Default Rule Set System
Several rule sets that cover important fields of web security are by default implemented in the rule set system on the appliance after its initial setup.
The default rule system looks like this (nested rule sets are not shown).
NOTE: Some of these rule sets are not enabled by default.
Rule set | Description |
---|---|
Bypass Microsoft (Office 365) Services |
Lets requests and responses that are sent to and received from Office 365 and NOTE: This rule set is not enabled by default. |
HTTPS Scanning |
Prepares web traffic that is secured under HTTPS for processing by other NOTE: This rule set is not enabled by default. |
Remove Privacy Violation Header |
Removes privacy violation headers from requests to prepare them for NOTE: This rule set is not enabled by default. |
Global Whitelist | Lets requests for whitelisted URLs or IP addresses skip further filtering. |
Common Rules | Provides functions that support the filtering process, such as web caching, progress indication, and opening of archives. |
URL Filtering | Controls filtering of individual URLs and URL categories. |
Media Type Filtering | Controls filtering of particular types of media. |
Gateway AntiMalware | Controls virus and malware filtering using virus signatures and proactive methods. |
Dynamic Content Classification |
Controls dynamic classification of content. NOTE: This classification is performed in support of URL filtering. |