Cisco Cisco Web Security Appliance S670 User Guide

Page of 582
C O N F I G U R I N G   U R L   F I L T E R S   F O R   D A T A   S E C U R I T Y   P O L I C Y   G R O U P S
C H A P T E R   1 3 :   U R L   F I L T E R S
 277
Note — If you want to block a particular URL category for HTTPS requests, choose to 
decrypt that URL category in the Decryption Policy group and then choose to block the 
same URL category in the Access Policy group.
4. In the Uncategorized URLs section, choose the action to take for client requests to web 
sites that do not fall into a predefined or custom URL category. You can choose any action 
listed in Table 13-2.
5. Submit and commit your changes.
Configuring URL Filters for Data Security Policy Groups
You can configure URL filtering for user defined Data Security Policy groups and the Global 
Policy Group.
To configure URL filtering in a Data Security Policy group:
1. Navigate to the Web Security Manager > IronPort Data Security Policies page.
Use Global Setting
Uses the action for this category in the global Decryption Policy group. 
This is the default action for user defined policy groups.
Applies to user defined policy groups only.
Pass Through
Passes through the connection between the client and the server without 
inspecting the traffic content. You might want to pass through 
connections to trusted secure sites, such as well known banking and 
financial institutions.
Monitor
The Web Proxy neither allows nor blocks the request. Instead, it 
continues to evaluate the client request against other policy group control 
settings, such as web reputation filtering.
Decrypt
Allows the connection, but inspects the traffic content. The appliance 
decrypts the traffic and applies Access Policies to the decrypted traffic as 
if it were a plaintext HTTP connection. By decrypting the connection and 
applying Access Policies, you can scan the traffic for malware. You might 
want to decrypt connections to third party email providers, such as gmail 
or hotmail. 
For more information about how the appliance decrypts HTTPS traffic, 
see “Decrypting HTTPS Traffic” on page 191.
Drop
Drops the connection and does not pass the connection request to the 
server. The appliance does not notify the user that it dropped the 
connection. You might want to drop connections to third party proxies 
that allow users on the network bypass the organization’s acceptable use 
policies.
Table 13-2 URL Category Filtering for Decryption Policies (Continued)
Action
Description