Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Endpoint Security 10.6.0 - Web

Download as pdf or txt
Download as pdf or txt
You are on page 1of 57

McAfee Endpoint Security 10.6.

0 - Web
Control Product Guide
(McAfee ePolicy Orchestrator)
COPYRIGHT
Copyright © 2018 McAfee, LLC

TRADEMARK ATTRIBUTIONS
McAfee and the McAfee logo, McAfee Active Protection, ePolicy Orchestrator, McAfee ePO, McAfee EMM, Foundstone, McAfee LiveSafe, McAfee QuickClean, Safe Eyes,
McAfee SECURE, SecureOS, McAfee Shredder, SiteAdvisor, McAfee Stinger, True Key, TrustedSource, VirusScan are trademarks or registered trademarks of McAfee,
LLC or its subsidiaries in the US and other countries. Other marks and brands may be claimed as the property of others.

LICENSE INFORMATION
License Agreement
NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE
GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE
CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE
RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU
DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF
APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND.

2 McAfee Endpoint Security 10.6.0 - Web Control Product Guide


Contents

1 Product overview 5
Overview of Endpoint Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
How Endpoint Security works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Overview of Web Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Key features of Web Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
How Web Control works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Feature overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Supported and unsupported browsers . . . . . . . . . . . . . . . . . . . . . . . 10
Identifying threats while browsing . . . . . . . . . . . . . . . . . . . . . . . . . 11
Identifying threats while searching . . . . . . . . . . . . . . . . . . . . . . . . . 12
Site reports provide details . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
How Web Control blocks or warns about a site or download . . . . . . . . . . . . . . . . 13
How Web Control and McAfee Client Proxy work together . . . . . . . . . . . . . . . . 13
How web gateway enforcement works . . . . . . . . . . . . . . . . . . . . . . . 14
How safety ratings are compiled . . . . . . . . . . . . . . . . . . . . . . . . . . 15
How file downloads are scanned . . . . . . . . . . . . . . . . . . . . . . . . . . 16
How McAfee GTI works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
How Web Control works with Web Reporter . . . . . . . . . . . . . . . . . . . . . 17
Information that the software sends to McAfee ePO . . . . . . . . . . . . . . . . . . 18
Web Control additions to McAfee ePO . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Permission sets and Web Control . . . . . . . . . . . . . . . . . . . . . . . . . 19
Client tasks and Web Control . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Frequently asked questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

2 Setting up a strategy for browsing security 23


Guidelines for creating a strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Selecting the right policy options and features . . . . . . . . . . . . . . . . . . . . . . . 24
Using URLs or domains to control access . . . . . . . . . . . . . . . . . . . . . . . 25
Using safety ratings to control access . . . . . . . . . . . . . . . . . . . . . . . . 26
Using web categories to control access . . . . . . . . . . . . . . . . . . . . . . . 27

3 Configuring Web Control 29


Policies and Web Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
How policies work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Assign multiple instances of a policy . . . . . . . . . . . . . . . . . . . . . . . . 32
Evaluating policy settings with Observe mode . . . . . . . . . . . . . . . . . . . . . 32
Enable and disable Web Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Configuring browsers to force-enable the Web Control plug-in . . . . . . . . . . . . . . . 33
Track browser events to use for reports . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Specify enforcement behavior for specific actions . . . . . . . . . . . . . . . . . . . . . . 34
Warn about or block unknown URLs and file downloads . . . . . . . . . . . . . . . . . . . . 34
Scan files before downloading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Block all internal sites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Configure Secure Search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Send Web Control logs from McAfee ePO to Web Reporter . . . . . . . . . . . . . . . . . . . 36

McAfee Endpoint Security 10.6.0 - Web Control Product Guide 3


Contents

Manage blocked and allowed sites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37


Prohibit use of specific browsers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Specify rating actions and block site access based on web category . . . . . . . . . . . . . . . . 39
Customize user notifications for blocked content . . . . . . . . . . . . . . . . . . . . . . . 40

4 Monitoring browser protection and security with McAfee ePO 41


Dashboards, monitors, and Web Control . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Queries, reports, and Web Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Server tasks and Web Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Roll up system or event data for Endpoint Security . . . . . . . . . . . . . . . . . . . 45
Events, responses, and Web Control . . . . . . . . . . . . . . . . . . . . . . . . . . . 46

5 Using Web Control on a client system 47


Enable the Web Control plug-in from the browser on a client system . . . . . . . . . . . . . . . 47
Get information about a site that you're viewing . . . . . . . . . . . . . . . . . . . . . . . 48
Get information about a site from search results . . . . . . . . . . . . . . . . . . . . . . . 48

6 Managing Web Control on a client system 51


Enable Web Control and configure its options on a client system . . . . . . . . . . . . . . . . . 51
Specify rating actions and block site access based on web category on a client system . . . . . . . . . 53

7 Monitoring Web Control activity on a client system 55


Check the Event Log for recent activity . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Web Control log file names and locations . . . . . . . . . . . . . . . . . . . . . . . . . 55

4 McAfee Endpoint Security 10.6.0 - Web Control Product Guide


1 Product overview

Contents
Overview of Endpoint Security
How Endpoint Security works
Overview of Web Control
Key features of Web Control
How Web Control works
Feature overview
Web Control additions to McAfee ePO
Frequently asked questions

Overview of Endpoint Security


®
McAfee Endpoint Security is an integrated, extensible security solution that protects servers, computer
systems, laptops, and tablets against known and unknown threats. These threats include malware, suspicious
communications, unsafe websites, and downloaded files.

Endpoint Security enables multiple defense technologies to communicate in real time to analyze and protect
against threats.

Endpoint Security consists of these security modules:

• Threat Prevention — Prevents threats from accessing systems, scans files automatically when they are
accessed, and runs targeted scans for malware on client systems.

• Firewall — Monitors communication between the computer and resources on the network and the
Internet. Intercepts suspicious communications.

• Web Control — Monitors web searching and browsing activity on client systems and blocks websites and
downloads based on safety rating and content.

• Adaptive Threat Protection — Analyzes content from your enterprise and decides how to respond based
on file reputation, rules, and reputation thresholds. Adaptive Threat Protection is an optional Endpoint
Security module.

The Common module provides settings for common features, such as interface security and logging. This
module is installed automatically if any other module is installed.

All modules integrate into a single Endpoint Security interface on the client system. Each module works
together and independently to provide several layers of security.

See also
How Endpoint Security works on page 6
Overview of Web Control on page 7

McAfee Endpoint Security 10.6.0 - Web Control Product Guide 5


1 Product overview
How Endpoint Security works

How Endpoint Security works


Endpoint Security intercepts threats, monitors overall system health, and reports detection and status
information. Client software is installed on each system to perform these tasks.
Typically, you install one or more Endpoint Security modules on client systems, manage detections, and
configure settings that determine how product features work.

McAfee ePO
® ® ® ™
You use McAfee ePolicy Orchestrator (McAfee ePO ) to deploy and manage Endpoint Security modules on
client systems. Each module includes an extension and a software package that are installed on the McAfee
ePO server. McAfee ePO then deploys the software to client systems.
®
Using McAfee Agent, the client software communicates with McAfee ePO for policy configuration and
enforcement, product updates, and reporting.

