Security Policies In-Depth.book

Security Policies
In Depth
Secure Web Gateway
Release 10.2
M86 SECURITY POLICIES IN DEPTH
© 2012 M86 Security
All rights reserved.
828 W. Taft Ave., Orange, CA 92865, USA
Version 10.2, published June 2011 for Secure Web Gateway
software release 10.2.
This document may not, in whole or in part, be copied,
photocopied, reproduced, translated, or reduced to any
electronic medium or machine readable form without prior
written consent from M86 Security.
Every effort has been made to ensure the accuracy of this
document. However, M86 Security makes no warranties with
respect to this documentation and disclaims any implied
warranties of merchantability and fitness for a particular
purpose. M86 Security shall not be liable for any error or for
incidental or consequential damages in connection with the
furnishing, performance, or use of this manual or the
examples herein. Due to future enhancements and
modifications of this product, the information described in this
documentation is subject to change without notice.
Trademarks
Other product names mentioned in this manual may be
trademarks or registered trademarks of their respective
companies and are the sole property of their respective
manufacturers.
M86 SECURITY
SECURITY POLICIES IN DEPTH
2
TABLE OF CONTENTS
Table of Contents
ABOUT THIS MANUAL ................................................... 6
Where To Go From Here. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
CHAPTER 1: SECURITY POLICY CONCEPTS.................... 7
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Types of Policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Master Security Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
X-Ray Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Emergency Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
HTTPS Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Full Bypass Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Cloud User Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Security Policy Components . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Rules and Conditions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Rule Logic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Available Conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
User Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
CHAPTER 2: DETAILED RULE DESCRIPTIONS ............... 37
Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Allow Access to White Listed Sites . . . . . . . . . . . . . . . . . . . . . . . . . 37
Allow All . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Allow and Scan Customer-Defined File Extensions. . . . . . . . . . . . . 43
Allow and Scan Customer-Defined True Content Type . . . . . . . . . . 44
Allow Known Legitimate Content . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Allow Streaming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Allow Trusted Sites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Allow Whitelisted ActiveX, Java Applets and Executables . . . . . . . 48
Block Access to Adware Sites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Block Access to Blacklisted Sites . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Block Access to High-Risk Site Categories . . . . . . . . . . . . . . . . . . 58
Block Access to Spyware Sites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Block ActiveX, Java Applets and Executables by ACL . . . . . . . . . . 65
Block Binary Exploits in Textual Files . . . . . . . . . . . . . . . . . . . . . . . 68
M86 SECURITY
SECURITY POLICIES IN DEPTH
3
TABLE OF CONTENTS
Block Binary Objects With Invalid Digital Certificate . . . . . . . . . . . . 69
Block Binary Objects Without a Digital Certificate . . . . . . . . . . . . . . 71
Block Binary VAD Vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Block Blacklisted File Extensions. . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Block Customer-Defined File Extensions. . . . . . . . . . . . . . . . . . . . . 79
Block Customer-Defined True Content Type . . . . . . . . . . . . . . . . . . 80
Block Everything Except White Lists . . . . . . . . . . . . . . . . . . . . . . . . 81
Block Files with COM Extension . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Block Files with Suspicious Multiple Extensions . . . . . . . . . . . . . . . 83
Block Illegitimate Archives (Including
Password-Protected Archives). . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Block IM Tunneling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Block Known Malicious Content. . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Block Known Spyware (ACL). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Block Known Viruses (McAfee / Sophos / Kaspersky). . . . . . . . . . . 93
Block Malicious ActiveX, Java Applets and Executables. . . . . . . . . 96
Block Malicious Content (Malware Entrapment Engine) . . . . . . . . 102
Block Microsoft Office Documents
containing Macros and/or Embedded Files . . . . . . . . . . . . . . . . . . 103
Block Outgoing Microsoft Office Documents . . . . . . . . . . . . . . . . . 106
Block Potentially Malicious Archives . . . . . . . . . . . . . . . . . . . . . . . 109
Block Potentially Malicious Packed Executables . . . . . . . . . . . . . . 111
Block Revoked Cloud Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Block Spoofed Content . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
Block Suspicious File Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Block Unscannable (McAfee / Sophos / Kaspersky) . . . . . . . . . . . 117
Block Unscannable ActiveX, Java Applets and Executables. . . . . 117
Block Unscannable Archives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Customer-Defined URL Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Data Leakage Prevention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Detect Known Trojan Network Activity. . . . . . . . . . . . . . . . . . . . . . 122
Temporarily Block Cloud Users . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Block Social Media Post Control . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Social Media Post Control Allowed Requests . . . . . . . . . . . . . . . . 124
Bypass Whitelisted URLs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
Block All HTTPS URLS Except White Lists . . . . . . . . . . . . . . . . . . 127
M86 SECURITY
SECURITY POLICIES IN DEPTH
4
TABLE OF CONTENTS
CHAPTER 3: IMPLEMENTING SECURITY POLICY .......... 128
Pre-supplied Policies Containing Rules . . . . . . . . . . . . . . . . 128
Establishing Site Security Policy — Key Points . . . . . . . . . 129
List of Available Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Rules Available for Security Policies . . . . . . . . . . . . . . . . . . . . . . . 131
Rule Available for HTTPS Policies. . . . . . . . . . . . . . . . . . . . . . . . . 133
Rules Available for Emergency HTTPS Policy . . . . . . . . . . . . . . . 133
Defining Security Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
Creating a Security Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
Creating / Editing a Rule in a User-Defined Policy . . . . . . . . . . . . 135
Adding / Editing Conditions in a Rule. . . . . . . . . . . . . . . . . . . . . . . 137
Example - Creating a New Rule. . . . . . . . . . . . . . . . . . . . . . . . . . . 138
Setting Which Policies are Implemented . . . . . . . . . . . . . . . 146
Setting Policy Defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Setting a Master Policy for an Administrator . . . . . . . . . . . . . . . . . 149
Assigning Policies to User Groups and Users . . . . . . . . . . . . . . . . 149
Defining User Lists. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
Fields and Options in the Security Definition Screens . . . . 153
Options Available in the Policy Tree . . . . . . . . . . . . . . . . . . . . . . . 153
Policy Details Screen - Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Rule Details Screen - Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
Condition Details Screen - Fields . . . . . . . . . . . . . . . . . . . . . . . . . 158
APPENDIX A .............................................................. 159
M86 SECURITY
SECURITY POLICIES IN DEPTH
5
WHERE TO GO FROM HERE
About This Manual
This manual supplements the security policy information described
in the SWG Management Console Reference Guide and the
SWG User Guide, and it assumes that you are familiar with the
information in those guides.
Although some of the information contained in this manual also
appears in the SWG Management Console Reference Guide and
the SWG User Guide, this guide expands on SWG security
functionality in more depth and describes advanced SWG security
configuration.
Where To Go From Here
The chapters in this guide are sequenced in user-recommended
order.
• Before customizing security policy, you should be familiar with
the information in Chapter 1: Security Policy Concepts.
• For descriptions of the rules, rule definitions, and relevant
conditions, see Chapter 2: Detailed Rule Descriptions.
• For instructions and related information on how to customize
security policy, see Chapter 3: Implementing Security Policy.
• For sample diagrams of the Master Policy and the Security
Policy enforcement process, see Appendix A.
M86 SECURITY
SECURITY POLICIES IN DEPTH
6
CHAPTER 1: SECURITY POLICY CONCEPTS
Chapter 1: Security Policy Concepts
This chapter contains the following main sections:
• Introduction
• Types of Policies
y Master Security Policy
y X-Ray Policy
y Emergency Policies
y HTTPS Policies
y Full Bypass Policy
y Cloud User Policies
• Security Policy Components
y Rules and Conditions
y Rule Logic
y Available Conditions
• User Management
M86 SECURITY
SECURITY POLICIES IN DEPTH
7
INTRODUCTION
Introduction
Secure Web Gateway security is policy-based with advanced
configuration availability. Policies are built on rules that define the
actions to be taken when specific conditions are met.
SWG provides pre-supplied security policies, which are secured
against editing. To match an organization’s specific security
requirements, SWG enables new policy creation. To assist in
increasing policy configuration availability, the pre-supplied
secured policies can be copied and then edited as required.
The basic policy building block is a condition, which is satisfied
when an event is triggered. The condition is associated with a rule,
which, based on the triggered event, performs an action (and in
many cases also displays end-user messages). The rules action in
turn is associated with the organization’s security policy.
Security policies, their rules and conditions are defined in the
Management Console. The Management Console also enables
identification of which policies to use in which situations.
In addition to setting up security policies, the policies must be
associated with users or user groups. Users groups can be
defined, and then policies assigned specifically to individual
groups.
As the basis for maintaining user groups, SWG uses the
Lightweight Directory Access Protocol (LDAP) application protocol
for accessing and maintaining distributed directory information
services.
SWG enables users to be assigned to either LDAP groups or
non-LDAP groups. SWG does not require users to be assigned to
a group.
M86 SECURITY
SECURITY POLICIES IN DEPTH
8
CHAPTER 1: SECURITY POLICY CONCEPTS
Types of Policies
Secure Web Gateway provides the following pre-supplied security
policies.
Policy
For information, see:
•
•
•
•
Master Security Policy.
M86 X-Ray Policy (and X-Ray
Mode)
X-Ray Policy
•
•
Emergency Policies
M86 Emergency Policy
M86 HTTPS Emergency
Policy
M86 HTTPS Policy
HTTPS Policies
•
Cloud User Policies
•
M86 SECURITY
M86 Master Policy
M86 Basic Security Policy
M86 Medium Security Policy
M86 Strict Security Policy
M86 Blocked Cloud Users
Policy
M86 Revoked Cloud Users
Policy
Full Bypass Policy
Full Bypass Policy
•
•
•
•
For details, see the
Management Console
Reference Guide.
Caching Policy
Logging Policies
Identification Policies
Device Logging Policies
SECURITY POLICIES IN DEPTH
9
TYPES OF POLICIES
Master Security Policy
Master security policies are compulsory global policies for all
groups in an organization, and are in addition to Basic, Medium
and Strict policies implemented by lower level general
Administrators.
Master policies are created by Super Administrators and are
assigned to general Administrators for different user groups.
General Administrators can change policies or rules belonging to
their specific group only.
NOTES: A Master Policy can comprise any security policies within
the system. The Super Administrator can assign different Master
Policies to different Administrators or assign the same Master
Policies to all Administrators.
Figure 1-1 illustrates the relationships between Super
Administrators, general Administrators, and Security policies.
Figure 1-1: Master Policy Dependencies
M86 SECURITY
SECURITY POLICIES IN DEPTH
10
CHAPTER 1: SECURITY POLICY CONCEPTS
Master Security Policies
M86 provides three Security Policy levels to match an individual
organization's unique security requirements. Each provides a
progression in the security level.
• M86 Basic Security Policy: Provides a baseline policy when
connecting two relatively secure environments to each other.
Only the basic engines for client web security are activated.
• M86 Medium Security Policy: Provides better security when
connecting to the internet by building on top of the basic security
policy and adding more proactive, behavioral, real-time
elements. The policy uses all the security engines, and enforces
the standard measures or code analysis. This is the default
policy in the Management Console.
• M86 Strict Security Policy: Provides additional security
against the system being compromised in higher-sensitivity
environments. It utilizes all the rules and standards for secure
web behavior, while keeping HTML Repair enabled to provide a
usable browsing experience without blocking complete pages
that may have violated some security standards. HTML Repair
is part of the SWG Malware Entrapment Scanning Engine which
automatically repairs pages after removing suspicious code.
Security Policies – Setup
Security policies are configured using rule and condition
components. These components are described in greater detail in
Security Policy Components.
Policy configuration is intended for more experienced system
administrators. Existing pre-supplied advanced policies cannot be
modified, but can be copied and then edited, effectively creating
new policies with rules and conditions that can be fine-tuned.
M86 SECURITY
SECURITY POLICIES IN DEPTH
11
TYPES OF POLICIES
X-Ray Policy
An X-Ray Policy evaluates the effects of a planned security policy
on the system before implementation.
In an X-Ray policy, if a transaction meets the required conditions,
the rule is logged but not acted upon, and the transaction continues
being evaluated with the next rule, and so on for all rules in the
policy.
In this way, X-Ray Policy ensures that transactions are evaluated
against rules, but there is no blocking action or content change.
The results of the X-Ray Policy, and rules within, can be assessed
in the Logs View (under Logs and Reports in the Management
Console).
NOTES: Rules within the X-Ray Policy are not marked as X-Ray
mode.
X-Ray Mode
Even in non-X-Ray policies, individual rules can be placed in
X-Ray Mode (the Rule Definition screen displays an X-Ray Mode
check box for each rule). Rules in X-Ray Mode are logged but the
actions are not performed.
If both X-Ray and non-X-Ray Mode rules are activated in a
non-X-Ray policy, only the last triggered rule is reported.
Emergency Policies
The M86 Emergency Policy and M86 Hypertext Transfer Protocol
Secure (HTTPS) Emergency Policy are designed for cases where,
for example, Internet access in the organization has encountered
an infectious attack or where the organization has been infected by
malicious code.
Emergency Policies prevent and minimize damage by blocking
most network traffic while still enabling access to some pre-defined
web sites (for example, Windows Update).
M86 SECURITY
SECURITY POLICIES IN DEPTH
12
CHAPTER 1: SECURITY POLICY CONCEPTS
HTTPS Policies
M86 Hypertext Transfer Protocol Secure (HTTPS) Policies contain
rules dealing with HTTPS site access. HTTPS Policies define
which HTTPS sites are fully allowed, which HTTPS sites are
inspected, which HTTPS sites request user approval to continue,
and which HTTPS sites are blocked. The blocking mechanism is
based on White Lists, URL categorization, certificate error
checking, and certificate validation.
HTTPS Policies are displayed only for customers with the required
license.
Full Bypass Policy
This policy contains one rule (Allow All) ensuring no items are
scanned by the M86 engines. This rule can be set by
administrators and is intended for end-users who are permitted to
surf through the M86 SWG Appliance without any scanning.
Cloud User Policies
Cloud User policies determine user access:
• Blocked Cloud Users Policy: Defines policies for users who
are temporarily blocked from using the cloud.
• Revoked Cloud Users Policy: Defines policies for users who
are permanently revoked from using the cloud.
M86 SECURITY
SECURITY POLICIES IN DEPTH
13
SECURITY POLICY COMPONENTS
Security Policy Components
Rules and Conditions
The main Security Policies components are:
• Rules: Define the actions to be performed.
• Conditions: Determine if a rule is triggered.
Figure 1-2 illustrates the tree pane displayed for Policies in the
Management Console.
Figure 1-2: Security Policy Tree Pane
It is important to note the following about rule actions:
• The most common rule actions are as follows:
y Allow: The web content is allowed, usually with a specified
action requirement.
y Block: The web content is blocked.
M86 SECURITY
SECURITY POLICIES IN DEPTH
14
CHAPTER 1: SECURITY POLICY CONCEPTS
y Coach: The web content is temporarily blocked with the
end-user receiving a warning message, usually with a
specified action requirement.
• Depending on the defined action, the rule also contains one of
the following:
y Advanced Actions: Used for Allow actions.
y End-user Message: Used for Block and Coach actions.
Examples
The M86 Basic Security Policy comes with several rules including
the following (values are explained later in this document):
Rule: Allow Streaming
• Action: Allow
• Advanced Action: Bypass Scanning
• Condition name: True Content Type
Rule: Block Access to Blacklisted Sites
• Action: Block
• End-user Message: Blacklisted URL
• Condition Name: URL List
Rule: Data Leakage Prevention
• Action: Block
• End-user Message: Data Leakage Prevention
• Condition Name (there are two conditions):
y Data Leakage Prevention (Applies to Confidential
information)
y Direction (Applies to Incoming/Outgoing)
M86 SECURITY
SECURITY POLICIES IN DEPTH
15
SECURITY POLICY COMPONENTS
Rule Logic
A rule can include multiple conditions. For the rule to be enforced,
all its conditions must be matched. For example, a rule that
includes conditions regarding file extensions, time frames and
parent archive types, is enforced only if all of the conditions are
met.
Rules are enforced in the order determined by the rule priority list.
Rule priority determination is as follows:
• A rule’s priority is determined by its relative position in the rule
list, with the highest priority rule at the top, and the lowest at the
bottom. Rules can be moved up and down in the list to change
their priority level.
• Any action taken is according to the rule of highest priority
matching a given transaction.
• After a rule is enforced, lower priority rules are no longer
relevant and are not evaluated. Keep this in mind as you
consider the placement of rules in the policy. For example:
y In Blocking rules, consider which blocking reason is likely to
provide the most important information in the logs, reports
and notifications. For example, if access can be blocked in
case of a virus or a suspicious file type, the virus name is
probably more important than the file type. Therefore, to
ensure that the virus name is provided, place the Anti-Virus
rule before the Suspicious File Type rule.
y In Allow rules, if the conditions of a higher priority rule are
matched, the rules after that are not be checked against
content. In other words, a matched Allow rule effectively
creates a virtual trust level, and any content received after the
matched Allow rule is not scanned by any blocking rules.
M86 SECURITY
SECURITY POLICIES IN DEPTH
16
CHAPTER 1: SECURITY POLICY CONCEPTS
• If a rule is not specific to any of the listed values for a condition,
instead of selecting all possible values, do not use the condition,
and leave it blank.
