McAfee MAP-3300-SWG Product Guide - Page 197

HTTP Scanning, Dictionaries, Scanner Options

Page 197 highlights

Overview of Web features Web Policies You can specify the action to take when the appliance is unable to scan into an email attachment (either archive or document) or a file that is being requested from a website, because it has been password protected. If the content is protected by password, the appliance cannot examine the contents because they are encrypted. If you choose to allow such files into your network, you must ensure that their contents can be scanned later for any threats by an on-access scanner. Table 193 Option definitions Option Definition If a read protected document is detected Provides a main action to take. The action associated with read protected documents will only trigger when compliance scanning is enabled, and the contents of the document can not be extracted. If a password-protected archive file is detected Use the default alert And also Provides a main action to take. When selected, issues the default alert upon detection. When deselected, allows you to click the link, then change the text of the alert. Provides several further actions to take. To select several items, use Ctrl-click or click and Shift-click. HTTP Scanning Use this page to scan request and response bodies, cookies and headers to prevent exploits including buffer-overflow attacks and malicious scripts. Web | Web Policies | Scanning Policies | Scanner Options | HTTP Scanning Table 194 HTTP Requests - Option definitions Option Scan the request header Scan the request body Definition Select to scan the HTTP request header information. Select to scan the HTTP request body information. Table 195 HTTP Responses - Option definitions Option Scan the response header Scan the response body Definition Select to scan the HTTP response header information. Select to scan the HTTP response body information. Dictionaries Use this page to view and edit compliance dictionaries. Email | Email Policies | Dictionaries McAfee Email and Web Security Appliances 5.6.0 Product Guide 197

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336

You can specify the action to take when the appliance is unable to scan into an email attachment
(either archive or document) or a file that is being requested from a website, because it has been
password protected. If the content is protected by password, the appliance cannot examine the
contents because they are encrypted.
If you choose to allow such files into your network, you must ensure that their contents can be
scanned later for any threats by an on-access scanner.
Table 193
Option definitions
Option
Definition
If a read protected document is detected
Provides a main action to take.
The action associated with read protected documents will only
trigger when compliance scanning is enabled, and the contents of
the document can not be extracted.
If a password-protected archive file is
detected
Provides a main action to take.
Use the default alert
When selected, issues the default alert upon detection. When
deselected, allows you to click the link, then change the text of the
alert.
And also
Provides several further actions to take.
To select several items, use Ctrl-click or click and Shift-click.
HTTP Scanning
Use this page to scan request and response bodies, cookies and headers to prevent exploits including
buffer-overflow attacks and malicious scripts.
Web
|
Web Policies
|
Scanning Policies
|
Scanner Options
|
HTTP Scanning
Table 194
HTTP Requests — Option definitions
Option
Definition
Scan the request header
Select to scan the HTTP request header information.
Scan the request body
Select to scan the HTTP request body information.
Table 195
HTTP Responses — Option definitions
Option
Definition
Scan the response header
Select to scan the HTTP response header information.
Scan the response body
Select to scan the HTTP response body information.
Dictionaries
Use this page to view and edit compliance dictionaries.
Email
|
Email Policies
|
Dictionaries
Overview of Web features
Web Policies
McAfee Email and Web Security Appliances 5.6.0 Product Guide
197