Client modules
The client software protects systems with regular updates, continuous monitoring, and detailed reporting.

It sends data about detections on your computers to the McAfee ePO server. This data is used to generate
reports about detections and security issues on your computers.

TIE server and Data Exchange Layer


® ®
The Endpoint Security framework integrates with McAfee Threat Intelligence Exchange (TIE) and McAfee Data
Exchange Layer (DXL) when using Adaptive Threat Protection. These optional products enable you to control file
reputation locally and share the information immediately throughout your environment.
® ™
If the TIE server is not available, Adaptive Threat Protection queries McAfee Global Threat Intelligence (McAfee
GTI) for reputation information.

McAfee GTI
Threat Prevention, Firewall, Web Control, and Adaptive Threat Protection query McAfee GTI for reputation
information to determine how to handle files on the client system.

6 McAfee Endpoint Security 10.6.0 - Web Control Product Guide


Product overview
Overview of Web Control 1

McAfee Labs
The client software communicates with McAfee Labs for content file and engine updates. McAfee Labs regularly
releases updated content packages.

Figure 1-1 How it works

How your protection stays up to date


Regular updates of Endpoint Security protect your computers from the latest threats.

To perform updates, the client software connects to a local or remote McAfee ePO server or directly to a site on
the Internet. Endpoint Security checks for:

• Updates to the content files that detect threats. Content files contain definitions for threats such as viruses
and spyware, and these definitions are updated as new threats are discovered.

• Upgrades to software components, such as patches and hotfixes.

See also
Overview of Web Control on page 7

Overview of Web Control


®
McAfee Endpoint Security Web Control is a browser-protection solution that monitors web searching and
browsing activity on client computers. It protects against threats on webpages and in file downloads.

A McAfee team analyzes each website and assigns a color-coded safety rating based on test results. The color
indicates the level of safety for the site.

McAfee Endpoint Security 10.6.0 - Web Control Product Guide 7


1 Product overview
Key features of Web Control

Web Control uses the test results to identify web-based threats. Software installed on the client system adds
features that appear in the browser window and search results to notify users.

You use McAfee ePO to deploy and manage Web Control on client systems. Settings control access to sites
based on their safety rating, the type of content they contain, and their URL or domain name.

See also
Overview of Endpoint Security on page 5

Key features of Web Control


The key features of Web Control protect your systems from web-based threats, detect threats, and correct
issues with file downloads.

Protect
Protect your systems from malicious websites and downloads using these Web Control features:

• Block and Allow List — Prevent users from visiting specific URLs or domains or always allow access to sites
that are important to your business.

• Rating Actions and Web Category Blocking — Use safety ratings and web categories defined by McAfee to
control user access to sites, pages, and downloads.

• Secure Search — Automatically block risky sites from appearing in search results based on their safety
rating.

• Self protection — Prevent users from disabling the Web Control plug-in or uninstalling or changing Web
Control files, registry keys, registry values, services, and processes.

Detect
Detect malicious websites using these Web Control features:

• Web Control button in the browser window — The Web Control plug-in displays a button indicating the
safety rating for the site. Click the button for more information about the site.

• Web Control icon on search results pages — An icon appears next to each listed site. The color of the icon
indicates the safety rating for the site. Hover over the icon for more information about the site.

• Site reports — Details show how the safety rating was calculated based on types of threats detected, test
results, and other data.

• Dashboards and monitors — Display statistics about Web Control activity, including visits and downloads
from sites by rating, content type, and blocked or allowed list.

• Queries and reports — Retrieve detailed information about Web Control browser events, and save it in
reports.

Correct
Monitor and tune Web Control behavior using these features:

• Interlock with other McAfee products — Disable Web Control automatically if it detects a web gateway
appliance or if McAfee Client Proxy is installed and in redirection mode.
®

• File scanning for file downloads — Web Control sends files to Threat Prevention for scanning. If it detects
a threat, Threat Prevention responds with the configured action such as clean, and alerts the user.

8 McAfee Endpoint Security 10.6.0 - Web Control Product Guide


Product overview
How Web Control works 1

• Dashboards and monitors — Monitor activity to understand browsing activity, then use that information to
tune Web Control settings.

• Exclusions — Prevent Web Control from rating or blocking specific IP addresses.

How Web Control works


Web Control queries McAfee GTI for reputation information to determine how to handle navigation to URLs.
1 The administrator configures Web Control settings in McAfee ePO and enforces the policy to the client
system.

2 The user visits or accesses a resource from a website.

3 Web Control requests the URL reputation from McAfee GTI.


• If the URL reputation is green, Web Control allows navigation to the URL and displays the page.
Otherwise, Web Control navigates to either the block or warn page, based on settings.

• If the URL reputation is unrated but matches a category in McAfee GTI, Web Control allows or blocks
navigation to the URL, based on Content Actions settings.

4 If the request is a file download and the file reputation is not malicious, Web Control allows the download,
even if the URL reputation is malicious. If the file reputation is unknown, Web Control sends the file to
Threat Prevention for scanning by the on-demand scanner.
Threat Prevention checks the file against the AMCore content file. If it matches a signature or hash in
content, the file download is blocked. Otherwise, the file is downloaded.

5 Web Control logs the details, then generates and sends an event to McAfee ePO.

Figure 1-2 How it works

McAfee Endpoint Security 10.6.0 - Web Control Product Guide 9


1 Product overview
Feature overview

Web Control and McAfee Client Proxy


When Web Control is disabled because Client Proxy is present and redirecting:

• Web Control ignores rating and enforcement actions.

• Web Control browser controls are disabled.

• Endpoint Security Client Status page shows Web Control status as Disabled.

• Endpoint Security Client Settings page indicates that Web Control is disabled because Client Proxy is
detected.

See also
Identifying threats while browsing on page 11
Identifying threats while searching on page 12
Site reports provide details on page 12
How Web Control blocks or warns about a site or download on page 13
How file downloads are scanned on page 16
How McAfee GTI works on page 17

Feature overview
Contents
Supported and unsupported browsers
Identifying threats while browsing
Identifying threats while searching
Site reports provide details
How Web Control blocks or warns about a site or download
How Web Control and McAfee Client Proxy work together
How web gateway enforcement works
How safety ratings are compiled
How file downloads are scanned
How McAfee GTI works
How Web Control works with Web Reporter
Information that the software sends to McAfee ePO

Supported and unsupported browsers


Web Control supports Microsoft Internet Explorer, Google Chrome, and Mozilla Firefox.
Web Control supports these browsers and versions:

• Internet Explorer 11

• Chrome — Current version. Chrome doesn't support the Show Balloon option.

• Firefox — Current version, including multi-process architecture (E10S)

• Firefox ESR (Extended Support Release) — Current version and previous version

• Safari — See KB84934.

Because Google and Mozilla release new versions frequently, Web Control might not work with a new update. A
Web Control patch is released as soon as possible to support the changes from Google or Mozilla.