• All rules can be used in X-Ray mode, where rule activities are
logged but no action is taken. The rule activity is displayed in the
logs, enabling production environment fine tuning, or rule review
and its related policy.
Rule Processing Flow
The security rule processing flow is divided into two phases:
• Request Phase
y If a Block action is triggered by a rule in the Request phase,
the request is not sent to the destination server, and an
appropriate message is displayed to the user.
y If a Coach action is triggered by a rule in the Request phase,
an appropriate message is displayed to the user. If the user
then approves the message, the request is sent to the
destination server. The Coach action applies only to the
Request phase.
• Response Phase
y Any content received in the response phase is evaluated
regardless of the action taken in the Request phase.
y If an Allow action is triggered, the content is passed to the
user. In addition, if no action is taken, the default action is an
implicit Allow.
y If a Block action is triggered, the content is not passed to the
user, and an appropriate error message is displayed to the
user.
M86 SECURITY
SECURITY POLICIES IN DEPTH
17
SECURITY POLICY COMPONENTS
The following diagram illustrates the basic six steps in the rules
transaction process:
Figure 1-3: Rules Transaction Process
For additional Request and Response phase diagrams for Master
Policy and Security Policies interaction, see Appendix A.
The diagram illustrates when a Master Policy is being used (that
is, users go through both a Master and a Security Policy) and the
rule process occurs as follows:
1. Client sends a request.
2. All request rules in the Master Policy are processed and the
request is forwarded to the Security Policy.
M86 SECURITY
SECURITY POLICIES IN DEPTH
18
CHAPTER 1: SECURITY POLICY CONCEPTS
3. All request rules in the Security Policy are processed and the
request is sent to the Internet.
4. A response is returned from the Web server.
5. All response rules in the Master Policy are processed, and the
response content is forwarded to Security Policy.
6. All response rules in the Security Policy are processed and the
content is delivered to the Client.
NOTES: These rules are processed as long as a rule is not yet
triggered.
M86 SECURITY
SECURITY POLICIES IN DEPTH
19
SECURITY POLICY COMPONENTS
Output Messages
As the flow indicates, many rules, including those performing Block
actions, display output messages to the end-user. The following
are examples of output messages.
Page Blocked Message
When an Internet site is blocked, a page block message (if
configured) is sent to the end-user stating that a site was blocked
due to the reason specified in the message. This message also
contains a transaction ID, which the administrator can use to trace
the transaction in the Log View and find out why this specific site/
page was blocked.
An example of a page Block message is as follows:
Figure 1-4: Example of a Page Block Message
M86 SECURITY
SECURITY POLICIES IN DEPTH
20
CHAPTER 1: SECURITY POLICY CONCEPTS
Coaching Message (Warning)
An administrator can create a new Security Policy and within this
policy, create Coach (Warning) rules. These can be used as
warnings for potential security situations or work performance loss
for end-users. An example of a Coach message is as follows:
Figure 1-5: Example of a Coach Page Message
Partial Block Message
If part of the HTML page contains malicious code, SWG can
remove that specific part of the HTML page and allow the rest of it
to be displayed to the end-user.
M86 SECURITY
SECURITY POLICIES IN DEPTH
21
SECURITY POLICY COMPONENTS
Available Conditions
Each rule can include multiple conditions, all of which must be met
for the rule to be triggered.
Conditions Available for Security Policy Rules
The following conditions are used in configuring Security Policy
rules.
• Authentication Cluster: Applies to the clusters as used in the
parameters for the Authentication or Get User Credentials
actions when configuring an Identification policy rule.
The Authentication Cluster condition is available for rules in
Policy type Device Logging.
• Authentication Methods: Uses the configured authentication
methods defined in the Action field when configuring an
Identification policy rule.
y Authenticate M86 SWG: Communicates with the client to get
USERID information and uses an external Authentication Site
to validate this information.
y Get user credentials: M86 SWG gets user identification via
NTLM or another such method.
y Identify by headers: Identifies the end-user according to the
Header (HTTP).
y Identify by source IP: Identifies the end-user by source IP.
This condition can be used to include or exclude the
authentication methods for logging purposes.
The Authentication Methods condition is available for rules in
Policy type Device Logging.
• Authentication Protocols: Logs the protocols used for
authentication (Basic, NTLM or both).
The Authentication Protocols condition is available for rules in
Policy type Device Logging.
M86 SECURITY
SECURITY POLICIES IN DEPTH
22
CHAPTER 1: SECURITY POLICY CONCEPTS
• Authentication Status: Logs the failed status of authentication
attempts.
The Authentication Status condition is available for rules in
Policy type Device Logging.
• Active Content List: Contains active content objects such as
ActiveX Controls and Java Applets which have already been
scanned by SWG and kept in the SWG Server Database. Each
newly scanned Applet, Control or Executable is automatically
added to the Auto-Generated list, which is the only list that
cannot be used in a rule. To create exception rules, items from
the Auto-Generated list can be moved to other lists.
The condition is applied to objects matching entries in these
lists. SWG includes the following default list which can be used
as part of this condition:
y Allowed: Allows trusted objects, which are blocked by the
Default Security Policy.
y Blocked: Blocks forbidden objects, which are allowed by the
Default Security Policy.
To configure the Active Content List, click Policies Æ
Condition Settings Æ Active Content List. For more
information, see the Management Console Reference Guide.
The condition is applied to objects matching the Active Content
List and are available for rules in Policy types Security and
Logging.
• Anti-Virus (McAfee/Sophos/Kaspersky): Anti-virus third party
scanning engine which scans for known viruses. The anti-virus
lists are automatically updated with SWG maintenance updates.
The Anti-virus condition is available for rules in Policy types
Security and Logging.
M86 SECURITY
SECURITY POLICIES IN DEPTH
23
SECURITY POLICY COMPONENTS
• Approved Content: VuSafe is an M86 Security web portal
used for streaming media content categorization, and
permissions management within the education market. The
Approved Content condition enables SWG to integrate VUSafe
(http://www.m86vusafe.com) and perform the necessary actions
required to filter out content unsuitable for a particular audience.
Administrators add a URL Encryption Key (UEK) to the VuSafe
portal. When an end-user (primarily students) tries to view an
authorized video, the URL request will have an additional UEK
hash key. This same UEK is entered into the SWG where it is
then verified.
To configure Approved Content, click Policies Æ Condition
Settings Æ Approved Content (incl. VuSafe). For more
information, see the Management Console Reference Guide.
The condition is applied to objects matching entries in the UEK
lists and are available for rules in Policy types Security and
Logging.
• Archive Errors (Archives): This applies if an archive is not
scanned by SWG due to predefined conditions such as
password protection, nesting depth, expanded file exceeding
limit, file could not be extracted, etc.
The archive file size for the condition verifying size limitation
compliance must be set. The specified number of files bundled
together includes the number of archives within archives, and
the size of the extracted file. Archives include: Zip Archive, GZip
Archive, RAR Archive, CAB Archive, BZ2 Archive and TAR
Archive. To configure the archive file size, click Policies Æ
Condition Settings Æ Archives. For more information, see
the Management Console Reference Guide.
The Archive Errors condition is available for rules in Policy types
Security and Logging.
• Archives: Specifies the number of files bundled together; the
number of archives within archives and the size of the extracted
file. Archives include: Zip Archive, GZip Archive, RAR Archive,
CAB Archive, BZ2 Archive and TAR Archive.
M86 SECURITY
SECURITY POLICIES IN DEPTH
24
CHAPTER 1: SECURITY POLICY CONCEPTS
• Behavior Profile (Binary Behavior): The M86 binary behavior
engine is based on checking security behaviors and profiles,
which are examined through the inspection of the binary’s
exposed mechanisms defined as required interfaces to the
system. The Binary Behavior Profile enables active content
identification that could be considered malicious or suspicious
when exhibited by ActiveX Controls, Java Applets, executable
files and any other relevant files. This condition can also match
objects to the following non-editable profiles:
y Suspected Malware: Contains behavior profile patterns
specific to Spyware objects. This option is displayed only if
the Anti-Spyware engine is purchased.
y Unscannable Active Content: This profile is assigned
whenever the appliance could not scan an object.
To configure Behavior Profile, click Policies Æ Condition
Settings Æ Binary Behavior. For more information, see the
Management Console Reference Guide.
Binary Behavior conditions are available for rules in Policy types
Security and Logging, and include the following:
y Automatic Execution and Termination: Conditions for
automatic file execution options considered unsafe when
performed by ActiveX, Executables and by Java Applets.
y File Access: Conditions for file access options considered
unsafe when performed by ActiveX, Executables and by Java
Applets.
y Registry Access: Conditions for registry access options
considered unsafe when performed by ActiveX, Executables
and by Java Applets.
y Network Access: Conditions for network access options
considered unsafe when performed by ActiveX, Executables
and by Java Applets.
y Minor Risk Operations: Conditions for minor risk operations
options considered unsafe when performed by ActiveX,
Executables and by Java Applets.
M86 SECURITY
SECURITY POLICIES IN DEPTH
25
SECURITY POLICY COMPONENTS
y Disclosure of Information: Conditions for Disclosure of
Information options considered unsafe when performed by
Java Applets.
y Java Runtime: Conditions for Java runtime options
considered unsafe when performed by Java Applets, which
can eliminate security restrictions.
y Change Settings: Conditions for Change Settings options
considered unsafe when performed by ActiveX and
Executables.
y System Settings: Conditions for system settings options
considered unsafe when performed by Java Applets.
y General: Conditions for general options considered unsafe
when performed by ActiveX and Executables.
y Other Running Applications: Conditions for other running
application options considered unsafe when performed by
ActiveX and Executables.
• Binary VAD: The Binary Vulnerability Antidote (VAD) condition
scans binary files, looking for patterns of exploits. Binary VAD is
divided into five security levels: None, Basic, Medium, High
and Strict.
The Binary VAD condition is available for rules in Policy types
Security and Logging.
• Content Size: Refers to the content size (in KB) being scanned,
which can limit very large files from entering or leaving the
network. The predefined content sizes cannot be modified.
However, new Content Size lists can be created.
To configure Content Size, click Policies Æ Condition
Settings Æ Content Size. For more information, see the
Management Console Reference Guide.
The conditions are set against the configured content sizes and
are available for rules in Policy types Security, Logging, and
ICAP Forward.
M86 SECURITY
SECURITY POLICIES IN DEPTH
26
CHAPTER 1: SECURITY POLICY CONCEPTS
• Data Leakage Prevention: Data Leakage Prevention (DLP) is
a content processor through which SWG scans information—
such as customer records, financial information, and intellectual
property—stored within varying document types, and prevents it
from leaving the network should it violate specific organization
compliance.
This condition is pre-set to identify potentially harmful data
incorporating a multi-language built condition used in a DLP
rule, in X-ray mode, within a default policy. It cannot be edited.
However, using the DLP Rule Builder, additional filter conditions
can be created, defined and edited.
To configure Data Leakage Prevention, click Policies Æ
Condition Settings Æ Data Leakage Prevention. For more
information, see the Management Console Reference Guide.
The conditions are set against the configured DLP and are
available for rules in Policy types Security and Logging.
• Digital Signatures: Specifies if the content has an invalid or
missing digital signature.
The Digital Signatures condition is available for rules in Policy
types Security and Logging.
• Direction: Specifies the transaction direction (Incoming/
Outgoing) for which the rule may be triggered. For example, in
HTTP, Outgoing means the protocol Request phase, and
Incoming means the protocol Response phase. If no direction
is specifically applied, then the rule is checked on both the
request and response phases.
The Direction condition is available for rules in Policy types
Security and Logging.
M86 SECURITY
SECURITY POLICIES IN DEPTH
27
SECURITY POLICY COMPONENTS
• File Extensions: Each node in the File Extension tree identifies
a predefined list of file extensions, organized by topic. Also
included in the tree is the Multiple File Extensions list. This
refers to files that have more than one extension, and the last
extension allows the Operating System to run the file, for
example, file.txt.exe.
With the exception of the editable Multiple File Extensions list,
extensions from the existing File Extensions provided by
Trustwave SpiderLabs cannot be added or deleted. New File
Extension lists can be created.
To configure File Extensions, click Policies Æ Condition
Settings Æ File Extensions. For more information, see the
Management Console Reference Guide.
The conditions are set against the File Extension lists and are
available for rules in Policy types Security and Logging.
• HTTP Method: This condition is used in conjunction with the
Social Media Posts rule. The HTTP Method is a content
processor providing the ability to select, through the security
policy condition, possible values such as GET, POST, LOCK,
etc. This feature supports HTTP, ICAP, and HTTPS/SSL
requests.
The list of supported HTTP Method types is predefined and
non-editable.
The HTTP Method condition is available for rules in Policy types
Security, Logging, and ICAP Forward.
• Destination Port Range: Specifies port ranges used in
Identification Policy rules. The rules apply to client applications
whose target destination ports are in the range.
To configure Destination Port Range, click Policies Æ
Condition Settings Æ Destination Port Range. For more
information, see the Management Console Reference Guide.
The conditions are set against the destination port ranges and
are available for rules in Policy type Device Logging.
M86 SECURITY
SECURITY POLICIES IN DEPTH
28
CHAPTER 1: SECURITY POLICY CONCEPTS
• Header Fields: Headers are metadata enabling rule
customization based on these header fields. For example, you
can create a rule that blocks requests from specific user-agents.
The headers can be either request or response headers.
The Header Fields tree comes with a number of predefined
Header Fields provided by Trustwave SpiderLabs. With the
exception of Exclude By Headers, which can be edited, you
cannot add or delete any of them. However, new Header Fields
can be defined.
To configure Header Fields, click Policies Æ Condition
Settings Æ Header Fields. For more information, see the
Management Console Reference Guide.
The conditions are set against the configured Header Fields and
are available for rules in Policy types Security, Device
Logging, Logging, ICAP Forward, and Identification.
• ICAP Service Groups (Status): Internet Content Adaptation
Protocol (ICAP) is a high-level protocol for requesting services
from an Internet-based server. It provides a common format for
requesting services using standard HTTP messaging and
allows ICAP clients to invoke services on ICAP servers for a
variety of services.
To enable SWG to act as an ICAP Client, the receivable ICAP
Services must be configured in the condition by being clustered
into ICAP Service Groups.
To configure ICAP Service Groups, click Policies Æ
Condition Settings Æ ICAP Service Groups. For more
information, see the Management Console Reference Guide.
The ICAP Service Groups condition is available for rules in
Policy type Device Logging.
M86 SECURITY
SECURITY POLICIES IN DEPTH
29
SECURITY POLICY COMPONENTS
• IP Range: Defines one or more IP ranges for use in
Identification Policy rules applying to end-users whose IPs are
in the range. The range is used to distinguish the client machine
connecting to the Secure Web Gateway device by its source IP.
SWG provides pre-supplied IP Range definitions named
Exclude by IP and Branch Offices IPs. To enable
administrators to add/modify the IP ranges as required, M86
provides the default list Exclude by IP.
To configure IP Range, click Policies Æ Condition Settings
Æ IP Range. For more information, see the Management
Console Reference Guide.
The conditions are set against the configured IP ranges and are
available for rules in Policy types Device Logging, Upstream
Proxy and ICAP Forward.
• IM: Applies to transactions using Instant Messaging protocols
with HTTP tunnelling.
The IM condition is available for rules in Policy types Security
and Logging.
• Certification Validation Errors: Includes certificate integrity
checks, expiration checks, revocation and matching to ensure
corporate certificate policies are enforced, by automatically
validating each certificate and making sure that the chain goes
back to the trusted authority. Policies regarding certificates are
enforced by checking individual certificate names, date, trusted
authority chain and revocation lists.
A list of trusted certificate authorities is supplied with the system
and used for digital signature analysis and for HTTPS certificate
validation. Digital certificate lists are updated via the M86
security updates. These lists include the required trusted
certificate authorities as well as the Certificate Revocation Lists.
M86 SECURITY
SECURITY POLICIES IN DEPTH
30
CHAPTER 1: SECURITY POLICY CONCEPTS
Conditions can be set for the following certificate validation
failures:
y Invalid Certificate Structure
y Certificate Cannot be Trusted
y Certificate is Not Currently Valid
y Certificate Revoked
y Host Cannot be Trusted
y Bad Certificate Usage
To configure HTTPS Certificate Validation, click Policies Æ
Condition Settings Æ HTTPS Certificate Validation. For
more information, see the Management Console Reference
Guide.
Conditions are set against the configured certification validation
errors and are available for rules in Policy type HTTPS.
• Location: Used to distinguish a client application based on the
scanning server location. The condition options are one of the
following:
y Cloud: The scanning server is located in the internet cloud.
y Local: The scanning server is located in the enterprise.
The Location condition is available for rules in Policy types
Security, HTTPS, Caching, Logging, Identification, Device
Logging, and Upstream Proxy.
• Pre Authentication Headers: Includes header data previously
authenticated by a downstream proxy agent. These are
available for inclusion in the Identification Policy Rules. Defined
Pre Authenticated Headers can be added or deleted.
To configure Pre Authentication Headers, click Policies Æ
Condition Settings Æ Pre Authentication Headers. For more
information, see the Management Console Reference Guide.
