Number of bytes for all web objects that cloud decryption
was successfully applied to
CloudEnc.EncryptionBytesAll Number of bytes for all web objects that cloud encryption
was applied to
CloudEnc.EncryptionErrorsAll Number of bytes for all web objects that had cloud encryption
resulting in an error
CloudEnc.EncryptionHitsAll Number of bytes for all web objects that cloud encryption
was successfully applied to
FtpBytesFromServer Number of bytes for all web objects that were received from a
web server under FTP
FtpBytesToServer Number of bytes for all web objects sent to a web server
under FTP
FtpTraffic Number of bytes for all web objects sent and received under
FTP
HttpBytesFromClient Number of bytes for all web objects that were received from a
client under HTTP
HttpBytesFromServer Number of bytes for all web objects that were received from a
web server under HTTP
HttpBytesToClient Number of bytes for all web objects that were sent to a client
under HTTP
HttpBytesToServer Number of bytes for all web objects that were sent to a web
server under HTTP
HttpTraffic Number of bytes for all web objects sent and received under
HTTP
HttpsBytesFromClient Number of bytes for all web objects that were received from a
client under HTTPS
HttpsBytesFromServer Number of bytes for all web objects that were received from a
web server under HTTPS
HttpsBytesToClient Number of bytes for all web objects sent to a client under
HTTPS
HttpsBytesToServer Number of bytes for all web objects sent to a web server
under HTTPS
HttpsTraffic Number of bytes for all web objects sent and received under
HTTPS
ICAPReqmodTraffic Number of bytes for all web objects sent and received in the
Reqmod mode of ICAP
ICAPRespmodTraffic Number of bytes for all web objects sent and received in the
Respmod mode of ICAP
MemFree Number of bytes in the memory that are currently not in use
system-wide
SOCKSTraffic Number of bytes for all web objects sent and received under
SOCKS
SOCKSv4Traffic Number of bytes for all web objects sent and received under
SOCKS version 4
SOCKSv5Traffic Number of bytes for all web objects sent and received under
SOCKS version 5
SwapUsed Number of bytes in the swap space that are currently in use
SwapFree Number of bytes in the swap space that are currently not in
use
WebCacheHits Number of objects that were requested and found in the web
cache
WebCacheMisses Number of objects that were requested and not found in the
web cache
Character Description
* Matches any string, including the empty string (if not between square brackets).
For example, b* matches:
b
best
binary
and others
[...] Matches any of the single characters included in the square brackets.
? and * are normal characters between square brackets.
For example, [a5?] matches:
a
5
?
Note: The first character must not be an ! (exclamation mark).
! Matches any single character except those following the exclamation mark.
For example, [!ab] matches:
c
S
%
but not:
a
b
Character Description
[...] Matches any of the single characters included in the square brackets.
For example, regex([bc3]) matches:
b
c
3
^ Matches any single character in a bracketed expression except those following the accent circonflexe.
For example, regex([^a-d]) matches:
e
7
&
Log updates
The log is updated with every release of a major version of Web Gateway.
• Rule set changes and additions in major versions are announced in the release notes for those versions and included in the
log.
• Rule set changes and additions in maintenance versions are recorded in the release notes for those versions. They are included
in the log when it is updated at the next release of a major version.
For example, the update for version 7.7.1 includes changes and additions for version 7.7.1, as well as for versions 7.7.0.1, 7.7.0.2,
and so on.
Note: Changes and additions before version 7.6.2 are recorded in the release notes, but do not appear in the log.
Log entries
Log entries are listed by product version.
In the entries, rule sets are marked as default or library rule sets and as changed or new. Product versions are marked according
to whether they were originally provided as main or controlled releases.
Note: Rule set changes are only included in your version of Web Gateway if you have installed this version through completing a
new installation (clean install) or imported the respective rule set from the rule set library.
Cloud Threat Detection - Handle Offline Scan (Library rule set) – New
This rule set mainly performs the same tasks as the Cloud Threat Detection rule set.
It behaves differently, however, in that a web object is passed on to the requesting client immediately, without waiting until anti-
malware scanning by Cloud Threat Detection has completed.
You can add rules to make use of the scanning result. For example, you can send a notification to the administrator if a web
object that has been passed on was found to be infected by a virus.
Cloud Threat Detection - Handle Offline Scan (Library rule set) – New
This rule set mainly performs the same tasks as the Cloud Threat Detection rule set.
It behaves differently, however, in that a web object is passed on to the requesting client immediately, without waiting until anti-
malware scanning by Cloud Threat Detection has completed.
You can add rules to make use of the scanning result. For example, you can send a notification to the administrator if a web
object that has been passed on was found to be infected by a virus.
McAfee and the McAfee logo are trademarks or registered trademarks of McAfee, LLC or its subsidiaries in the US and other countries. Other
marks and brands may be claimed as the property of others.