Web Control doesn't support Microsoft Edge.

10 McAfee Endpoint Security 10.6.0 - Web Control Product Guide


Product overview
Feature overview 1

For the latest information about browsers that Web Control supports, see KB82761.

See also
Prohibit use of specific browsers on page 39

Identifying threats while browsing


When users browse to a website, a color-coded button appears in the browser. The color of the
button corresponds to the safety rating for the site.

The safety rating applies to HTTP and HTTPS protocol URLs only.

Internet Explorer Firefox and Description


Chrome
This site is tested daily and certified safe by McAfee SECURE .

This site is safe.

This site might have some issues.

This site has some serious issues.

No rating is available for this site.


This button appears for FILE (file://) protocol URLs.

A communication error occurred with the McAfee GTI server that


contains rating information.
Web Control didn't query McAfee GTI for this site, which indicates that
the site is internal or in a private IP address range.
This site is a phishing site.
Phishing is an attempt to acquire sensitive information such as user
names, passwords, and credit card details. Phishing sites masquerade
as trustworthy entities in electronic communication.

A setting allows this site.

A setting disabled Web Control.

The location of the button depends on the browser:

• Internet Explorer — Web Control toolbar

• Firefox — Right corner of the Firefox toolbar

• Chrome — Address bar

See also
Get information about a site that you're viewing on page 48
Frequently asked questions on page 21

McAfee Endpoint Security 10.6.0 - Web Control Product Guide 11


1 Product overview
Feature overview

Identifying threats while searching


When users type keywords into a search engine such as Google, Yahoo, Bing, or Ask, safety icons appear next to
sites in the search results page. The color of the button corresponds to the site's safety rating.

Tests revealed no significant problems.

Tests revealed some issues that users might need to know about. For example, the site tried to change
the testers’ browser defaults, displayed pop-ups, or sent testers a significant amount of non-spam email.
Tests revealed some serious issues that users must consider carefully before accessing this site. For
example, the site sent testers spam email or bundled adware with a download.
A Web Control setting blocked this site.

This site is unrated.

See also
Get information about a site from search results on page 48

Site reports provide details


Users can view the site report for a website to get detailed information about specific threats.
Site reports are delivered from the McAfee GTI ratings server and provide the following information.

This item... Indicates...


Overview The overall rating for the website, determined from these tests:
• Evaluation of a website's email and download practices using proprietary data collection and
analysis techniques.
• Examination of the website itself to see if it engages in annoying practices such as excessive
pop-ups or requests to change your home page.
• Analysis of the website's online affiliations to see if it associates with other suspicious sites.
• Combination of the McAfee review of suspicious sites with feedback from our Threat
Intelligence services.

Online How aggressively the site tries to get you to go to other sites that McAfee flagged with a red
Affiliations rating.
Suspicious sites often associate with other suspicious sites. The primary purpose of feeder sites
is to get you to visit the suspicious site. A site can receive a red rating if, for example, it links
too aggressively to other red sites. In this case, Web Control considers the site red by
association.

Web Spam The overall rating for a website's email practices, based on the test results.
Tests McAfee rates sites based on how much email we receive after entering an address on the site,
and how much the email looks like spam. If either measure is higher than what is considered
acceptable, McAfee rates the site yellow. If both measures are high or one looks egregious,
McAfee rates the site red.

Download The overall rating about the impact a site's downloadable software had on our test computer,
Tests based on the test results.
McAfee gives red flags to sites with virus-infected downloads or to sites that add unrelated
software considered by many to people be adware or spyware. The rating also considers the
network servers that a downloaded program contacts during operation, and any changes to
browser settings or computer registry files.

See also
Get information about a site from search results on page 48
Get information about a site that you're viewing on page 48

12 McAfee Endpoint Security 10.6.0 - Web Control Product Guide


Product overview
Feature overview 1

How Web Control blocks or warns about a site or download


When a user visits or accesses a resource from a site that has been blocked or warned about, Web Control
displays a page or pop-up message indicating the reason.

If rating actions for a site are set to:

• Warn — Web Control displays a warning to notify users of potential dangers associated with the site.

• Block — Web Control displays a message that the site is blocked and prevents users from accessing the site.

If rating actions for downloads from a site are set to:

• Warn — Web Control displays a warning to notify users of potential dangers associated with the download
file and allows user to block or continue with the download.

• Block — Web Control displays a message that the site is blocked and prevents the download.

If the file reputation is not malicious, Web Control allows file downloads from a blocked site using the complete
URL.

See also
Warn about or block unknown URLs and file downloads on page 34
Block all internal sites on page 35
Manage blocked and allowed sites on page 37
Customize user notifications for blocked content on page 40

How Web Control and McAfee Client Proxy work together


®
Web Control can disable itself when operating inside your enterprise network to allow McAfee Client Proxy to
perform web reputation checking.

For Web Control to be disabled, the client system must meet the Client Proxy criteria set in the MCP Policy settings.

Web Control remains enabled unless both of the following are true:

• The Disable if McAfee Client Proxy is detected option is selected.


If this option is not selected, Web Control remains enabled even if Client Proxy is redirecting.

• Client Proxy is redirecting.


If Client Proxy is installed but not redirecting for some reason, such as network or license issues, Web
Control is enabled.

When Web Control is configured to be disabled when Client Proxy is redirecting:

• When the client system is outside the internal network, Web Control is disabled and Client Proxy redirects
network traffic.

• When the client system moves from outside to inside the internal network, Client Proxy stops redirecting
and Web Control is reenabled.

McAfee Endpoint Security 10.6.0 - Web Control Product Guide 13


1 Product overview
Feature overview

When Web Control is disabled because Client Proxy is present and redirecting:

• Web Control ignores rating and enforcement actions.

• Web Control browser controls are disabled.

• Endpoint Security Client Status page shows Web Control status as Disabled.

• Endpoint Security Client Settings page indicates that Web Control is disabled because Client Proxy is
detected.

How web gateway enforcement works


Web gateways protect users from threats with proactive analysis to filter malicious content from web traffic.
Gateways scan the webpage active content to understand behavior, predict intent, and protect against targeted
attacks. If your organization uses a web gateway, you can specify that Web Control not enforce site ratings when
a web gateway is detected.

Use one of these methods to configure Web Control to detect a web gateway.

• Use your organization's default gateway


Web Control compares the client's default gateway IP address with the organization's gateway IP address
specified in the policy. If the IP addresses match, the default gateway enforces network traffic, rather than
Web Control.

• Detect web gateway enforcement


Web Control tries to contact http://gateway.siteadvisor.com. If Web Control can't retrieve content from this
site, a web gateway enforces network traffic, rather than Web Control.

Your web gateway must block http://gateway.siteadvisor.com.

• Specify internal landmark to use

14 McAfee Endpoint Security 10.6.0 - Web Control Product Guide


Product overview
Feature overview 1

If Web Control resolves the specified DNS name or IP addresses, it doesn't perform rating or enforcement
actions.

Best practice: Enter both a DNS name and IP addresses.