The conditions are set against the configured pre authentication
headers and are available for rules in Policy type Device
Logging.
M86 SECURITY
SECURITY POLICIES IN DEPTH
31
SECURITY POLICY COMPONENTS
• Malware Entrapment Profile: M86 Security’s Malware
Entrapment Scanning Engine monitors and identifies malicious
content.
The engine uses language tokens, Active Code semantic
patterns, forbidden combinations of operations, parameters,
and programming techniques to identify malicious active
content fed into the engine.
Malware Entrapment Profiles are divided into five different
security levels: None, Basic, Medium, High and Strict.
The security levels are directly related to the profile enforcement
effectiveness.
Each profile level consists of a list of actions that could be
considered malicious or suspicious when executed by Web
pages, VB Script files, Java Script files or other relevant files.
By default, the SWG system is pre-configured at the Medium
security level. Administrators can set an appropriate security
level on a per policy basis.
The Malware Entrapment Profile condition is available for rules
in Policy types Security and Logging.
• Parent Archive Type: Enables the administrator to assign
specific rules for items within archives such as ZIP, CAB, etc.
This condition does not match files outside the archives or the
archive files themselves.
The Parent Archive Type condition is available for rules in Policy
type Logging.
• Protocol: Used for the different browsing or downloading
protocols.
The Protocol condition is available for rules in Policy types
Security, Logging, and ICAP Forward.
M86 SECURITY
SECURITY POLICIES IN DEPTH
32
CHAPTER 1: SECURITY POLICY CONCEPTS
• Rule Action: Enables the option to log transactions when a
specific end-user action is performed. The rule actions include
Block, Allow, Block HTTPS, Bypass, Coach, Inspect or User
Approval.
Rule Action conditions are available for rules in Policy type
Logging.
• Spoofed Content: This condition applies to malicious files
disguised as harmless files.
The Spoofed Content condition is available for rules in Policy
types Security and Logging.
• Static Content List: This condition applies if a content's
signature is found in a list of predefined malicious content
signatures. This list is invisible to the administrator, and is
constantly updated by Trustwave SpiderLabs.
The Static Content List condition is available for rules in Policy
types Security and Logging.
• Time Frame: Enables the administrator to modify
organizational demands and requirements according to varying
week times. The predefined time frames provided with the
system can be modified to suit local times and customs. New
Time Frames can also be added.
Time Frame conditions are available for rules in Policy types
Security, Logging, and ICAP Forward.
• True Content Type: Unlike the declared content type, the True
Type detection engine limits the rule action to predefined
content types. The engine uses real content inspection to
identify the content type.
The True Content Type condition is available for rules in Policy
types Security, Logging, and ICAP Forward.
M86 SECURITY
SECURITY POLICIES IN DEPTH
33
SECURITY POLICY COMPONENTS
• URL Filtering: Blocks or allows content based on content
analysis instead of content source. A proprietary M86 List
Categorization engine is deployed as the primary URL
Categories Filter in the SWG, and provides increased
effectiveness by identifying embedded URLs.
The filter enables setting logical category groups, enabling
actions to be set by category group and not by every individual
category.
The URL Filtering condition is available for rules in Policy types
Security, HTTPS, Logging and ICAP Forward.
• URL Filtering (IBM/Websense): Specifies to which URL
category (or categories) the rule should apply. These categories
are maintained by the respective 3rd party.
The URL Filtering (IBM/Websense) condition is available for
rules in Policy types Security, HTTPS, Logging and ICAP
Forward.
• URL Lists: This condition refers to predefined URL white lists
(allowed), black lists (blocked), or bypass lists. Almost all URL
Lists are editable (the only pre-supplied list that is not editable is
M86 Security Recommended White List), and the administrator
can also create an organization-specific list.
This condition can also match the non-editable Spyware URL
List, which contains a list of known Spyware sites.
To configure URL Lists, click Policies Æ Condition Settings
Æ URL Lists. For more information, see the Management
Console Reference Guide.
The conditions are set against the URL lists.
The URL Lists condition is available for rules in Policy types
Security, HTTPS, Caching, Logging, Identification, Device
Logging, Upstream Proxy and ICAP Forward.
M86 SECURITY
SECURITY POLICIES IN DEPTH
34
CHAPTER 1: SECURITY POLICY CONCEPTS
• Upstream Proxy: Configures connections to upstream proxies.
Scanned traffic is sent either to a router, based on routing table
information, or to an upstream proxy, where the request is sent
in proxy format. Upstream proxy connection configuration is
through one of the following options:
y Client IP Header and User Name Header: How user
credentials are forwarded to the upstream proxy.
y Protocol: Protocol used to forward to the upstream proxy.
To configure Upstream Proxy, click Policies Æ Condition
Settings Æ Upstream Proxy. For more information, see the
Management Console Reference Guide.
The conditions are set against the configured upstream proxy
and are available for rules in Policy type Device Logging.
• Upstream Proxy Status: Checks if the connection to an
Upstream Proxy was successful.
The Upstream Proxy Status condition is available for rules in
Policy type Device Logging.
M86 SECURITY
SECURITY POLICIES IN DEPTH
35
USER MANAGEMENT
User Management
The basis for managing users in most environments is within
groups. Groups enable a more efficient method for assigning
policies for many users who require the same security profile.
Once a member of a group, policy management at the group level
automatically affects all the users assigned to the group.
Policies can have groups applied to them, or policies can have
groups excluded. For more information, see Assigning Policies to
User Groups and Users and the Management Console Reference
Guide.
IMPORTANT: It is important for administrators to maintain
configuration records to avoid anomalies where users are both in
groups applied to policies, and in groups excluded from policies.
In addition, defined User Lists enable administrators to specify to
which users a Security, HTTPS, or Logging policy rule will be
applied and which users should be excluded. For more information,
see Defining User Lists and the Management Console Reference
Guide.
M86 SECURITY
SECURITY POLICIES IN DEPTH
36
CHAPTER 2: DETAILED RULE DESCRIPTIONS
Chapter 2: Detailed Rule Descriptions
This chapter provides detailed rule descriptions.
Rules are used to set policies described in Chapter 3: Implementing
Security Policy. and are based on conditions described in Chapter 1:
Security Policy Concepts.
SWG provides pre-set rules encompassing all areas of security.
SWG also enables the creation of new rules as required by the
organization’s security demands.
For more information, see Creating / Editing a Rule in a User-Defined
Policy and Adding / Editing Conditions in a Rule.
For an example of rule creation, see Example - Creating a New Rule.
The example describes a Data Leakage Prevention policy, rule and
condition creation, and test.
Rules
Allow Access to White Listed Sites
This rule enables access to sites included on the safe lists.
However, SWG still scans any files within container files—such as
zip files—residing on a White Listed site.
White lists can be used to prevent over-blocking caused by
detecting dangerous operations in active content required for
organization productivity - for example, Microsoft Windows update
sites containing a powerful ActiveX control. Effectively, White lists
are a type of performance accelerator when browsing trusted sites.
M86 SECURITY
SECURITY POLICIES IN DEPTH
37
RULES
The following table describes the M86-provided rule definitions:
Allow Access to White Listed Sites
General Tab
Action
Allow
Advanced Action
Allow content and scan containers
Apply to Tab
User options
All Users
Exceptions Tab
Open workspace
None provided by M86.
This rule definition cannot be edited, but can be copied and
modified, and the condition elements can be edited. A copied and
modified rule can enable any defined condition.
Conditions
For this rule, SWG selects the following conditions:
• Customer Defined White List: Editable as an element by
clicking Policies Æ Condition Settings Æ URL Lists, and
then clicking Customer Defined White List.
• M86 Recommended White List: Provided by Trustwave
SpiderLabs and updated through maintenance updates.
• URL White List (Strict): Editable by clicking Policies Æ
Condition Settings Æ URL Lists, and then clicking URL
White List (Strict).
M86 SECURITY
SECURITY POLICIES IN DEPTH
38
CHAPTER 2: DETAILED RULE DESCRIPTIONS
Testing the Rule
 To test the Allow Access to White Listed Sites rule:
1. Copy and paste the following blocked URL site into your
browser:
http://www.m86security.com/EVG/passwordprotected.zip and
press Enter. The Login page opens.
2. Type the username: getevg and password: HurNoc45, and
then click OK.
The URL is blocked because the URL contains a password
protected archive. The following error message opens:
Figure 2-1: Page Blocked – Password Protected
To avoid blocking this page, add it to either the Customer Defined
White List, or the URL White List (Strict).
 To add a URL address to the Customer Defined White List:
1. Click Policies Æ Condition Settings Æ URL Lists, and then
click Customer Defined White List. In the right pane the
Customer Defined White List workspace opens.
M86 SECURITY
SECURITY POLICIES IN DEPTH
39
RULES
2. At the bottom right of the screen, click Edit.
Figure 2-2: Edit URL to Customer Defined White List
3. To add a row (URL), click
. A blank row opens in the table.
Figure 2-3: Add URL to Customer Defined White List
4. In the highlighted URL box, type the new URL:
http://www.m86security.com/EVG/passwordprotected.zip
5. Click Save, and then click
M86 SECURITY
.
SECURITY POLICIES IN DEPTH
40
CHAPTER 2: DETAILED RULE DESCRIPTIONS
6. Copy and paste the following blocked URL site into your
browser:
http://www.m86security.com/EVG/passwordprotected.zip and
press Enter. The Login page opens. To connect to the site, type
the username: getevg and password: HurNoc45, and click OK.
The following dialog box opens.
Figure 2-4: Web Site from White List
7. To save the file select Save File, and to view the file select
Open with and select the application to open the file.
8. Click OK.
 To remove a URL address from the Customer Defined White
List:
1. Click Policies Æ Condition Settings Æ URL Lists, and then
click Customer Defined White List. In the right pane the
Customer Defined White List workspace opens.
2. At the bottom right of the screen, click Edit.
M86 SECURITY
SECURITY POLICIES IN DEPTH
41
RULES
3. Click
next to the www.m86security.com/EVG/
passwordprotected.zip entry, and then click Delete URL. The
URL is deleted from the from the Customer Defined White List.
4. Click Save, and then on the tool bar, click
.
Allow All
NOTES: This rule appears only in the Full Bypass Policy, and is
the only rule in that policy.
This rule enables all scanning to be bypassed, effectively
suspending the M86 engine scanners. The rule setting is provided
by M86 and is intended for end-users permitted to surf through the
M86 SWG Appliance without any scanning.
The following table describes the M86-provided rule definitions:
Allow All
General Tab
Action
Allow
Advanced Action
Bypass Scanning
Apply to Tab
User options
All Users
Exceptions Tab
Open workspace
None provided by M86.
This rule definition cannot be edited, but can be copied and
modified, and the condition elements can be edited. A copied and
modified rule can enable any defined condition.
M86 SECURITY
SECURITY POLICIES IN DEPTH
42
CHAPTER 2: DETAILED RULE DESCRIPTIONS
Allow and Scan Customer-Defined File Extensions
This rule enables files with specific extensions to avoid scanning,
and at the same time enables container file scanning, for example
zipped files.
The following table describes the M86-provided rule definitions:
Allow and Scan Customer-Defined File Extensions
General Tab
Action
Allow
Advanced Action
Allow content and scan containers
Apply to Tab
User options
All Users
Exceptions Tab
Open workspace
None provided by M86.
Conditions
For this rule, SWG selects only the condition File Extensions
White List. Editable as an element by clicking Policies Æ
Condition Settings Æ File Extensions, and then—depending on
the rule—clicking File Extensions White List (Basic), or File
Extensions White List (Medium), or File Extensions White List
(Strict).
The list of supported file types is predefined and non-editable.
All file extension categories are predefined by Trustwave
SpiderLabs and modified by SWG software updates. The condition
definition is based on selecting these file extension categories.
M86 SECURITY
SECURITY POLICIES IN DEPTH
43
RULES
Allow and Scan Customer-Defined True Content
Type
This rule enables certain true type files, as defined by system
administrators, not to be scanned. The true type files are still
scanned if they are within archive containers. For this rule, SWG
provides no conditions.
The following table describes the M86-provided rule definitions:
Allow and Scan Customer-Defined True Content Type
General Tab
Action
Allow
Advanced Action
Allow content and scan containers
Apply to Tab
User options
All Users
Exceptions Tab
Open workspace
None provided by M86.
Conditions
For this rule, SWG provides no conditions. A copied and modified
rule can enable any defined condition. The conditions are grouped
file types, so before setting the conditions on a new rule, set the
files types to the conditions.
M86 SECURITY
SECURITY POLICIES IN DEPTH
44
CHAPTER 2: DETAILED RULE DESCRIPTIONS
Allow Known Legitimate Content
This rule enables the scanning of files that have been approved as
known legitimate content by M86 to be bypassed.
The following table describes the M86-provided rule definitions:
Allow Known Legitimate Content
General Tab
Action
Allow
Advanced Action
Allow content and do not scan containers
Apply to Tab
User options
All Users
Exceptions Tab
Open workspace
None provided by M86.
Conditions
For this rule, SWG selects only the condition Known Legitimate
Content List. The list is generated by Trustwave SpiderLabs and
is not accessible by the administrator. The list is updated during
SWG software updates.
M86 SECURITY
SECURITY POLICIES IN DEPTH
45
RULES
Allow Streaming
This rule enables media streaming such as audio and video to
pass through the system.
The following table describes the M86-provided rule definitions:
Allow Streaming
General Tab
Action
Allow
Advanced Action
Bypass scanning
Apply to Tab
User options
All Users
Exceptions Tab
Open workspace
None provided by M86.
This rule definition cannot be edited, but can be copied and
modified, and the condition elements can be edited. A copied and
modified rule can enable any defined condition.
Conditions
For this rule, SWG selects only the condition Streaming.
A copied and modified rule can enable any of the other conditions.
The conditions are grouped file types, so before setting the
conditions on a new rule, set the files types to the conditions.
M86 SECURITY
SECURITY POLICIES IN DEPTH
46
CHAPTER 2: DETAILED RULE DESCRIPTIONS
Allow Trusted Sites
This rule refers to security scanning being disabled completely on
highly trusted sites (as long as they are not blacklisted or part of a
Spyware/Adware list).
NOTES: Generally this rule is run prior to other security rules
(apart from blacklisted or spyware/adware sites). None of the sites
in the Trusted Sites and URL Bypass List will be scanned for any
security breach. Therefore, M86 recommends using this only for
selected sites and using the regular Customer Defined White List
for the majority of trusted sites.
The following table describes the M86-provided rule definitions:
Allow Trusted Sites
General Tab
Action
Allow
Advanced Action
Bypass scanning
Apply to Tab
User options
All Users
Exceptions Tab
Open workspace
None provided by M86.
This rule definition cannot be edited, but can be copied and
modified, and the condition elements can be edited. A copied and
modified rule can enable any defined condition.
M86 SECURITY
SECURITY POLICIES IN DEPTH
47
RULES
Conditions
For this rule, SWG selects the following conditions:
• Allow Large Download Sites: Editable as an element by
clicking Policies Æ Condition Settings Æ URL Lists, and
then clicking Allowed Large Download Sites.
• Trusted Sites: Editable as an element by clicking Policies Æ
Condition Settings Æ URL Lists, and then clicking Trusted
Sites.
• URL Bypass List (Basic): Editable as an element by clicking
Policies Æ Condition Settings Æ URL Lists, and then
clicking URL Bypass List (Basic).
Allow Whitelisted ActiveX, Java Applets and
Executables
This rule enables items in the “Allowed” Active Content List to enter
without scanning.
The following table describes the M86-provided rule definitions:
Allow Whitelisted ActiveX, Java Applets and Executables
General Tab
Action
Allow
Advanced Action
Allow content and do not scan containers
Apply to Tab
User options
All Users
Exceptions Tab
Open workspace
M86 SECURITY
None provided by M86.
SECURITY POLICIES IN DEPTH
48
CHAPTER 2: DETAILED RULE DESCRIPTIONS
This rule definition cannot be edited, but can be copied and
modified, and the condition elements can be edited. A copied and
modified rule can enable any defined condition.
Note the following:
• SWG creates signatures for active content (Java Applets,
ActiveX and Executable files) that passes through the SWG.
These signatures are available in the Active Content List. To
see the list, click Policies Æ Condition Settings Æ Active
Content List Æ Auto-generated. Auto-generated active
content signature entries can be moved to a destination group;
Allowed list or Blocked list. For the Default M86 Security Policy,
content based on signature only, is passed without scanning for
entries moved to the Allowed list. This enables the administrator
to specifically allow binary active content.
• If the Allow Whitelisted ActiveX, Java Applets and
Executables rule conditions are met, the rule is enforced at the
response phase.
Conditions
For this rule, SWG selects only the condition Allowed. This
condition refers to content with signatures listed in the Active
Content List. There are three lists, Allowed, Auto-generated and
Blocked. To edit these lists, click Policies Æ Condition Settings
Æ Active Content List. Then click the list to edit, and edit the lists
as required.
M86 SECURITY
SECURITY POLICIES IN DEPTH
49
RULES
Block Access to Adware Sites
This rule blocks predefined Adware URLs. The rule is enforced,
when its conditions are met, at the Request phase.
The following table describes the M86-provided rule definitions:
Block Access to Adware Sites
General Tab
Action
Block
End-user Message
Blocked adware URL
Apply to Tab
User options
All Users
Exceptions Tab
Open workspace
None provided by M86.