• If you enter the DNS name, Web Control performs a DNS query (doesn't check the local cache) on the
host name. If at least one IP address is detected, Web Control doesn't perform rating or enforcement
actions.

• If you enter IP addresses, Web Control resolves the name for each address. If at least one valid host
name is detected, Web Control stops processing and doesn't perform rating or enforcement actions.

• If you enter both a DNS name and IP addresses, Web Control performs a DNS query on the DNS host
name and checks the result against the specified IP addresses. If it detects a match, Web Control doesn't
perform rating or enforcement actions.

How safety ratings are compiled


A McAfee team develops safety ratings by testing criteria for each site and evaluating the results to detect
common threats.
Automated tests compile safety ratings for a website by:

• Downloading files to check for viruses and potentially unwanted programs bundled with the download.

• Entering contact information into sign-up forms and checking for resulting spam or a high volume of
non-spam email sent by the site or its affiliates.

• Checking for excessive pop-up windows.

• Checking for attempts by the site to exploit browser vulnerabilities.

• Checking for deceptive or fraudulent practices employed by a site.

The team compiles test results into a safety report that can also include:

• Feedback submitted by site owners, which might include descriptions of safety precautions used by the site
or responses to user feedback about the site.

• Feedback submitted by site users, which might include reports of phishing scams or bad shopping
experiences.

• More analysis by McAfee experts.

The McAfee GTI server stores site ratings and reports.

See also
Specify rating actions and block site access based on web category on page 39

McAfee Endpoint Security 10.6.0 - Web Control Product Guide 15


1 Product overview
Feature overview

How file downloads are scanned


Web Control sends file download requests to Threat Prevention for scanning before it allows files to be
downloaded.

See also
Scan files before downloading on page 35

16 McAfee Endpoint Security 10.6.0 - Web Control Product Guide


Product overview
Feature overview 1

How McAfee GTI works


McAfee GTI stores site ratings and reports for Web Control. If you configure Web Control to scan downloaded
files, the scanner uses McAfee GTI file reputation to check for suspicious files.
The scanner submits fingerprints of samples, or hashes, to a central database server hosted by McAfee Labs to
determine if they are malware. By submitting hashes, detection might be available sooner than when McAfee
Labs publishes the updated content file.

You can configure Endpoint Security to use a proxy server to retrieve McAfee GTI reputation information in the
Common settings.

For frequently asked questions about McAfee GTI, see KB53735.

See also
Frequently asked questions on page 21
Information that the software sends to McAfee ePO on page 18
How file downloads are scanned on page 16
Scan files before downloading on page 35

How Web Control works with Web Reporter


Web Reporter defines your browsing environment based on content categories and creates detailed reports on
your organization's web use and trends.
Used with Web Control, Web Reporter provides the reports that help administrators manage access to the web.
Use these reports to protect against liability exposure, productivity loss, bandwidth overload, and security
threats. For detailed information about configuring and using Web Reporter to generate reports, see the Web
Reporter documentation.

The Web Reporter server collects and processes log files and imports the data from the log file to the database.
After the data is transferred to the database, reports are generated. Log files are generated by running a Web
Control client task from the McAfee ePO server on all managed systems.

Web Reporter groups


These groups of people are involved in the Web Reporter environment:

• Web users have installed and enabled in their browser.

• Reporting users create and view reports.


Reporting users log on to the Web Reporter server with a web-based interface.

• Reporting administrator installs, configures, and maintains the Web Reporter server.
The reporting administrator uses the web-based interface to manage how Web Reporter is used in the
organization:

• Creating logon accounts

• Managing delegated reporting

• Configuring email settings

• Managing mapped columns

• Managing the database, directories, and log sources

McAfee Endpoint Security 10.6.0 - Web Control Product Guide 17


1 Product overview
Web Control additions to McAfee ePO

Web Reporter environment


The Web Reporter environment comprises these areas:

• Web Reporter is the server-based software with a web-based interface and configuration settings that
create detailed reports.

• Log sources are devices on the network that generate or store log files. Log files contain web filtering data,
including information such as user names, IP addresses, URLs, time stamps, and protocol types. Web
Reporter collects and processes the log files, then imports the data into its database. A log source can be a
directory on the Web Reporter server, an FTP server, or NetCache.

• Database stores data from each log source, and reports are generated using the data. Supported database
platforms include Microsoft SQL 2000 and 2005, MySQL 5.0, and Oracle 9 and 10.

See also
Send Web Control logs from McAfee ePO to Web Reporter on page 36

Information that the software sends to McAfee ePO


Web Control sends information about browsing activity, including the actions taken, to the McAfee ePO server.
This information can be used in queries.
Web Control sends the following information:

• Type of event initiated by the managed system (site visit or download)

• Unique ID assigned to the managed system

• Time

• Domain

• URL

• Web Control rating for the event’s site

• Whether the event’s site or site resource is on the Block and Allow List

• Reason for action (allow, warn, or block) taken by the software

• Observe mode status (on or off)

The software sends the complete URL of the website to the McAfee GTI server.

When a managed system visits a website, Web Control tracks the URL. The URL is the smallest amount of
information required for the software to uniquely identify the URL being rated for security. The focus of Web
Control is protecting your managed systems; no attempt is made to track personal Internet use.

Web Control doesn't send information about your company’s intranet sites to the McAfee GTI server.

See also
Track browser events to use for reports on page 34
How McAfee GTI works on page 17

Web Control additions to McAfee ePO


This managed product extends your ability to secure your network with these features and enhancements.

You must have appropriate permissions to access most features.

18 McAfee Endpoint Security 10.6.0 - Web Control Product Guide


Product overview
Web Control additions to McAfee ePO 1

McAfee ePO feature Addition


Client tasks Client tasks that you can use to automate management and maintenance on client
systems.
Use the Send Web Reporter Logs client task to transfer log files of browsing data from
the client systems to the McAfee Web Reporter server.
Dashboards Dashboards and monitors that you can use to keep watch on your environment.

Events and responses • Events for which you can configure automatic responses.

• Event groups and event types that you can use to customize automatic responses.

Managed system Properties that you can review in the System Tree or use to customize queries.
properties
Permissions sets Web Control permission category, available in all existing permission set.
Policies Block and Allow List, Content Actions, Enforcement Messaging, and Options policy
categories in the Endpoint Security Web Control product group.
Queries and reports • Default queries that you can use to run reports.
• Custom property groups based on managed system properties that you can use to
build your own queries and reports.

See also
Permission sets and Web Control on page 19
Client tasks and Web Control on page 20
Policies and Web Control on page 29
Dashboards, monitors, and Web Control on page 41
Queries, reports, and Web Control on page 43
Server tasks and Web Control on page 45
Events, responses, and Web Control on page 46

Permission sets and Web Control


Permission sets define rights for managed product functionality in McAfee ePO.
Web Control adds the Endpoint Security Web Control and Endpoint Security Web Control Query permission
groups to each permission set.

Permission groups define the access rights to the features. McAfee ePO grants all permissions for all products
and features to global administrators. Administrators then assign user roles to existing permission sets or
create new permission sets.

Your managed product adds these permission controls to McAfee ePO.

Permissions sets Default permissions


Executive Reviewer No permissions
Endpoint Security Web Control and Endpoint Security Web Control Query

Global Reviewer Views features, runs queries.


Endpoint Security Web Control

Global Reviewer Endpoint Security Web Control Query No permissions

McAfee Endpoint Security 10.6.0 - Web Control Product Guide 19


1 Product overview
Web Control additions to McAfee ePO

Permissions sets Default permissions


Group Admin No permissions
Endpoint Security Web Control and Endpoint Security Web Control Query

Group Reviewer No permissions


Endpoint Security Web Control and Endpoint Security Web Control Query

This managed product grants No Permissions by default.

Permissions must be granted for users to access or use permission-controlled features.

Table 1-1 Permissions required per feature


Feature Required permissions
Automatic Responses Automatic Responses, Event Notifications, Client Events
Client events and client rules Systems, System Tree access, Threat Event Log
Client tasks Endpoint Security Web Control: Tasks in the Endpoint Security Web Control
permission group
Dashboards and monitors Dashboards, Queries
Policies Endpoint Security Web Control: Policy in the Endpoint Security Web Control
permission group
Queries Queries & Reports
Server tasks Server Tasks
System Tree Systems, System Tree access
Threat Event Log Systems, System Tree access, Threat Event Log

For information about managing permission sets, see the McAfee ePO documentation.

See also
Client tasks and Web Control on page 20
Policies and Web Control on page 29
Dashboards, monitors, and Web Control on page 41
Queries, reports, and Web Control on page 43
Server tasks and Web Control on page 45
Events, responses, and Web Control on page 46

Client tasks and Web Control


Automate management or maintenance on managed systems using client tasks.

Your managed product adds these client tasks to the Client Task Catalog. You can use client tasks as is, edit
them, or create new ones.

Client task Description


Send Web Sends logs to the configured Web Reporter server.
Reporter Logs Web Control collects logs of page view and file downloads. Then, Web Control sends this data
to the configured Web Reporter server using the Send Web Reporter Logs client task.

Because large amounts of data that can be transferred when the logs are sent, we
recommend setting the client task to run on a randomized schedule.

See the settings for Event Logging in the Options policy to configure the Web Reporter server
settings.

20 McAfee Endpoint Security 10.6.0 - Web Control Product Guide


Product overview
Frequently asked questions 1

Web Control leverages the following default McAfee Agent client tasks.

Table 1-2 McAfee Agent default client tasks


Client task Description
Product Deployment Deploys McAfee products to client systems.
Product Update Updates content files, engines, and all McAfee products automatically.

For information about client tasks and the Client Task Catalog, see the McAfee ePO documentation.

See also
Permission sets and Web Control on page 19
Send Web Control logs from McAfee ePO to Web Reporter on page 36

Frequently asked questions


Here are answers to frequently asked questions.

Policy enforcement
How can users circumvent policy settings for Web Control and hide their browsing behavior?

These methods allow users to hide browsing activity:

• Creating an application that browses the web.

• Creating a frame page to load websites in a frame.

• Disabling the plug-in from the Choose Add-ons pop-up window that Internet Explorer displays after
Web Control is installed.

• Disabling Web Control in Chrome or Firefox by managing add-ons or extensions in the browser.

To protect against these situations:

• Enable Self Protection for Web Control in the Common Options policy to keep users from disabling in
Web Control Internet Explorer.

• Assign a policy to a group to automatically enable the Web Control plug-in in Internet Explorer and
Chrome.
For information, see KB87568.

• Use queries that track browsing behavior and usage. Queries alert you when managed systems show
no browsing data or less browsing data than expected.

• Check the compliance status of the client software using the Endpoint Security Web Control:
Compliance Status query. This query indicates when the software is disabled.

By setting up monitors that use the applicable queries, or frequently checking reports generated by
queries, you know when users circumvent policy settings. You can then take immediate steps to ensure
compliance.

Information tracking and reporting


If Internet Explorer is the only browser installed on a managed system when Web Control is deployed,
must I redeploy the software after installing Firefox or Chrome?
No. Web Control detects both Firefox and Chrome when they are installed and immediately begins to
protect searching and browsing activities in that browser, while continuing to protect Internet Explorer.

McAfee Endpoint Security 10.6.0 - Web Control Product Guide 21


1 Product overview
Frequently asked questions

Color coding
Why is the Web Control button gray?
Several causes are possible:
• The site is not rated.

• The client software is disabled.

General
Is it safe to use Web Control as my only source of security against web-based threats?
No. Web Control tests many threats, and constantly adds new threats to its testing criteria, but it can't
test for all threats. Users must continue to use traditional security defenses, such as virus and spyware
protection, intrusion prevention, and network access control.

See also
Guidelines for creating a strategy on page 23
Identifying threats while browsing on page 11
Supported and unsupported browsers on page 10
Configuring browsers to force-enable the Web Control plug-in on page 33
Dashboards, monitors, and Web Control on page 41
Queries, reports, and Web Control on page 43

22 McAfee Endpoint Security 10.6.0 - Web Control Product Guide


2 Setting up a strategy for browsing security

Contents
Guidelines for creating a strategy
Selecting the right policy options and features

Guidelines for creating a strategy


Design and implement a browsing security strategy that fully protects your client systems against web-based
threats.
1 Enable Observe mode and deploy the client software.
Before deploying the client software, enable Observe mode. This mode prevents Web Control from
enforcing actions (such as blocking and warning) based on the settings. Instead, Web Control tracks
browsing behavior data that you can retrieve in reports.

2 Evaluate browsing traffic and usage patterns (Reports).


Run queries and review the results to learn about network browsing patterns. For example, what types of
sites are users visiting? What time of day is browsing traffic heaviest?

3 Create policies.
Configure settings based on the browsing behavior revealed in the query results. Block or warn any sites or
downloads that present threats, and allow sites that are important to your users.

4 Test and evaluate settings (Observe mode).


Enable Observe mode to track the number of users who access sites that the configured settings might
affect. Run queries, then view and evaluate the tracked data. Are the settings comprehensive enough? Did
the settings result in any unintended consequences? Adjust the settings as needed, then disable Observe
mode to activate them.

5 Ensure compliance, productivity, and security with frequent monitoring.


Run queries regularly and view results in reports or in monitors.

• Verify that Web Control is enabled on all computers and is functioning properly by running the
Functional Compliance query.

• Check whether any required sites or site resources, such as download files, are blocked.

• Check visits to sites that contain threats.

• Update settings to address any problems.

McAfee Endpoint Security 10.6.0 - Web Control Product Guide 23


2 Setting up a strategy for browsing security
Selecting the right policy options and features

See also
Evaluating policy settings with Observe mode on page 32
Policies and Web Control on page 29
Queries, reports, and Web Control on page 43
Dashboards, monitors, and Web Control on page 41
Specify enforcement behavior for specific actions on page 34

Selecting the right policy options and features


Identify your browser security goals and deploy Web Control features.
When developing a strategy for browsing security:

• Assess the security concerns and vulnerabilities that apply to your business.