This rule definition cannot be edited, but can be copied and
modified, and the condition elements can be edited. A copied and
modified rule can enable any defined condition.
Conditions
For this rule, SWG selects only the condition Adware URL List.
The list is generated by Trustwave SpiderLabs and is not
accessible by the administrator. The list is updated during SWG
software updates.
M86 SECURITY
SECURITY POLICIES IN DEPTH
50
CHAPTER 2: DETAILED RULE DESCRIPTIONS
Testing the Rule
 To test the Block Access to Adware Sites rule:
1. Copy and paste the following URL into your browser (known
adware):
www.infinityads.com
The following message opens when trying to access this site.
Figure 2-5: Page Blocked Message – Adware Sites
2. Return to the Management Console and click Logs and
Reports Æ View Web Logs.
3. At the bottom right of the screen, click Manage Profiles, and
then in the left pane, click admin Blocked Transactions. The
blocked transactions are listed in the right pane.
4. In the same row as the blocked transaction, click
and click
Details. The Transaction Detail tabs include Transaction, User,
Policy Enforcement, Content and Scanning Server details.
M86 SECURITY
SECURITY POLICIES IN DEPTH
51
RULES
5. To view additional information on the transaction’s Request
phase, in the Transaction Details tree, click Request. Only the
Request component exists for this transaction because it was
blocked at the Request phase.
Figure 2-6: Request: Adware Sites
M86 SECURITY
SECURITY POLICIES IN DEPTH
52
CHAPTER 2: DETAILED RULE DESCRIPTIONS
Block Access to Blacklisted Sites
This rule blocks URLs on a predefined list specifying blacklisted
sites. The rule is enforced, when its conditions are met, at the
Request phase.
The following table describes the M86-provided rule definitions:
Block Access to Blacklisted Sites
General Tab
Action
Block
End-user Message
Blacklisted URL
Apply to Tab
User options
All Users
Exceptions Tab
Open workspace
None provided by M86.
This rule definition cannot be edited, but can be copied and
modified, and the condition elements can be edited. A copied and
modified rule can enable any defined condition.
Conditions
For this rule, SWG selects the following conditions:
• Customer Defined Black List: Editable as an element by
clicking Policies Æ Condition Settings Æ URL Lists, and
then clicking Customer Defined Black List. Entries can be
added or deleted, which determines what is blocked by SWG.
• M86 Recommended Black List: Cannot be edited or viewed
by the administrator.
• URL Black List (Basic): Editable as an element by clicking
Policies Æ Condition Settings Æ URL Lists, and then
clicking URL Black List (Basic).
M86 SECURITY
SECURITY POLICIES IN DEPTH
53
RULES
Testing the Rule
 To test the Block Access to Blacklisted Sites rule:
1. Click Policies Æ Condition Settings Æ URL Lists, and then
click Customer Defined Black List. In the right pane the
Customer Defined Black List workspace opens.
2. At the bottom right of the screen, click Edit.
Figure 2-7: Edit URL to Customer Defined Black List
M86 SECURITY
SECURITY POLICIES IN DEPTH
54
CHAPTER 2: DETAILED RULE DESCRIPTIONS
3. To add a row (URL), click
. A blank row opens in the table.
Figure 2-8: Add URL to Customer Defined Black List
4. In the highlighted URL box, type the new URL:
www.cnn.com/* (‘*’ is the wild card, meaning that all URLs
contained within www.cnn.com will be blocked).
5. Click Save, and then click
.
 To test that this website was blocked:
1. Copy and paste the following URL into your browser:
www.cnn.com
The following message opens when trying to access this site.
Figure 2-9: Page Blocked Message – Blacklisted Sites
NOTES: The transaction ID refers to the unique interaction
between the end-user and the SWG system.
M86 SECURITY
SECURITY POLICIES IN DEPTH
55
RULES
2. Return to the Management Console and click Logs and
Reports Æ View Web Logs.
mp
Figure 2-10: Web Logs
3. In the same row as the blocked cnn.com transaction, click
and then click Details. The Transaction Detail tabs include
Transaction, User, Policy Enforcement, Content and Scanning
Server details.
4. In the Transaction Details tree, click Request to obtain further
information on the Request phase of this transaction. Only the
Request component exists for this transaction since it was
blocked at the Request phase.
M86 SECURITY
SECURITY POLICIES IN DEPTH
56
CHAPTER 2: DETAILED RULE DESCRIPTIONS
Figure 2-11: Request: Blacklisted Site
 To remove this website from the Customer Defined Black List:
1. Click Policies Æ Condition Settings Æ URL Lists, and then
click Customer Defined Black List. In the right pane the
Customer Defined Black List workspace opens.
2. To open the screen for editing, click Edit.
3. In the same row as the blacklisted URL www.cnn.com
transaction, click
, and then click Delete.
4. Click Save, and then click
M86 SECURITY
.
SECURITY POLICIES IN DEPTH
57
RULES
Block Access to High-Risk Site Categories
NOTES: If the rule name is followed by a (Websense) or (IBM)
qualifier, the rule applies to filtering by the respective engine. If the
rule name is not followed by a qualifier, the rule applies to all M86
filtering.
This rule blocks a list of predefined URL categories. A different
URL list is provided for the Websense, IBM Proventia, and M86
Web Filter, depending on your license. The rule is enforced, when
its conditions are met, at the Request phase.
NOTE: Websense and IBM Proventia Web Security filter engines
require a license.
The following table describes the M86-provided rule definitions:
Block Access to High-Risk Site Categories
General Tab
Action
Block
End-user Message
Blocked URL Category
Apply to Tab
User options
All Users
Exceptions Tab
Open workspace
None provided by M86.
This rule definition cannot be edited, but can be copied and
modified, and the condition elements can be edited. A copied and
modified rule can enable any defined condition.
M86 SECURITY
SECURITY POLICIES IN DEPTH
58
CHAPTER 2: DETAILED RULE DESCRIPTIONS
Conditions
For the following rules, SWG selects the following conditions:
• URL Filtering: Includes the following condition elements and
sub-condition elements:
y Security: Includes the security sub-condition elements Bad
Reputation Domains, BotNet, Hacking, Malicious Code/Virus
Phishing, Spyware, Web-based, and Proxies/Anonymizers.
These elements can be selected or deactivated according to
organizational policies. To maximize security, the provided
M86 rule has all elements selected.
• URL Filtering (Websense): Includes the following condition
elements:
y Adult/Sexually Explicit
y Hacking
y Proxies and Translators
y Spyware
• URL Filtering (IBM): Includes the following condition elements:
y Anonymous Proxies
y Computer Crime/Hacking
y Erotic/Sex
y Malware
y Phishing URLs
y Pornography
y Spam URLs
y Warez/Software Piracy
M86 SECURITY
SECURITY POLICIES IN DEPTH
59
RULES
Testing the Rule
 To test the Block Access to High-Risk Site Categories rule:
1. Copy and paste the following URL into your browser:
http://www.hackingexposed.com/
The following message opens when trying to access this site.
Figure 2-12: Page Blocked Message - Hacking
NOTES: The transaction ID refers to the unique interaction
between the end-user and the SWG system.
2. Return to the Management Console and click Logs and
Reports Æ View Web Logs.
3. In the same row as the blocked transaction, click
and then
click Details. The Transaction Detail tabs include Transaction,
User, Policy Enforcement, Content and Scanning Server
details.
4. In the Transaction Details tree, click Request to obtain further
information on the Request phase of this transaction. Only the
Request component exists for this transaction since it was
blocked at the Request phase.
M86 SECURITY
SECURITY POLICIES IN DEPTH
60
CHAPTER 2: DETAILED RULE DESCRIPTIONS
Figure 2-13: Request: High-Risk Site Categories - Hacking
Block Access to Spyware Sites
This rule blocks predefined Spyware Sites. The rule is enforced,
when its conditions are met, at the Request phase.
The following table describes the M86-provided rule definitions:
Block Access to Spyware Sites
General Tab
Action
Block
End-user Message
Blocked Spyware URL
Apply to Tab
User options
All Users
Exceptions Tab
Open workspace
M86 SECURITY
None provided by M86.
SECURITY POLICIES IN DEPTH
61
RULES
This rule definition cannot be edited, but can be copied and
modified, and the condition elements can be edited. A copied and
modified rule can enable any defined condition.
Conditions
For this rule, SWG selects only the condition Spyware URL List.
The list is generated by Trustwave SpiderLabs and is not
accessible by the administrator. The list is updated during SWG
software updates.
Testing the Rule
 To test the Block Access to Spyware Sites rule:
1. Copy and paste the following URLs (known spyware sites) into
your browser:
y www.dplog.com
y www.cashsearch.biz
The following message opens when trying to access the sites.
Figure 2-14: Page Blocked Message – Spyware Sites
2. Return to the Management Console and click Logs and
Reports Æ View Web Logs.
M86 SECURITY
SECURITY POLICIES IN DEPTH
62
CHAPTER 2: DETAILED RULE DESCRIPTIONS
Figure 2-15: View Web Logs
3. In the same row as the blocked transaction, click
and then
click Details. The Transaction Detail tabs include Transaction,
User, Policy Enforcement, Content and Scanning Server
details.
Figure 2-16: Transaction Details - Spyware Site
M86 SECURITY
SECURITY POLICIES IN DEPTH
63
RULES
4. In the Transaction Details tree, click Request to obtain further
information on the Request phase of this transaction. Only the
Request component exists for this transaction since it was
blocked at the Request phase.
Figure 2-17: Request: Spyware Sites
M86 SECURITY
SECURITY POLICIES IN DEPTH
64
CHAPTER 2: DETAILED RULE DESCRIPTIONS
Block ActiveX, Java Applets and Executables by
ACL
The rule causes the SWG Appliance to block items moved to the
“Blocked” Active Content List. The rule is enforced, when its
conditions are met, at the Response phase, unless it is uploaded.
The following table describes the M86-provided rule definitions:
Block ActiveX, Java Applets and Executables by ACL
General Tab
Action
Block
End-user Message
Active Content List
Apply to Tab
User options
All Users
Exceptions Tab
Open workspace
None provided by M86.
This rule definition cannot be edited, but can be copied and
modified, and the condition elements can be edited. A copied and
modified rule can enable any defined condition.
Note the following:
• SWG creates signatures for active content (Java Applets,
ActiveX and Executable files) that passes through the SWG.
These signatures are available in the Active Content List. To
see the list, click Policies Æ Condition Settings Æ Active
Content List Æ Auto-generated. Auto-generated active
content signature entries can be moved to a destination group;
Allowed list or Blocked list.
M86 SECURITY
SECURITY POLICIES IN DEPTH
65
RULES
Once an entry is moved to the Blocked list, the next time an
end-user requests a blacklisted entry, the content is blocked
automatically—without scanning— based on signature only.
Figure 2-18: Auto-generated Screen
Conditions
For this rule, SWG selects only the condition Blocked. This
condition refers to content with signatures listed in the Active
Content List. There are three lists; Allowed, Auto-generated and
Blocked. To edit these lists, click Policies Æ Condition Settings
Æ Active Content List. Then click the list to edit, and edit the lists
as required.
M86 SECURITY
SECURITY POLICIES IN DEPTH
66
CHAPTER 2: DETAILED RULE DESCRIPTIONS
Testing the Rule
 To test the Block ActiveX, Java Applets and Executables by
ACL rule:
1. Go to a site that uses Java Applets such as:
http://java.sun.com/applets/jdk/1.3/
2. On the left side, click one example, for example: Dither Test.
3. To open the Auto-generated screen displaying active content,
click Policies Æ Condition Settings Æ Active Content List
Æ Auto-generated.
p
Figure 2-19: Auto-generated Screen: Example
4. In the Find All field, type the word Java, and then click Go.
5. Select all the found entries. In the To field, select the Blocked
List.
6. Click Save, and then click
.
7. Re-access the Java Applets using the site, in our example:
http://java.sun.com/applets/jdk/1.3/
This will result in an access denied message.
M86 SECURITY
SECURITY POLICIES IN DEPTH
67
RULES
Block Binary Exploits in Textual Files
This rule blocks potential exploitations of vulnerable applications
by detecting and blocking textual files with binary data.
The following table describes the M86-provided rule definitions:
Block Binary Exploits in Textual Files
General Tab
Action
Block
End-user Message
Blocked Binary Exploit in Textual File
Apply to Tab
User options
All Users
Exceptions Tab
Open workspace
None provided by M86.
This rule definition cannot be edited, but can be copied and
modified, and the condition elements can be edited. A copied and
modified rule can enable any defined condition.
Conditions
For this rule, SWG selects the following conditions:
• Content Size: Content size refers to the size (in KB) of the
content being scanned. These content size values limit very
large files from entering or leaving your organization.
• File extensions: Only the Potentially Exploitable Textual
Files element is selected, which cannot be edited by the
administrator. However, it can be viewed at Policies Æ
Condition Settings Æ File extensions.
• True Content Type: Only Other is selected, referring to binary
content in a textual file.
M86 SECURITY
SECURITY POLICIES IN DEPTH
68
CHAPTER 2: DETAILED RULE DESCRIPTIONS
Block Binary Objects With Invalid Digital Certificate
This rule blocks binary objects which, for various reasons, have an
incorrect digital certificate attached.
The following table describes the M86-provided rule definitions:
Block Binary Objects With Invalid Digital Certificate
General Tab
Action
Block
End-user Message
Digital Signature Violation
Apply to Tab
User options
All Users
Exceptions Tab
Open workspace
None provided by M86.
This rule definition cannot be edited, but can be copied and
modified, and the condition elements can be edited. A copied and
modified rule can enable any defined condition.
Conditions
For this rule, SWG selects only the condition Digital Signatures,
which specifies if the content has an invalid digital signature.
M86 SECURITY
SECURITY POLICIES IN DEPTH
69
RULES
Testing the Rule
 To test the Block Binary Objects with Invalid Digital Certificate
rule:
1. Copy and paste the following URL into your browser:
http://www.m86security.com/EVG/invalid%20signature.exe
2. To connect to the site, type the username: getevg and
password: HurNoc45, and then click OK.
The following message opens when trying to access the site.
Figure 2-20: Page Blocked - Invalid Signature
3. Return to the Management Console and click Logs and
Reports Æ View Web Logs.
4. In the same row as the blocked transaction, click
and then
click Details. The Transaction Detail tabs include Transaction,
User, Policy Enforcement, Content and Scanning Server
details.
M86 SECURITY
SECURITY POLICIES IN DEPTH
70
CHAPTER 2: DETAILED RULE DESCRIPTIONS
5. In the Transaction Details tree, click Request/Response to
obtain further information on the Request and Response phase
of this transaction.
Figure 2-21: Response: Invalid Digital Signature
Block Binary Objects Without a Digital Certificate
This rule blocks binary objects that do not have a digital certificate
verifying their integrity. The digital certificate identifies to whom the
certificate was issued and the certifying authority that issued the
certificate. ActiveX, executables and other binary objects which are
not signed by a Certification Authority are potentially malicious
objects. The digital certificate contains information about who the
certificate was issued to, as well as the certifying authority that
issued the certificate.
M86 SECURITY
SECURITY POLICIES IN DEPTH
71
RULES
The following table describes the M86-provided rule definitions:
Block Binary Objects Without a Digital Certificate
General Tab
Action
Block
End-user Message
Digital Signature Violation
Apply to Tab
User options
All Users
Exceptions Tab
Open workspace
None provided by M86.
This rule definition cannot be edited, but can be copied and
modified, and the condition elements can be edited. A copied and
modified rule can enable any defined condition.
Conditions
For this rule, SWG selects the following conditions:
• Digital Signatures: Specifies if the content has a missing
digital signature.
• Parent Archive Type: Enables the administrator to assign
specific rules for items within archives such as ZIP, CAB, etc.
For this rule, M86 has selected Everything except for the
items selected below, and with nothing selected, effectively
selects all the archive types listed in the SWG.
M86 SECURITY
SECURITY POLICIES IN DEPTH
72
CHAPTER 2: DETAILED RULE DESCRIPTIONS
Testing the Rule
 To test the Block Binary Objects without a Digital Certificate
rule:
1. Copy and paste the following URL into your browser:
http://www.m86security.com/EVG/no_digital_signature.exe
2. To connect to the site, type the username: getevg and
password: HurNoc45, and then click OK.
The following message opens when trying to access the site.
Figure 2-22: Page Blocked - Missing Digital Signature
3. Return to the Management Console and click Logs and
Reports Æ View Web Logs.
4. In the same row as the blocked transaction, click
and then
click Details. The Transaction Detail tabs include Transaction,
User, Policy Enforcement, Content and Scanning Server
details.
M86 SECURITY
SECURITY POLICIES IN DEPTH
73
RULES
5. In the Transaction Details tree, click Request/Response to
obtain further information on the Request and Response phase
of this transaction.
Figure 2-23: Response: Missing Digital Signature
M86 SECURITY
SECURITY POLICIES IN DEPTH
74
CHAPTER 2: DETAILED RULE DESCRIPTIONS
Block Binary VAD Vulnerabilities
This rule blocks binary application level vulnerabilities based on
Trustwave SpiderLabs detection rules.