• Carefully consider any domains and sites that must be accessible to your managed systems and any sites to
block.

• Decide which network browsing activities to monitor.

• Determine your most effective and efficient forms of monitoring.

Use this list to identify which product features can help meet your security or productivity goals.

If your goal is... Specify these options...


Use Web Control ratings to control access to sites, and Content Actions policy
file downloads.
Use site content to control access to sites. Content Actions policy
Control access to supported and unsupported Browser Control policy
browsers.
Block phishing pages. Options policy: Action Enforcement section
Block or ensure access to sites or domains. Block and Allow List policy
Control access to resources (such as downloaded files) Block and Allow List policy: Allowed Site Options on
on "allowed" sites. the Advanced Settings tab
Track visits to allowed sites and green-rated sites. • Options policy: Event Logging section
• Common module, Options policy, Event Logging
section: Web Control events to log must be set to All

Configure logging settings. Common module, Options policy: Client Logging


section
Prevent data about intranet sites from being reported Options policy: Specify IP addresses or ranges to
to McAfee GTI. exclude from Web Control rating or blocking in the
Exclusions section
Block all internal sites. Options policy: deselect Allow all IP addresses in the
local network in the Exclusions section
Communicate to users why a site is blocked or how to Enforcement Messaging policy
protect against threats on a site.
Evaluate the effect of policy settings before they are Options policy: Enable Observe mode option in the
implemented. Action Enforcement section
Enter information about any proxy server needed for Common module, Options policy: Proxy Server
Internet access. section

24 McAfee Endpoint Security 10.6.0 - Web Control Product Guide


Setting up a strategy for browsing security
Selecting the right policy options and features 2

If your goal is... Specify these options...


Monitor the effect of current policy settings. Dashboards, monitors, and queries
Obtain detailed reports based on site content. Web Reporter

See also
Using URLs or domains to control access on page 25
Using safety ratings to control access on page 26
Using web categories to control access on page 27
Policies and Web Control on page 29

Using URLs or domains to control access


Set up lists of sites that users can or can't access.
The Block and Allow List contains URLs or site patterns that the policy blocks or allows.

• Allow indicates that users can always access the site, regardless of safety rating or content type. Use allowed
sites to make sure that managed systems can access sites that are important to your business. The button
in the upper-right corner of the browser appears white for allowed sites.

Exercise caution when adding allowed sites to Block and Allow List policies.

You can also specify actions for resources, such as file downloads, in allowed sites. For example, if your
users aren't vulnerable to potential threats on a yellow site, add the site as allowed to a Block and Allow List.
If the site contains a red download file, allow access to the site, but block access to those resources. This
strategy makes sure that sites important to your business are accessible, while protecting your users from
potential threats on those sites.

• Block indicates that users can never access the site. Use blocked sites to deny access to sites that aren't
needed to your business or don't conform to company security standards. The button in the upper-right
corner of the browser appears black for blocked sites.

The Block and Allow List policy is a multiple-instance policy.

By default, if the same site appears as both blocked and allowed, the block action takes precedence. You can
configure a policy option for allowed sites to take priority.

The settings for the Block and Allow List policy override those in the Content Actions policy.

See also
How policies work on page 31
How site patterns work on page 25
Warn about or block unknown URLs and file downloads on page 34
Manage blocked and allowed sites on page 37

How site patterns work


The Block and Allow List policies use site patterns to specify a range of sites that are allowed or blocked. With
site patterns, you can allow or block a domain or a range of similar sites without entering each URL separately.
When a user navigates to a site, Web Control compares the URL to the site patterns configured in the assigned
Block and Allow List policies.

A site pattern consists of a URL or partial URL, which Web Control interprets as two distinct components:

• Domain with protocol information (for example, http://, https://, or ftp://)

• Path

McAfee Endpoint Security 10.6.0 - Web Control Product Guide 25


2 Setting up a strategy for browsing security
Selecting the right policy options and features

http:// The domain consists of two parts:


www.mcafee.com
• Protocol — http:// in this example.
• Internet domain — www.mcafee.com in this example.
Web Control matches domain information from the end. A matching URL domain must
end with the site pattern’s domain. The protocol can vary.

These domains match http:// These domains don't match http://


www.mcafee.com: www.mcafee.com:
• ftp://www.mcafee.com • http://www.mcafee.downloads.com
• https://1www.mcafee.com • http://mcafee.net
• http://info.www.mcafee.com • http://www.mcafeeasap.com
• http://us.mcafee.com

/us/enterprise The path includes everything that follows the slash (/) after the domain.
Web Control matches path information from the beginning. A matching URL path must
begin with the site pattern’s path.

These domains match /us/enterprise: These domains don't match /us/enterprise:


• /us/enterpriseproducts • /emea/enterprise
• /us/enterprise/products/security • /info/us/enterprise

Site patterns must be at last three characters in length and must not include wildcard characters. Web Control
doesn't check for matches in the middle or end of URLs.

Use the "." character at the beginning of a site pattern to match a specific domain. For convenience, the "."
character causes Web Control to ignore the protocol and introductory characters.

Table 2-2 Example


.mcafee.com matches these URLs .mcafee.com doesn't match these URLs
• http://www.info.mcafee.com • http://www.mcafeeasap.com
• http://mcafee.com • http://salesmcafee.com
• http://ftp.mcafee.com • http://ftp.mcafee.net

Using safety ratings to control access


Use safety ratings to determine whether users can access a site or access resources on a site.
In the Content Actions settings, specify whether to allow, warn, or block sites and file downloads, based on the
safety rating. This setting enables a greater level of granularity in protecting users against files that might pose a
threat on sites with an overall green rating.

To block file downloads on allowed sites, change the settings on the Advanced Settings tab of the Block and
Allow List settings.

Best practice: To make sure that users can access specific sites that are important to your business, no matter
how they are rated, add them to an allowed list. Users can access sites that appear on an allowed list even if you
configured other actions with their ratings.

See also
How policies work on page 31
Specify rating actions and block site access based on web category on page 39

26 McAfee Endpoint Security 10.6.0 - Web Control Product Guide


Setting up a strategy for browsing security
Selecting the right policy options and features 2

Using web categories to control access


McAfee defines categories for the types of content on websites. You can allow or block access to sites based on
these categories.
When you enable web category blocking in the Content Actions settings, the software blocks or allows
categories of websites. These web categories include Gambling, Games, and Instant Messaging. McAfee defines
and maintains the list of about 105 web categories.

When a client user accesses a site, the software checks the web category for the site. If the site belongs to a
defined category, access is blocked or allowed, based on the settings in the Content Actions settings. For sites
and file downloads in the unblocked categories, the software applies the specified Rating Actions.

See also
How policies work on page 31
Specify rating actions and block site access based on web category on page 39

McAfee Endpoint Security 10.6.0 - Web Control Product Guide 27


2 Setting up a strategy for browsing security
Selecting the right policy options and features

28 McAfee Endpoint Security 10.6.0 - Web Control Product Guide


3 Configuring Web Control

Contents
Policies and Web Control
Enable and disable Web Control
Track browser events to use for reports
Specify enforcement behavior for specific actions
Warn about or block unknown URLs and file downloads
Scan files before downloading
Block all internal sites
Configure Secure Search
Send Web Control logs from McAfee ePO to Web Reporter
Manage blocked and allowed sites
Prohibit use of specific browsers
Specify rating actions and block site access based on web category
Customize user notifications for blocked content

Policies and Web Control


Policies let you configure, apply, and enforce settings for managed systems in your environment.