The following table describes the M86-provided rule definitions:
Block Binary VAD Vulnerabilities
General Tab
Action
Block
End-user Message
Binary VAD Violation
Apply to Tab
User options
All Users
Exceptions Tab
Open workspace
None provided by M86.
This rule definition cannot be edited, but can be copied and
modified, and the condition elements can be edited. A copied and
modified rule can enable any defined condition.
Conditions
The condition is actually a Suspected Malware list which is
updated by Trustwave SpiderLabs, and cannot be accessed by the
administrator.
M86 SECURITY
SECURITY POLICIES IN DEPTH
75
RULES
Block Blacklisted File Extensions
This rule blocks file types which may be a security hazard and are
not normally used by legitimate sites/applications.
The following table describes the M86-provided rule definitions:
Block Blacklisted File Extensions
General Tab
Action
Block
End-user Message
File Extension
Apply to Tab
User options
All Users
Exceptions Tab
Open workspace
None provided by M86.
This rule definition cannot be edited, but can be copied and
modified, and the condition elements can be edited. A copied and
modified rule can enable any defined condition.
Conditions
For this rule, SWG selects only the condition File Extensions
Black List. Editable as an element by clicking Policies Æ
Condition Settings Æ File Extensions, and then—depending on
the rule—clicking File Extensions Black List (Medium), or File
Extensions Black List (Strict).
The list of supported file types is predefined and non-editable.
All file extension categories are predefined by Trustwave
SpiderLabs and modified by SWG software updates. The condition
definition is based on selecting these file extension categories.
M86 SECURITY
SECURITY POLICIES IN DEPTH
76
CHAPTER 2: DETAILED RULE DESCRIPTIONS
Testing the Rule
 To test the Block Blacklisted File Extensions rule:
1. Copy and paste the following URL into your browser:
http://www.m86security.com/EVG/dir.cmd
2. To connect to the site, type the username: getevg and
password: HurNoc45, and then click OK.
The following message opens when trying to access the site.
:
Figure 2-24: Page Blocked - Forbidden File Extensions
3. Return to the Management Console and click Logs and
Reports Æ View Web Logs.
M86 SECURITY
SECURITY POLICIES IN DEPTH
77
RULES
4. In the Transaction Details tree, click Request/Response to
obtain further information on the Request and Response phase
of this transaction.
Figure 2-25: Request - Forbidden File Extensions
M86 SECURITY
SECURITY POLICIES IN DEPTH
78
CHAPTER 2: DETAILED RULE DESCRIPTIONS
Block Customer-Defined File Extensions
This rule blocks files with a specific extension, defined and
selected by the administrator.
The rule is enabled only in the M86 Basic Security Policy.
The following table describes the M86-provided rule definitions:
Block Customer-Defined File Extensions
General Tab
Action
Block
End-user Message
File Extension
Apply to Tab
User options
All Users
Exceptions Tab
Open workspace
None provided by M86.
This rule definition cannot be edited, but can be copied and
modified, and the condition elements can be edited. A copied and
modified rule can enable any defined condition.
Conditions
The list of supported file types is predefined and non-editable.
All file extension categories are predefined by Trustwave
SpiderLabs and modified by SWG software updates. The condition
definition is based on selecting these file extension categories.
M86 SECURITY
SECURITY POLICIES IN DEPTH
79
RULES
Block Customer-Defined True Content Type
This rule blocks specific content type files, selected by the
administrator.
The rule is enabled only in the M86 Basic Security Policy.
The following table describes the M86-provided rule definitions:
Block Customer-Defined True Content Type
General Tab
Action
Block
End-user Message
Type Detector
Apply to Tab
User options
All Users
Exceptions Tab
Open workspace
None provided by M86.
This rule definition cannot be edited, but can be copied and
modified, and the condition elements can be edited. A copied and
modified rule can enable any defined condition.
Conditions
The condition type is True Content Type, but for this rule by default
SWG does not select any file extensions.
The list of supported file types is predefined and non-editable.
All file extension categories are predefined by Trustwave
SpiderLabs and modified by SWG software updates. The condition
definition is based on selecting these file extension categories.
M86 SECURITY
SECURITY POLICIES IN DEPTH
80
CHAPTER 2: DETAILED RULE DESCRIPTIONS
Block Everything Except White Lists
NOTES: This rule appears only in M86 Emergency Policy, and is
the first rule listed in that policy. (The other rules in that policy also
appear in other policies.)
Blocks all URLs, except the ones which appear on the Emergency
White List or on the M86 Recommended White List.
The following table describes the M86-provided rule definitions:
Block Everything Except White Lists
General Tab
Action
Block
End-user Message
Emergency Policy Active
Apply to Tab
User options
All Users
Exceptions Tab
Open workspace
None provided by M86.
This rule definition cannot be edited, but can be copied and
modified, and the condition elements can be edited. A copied and
modified rule can enable any defined condition.
Conditions
For this rule, SWG selects all the URL List conditions except the
following two conditions:
• Emergency White List: A user-defined list of allowed sites.
Editable as an element by clicking Policies Æ Condition
Settings Æ URL Lists Æ Emergency White List.
M86 SECURITY
SECURITY POLICIES IN DEPTH
81
RULES
• M86 Recommended White List: The list is generated by
Trustwave SpiderLabs and is not accessible by the
administrator. The list is updated during SWG software updates.
Block Files with COM Extension
This rule blocks files with COM extensions (separately from the
Block Blacklisted File Extensions rule) which are a known
security risk.
The following table describes the M86-provided rule definitions:
Block Files with COM Extension
General Tab
Action
Block
End-user Message
File Extension
Apply to Tab
User options
All Users
Exceptions Tab
Open workspace
None provided by M86.
This rule definition cannot be edited, but can be copied and
modified, and the condition elements can be edited. A copied and
modified rule can enable any defined condition.
Conditions
For this rule, SWG selects the following conditions:
• Direction: Specifies the transaction direction (Incoming/
Outgoing) which triggers the rule. For example, in HTTP,
Outgoing means the protocol Request phase, and Incoming
means the protocol Response phase. SWG selects Incoming.
M86 SECURITY
SECURITY POLICIES IN DEPTH
82
CHAPTER 2: DETAILED RULE DESCRIPTIONS
• File Extensions: Only the COM element is selected, which
cannot be edited by the administrator. However, it can be
viewed at Policies Æ Condition Settings Æ File extensions.
• True Content Type: The following elements are selected:
y DOS Executable File: Refers to executable file developed
and run through DOS.
y Other: Refers to binary content in a textual file.
Block Files with Suspicious Multiple Extensions
This rule blocks files with suspicious multiple extensions. This is
based on a comparison of the last file extension to a list of
suspicious extensions (as well as comparing the extension before
last to a list of benign extensions). This rule protects users from
mistakenly downloading a potentially dangerous file.
The following table describes the M86-provided rule definitions:
Block Files with Suspicious Multiple Extensions
General Tab
Action
Block
End-user Message
Multiple Extension
Apply to Tab
User options
All Users
Exceptions Tab
Open workspace
None provided by M86.
This rule definition cannot be edited, but can be copied and
modified, and the condition elements can be edited. A copied and
modified rule can enable any defined condition.
M86 SECURITY
SECURITY POLICIES IN DEPTH
83
RULES
Conditions
For this rule, SWG selects only the File Extension condition
component Multiple Extensions. To edit the multiple extension
list, click Policies Æ Condition Settings Æ File extensions, and
then click Multiple Extensions.
Testing the Rule
 To test the Block Files with Suspicious Multiple Extensions
rule:
1. Copy and paste the following URL into your browser:
http://www.m86security.com/EVG/Capitalsettime.TXT.JS
2. To connect to the site, type the username: getevg and
password: HurNoc45, and then click OK.
The following message opens when trying to access the site.
Figure 2-26: Page Blocked - Multiple Extensions
3. Return to the Management Console and click Logs and
Reports Æ View Web Logs.
4. In the same row as the blocked transaction, click
and then
click Details. The Transaction Detail tabs include Transaction,
User, Policy Enforcement, Content and Scanning Server
details.
M86 SECURITY
SECURITY POLICIES IN DEPTH
84
CHAPTER 2: DETAILED RULE DESCRIPTIONS
5. In the Transaction Details tree, click Request to obtain further
information on the Request phase of this transaction. Only the
Request component exists for this transaction since it was
blocked at the Request phase.
Figure 2-27: Request: Multiple Extensions
M86 SECURITY
SECURITY POLICIES IN DEPTH
85
RULES
Block Illegitimate Archives (Including PasswordProtected Archives)
This rule blocks attacks that try to use malformed archives. It also
blocks password protected archives because they cannot be
scanned.
The following table describes the M86-provided rule definitions:
Block Illegitimate Archives (Including Password-Protected
Archives)
General Tab
Action
Block
End-user Message
Container Violation
Apply to Tab
User options
All Users
Exceptions Tab
Open workspace
None provided by M86.
This rule definition cannot be edited, but can be copied and
modified, and the condition elements can be edited. A copied and
modified rule can enable any defined condition.
M86 SECURITY
SECURITY POLICIES IN DEPTH
86
CHAPTER 2: DETAILED RULE DESCRIPTIONS
Conditions
For this rule, SWG selects the following Archive Errors condition
elements:
• File could not be extracted: Specifies containered files which
cannot be extracted, for example a compressed file. If a file
cannot be opened, it cannot be scanned.
• Invalid format: Specifies files with a format not recognized by
the system, and subsequently cannot be scanned.
• Password protected: Specified password protected files which
are closed to the system, and subsequently closed against
scanning.
Testing the Rule
 To test the Block Illegitimate Archives (Including Password
Protected Archives) rule:
1. Copy and paste the following URL into your browser:
http://www.m86security.com/EVG/demo.zip
This link will try to exploit ZIP file vulnerability causing a denial
of service.
2. To connect to the site, type the username: getevg and
password: HurNoc45, and click OK.
M86 SECURITY
SECURITY POLICIES IN DEPTH
87
RULES
A download status page appears.
After this page, the following error message is displayed:
Figure 2-28: Page Blocked - Illegitimate Archives
3. Return to the Management Console and click Logs and
Reports Æ View Web Logs.
4. In the same row as the blocked transaction, click
and select
Details. The Transaction Detail tabs include Transaction, User,
Policy Enforcement, Content and Scanning Server details.
M86 SECURITY
SECURITY POLICIES IN DEPTH
88
CHAPTER 2: DETAILED RULE DESCRIPTIONS
5. In the Transaction Details tree, click Request/Response to
obtain further information on the Request and Response
phases of this transaction.
Figure 2-29: Response: Illegitimate Archives
M86 SECURITY
SECURITY POLICIES IN DEPTH
89
RULES
Block IM Tunneling
This rule blocks IM tunneling by default since these are known
crimeware distribution vehicles.
The following table describes the M86-provided rule definitions:
Block IM Tunneling
General Tab
Action
Block
End-user Message
Instant Messenger Detected
Apply to Tab
User options
All Users
Exceptions Tab
Open workspace
None provided by M86.
This rule definition cannot be edited, but can be copied and
modified, and the condition elements can be edited. A copied and
modified rule can enable any defined condition.
Conditions
For this rule, SWG selects the following IM condition elements:
• AOL and ICQ
• Windows Live Messenger
• Yahoo Messenger
M86 SECURITY
SECURITY POLICIES IN DEPTH
90
CHAPTER 2: DETAILED RULE DESCRIPTIONS
Block Known Malicious Content
The rule statically blocks a list of predefined malicious objects
identified by Trustwave SpiderLabs.
The following table describes the M86-provided rule definitions:
Block Known Malicious Content
General Tab
Action
Block
End-user Message
Hash Scanner
Apply to Tab
User options
All Users
Exceptions Tab
Open workspace
None provided by M86.
This rule definition cannot be edited, but can be copied and
modified, and the condition elements can be edited. A copied and
modified rule can enable any defined condition.
Conditions
For this rule, SWG selects only the Static Content List condition
element Malicious Objects List. The Malicious Objects List
cannot be manipulated or viewed by the administrator.
M86 SECURITY
SECURITY POLICIES IN DEPTH
91
RULES
Block Known Spyware (ACL)
This rule blocks a list of predefined malicious content. This list is
generated by Trustwave SpiderLabs and is not accessible by the
administrator.
The following table describes the Rule Editor definitions:
Block Known Spyware (ACL)
Action
Block
End-User Message
Spyware Object Detected
Conditions
True Content Type
Active binary content
Active Content List
Spyware Objects
Note that the Block Known Spyware (ACL) rule will be enforced,
if its conditions were met, at the Response phase.
M86 SECURITY
SECURITY POLICIES IN DEPTH
92
CHAPTER 2: DETAILED RULE DESCRIPTIONS
Block Known Viruses (McAfee / Sophos /
Kaspersky)
The Block Known Viruses rules (McAfee/Sophos/Kaspersky)
block known viruses using the Anti-Virus engine that you have a
license for and provide a specific virus name in the Web Logs
where possible. There are three Anti-Virus engines – McAfee,
Sophos and Kaspersky – that work with the SWG Appliance. Using
an Anti-Virus engine helps to optimize user experience.
The following table describes the Rule definitions:
Block Known Viruses
Action
Block
End-User Message
Virus detected
Conditions
Anti-Virus (McAfee/
Sophos/Kaspersky)
M86 SECURITY
Virus detected
SECURITY POLICIES IN DEPTH
93
RULES
Testing the Rule
 To test the Block Known Viruses (McAfee/Sophos/Kaspersky)
rule:
1. Copy and paste the following URL into your browser:
http://www.m86security.com/EVG/eicar.com.txt
2. To connect to the site, type the username: getevg and
password: HurNoc45, and click OK.
The following error message is displayed:
Figure 2-30: Page Blocked: Virus
3. Return to the Management Console and select the Logs and
Reports Æ View Web Logs menu in the Main Navigation bar.
4. In the same row as the blocked transaction, click
and select
Details. The Transaction Detail tabs include Transaction, User,
Policy Enforcement, Content and Scanning Server details.
M86 SECURITY
SECURITY POLICIES IN DEPTH
94
CHAPTER 2: DETAILED RULE DESCRIPTIONS
5. In the Transaction Details tree, click Request/Response to
obtain further information on the Request and Response
phases of this transaction.
Figure 2-31: Response - Virus Detected
M86 SECURITY
SECURITY POLICIES IN DEPTH
95
RULES
Block Malicious ActiveX, Java Applets and
Executables
The Block Malicious ActiveX, Java Applets and Executables
rule uses the M86 Proprietary Behavior Profile (Binary) engine.
This is a unique security engine, designed to identify and block
malicious content by identifying combinations of operations,
parameters, script manipulations and other exploitation techniques
for a given piece of content.
The following table describes the definitions:
Block Malicious ActiveX, Java Applets and Executables
Action
Block
End-User Message
Malicious Behavior Detected
Conditions
Behavior Profile
M86 SECURITY
Default Profile - Binary Behavior (Strict)
Suspected Malware (Strict)
Medium Sensitivity Binary Behavior Profile
(Medium)
SECURITY POLICIES IN DEPTH
96
CHAPTER 2: DETAILED RULE DESCRIPTIONS
Note the following:
• If Default Profile - Binary Behavior is selected then this rule
prevents end-users from downloading most executables such
as setup.exe files and is therefore included only in the Strict
Security Policy. This is the only difference between the
Medium and Strict Security Policies.
• The Binary Behavior information can be found via Policies Æ
Condition Settings Æ Binary Behavior Æ Default Profile –
Binary Behavior.
Figure 2-32: Behavior Profile (Binary)
The Behavior Profile consists of selected behavior groups of the
Behavior Profile engine. Those groups are divided into 2 areas:
• ActiveX and Executables
• Java Applets
M86 SECURITY
SECURITY POLICIES IN DEPTH
97
RULES
Testing the Rule
Java Applets
 To test the Block Malicious ActiveX, Java Applets and
Executables rule with selection of the Behavior Blocking: Java
Applets:
1. Copy and paste the following URL into your browser:
http://www.m86security.com/EVG/readFile.class
2. To connect to the site, type the username: getevg and
password: HurNoc45, and click OK.
The following error message is displayed:
Figure 2-33: Error Messages: Malicious Behavior
3. Return to the Management Console and select the Logs and
Reports Æ View Web Logs menu in the Main Navigation bar.
4. In the same row as the blocked transaction, click
and select
Details. The Transaction Detail tabs include Transaction, User,
Policy Enforcement, Content and Scanning Server details.
M86 SECURITY
SECURITY POLICIES IN DEPTH
98
CHAPTER 2: DETAILED RULE DESCRIPTIONS
5. In the Transaction Details tree, click Request/Response to
obtain further information on the Request and Response
phases of this transaction.
Figure 2-34: Response: Malicious Behavior
ActiveX and Executables Violation:
 To test the Block Malicious ActiveX, Java Applets and
Executables rule with selection of the Behavior Blocking:
ActiveX and Executables Violation:
1. Copy and paste the following URL into your browser:
http://www.m86security.com/EVG/FinjanEmptyDemo.zip
M86 SECURITY
SECURITY POLICIES IN DEPTH
99
RULES
This URL contains an exe file which violates the following
restricted behaviors:
ƒ
ƒ
ƒ
ƒ
ƒ
ƒ
File Read
File Write
Terminate Process
Potentially Dangerous Process: Debugging
Functions
Potentially Dangerous Memory Management
Functions
Dynamic Link Library Invocation Functions
2. To connect to the site, type the username: getevg and
password: HurNoc45, and click OK.
The following error message is displayed:
Figure 2-35: Page Blocked - Malicious Behavior
3. Return to the Management Console and select the Logs and
Reports Æ View Web Logs menu in the Main Navigation bar.
4. In the same row as the blocked transaction, click
and select
Details. The Transaction Detail tabs include Transaction, User,
Policy Enforcement, Content and Scanning Server details.
M86 SECURITY
SECURITY POLICIES IN DEPTH
100
CHAPTER 2: DETAILED RULE DESCRIPTIONS
5. In the Transaction Details tree, click Request/Response to
obtain further information on the Request and Response
phases of this transaction.
Figure 2-36: Response: Malicious Behavior
M86 SECURITY
SECURITY POLICIES IN DEPTH
101
RULES
Block Malicious Content (Malware Entrapment
Engine)
The Block Malicious Content (Malware Entrapment Engine)
rule uses the M86 proprietary Malware Entrapment Scanning
engine to monitor, identify, and block malicious content. The
engine uses language tokens, semantic patterns of Active Code,
forbidden combinations of operations, parameters and
programming techniques, to identify malicious active content fed
into the engine.
This rule has a single condition: Malware Entrapment Profile.
Malware Entrapment Profiles are divided into five different security
levels: None, Basic, Medium, High and Strict. The security levels
pertain to the efficacy with which the profile is enforced. Each
profile level consists of a list of actions that could be considered
malicious or suspicious when executed by Web pages, VB Script
files, Java Script files or other relevant files.
The SWG system is pre-configured, by default, at the Medium
security level. Administrators can set an appropriate security level
on a per policy basis.
The following table describes the Rule Editor definitions:
Block Malicious Content (Malware Entrapment Engine)
Action
Block
End-User Message
Malicious Behavior Detected
Conditions
Malware
Entrapment Profile
M86 SECURITY
Active malicious content
SECURITY POLICIES IN DEPTH
102
CHAPTER 2: DETAILED RULE DESCRIPTIONS
Block Microsoft Office Documents containing
Macros and/or Embedded Files
The Block Microsoft Office Documents containing Macros
and/or Embedded files rule blocks Microsoft Office Documents
which contain macros or embedded files. This is because macros
and embedded files might contain malicious code.
The following table describes the definitions:
Block Microsoft Office Documents containing Macros and/or
Embedded file
Action
Block
End-User Message
Suspicious File Type Detected
Conditions
True Content Type
M86 SECURITY
Microsoft Office Document with Embedded Files,
Microsoft Office Document with Macros
SECURITY POLICIES IN DEPTH
103
RULES
Testing the Rule
 To test the Block Microsoft Office Documents containing
Macros and/or Embedded files rule:
1. Copy and paste the following URL into your browser:
http://www.m86security.com/EVG/macro.doc
2. To connect to the site, type the username: getevg and
password: HurNoc45, and click OK.
The following message appears:
Figure 2-37: Page Blocked - Microsoft Office document containing macro
3. Return to the Management Console and select the Logs and
Reports Æ View Web Logs menu in the Main Navigation bar.
4. In the same row as the blocked transaction, click
and select
Details. The Transaction Detail tabs include Transaction, User,
Policy Enforcement, Content and Scanning Server details.
M86 SECURITY
SECURITY POLICIES IN DEPTH
104
CHAPTER 2: DETAILED RULE DESCRIPTIONS
5. In the Transaction Details tree, click Request/Response to
obtain further information on the Request and Response
phases of this transaction.
Figure 2-38: Response: Microsoft Office document with Macros
M86 SECURITY
SECURITY POLICIES IN DEPTH
105
RULES
Block Outgoing Microsoft Office Documents
The Block Outgoing Microsoft Office Documents logs the
number of transmissions of Microsoft Office documents to the
Internet. In the M86 Policy it is defined as X-Ray.
The following table describes the Rule definitions:
Block Outgoing Microsoft Office Documents
Action
Block (X-Ray)
End-User Message
Outgoing Microsoft Office File Detection (N/A)
Conditions
Direction
Outgoing
File Extensions
Microsoft Office
True Content Type
Microsoft Office Document, Microsoft Office
Document with Embedded Files, Microsoft Office
Document with Macros, Microsoft Office Scrap
Object, Microsoft Outlook MSG Document,
Microsoft Word document, Microsoft Excel Macro
File, Microsoft Access Database
Note the following:
• The Block Outgoing Microsoft Office Documents rule has
been added as an X-ray rule in the predefined M86 Security
Policies.This means that no documents will actually be blocked;
but the results will be displayed in the Logs view.
• If the Block Outgoing Microsoft Office Documents rule was
Active, then it would be enforced, if its conditions were met, at
the Request phase.
M86 SECURITY
SECURITY POLICIES IN DEPTH
106
CHAPTER 2: DETAILED RULE DESCRIPTIONS
Testing the Rule
 To test the Block Outgoing Microsoft Office Documents rule:
1. Duplicate the M86 Medium Security Policy.
2. Edit the Block Outgoing Microsoft Office Document rule by
disabling the X-Ray check box.
3. Make sure your User Group has the Duplicate Policy assigned
to it.
4. Copy and paste the following URL into your browser:
http://encodable.com/uploaddemo/
5. In the File 1 of 1 field, select Browse and select any Microsoft
Office document for uploading.
6. Click Begin Uploading. The following error message is
displayed:
Figure 2-39: Page Blocked - Block Outgoing Microsoft Office Documents
7. Return to the Management Console and select the Logs and
Reports Æ View Web Logs menu in the Main Navigation bar.
8. In the same row as the blocked transaction, click
and select
Details. The Transaction Detail tabs include Transaction, User,
Policy Enforcement, Content and Scanning Server details.
M86 SECURITY
SECURITY POLICIES IN DEPTH
107
RULES
9. In the Transaction Details tree, click on Request (4) screen to
obtain further information on the Request phase of this
transaction. Only the Request component exists for this
transaction since it was blocked at the Request phase.
Figure 2-40: Request: Block Outgoing Microsoft Office Documents
10.Reassign the required Security Policy to your User Group.
M86 SECURITY
SECURITY POLICIES IN DEPTH
108
CHAPTER 2: DETAILED RULE DESCRIPTIONS
Block Potentially Malicious Archives
The Block Potentially Malicious Archives rule was designed to
block attacks that try to cause Denial of Service using archives.
The following table describes the Rule Editor definitions:
Block Potentially Malicious Archives
Action
Block
End-User Message
Container Violation
Conditions
Archive Errors
Maximum Extracted Container Size - exceeded,
Archive Depth - exceeded, Maximum Entries in
Container - exceeded
Testing the Rule
 To test the Block Potentially Malicious Archives rule:
1. Copy and paste the following URL into your browser:
http://www.m86security.com/EVG/
Potentially_Malicious_Archives_Demo.zip
2. To connect to the site, type the username: getevg and
password: HurNoc45, and click OK.
M86 SECURITY
SECURITY POLICIES IN DEPTH
109
RULES
After the downloading box, the following error message is
displayed:
Figure 2-41: Page Blocked: Potentially Malicious Archives
3. Return to the Management Console and select the Logs and
Reports Æ View Web Logs menu in the Main Navigation bar.
4. In the same row as the blocked transaction, click
and select
Details. The Transaction Detail tabs include Transaction, User,
Policy Enforcement, Content and Scanning Server details.
5. In the Transaction Details tree, click Request/Response to
obtain further information on the Request and Response
phases of this transaction.
M86 SECURITY
SECURITY POLICIES IN DEPTH
110
CHAPTER 2: DETAILED RULE DESCRIPTIONS
Figure 2-42: Response: Block Potentially Malicious Archives
Block Potentially Malicious Packed Executables
The Block Potentially Malicious Packed Executables rule
blocks known problematic packed executables which may be used
to hide malicious content.
The following table describes the definitions:
Block Potentially Malicious Packed Executable
Action
Block
End-User Message
Type Detector
Conditions
True Content Type
M86 SECURITY
Potentially Malicious Packers
SECURITY POLICIES IN DEPTH
111
RULES
Note the following:
• You must enable one of the Anti-Virus engines (Sophos/
McAfee/Kaspersky) in order to use this Block Potentially
Malicious Packed Executables rule.
Testing the Rule
 To test the Block Potentially Malicious Packed Executables
rule:
1. Copy and paste the following URL into your browser:
http://www.m86security.com/EVG/packer.exe
2. To connect to the site, type the username: getevg and
password: HurNoc45, and click OK.
The following message appears:
Figure 2-43: Page Blocked - Packed Executables
3. Return to the Management Console and select the Logs and
Reports Æ View Web Logs menu in the Main Navigation bar.
4. In the same row as the blocked transaction, click
and select
Details. The Transaction Detail tabs include Transaction, User,
Policy Enforcement, Content and Scanning Server details.
M86 SECURITY
SECURITY POLICIES IN DEPTH
112
CHAPTER 2: DETAILED RULE DESCRIPTIONS
5. In the Transaction Details tree, click Request/Response to
obtain further information on the Request and Response
phases of this transaction.
Figure 2-44: Response: Packed Executables
Block Revoked Cloud Users
NOTES: This rule appears only in the M86 Revoked Cloud Users
Policy, and is the only rule to appear in that policy.
The Block Revoked Cloud Users rule is used to block users from
browsing through the Secure Web Gateway if their certificates are
known to have been compromised and are therefore deemed no
longer valid. The current user certificate is revoked and a new
certificate must be issued.
M86 SECURITY
SECURITY POLICIES IN DEPTH
113
RULES
The following table describes the Rule Editor definitions:
Block Revoked Cloud Users
Action
Block
End-User Message
Revoked Cloud User
Conditions — (None)
Block Spoofed Content
The Block Spoofed Content rule was designed to neutralize
attacks in which a virus or malicious code masquerades as a
harmless file in order to elude the anti-virus engine. This rule also
covers situations where executable files are spoofed as other
extension files.
The following table describes the definitions:
Block Spoofed Content
Action
Block
End-User Message
Spoofed Content
Conditions
Spoofed Content
Spoofed Content
Testing the Rule
 To test the Block Spoofed Content rule:
1. Copy and paste the following URL into your browser:
http://www.m86security.com/EVG/archive.zip
2. To connect to the site, type the username: getevg and
password: HurNoc45, and click OK.
M86 SECURITY
SECURITY POLICIES IN DEPTH
114
CHAPTER 2: DETAILED RULE DESCRIPTIONS
The following message appears:
Figure 2-45: Page Blocked: Spoofed Content
3. Return to the Management Console and select the Logs and
Reports Æ View Web Logs menu in the Main Navigation bar.
4. In the same row as the blocked transaction, click
and select
Details. The Transaction Detail tabs include Transaction, User,
Policy Enforcement, Content and Scanning Server details.
5. In the Transaction Details tree, click Request/Response to
obtain further information on the Request and Response
phases of this transaction.
M86 SECURITY
SECURITY POLICIES IN DEPTH
115
RULES
Figure 2-46: Response: Block Spoofed Content
Block Suspicious File Types
The Block Suspicious File Types rule complements the Forbid
Blacklisted File Extensions rule by checking the true type of the
downloaded content and preventing extension spoofing which
might have bypassed the Forbid Blacklisted File Extensions rule.
The following table describes the Rule definitions:
Block Suspicious File Types
Action
Block
End-User Message
Suspicious File Type Detected
Conditions
True Content Type
M86 SECURITY
DOS Executable file, Link File, MSI Installation
Package, Microsoft Outlook MSG Document,
PIF-Windows Program Information, UPX
compressed Win32 Executable, URL File,
Windows Metafile, Windows registry files
SECURITY POLICIES IN DEPTH
116
CHAPTER 2: DETAILED RULE DESCRIPTIONS
Block Unscannable (McAfee / Sophos / Kaspersky)
The Block Unscannable rules (McAfee/Sophos/Kaspersky)
block unscannable content. Content which is not scannable by the
traditional Anti-Virus engine is always blocked since there is no risk
estimation for it, and since formatting content in such a way is
suspicious behavior. You need a license for one of these Anti-Virus
engines.
The following table describes the definitions:
Block Unscannable (McAfee/Sophos/Kaspersky)
Action
Block
End-User Message
Blocked since AV could not scan
Conditions
Anti-Virus (McAfee/
Sophos/ Kaspersky)
The Anti-Virus engine could not scan this
file
Block Unscannable ActiveX, Java Applets and
Executables
The Block Unscannable ActiveX, Java Applets and
Executables rule blocks unscannable active content.
The following table describes the definitions:
Block Unscannable ActiveX, Java Applets and Executables
Action
Block
End-User Message
Unscannable Content Detected
Conditions
M86 SECURITY
True Content Type
Active Binary Content
Behavior Profile (Binary)
Unscannable Active Content
SECURITY POLICIES IN DEPTH
117
RULES
Block Unscannable Archives
The Block Unscannable Archives rule blocks archives which
cannot be opened by M86's engine. Such archives are blocked
since there is no risk estimation regarding their content.
NOTES: This rule is activated before Anti-Virus scanning to
protect the Anti-Virus from potential archive viruses
contained in such archives.
The following table describes the definitions:
Block Unscannable Archives
Action
Block
End-User Message
Type Detector
Conditions
True Content Type
Unscannable Archives
Note that this rule is evaluated at the Response phase.
Testing the Rule
 To test the Block Unscannable Archives rule:
1. Copy and paste the following URL into your browser:
http://www.m86security.com/EVG/unaceVulnerability.zip
This URL contains a Zip file with ACE files designed to test
ACE’s vulnerabilities.
2. To connect to the site, type the username: getevg and
password: HurNoc45, and click OK.
3. Return to the Management Console and select the Logs and
Reports Æ View Web Logs menu in the Main Navigation bar.
M86 SECURITY
SECURITY POLICIES IN DEPTH
118
CHAPTER 2: DETAILED RULE DESCRIPTIONS
4. In the same row as the blocked transaction, click
and select
Details. The Transaction Detail tabs include Transaction, User,
Policy Enforcement, Content and Scanning Server details.
5. In the Transaction Details tree, click Request/Response to
obtain further information on the Request and Response
phases of this transaction. The first part of the Response
component is a zip file.
Figure 2-47: Response 1: Unscannable Archives
M86 SECURITY
SECURITY POLICIES IN DEPTH
119
RULES
6. Click to reveal the second page of the response. You will see
that the zip file contains an ACE file and was therefore blocked.
Figure 2-48: Response 2: Unscannable Archives
Customer-Defined URL Filtering
NOTES: If the rule name is followed by a (Websense) or (IBM)
qualifier, the rule applies to filtering by the respective engine. If the
rule name is not followed by a qualifier, the rule applies to M86
filtering.
The Customer-Defined URL Filtering rules (including those for
Websense and IBM) refer to blocking a list of URL categories. A
different URL list is provided for the Websense, IBM Proventia, and
M86 Web Filter, depending on your license. This rule is only
relevant if you have selected categories through the Simplified
Policies interface.
M86 SECURITY
SECURITY POLICIES IN DEPTH
120
CHAPTER 2: DETAILED RULE DESCRIPTIONS
The following table describes the definitions:
Customer-Defined URL Filtering
Action
Block
End-User Message
Blocked URL Category
Conditions
Customer-Defined
URL Filtering
(Websense/IBM)
The categories that you choose in the Simplified
Setup URL Categorization block will be displayed
here.
Data Leakage Prevention
The Data Leakage Prevention (X-Ray default) rule scans web
content to prevent vital information from being leaked out of the
organization network.
The Data Leakage Prevention rule refers to the Data Leakage
Prevention profile.
To configure the Data Leakage Prevention rule, click Policies Æ
Condition Settings Æ Data Leakage Prevention.
M86 SECURITY
SECURITY POLICIES IN DEPTH
121
RULES
The following table describes the Data Leakage Prevention
condition and rule definitions.
Data Leakage Prevention
Action
Block, Allow, or Coach
End-User Message
Data Leakage Prevention
Conditions
Direction
This condition enables the administrator to
trigger a rule specifically on the transaction
request (Outgoing) or response (Incoming)
phase.
Data Leakage Prevention
This condition enables the administrator to
monitor and prevent data leakage.
Detect Known Trojan Network Activity
The Detect Known Trojan Network Activity rule detects network
activity usually associated with Trojans sending and receiving data
from the Internet. This rule is provided in X-Ray format with the
predefined Security Policies. To change this rule to block Trojan
activity, duplicate the Policy and remove the check in the X-Ray
check box.
The following table describes the definitions:
Detect Known Trojan Network Activity
Action
Block
End-User Message
Suspected Trojan traffic detected (appears in Logs
on X-Ray action)
Condition
M86 SECURITY
Header Fields
Trojans
Direction
Outgoing
SECURITY POLICIES IN DEPTH
122
CHAPTER 2: DETAILED RULE DESCRIPTIONS
Temporarily Block Cloud Users
NOTES: This rule appears only in the M86 Blocked Cloud Users
Policy, and is the only rule to appear in that policy.
The Temporarily Block Cloud Users rule is used to block users
from browsing through the Secure Web Gateway if their certificates
are suspected of being compromised and are therefore deemed no
longer valid. The current user certificate must be verified.