Policies are collections of settings that you create, configure, and apply, then enforce. Most policy settings
correspond to settings that you configure in the Endpoint Security Client. Other policy settings are the primary
interface for configuring the software.

Your managed product adds these categories to the Policy Catalog. The available settings vary in each category.

Table 3-1 Web Control policy categories


Category Description
Block and Allow List Configures the Block and Allow List, including:
(Multiple-instance) • Sites that users are allowed to access
• Sites that users are blocked from accessing
• Access to individual resources, such as file downloads, on the sites
• Whether the allowed sites have precedence over blocked sites
You can apply several instances of this policy, resulting in one combined, effective
policy.

Browser Control Configures settings to prohibit specific supported and unsupported browsers.

McAfee Endpoint Security 10.6.0 - Web Control Product Guide 29


3 Configuring Web Control
Policies and Web Control

Table 3-1 Web Control policy categories (continued)


Category Description
Content Actions Configures rules for user access, based on the safety ratings assigned to:
(Multiple-instance) • Categories of web content
• Websites
• File downloads
You can apply several instances of this policy, resulting in one combined, effective
policy.

Enforcement Messaging Specifies messages and explanations, which can include your own image, to display
when users attempt to access:
• Sites blocked and warned by Rating Actions
• File downloads blocked and warned by Rating Actions
• Phishing pages
• Blocked sites on the Block and Allow List
• Sites blocked when McAfee GTI is unreachable
• Sites blocked and warned that McAfee GTI has not yet verified

Options Configures general settings, including:


• Disable and enable the client software.
• Prevent users from uninstalling or disabling the browser plug-in.
• Show and hide Web Control in the browser.
• Configure action enforcement behavior.
• Enable Observe mode to evaluate and tune policy settings before implementing
them.
• Specify Secure Search settings.
• Configure logging.
• Configure Web Reporter.
• Set up Web Control behavior if your organization implements a web gateway.

Customizing policies
Each policy category includes default policies.

You can use default policies as is, edit the My Default default policies, or create new policies.

Table 3-2 Web Control default policies


Policy Description
McAfee Default Defines the default policy that takes effect if no other policy is applied. You can duplicate, but
not delete or modify, this policy.
My Default Defines default settings for the category.

Multiple-instance policies
The Content Actions and Block and Allow List policies are multiple instance policies. You can assign more than
one policy instance to a client. For the policies that have multiple instances, an Effective Policy link provides a
view of the details of the combined policy instances.

30 McAfee Endpoint Security 10.6.0 - Web Control Product Guide


Configuring Web Control
Policies and Web Control 3

User-based policies
User-based polices (UBP) enable policies to be defined and enforced using McAfee ePO policy assignment rules
with an LDAP server. These assignment rules are enforced on the client system for the user at log-on,
regardless of the McAfee ePO group.

User-based polices are enforced when a user with a matching assignment rule logs on to the client system on
the console. System-based polices (SBP) are enforced when two or more users are logged on to a system. Policy
assignment rules take precedence over polices defined in the System Tree.

The user policy supersedes the system policy. All system policies apply and any user-based policy overrides the
system policy.

Policy assignment rules are enforced only if the user logs on as the interactive user. The system policy, rather
than the user policy, is enforced if the user logs on:
• With a runas command

• To a remote desktop or terminal service where the user's logon is not set to interactive

For more information about user-based policies and policy assignment rules, see the McAfee ePO Help.

Comparing policies
You can compare all policy settings for the module using the Policy Comparison feature in McAfee ePO. For
information, see the McAfee ePO Help.

For information about policies and the Policy Catalog, see the McAfee ePO documentation.

See also
Assign multiple instances of a policy on page 32
How policies work on page 31
Evaluating policy settings with Observe mode on page 32

How policies work


Web Control includes preconfigured default policies. You can't change the default policies, but you can create
copies and modify them to meet your browsing protection needs.
You then assign the policy to managed systems running the client software. You can assign the same policy
settings to all managed systems, or to groups of managed systems that require the same type of access and
protection.

Multiple-instance policies
Multiple-instance policies, such as Block and Allow List and Content Actions, support combining multiple
policies under a single effective policy.

Multiple-instance policies obey the McAfee ePO laws of inheritance within a System Tree. See the McAfee ePO
Help.

You can use multiple-instance policies to apply a default list of sites, and add entries for a particular group or all
groups. Instead of updating the entire list with the new entries, create a second policy instance for the new
entries. Then, apply it and the default list together. The effective policy is then the combination of the two
policies.

For example, you configure one Block and Allow List policy for Group A, another for Group B, and another for
Group C. If Group A contains Group B, and Group B contains Group C, the Block and Allow List policy
incorporates elements from the three policies. The allowed list for Group C might contain all sites listed for
Group A and Group B, and extra sites specific to Group C. By using an effective policy, you don't have to re-enter
all sites from Group A and Group B into the allowed list for Group C.

McAfee Endpoint Security 10.6.0 - Web Control Product Guide 31


3 Configuring Web Control
Policies and Web Control

For more information about using policies, see the McAfee ePO Help.

See also
Assign multiple instances of a policy on page 32
Selecting the right policy options and features on page 24

Assign multiple instances of a policy


Assign more than one instance of a policy to systems in the System Tree to combine multiple instances under
one effective policy.
For policies that support multiple instances, an Effective Policy link provides details of the combined policies.
Block and Allow List and Content Actions support multiple instances.

Task
1 Select Menu | Systems | System Tree and select a group in the System Tree.

For one system, select a group in the System Tree that contains the system. Then, on the Systems tab, select
the system and select Actions | Agent | Modify Policies on a Single System.

2 Under Assigned Policies, select Endpoint Security Web Control in the Product list.

3 Click Edit Assignments for one of the multiple-instance policies (Block and Allow List or Content Actions).

4 On the Policy Assignment page, click New Policy Instance, then select a policy from the Assigned Policy drop-down
list for the additional policy instance.
To view the combined effect of multiple policies, click View Effective Policy.

You can view the effective policy at any time from the Assigned Policies tab of the System Tree.

5 Click OK.

See also
How policies work on page 31

Evaluating policy settings with Observe mode


Observe mode enables you to evaluate the effect of warn or block policy settings on network browsing activity
before implementing them.
To enable Observe mode, see enforcement behavior settings in the Options policy.

Use Observe mode to track:

• Visits to red, yellow, or unrated sites

• Visits to sites that you configured to block or warn

• Visits to phishing pages if configured to block

• Downloads that you configured to block or warn

Information compiled in Observe mode is available by running queries, then viewing the results in reports or
monitors.

If current settings adversely affect network browsing patterns, adjust settings before disabling Observe mode.
When you disable Observe mode, Web Control enforces policy settings.