The following table describes the Rule Editor definitions:
Temporarily Block Cloud Users
Action
Block
End-User Message
Temporarily Blocked Cloud User
Conditions — (None)
Block Social Media Post Control
The Block Social Media Post Control rule blocks posts (entries)
to Social Media sites such as Facebook. (Allowed exceptions are
specified in the Social Media Post Control Allowed Requests
rule.) This rule does not affect read-only activity in social media
sites.
M86 SECURITY
SECURITY POLICIES IN DEPTH
123
RULES
The following table describes the rule definitions:
Block Social Media Post Control
Action
Block
End-User Message
Social Media Sites
Conditions
HTTP Method
Post
Protocol
HTTP and HTTPS
URL Lists
*.facebook.com
Social Media Post Control Allowed Requests
The Social Media Post Control Allowed Requests rule identifies
the nature of the posts (entries) that can be made to Social Media
sites — for example, login to Facebook.
The following table describes the rule definitions:
Social Media Post Control Allowed Requests
Action
Allow: Allow content and scan containers
Conditions
M86 SECURITY
HTTP Method
Post
Protocol
HTTP and HTTPS
URL Lists
*.facebook.com
SECURITY POLICIES IN DEPTH
124
CHAPTER 2: DETAILED RULE DESCRIPTIONS
Block Certificate Validation Errors
NOTES: This rule is available only in the M86 HTTPS Policy and is
the only rule in that policy.
The Block Certificate Validation Errors rule blocks sites
containing invalid or missing digital certificates.
The following table describes the Rule definitions:
Block Certificate Validation Errors
Action
Block HTTPS
End-User Message
Certificate Validation Mismatch
Conditions
Certificate
Validation Errors
Default Certificate Validation Profile
IMPORTANT: It is important in any customer-defined HTTPS
Policy to always have the first rule allowing content.
Additional HTTPS Policy Rule Details
The Rule Details screen defines the Action and End User
Message for the corresponding rule, and includes Apply to and
Exception tabs.
• Action: Each rule has a corresponding Action:
y Bypass: Certificate validation will not be performed by the
system. No security inspection will take place.
y Inspect Content (default): HTTPS rules and Security rules
scanning is carried out.
M86 SECURITY
SECURITY POLICIES IN DEPTH
125
RULES
y User approval: Sends an approval page to the end-user for
each new HTTPS site that is accessed. This is sent for
situations where the certificate is valid but user approval is
required to decrypt traffic for this site or where there were
certificate mismatches and the end-user is given the choice to
continue or not. If the end-user chooses not to approve the
transaction, the connection is closed. This is similar to the
Coach action for Security Rules.
y Block HTTPS: Sites that have certificate errors are blocked.
• End-User Message: Each rule that has the Inspect Content or
User Approval or Block HTTPS action can have a reason
which is selected from a drop-down list. This reason is displayed
in a message to the end-user which can be configured via
End-User Messages Æ Block/Warn Messages. This reason
can be selected from a list of pre-defined reasons or created by
the administrator.
Alternatively, you can select Do not display End-User
Message if you do not want to display a message to the
end-user.
• Apply to and Exception tabs: If one or more user lists have
been predefined, you can specify lists of users to which the rule
will be applied and which users should be excluded from the
rule.
Bypass Whitelisted URLs
NOTES: This rule appears only in the M86 Emergency HTTPS
Policy, and is the first rule (of two) to appear in that policy. (The
other rule in that policy is Block all HTTPS URLs except White
Lists.)
The Bypass Whitelisted URLs rule allows access to trusted
Internet sites which are listed on the Emergency white list and the
M86 recommended white list.
M86 SECURITY
SECURITY POLICIES IN DEPTH
126
CHAPTER 2: DETAILED RULE DESCRIPTIONS
The following table describes the Rule definitions:
Bypass Whitelisted URLs
Action
Bypass
Conditions
Certificate Validation Mismatch
URL Lists
M86 Recommended White List, Emergency
White List
Bypass Whitelisted URLs
Block All HTTPS URLS Except White Lists
NOTES: This rule appears only in M86 Emergency HTTPS Policy,
and is the second rule (of two) to appear in that policy. (The first
rule in that policy is Bypass Whitelisted URLs.)
The Block all HTTPS URLs except White Lists rule blocks
access to all URLs that do not appear in the listed white lists.
The following table describes the Rule definitions:
Block all HTTPS URLS except White Lists
Action
Block HTTPS
End-User Message
Emergency Policy Active
Conditions
No conditions apply to this rule
M86 SECURITY
SECURITY POLICIES IN DEPTH
127
PRE-SUPPLIED POLICIES CONTAINING RULES
Chapter 3: Implementing Security Policy
This chapter contains the following main sections:
y Pre-supplied Policies Containing Rules
y Establishing Site Security Policy — Key Points
y List of Available Rules
y Defining Security Policies
y Setting Which Policies are Implemented
y Fields and Options in the Security Definition Screens
Pre-supplied Policies Containing Rules
SWG-provided rules cannot be changed. However, these rules can
be copied and the newly generated rules can then be changed to
match the organization’s security requirements.
The rules are logically grouped into pre-defined policies. To access
the rules, click Policies Æ Condition SettingsÆ Advanced.
The pre-supplied policies with set rules are as follows:
• Full Bypass Policy
• M86 Basic Security Policy
• M86 Blocked Cloud Users Policy
• M86 Emergency Policy
• M86 Medium Security Policy
• M86 Revoked Cloud Users Policy
• M86 Strict Security Policy
• M86 X-Ray Policy
M86 SECURITY
SECURITY POLICIES IN DEPTH
128
CHAPTER 3: IMPLEMENTING SECURITY POLICY
Establishing Site Security Policy — Key Points
To implement security policy, you perform the following tasks:
1. Define any needed new security policies (optional). This
includes defining their rules and adding their conditions.
2. Set which policies will be implemented. This includes setting
which policies will be the site defaults, and then setting any
needed exceptions to those defaults (for administrators, user
groups, users, etc.).
This chapter describes how to perform all these tasks.
As noted in Chapter 1: Security Policy Concepts, the Secure Web
Gateway application comes with a number of predefined security
policies, but you can define other policies.
The application requires a default for each of the following policy
types, and assigns predefined policies as the defaults.
y Master Policy
y Security Policy
y HTTPS Policy
y Logging Policy
y Emergency Policy
y HTTPS Emergency Policy
You can change the default policy assignments.
For each of the above policy types (except Emergency), you can
also assign a different policy for each user and group. If a different
one is not assigned to the user or group, the default is used. (The
policy defined as the default Emergency policy applies to all user
groups and users.)
M86 SECURITY
SECURITY POLICIES IN DEPTH
129
LIST OF AVAILABLE RULES
Note the following:
y You can set any policy as a Master Policy default, and for
different administrators, you can set any other policy as that
administrator’s Master Policy.
y Only one policy can be set as the default Security Policy. A
different policy can set for each User Group/User as the
Security policy in place of the default. The assigned Security
Policy must be one of the following:
Recommended for the default
•
•
•
•
M86 Basic Security Policy
M86 Medium Security Policy
M86 Strict Security Policy
(site-defined policy)
Not recommended for the
default; intended for specific
Users/Groups
•
•
•
•
•
Full Bypass Policy
M86 X-Ray Policy
M86 Blocked Cloud Users Policy
M86 Revoked Cloud Users Policy
(site-defined policy)
Not recommended for the
default or for Users/Groups
M86 Emergency Policy
y Instructions for setting the defaults are provided in Setting
Policy Defaults.
y Instructions for assigning a policy to a user group are
provided in Assigning Policies to User Groups and Users.
List of Available Rules
This section contains the following topics:
y Rules Available for Security Policies
y Rule Available for HTTPS Policies
y Rules Available for Emergency HTTPS Policy
M86 SECURITY
SECURITY POLICIES IN DEPTH
130
CHAPTER 3: IMPLEMENTING SECURITY POLICY
Rules Available for Security Policies
The following table lists predefined rules, and indicates—with an X
in the relevant columns—the rules enabled in each policy.
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
Revoked Cloud Users
X-Ray
X
Emergency
Strict
X
Full Bypass
Medium
Allow Access to White Listed Sites
Allow All
Allow and Scan Customer-Defined File Extensions
Allow and Scan Customer-Defined True Content Type
Allow Known Legitimate Content
Allow Streaming
Allow Trusted Sites
Allow Whitelisted ActiveX, Java Applets and
Executables
Block Access to Adware Sites
Block Access to Blacklisted Sites
Block Access to High-Risk Site Categories (including
Basic
Rule
Blocked Cloud Users
Rules link to detailed descriptions in Chapter 2: Detailed Rule
Descriptions.
X
M86, Websense and IBM)
Block Access to Spyware Sites
Block ActiveX, Java Applets and Executables by ACL
Block Binary Exploits in Textual Files
Block Binary Objects With Invalid Digital Certificate
Block Binary Objects Without a Digital Certificate
Block Binary VAD Vulnerabilities
Block Blacklisted File Extensions
Block Customer-Defined File Extensions
Block Customer-Defined True Content Type
Block Everything Except White Lists
M86 SECURITY
X
X
X
X
SECURITY POLICIES IN DEPTH
X
X
131
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
Revoked Cloud Users
X-Ray
X
X
X
Emergency
Strict
X
X
X
X
Full Bypass
Medium
Block Files with COM Extension
Block Files with Suspicious Multiple Extensions
Block Illegitimate Archives (Including PasswordProtected Archives)
Block IM Tunneling
Block Known Malicious Content
Block Known Spyware (ACL)
Block Known Viruses (McAfee / Sophos / Kaspersky)
Block Malicious ActiveX, Java Applets and
Executables
Block Malicious Content (Malware Entrapment
Engine)
Block Microsoft Office Documents containing Macros
and/or Embedded Files
Block Outgoing Microsoft Office Documents
Block Potentially Malicious Archives
Block Potentially Malicious Packed Executables
Block Revoked Cloud Users
Block Social Media Post Control
Block Spoofed Content
Block Suspicious File Types
Block Unscannable (McAfee / Sophos / Kaspersky)
Block Unscannable ActiveX, Java Applets and
Executables
Block Unscannable Archives
Customer-Defined URL Filtering (including M86,
Basic
Rule
Blocked Cloud Users
LIST OF AVAILABLE RULES
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
Websense and IBM)
Data Leakage Prevention
Detect Known Trojan Network Activity
M86 SECURITY
SECURITY POLICIES IN DEPTH
X
132
Social Media Post Control Allowed Requests
Temporarily Block Cloud Users
Revoked Cloud Users
Emergency
Full Bypass
X-Ray
Strict
Medium
Basic
Rule
Blocked Cloud Users
CHAPTER 3: IMPLEMENTING SECURITY POLICY
X
X
IMPORTANT:
• The difference between Medium and Strict Security
Policies is displayed in the Block Unscannable ActiveX,
Java Applets and Executables rule where the Default
Profile - Binary Behavior is not blocked in the Medium
Security Policy.
• Where possible, Trustwave SpiderLabs provides Rule
Tests for the above rules. Before beginning Rule Tests,
ensure that your browser is configured with the SWG NG
Appliance IP as an HTTP proxy.
Rule Available for HTTPS Policies
HTTPS policy contains a single rule:
y Block Certificate Validation Errors
Rules Available for Emergency HTTPS Policy
Emergency HTTPS policy contains the following rules:
y Bypass Whitelisted URLs
y Block All HTTPS URLS Except White Lists
M86 SECURITY
SECURITY POLICIES IN DEPTH
133
DEFINING SECURITY POLICIES
Defining Security Policies
This section contains the following procedures:
y Creating a Security Policy
y Creating / Editing a Rule in a User-Defined Policy
y Adding / Editing Conditions in a Rule
y Example - Creating a New Rule
Creating a Security Policy
NOTE: This procedure applies to the following policies:
• Full Bypass Policy
• M86 Basic Security Policy
• M86 Medium Security Policy
• M86 Strict Security Policy
• M86 X-Ray Policy
• M86 Emergency Policy
• M86 HTTPS Policy
• M86 HTTPS Emergency Policy
You can assign any security policy as the default Master Policy.
For instructions, see Setting Policy Defaults.
 To create a security policy:
1. Right-click the policy that you want to duplicate, and choose
Duplicate Policy. (Alternatively, you can create a new policy
from scratch by right-clicking the root Policies node in the tree
and choosing Add Policy.)
M86 SECURITY
SECURITY POLICIES IN DEPTH
134
CHAPTER 3: IMPLEMENTING SECURITY POLICY
The following table identifies how to access each type of policy
that can be duplicated, in the Management Console.
Policy
Access
• M86 Basic Security Policy
• M86 Medium Security Policy
• M86 Strict Security Policy
Policies Æ Security Æ
Advanced.
•
•
•
•
•
Policies Æ Security Æ
Advanced.
Full Bypass Policy
M86 Emergency Policy
M86 X-Ray Policy
M86 Blocked Cloud Users Policy
M86 Revoked Cloud Users Policy
• M86 HTTPS Policy
• M86 HTTPS Emergency Policy
Policies Æ HTTPS
2. In the Duplicate Policy window, do the following:
a. Type a name for the policy.
b. If the policy should be an X-Ray policy, select the X-Ray
check box. (An X-ray policy is generally used for
evaluation purposes. It evaluates and logs transactions
against its rules, but does not activate the rules.)
c. Provide a description of the policy (optional).
d. When done, click Save.
3. Create and add the rules that constitute the policy. For
instructions, see Creating / Editing a Rule in a User-Defined Policy.
Creating / Editing a Rule in a User-Defined Policy
 To create or edit a rule in a user-defined policy:
1. Do any of the following:
y To edit an existing rule, click the rule in the tree, and then in
the main pane, click Edit.
M86 SECURITY
SECURITY POLICIES IN DEPTH
135
DEFINING SECURITY POLICIES
y If you are defining the first rule in the policy, right-click the
policy and choose Add Rule.
y To add a rule directly above an existing rule, right-click the
existing rule, and select Insert Rule.
(Note: To move a defined rule above or below another
defined rule, right-click either of the two rules and choose
Move this Rule; then right-click the other rule, and choose
Above this Rule or Below this Rule, as appropriate. This is
especially useful if you want to create a new rule under the
lowest rule, but the Insert Rule command inserts the new rule
above that rule.)
2. In the Rule definition screen:
a. Type (or edit) a name for the rule.
b. If the rule should be an X-ray rule, select the X-Ray check
c.
d.
e.
f.
M86 SECURITY
box. An X-ray rule is a rule that is evaluated and logged,
but not activated.
Provide a description of the rule (optional).
Select the Action for the rule (Allow, Block, or Coach.) For
more information, see Rules and Conditions and Rule
Processing Flow.
Depending on whether or not the rule should be enabled,
ensure that the Enabled check box is appropriately
checked or unchecked (default: Enabled).
Do either of the following:
ƒIf you chose Allow as the action, select the appropriate
Advanced Action.
ƒIf you chose Block or Coach as the action, select the
desired End-User Message. If the End User
Message should not be displayed, select the Do Not
Display End User Message check box. For
information on defining End User Messages, see
Rules and Conditions and Rule Processing Flow.
SECURITY POLICIES IN DEPTH
136
CHAPTER 3: IMPLEMENTING SECURITY POLICY
g. For Security, Logging, and HTTPS policies, if one or more
user lists have been predefined:
ƒ Click the Apply to tab and select the check box to
specify to which predefined user lists the rule will be
applied.
ƒ Click the Exception tab and select the check box to
specify which user lists should be excluded from the
rule.
For more information, see Defining User Lists.
h. Click Save.
3. Add the Conditions that determine if the rule will be triggered.
For instructions, see Adding / Editing Conditions in a Rule.
Adding / Editing Conditions in a Rule
 To add each condition to the rule in a user-defined policy:
1. Do either of the following:
y To edit an existing condition, click the condition under the rule
in the tree, and then in the main pane, click Edit.
y To add a new condition, right-click the rule and choose Add
Condition.
2. In the Condition definition screen, do the following.
a. Select a condition. Depending on the condition that you
choose, an appropriate check box list is displayed at the
bottom of the Condition window.
b. In the Applies To area, select whether you want to apply
the condition to any of the values you will be selecting in
the check list, or to apply the conditions to the values you
will NOT be selecting in the check list.
c. Depending on the Applies To radio button you selected,
check the appropriate check boxes. (If useful, you can
use the Select/Deselect All check box).
d. If the condition has any other special fields or
requirements to fill in, fill them in appropriately.
M86 SECURITY
SECURITY POLICIES IN DEPTH
137
DEFINING SECURITY POLICIES
e. Click Save.
3. (To delete a condition, right-click the condition and choose
Delete Condition).
Example - Creating a New Rule
This example describes a Data Leakage Prevention policy, rule
and condition creation, and test.
Use the following steps to create and test a Data Leakage
Prevention rule:
1. To create a new Data Leakage Condition:
2. To create a new Data Leakage Prevention Profile and Rule:
3. To test the New Rule:
 To create a new Data Leakage Condition:
This Condition Component example ensures that Diner’s Club
credit card numbers do not leave the organization. An entry such
as Diners Club 3005 458696 5454 is recognized and blocked, all
Diners Club credit card information numbers beginning with 300
and a total of 14 digits is recognized. However, an entry such as
Diners Club 4005 458696 5454 is not blocked, as it does not meet
the condition requirements (such as the number 300) and is
therefore known not to be a valid Diners Club credit card number.
1. To create a new Security policy, click Policies Æ Condition
SettingsÆ Data leakage Prevention.
2. In the left pane, right-click Data Leakage Condition and click
Add Filter Condition, or click
M86 SECURITY
.
SECURITY POLICIES IN DEPTH
138
CHAPTER 3: IMPLEMENTING SECURITY POLICY
A new component is added to the list of Condition Components.
Figure 3-1: Create Condition Component
3. In the Data Leakage Prevention Name box, type an appropriate
Condition name, for example, Block Documents with Diners CC.
4. Build the condition using the appropriate values, placeholders,
and operators. For this example, build the following condition:
(Diners Club OR Carte Blanche) AND (300$$$$$$$$$$$ OR
305$$$$$$$$$$$ OR 36$$$$$$$$$$$$).
SWG provides three different condition building methods:
y Edit the condition directly into the workspace.
y Use the provided Condition Builder:
Click Condition Builder.
The Condition Builder dialog box opens.
Figure 3-2: Condition Builder Dialog Box
M86 SECURITY
SECURITY POLICIES IN DEPTH
139
DEFINING SECURITY POLICIES
y Use the on-screen editing buttons.
Figure 3-3: On-screen Condition Editing Buttons
NOTES: Be sure to use the placeholder buttons for the right
and left parentheses, the “OR” and “AND” logical operators,
and the $ numeric wild card.
While typing the condition, SWG automatically checks syntax
accuracy, and when completing the condition, SWG indicates
the correctness by changing the
icon to
.
Figure 3-4: New Condition Component
5. Click Save.
M86 SECURITY
SECURITY POLICIES IN DEPTH
140
CHAPTER 3: IMPLEMENTING SECURITY POLICY
The new Component is added to the Condition.
Figure 3-5: New Added Component
 To create a new Data Leakage Prevention Profile and Rule:
1. To create a new Security policy, click Policies Æ Security.
2. In the left pane, right-click Policies and click Add Policy, or if
displayed, click
.
A new policy is added to the list of policies.
Figure 3-6: Create New Policy
M86 SECURITY
SECURITY POLICIES IN DEPTH
141
DEFINING SECURITY POLICIES
3. In the Policy Name box, type DLP Test Policy, and then click
Save.
4. Right-click the DLP Test Policy policy, and then click Add
Rule, or click
.
A new rule is opened in the right pane.
5. In the Rule Name box, type Data Leakage Prevention and in
the End-User Message drop-down list select Data Leakage
Prevention.
Figure 3-7: Create New DLP Rule
6. If one or more user lists have been predefined:
y Click the Apply to tab and select the check box to specify to
which predefined user lists the rule will be applied.
y Click the Exception tab and select the check box to specify
which user lists should be excluded from the rule.
For more information, see Defining User Lists.
M86 SECURITY
SECURITY POLICIES IN DEPTH
142
CHAPTER 3: IMPLEMENTING SECURITY POLICY
7. Click Save.
The new rule is displayed under the policy.
Figure 3-8: New DLP Rule Added
8. Right-click the Data Leakage Prevention rule, and then click
Add Condition, or click
.
A new Condition is opened in the right pane.
9. In the Condition Name drop-down list, select Data Leakage
Prevention, and then from the displayed Components select
Block Documents with Diners CC.
M86 SECURITY
SECURITY POLICIES IN DEPTH
143
DEFINING SECURITY POLICIES
Figure 3-9: Add Condition to Rule
10.Click Save.
The new Condition is displayed under the Rule.
Figure 3-10: New Condition Added to Rule
M86 SECURITY
SECURITY POLICIES IN DEPTH
144
CHAPTER 3: IMPLEMENTING SECURITY POLICY
11.To ensure that the new policy is in use, click Policies Æ
Default Policy Settings.
12.Click Edit, then in the Default Policy Values workspace, from
the Security Policy drop-down select DLP Test Policy.
Figure 3-11: Setting Default Security Policy
13.Click Save.
 To test the New Rule:
1. Copy the following URL into your browser:
http://www.m86security.com/EVG/diners.doc
2. Connect to the site, and type the username: getevg and
password: HurNoc45, and then click OK.
3. Copy the following URL into your browser:
http://www.m86security.com/EVG/data_leakage_test.asp
4. Click Browse, then navigate to the folder containing the
downloaded “diners.doc”, and select the file.
M86 SECURITY
SECURITY POLICIES IN DEPTH
145
SETTING WHICH POLICIES ARE IMPLEMENTED
5. Click Upload.
6. For a correctly configured rule, SWG displays a blocking
message, similar to the following:
Figure 3-12: Data Leakage Prevention Page Block Message
Setting Which Policies are Implemented
You can override the defaults for specific user groups and users. In
the case of Master Policy, you can assign policies other than the
default Master Policy to different administrators. You can also
define user lists to identify the users to which specific rules should
or should not apply.
This section contains the following topics:
y Setting Policy Defaults
y Setting a Master Policy for an Administrator
y Assigning Policies to User Groups and Users
y Defining User Lists
M86 SECURITY
SECURITY POLICIES IN DEPTH
146
CHAPTER 3: IMPLEMENTING SECURITY POLICY
Setting Policy Defaults
You set policy defaults in the Default Policy Settings screen of
the Management Console.
 To set policy defaults:
1. Select Policies Æ Default Policies Settings.
The Default Policies Settings screen (Figure 3-13) lists a number
of policy types, and provides a drop-down list of all defined
policies for each type.
Figure 3-13: Default Policy Settings Screen
M86 SECURITY
SECURITY POLICIES IN DEPTH
147
SETTING WHICH POLICIES ARE IMPLEMENTED
2. Click Edit.
3. To set Emergency Policies here, check the Enable Emergency
Policy check box and select the policies. Note: Setting
Emergency Policies here assigns them to all Users and
overrides any other Security Policies individually set per User or
per User Group.
4. In the Default Policy Values area, select the desired policy for
each policy type. For an explanation of the different types of
policies, see Types of Policies.
Note the following:
y In the Master Policy drop down list, the empty option is the
default value provided by the system. Select one of the
policies to be used as the default Master Policy.
y The default Security, Logging and HTTPS policies set here
will automatically be assigned to users in the system if no
other Policies have been assigned to them in the Users tab.
They will also be assigned automatically to unknown users.
The following are the default values provided by the system:
ƒ
ƒ
ƒ
Security Policy: M86 Security Strict Security Policy
Logging Policy: Log All Protective Actions Policy
HTTPS Policy: M86 HTTPS Policy
NOTE: The policies you define here will be the values referred to in
User Groups and LDAP Groups.
5. When done, click Save.
M86 SECURITY
SECURITY POLICIES IN DEPTH
148
CHAPTER 3: IMPLEMENTING SECURITY POLICY
Setting a Master Policy for an Administrator
NOTE: Before setting a security policy as the Master Policy for an
administrator, you must ensure that the security policy is defined.
For instructions on creating a security policy, see Creating a
Security Policy.
 To set a master policy:
1. In the Management Console, select Administration Æ
Administrators, and then, in the tree pane under Super
Administrators, select Admin.
2. In the main pane:
a. Click Edit.
b. In the Master Policy drop-down list, select the policy that
should be used as the Master Policy.
c. Click Save.
Assigning Policies to User Groups and Users
Unless you instruct otherwise, all users groups and users will use
the default policies, as set in Setting Policy Defaults.
NOTE: The application comes with predefined user groups called
Blocked Cloud Users and Revoked Cloud Users. It is
recommended that you assign Cloud User policies to the
like-named user group, and then add or remove users from the
groups as needed.
 To assign policies to a User Group:
NOTE: This procedure assumes that the User Group is already
created. For instructions on creating other User Groups, see the
Management Console Reference Guide.
1. Select Users Æ Users/User Groups.
2. In the User Group tree, select the User Group.
M86 SECURITY
SECURITY POLICIES IN DEPTH
149
SETTING WHICH POLICIES ARE IMPLEMENTED
3. In the main detail screen (Figure 3-14), do the following:
Figure 3-14: User Group Policy Definition
a. Click Edit.
b. For each policy type whose assignment you want to
change, select the desired policy in the drop down list.
c. When done, click Save.
M86 SECURITY
SECURITY POLICIES IN DEPTH
150
CHAPTER 3: IMPLEMENTING SECURITY POLICY
 To assign policies to individual users:
NOTE: This procedure assumes that the user, including IP
addresses, is already defined. For instructions on defining users,
see the Management Console Reference Guide.
1. Select Users Æ Users/User Groups.
2. In the Independent Users tree, select the user.
3. In the main detail screen for the user:
a. Click Edit.
b. For each policy type whose assignment you want to
change, select the desired policy in the drop down list.
c. When done, click Save.
Defining User Lists
User Lists enable you to define lists of LDAP Groups and Users,
and M86 User Groups and users. The lists can then be used to
identify the users to which specific rules should or should not apply
when defining Security, HTTPS, and Logging Policy rules.
You define User Lists in the User Lists screen, accessed via
Users Æ User Lists.
• To create a new user list, right-click the User Lists main node in
the tree and select Add List.
• To edit an existing user list, select the list under the User Lists
main node. Then, in the User List window, click Edit.
For detailed instructions, see the Management Console User
Guide.
M86 SECURITY
SECURITY POLICIES IN DEPTH
151
SETTING WHICH POLICIES ARE IMPLEMENTED
The User List definition window is displayed in the main pane and
comprises five tabs:
• The Selected Members tab displays a summary of the details
selected in the other lists.
• The other tabs, LDAP Groups, LDAP Users, M86 User
Groups, and M86 Users, enable you to select existing values
from those respective categories.
Note that selected items are cumulative. For example, an LDAP
user who was not selected in the LDAP User tab, but who belongs
to an LDAP Group that was selected in the LDAP Group tab, will be
included in the list.
After a new or edited user list is saved and committed, the list is
included in the lists that appear in the Applies To tab and Except
tab of Security, HTTPS and Logging policy rules.
To see which policy rules a list is used in, right-click the User List
and select Used In.
For more information, see the Management Console Reference
Guide.
M86 SECURITY
SECURITY POLICIES IN DEPTH
152
CHAPTER 3: IMPLEMENTING SECURITY POLICY
Fields and Options in the Security Definition
Screens
This section contains the following topics:
y Options Available in the Policy Tree
y Policy Details Screen - Fields
y Rule Details Screen - Fields
y Condition Details Screen - Fields
Options Available in the Policy Tree
The following table describes the options available when you
right-click a tree entry at a particular level:
Action
Description
Root Level
Add Policy
Available from top level folder only. Allows
you to create a new Policy.
Policy Level
M86 SECURITY
Add Rule
Available from Policy folder. Allows you to
create a new Rule.
Delete Policy
Available from specific Policy. Allows you to
remove a Policy. Note that deleting a Policy
will delete all the Rules and Conditions
belonging to it.
Set As Default
Available from specific Policy. Allows you to
set the Policy as the default Security Policy.
Duplicate Policy
Available from specific Policy. Allows you to
clone a predefined Policy and customize it for
your own needs.
SECURITY POLICIES IN DEPTH
153
FIELDS AND OPTIONS IN THE SECURITY DEFINITION SCREENS
Action
Description
Export to HTML
Available from specific Policy. Allows you to
export to HTML format - which you can then
save or print as required.
Export to XML
Available from specific Policy. Allows you to
export to XML format - which you can then
save or print as required.
Rule Level
Add Condition
Available from Rule. Allows you to create a
new Condition.
Insert New Rule
Available from any rule. Allows you to insert a
new rule into your Policy above the rule you
are currently standing on.
Delete Rule
Available from specific Rule. Allows you to
remove a Rule from the Policy.
Move Rule To
Before this Rule
After this Rule
Available from specific Rule. Select Move
Rule To and then move cursor to desired
place. Select Before this Rule/After this
Rule to move the rule to the required
location.
Condition Level
Delete Condition
M86 SECURITY
Available from specific Condition. Allows you
to remove a Condition from a Rule.
SECURITY POLICIES IN DEPTH
154
CHAPTER 3: IMPLEMENTING SECURITY POLICY
Policy Details Screen - Fields
The Policies Details screen displays the following information:
M86 SECURITY
Field
Description
Policy Name
Name of the specific policy
X-Ray
Defines whether the Policy is X-Ray or not. (X-Ray
means the policy is logged but no action is taken)
Description
Contains a description of the policy.
User Groups/Users
using this policy
Security Policies can be assigned to different user
groups and users. This section displays which user
groups/users have this particular Policy assigned to
them. For more information on assigning policies to
user groups and users, see Assigning Policies to
User Groups and Users.
SECURITY POLICIES IN DEPTH
155
FIELDS AND OPTIONS IN THE SECURITY DEFINITION SCREENS
Rule Details Screen - Fields
If a rule is not specific to any of the listed values for a condition,
instead of selecting all possible values, do not use the condition,
and leave it blank.
The Rules Details screen displays the following information:
M86 SECURITY
Field
Description
Rule Name
Defines the name of the Security rule.
X-Ray
If the X-Ray check box is ticked, the rule is evaluated in the
Logs only. In other words, an x-ray rule is activated and
logged, but no block, warn or explicit allow action is taken.
Description
This provides a place for you to write a description of the rule.
Enable
Rule
When checked, the rule is enabled. When unchecked, the
rule is disabled.
Action
Block, Coach or Allow action, on positive evaluation of the
rule, as described below.
Block
The web content is blocked.
Coach
The web content is temporarily blocked and the
end-user receives a warning message that this
site is not recommended and that his/her activities
will be logged. The end-user can then decide
whether to proceed or not.
Allow
The web content is allowed and the selected
Advanced Action is taken as described below.
SECURITY POLICIES IN DEPTH
156
CHAPTER 3: IMPLEMENTING SECURITY POLICY
Field
Description
Advanced
Action
When Allow is selected you can choose one of the following
Advanced Action options:
• Allow transactions and scan containers: The content
is allowed, but container files are opened and the
contents are scanned. (This is the default option)
•
Allow content and do not scan containers: Allows
content through including container files, such as zip or
rar files, without scanning inside them. Content is allowed
through on request stage but may be stopped on
response stage.
•
Bypass Scanning: Allows content through without any
scanning at all on the request or response stage. This
allows full streaming and is useful, for example, for sites
which contain stock ticker streaming.
Do not
display
end-user
Message
Withholds sending a block page to the end-user.
End-user
Message
Defines which message is sent in the Page Block/Warn
message. The end-user message list and associated text is
managed in Policies Æ End User Messages Æ Block/Warn
Messages. The end-user Message template can be modified
in Policies Æ End User Messages Æ Message Template.
NOTES:
•
The Coach action can be applied to URL Categories and URL
Lists in an Outgoing direction only. In addition, only the
following Conditions can be added: Time Frame, Header
Fields, File Extension.
•
The Allow-Advanced actions which allow container files through
without scanning can be placed anywhere in your Security
Policy.
• In certain circumstances, X-Ray block rules might block traffic.
This happens when the web server replies with non-standard
HTTP traffic. This is applicable only for X-ray rules and not for
X-ray policies.
M86 SECURITY
SECURITY POLICIES IN DEPTH
157
FIELDS AND OPTIONS IN THE SECURITY DEFINITION SCREENS
Condition Details Screen - Fields
The Condition Details screen displays the following information:
Field
Description
Condition Name
Displays the name of the Condition. If you are defining
a new condition, choose the required condition from
the drop-down list.
Applies To
You can select which options are to be included or
excluded. In other words, you can either choose to
apply this rule to everything selected below or to apply
this rule to everything EXCEPT for the items selected
below.
Select/Deselect
All
Choose to select/deselect all the items in the
Condition.
The items display differently according to the Condition you have chosen.
For the list of available conditions, see Available Conditions.
M86 SECURITY
SECURITY POLICIES IN DEPTH
158
APPENDIX A
APPENDIX A
The following diagrams are sample illustrations of the Master
Policy and Security Policy enforcement process.
Figure A-1: Blocked by Master Policy (Request)
M86 SECURITY
SECURITY POLICIES IN DEPTH
159
Figure A-2: Blocked by Master Policy (Response)
M86 SECURITY
SECURITY POLICIES IN DEPTH
160
APPENDIX A
Figure A-3: Blocked by Security Policy (Request)
M86 SECURITY
SECURITY POLICIES IN DEPTH
161
Figure A-4: Blocked by Security Policy (Response)
M86 SECURITY
SECURITY POLICIES IN DEPTH
162
APPENDIX A
Figure A-5: Security X-Ray (Request)
M86 SECURITY
SECURITY POLICIES IN DEPTH
163
Figure A-6: Security X-Ray (Response)
M86 SECURITY
SECURITY POLICIES IN DEPTH
164
APPENDIX A
Figure A-7: Security Coach Rule (Option 1)
M86 SECURITY
SECURITY POLICIES IN DEPTH
165
Figure A-8: Security Coach Rule (Option 2)
M86 SECURITY
SECURITY POLICIES IN DEPTH
166
APPENDIX A
Figure A-9: Security X-Ray DLP (Request)
M86 SECURITY
SECURITY POLICIES IN DEPTH
167