See also
Specify enforcement behavior for specific actions on page 34
How policies work on page 31

32 McAfee Endpoint Security 10.6.0 - Web Control Product Guide


Configuring Web Control
Enable and disable Web Control 3

Enable and disable Web Control


Use settings to enable and disable Web Control on all systems managed by the McAfee ePO server.
When the software is disabled:

• Policy settings are not enforced.

• The site report can't be displayed.

• The Web Control button is gray.

Best practice: Only disable Web Control to perform tests or troubleshoot network connection problems. Make
sure to re-enable Web Control when you are done.

Task

1 Select Menu | Policy | Policy Catalog, then select Endpoint Security Web Control from the Product list.

2 From the Category list, select Options.

3 Click the name of an editable policy.

4 Configure settings in Web Control section.

5 Click Save.

6 Run an agent wake-up call to apply the setting immediately, or wait for the next automatic agent-server
communication.

See also
Policies and Web Control on page 29
How web gateway enforcement works on page 14
How Web Control and McAfee Client Proxy work together on page 13

Configuring browsers to force-enable the Web Control plug-in


With Active Directory, you can configure Internet Explorer and Chrome to force-enable the Web Control browser
plug-in so that users don't have to enable it manually on the client system.
• Internet Explorer
For information, see Managing Browser Settings with Group Policy Tools.

• The CLSID for the Web Control Browser Helper Object (BHO) is
{B164E929-A1B6-4A06-B104-2CD0E90A88FF}.

• The CLSID for the Web Control toolbar is {0EBBBE48-BAD4-4B4C-8E5A-516ABECAE064}.

• Chrome
For information, see Set Chrome policies for devices.

• The APPID for Web Control is jjkchpdmjjdmalgembblgafllbpcjlei.


The APPID is case sensitive.

• The location where the extension is hosted is https://clients2.google.com/service/update2/crx.

McAfee Endpoint Security 10.6.0 - Web Control Product Guide 33


3 Configuring Web Control
Track browser events to use for reports

Track browser events to use for reports


Use Options settings to configure Web Control events sent from client systems to the McAfee ePO database to
use for queries and reports.

Task
1 Select Menu | Policy | Policy Catalog, then select Endpoint Security Web Control from the Product list.

2 From the Category list, select Options.

3 Click the name of an editable policy.

4 Click Show Advanced.

5 Under Event Logging, configure settings on the page.

6 Click Save.

See also
Dashboards, monitors, and Web Control on page 41
Queries, reports, and Web Control on page 43

Specify enforcement behavior for specific actions


Configure how Web Control responds to certain situations by defining the behavior in the Action Enforcement
section of the Options settings.

Task
1 Select Menu | Policy | Policy Catalog, then select Endpoint Security Web Control from the Product list.

2 From the Category list, select Options.

3 Click the name of an editable policy.

4 Configure settings in the Action Enforcement section.

5 Click Save.

See also
Policies and Web Control on page 29
How McAfee GTI works on page 17
Scan files before downloading on page 35
Evaluating policy settings with Observe mode on page 32

Warn about or block unknown URLs and file downloads


Configure Action Enforcement settings in the Options settings to block, warn, or allow sites that McAfee GTI has not
yet rated.

Task
1 Select Menu | Policy | Policy Catalog, then select Endpoint Security Web Control from the Product list.

2 From the Category list, select Options.

3 Click the name of an editable policy.

34 McAfee Endpoint Security 10.6.0 - Web Control Product Guide


Configuring Web Control
Scan files before downloading 3

4 In Action Enforcement, select the action (Allow, Warn, or Block) for sites not yet verified by McAfee GTI.

5 Click Save.

See also
Policies and Web Control on page 29
How McAfee GTI works on page 17
Customize user notifications for blocked content on page 40

Scan files before downloading


Configure Web Control to scan all files before downloading and specify the sensitivity level to use when
determining if a detected sample is malware.
Web Control performs a McAfee GTI lookup on the file. If McAfee GTI allows the file, Web Control sends the file
to Threat Prevention for scanning. If a downloaded file is detected as a threat, Endpoint Security responds with
the configured action and alerts the user.

If users specify the complete URL to a file whose reputation is not malicious, Web Control allows the file
download, even if the site is blocked.

Task
1 Select Menu | Policy | Policy Catalog, then select Endpoint Security Web Control from the Product list.

2 From the Category list, select Options.

3 Click the name of an editable policy.

4 Select Enable file scanning for file downloads, then select the sensitivity level.

See also
How file downloads are scanned on page 16

Block all internal sites


By default Web Control doesn't block or report on IP addresses on the local private network. You can block all
internal sites in the Options settings.
To allow specific sites in the local private network, add them to the Block and Allow List.

Task
1 Select Menu | Policy | Policy Catalog, then select Endpoint Security Web Control from the Product list.

2 From the Category list, select Options.

3 Click the name of an editable policy.

4 Deselect Allow all local IP addresses in the local network.

5 Click Save.

See also
Policies and Web Control on page 29
Manage blocked and allowed sites on page 37

McAfee Endpoint Security 10.6.0 - Web Control Product Guide 35


3 Configuring Web Control
Configure Secure Search

Configure Secure Search


Secure Search automatically filters the malicious sites in the search result based on their safety rating.

Web Control uses Yahoo as the default search engine and supports Secure Search on Internet Explorer only.

Task
1 Select Menu | Policy | Policy Catalog, then select Endpoint Security Web Control from the Product list.

2 From the Category list, select Options.

3 Click the name of an editable policy.

4 Select Enable Secure Search, select the search engine, then specify whether to block links to risky sites.

If you change the default search engine, restart the browser after enforcing the policy on the client system.

The next time the user opens Internet Explorer, Web Control displays a pop-up prompting the user to
change to McAfee Secure Search with the specified search engine. For Internet Explorer versions where the
search engine is locked, the Secure Search pop-up doesn't appear.

5 Click Save.

See also
Policies and Web Control on page 29

Send Web Control logs from McAfee ePO to Web Reporter


To send logs from Web Control to Web Reporter, configure Options settings and the Send Web Reporter Logs
client task.
Web Control collects logs of page view and file downloads. The Send Web Reporter Logs client task sends the logs
to the configured Web Reporter server.

Task
1 Configure Web Reporter settings.
a Select Menu | Policy | Policy Catalog, then select Endpoint Security Web Control from the Product list.

b From the Category list, select Options.

c Click the name of an editable policy.

d Click Show Advanced.

e In Event Logging, select Send browser page views and downloads to Web Reporter and configure the Web Reporter
server settings.

36 McAfee Endpoint Security 10.6.0 - Web Control Product Guide


Configuring Web Control
Manage blocked and allowed sites 3

2 Configure the Send Web Reporter Logs client task.


a Select Menu | Policy | Client Task Catalog.

b From Endpoint Security Web Control , select Send Web Reporter Logs, and create and assign the new task.

c On the Schedule page, set the schedule for the task. Select Enable Randomization and set the randomization
period.

Best practice: Because large amounts of data can be transferred when the logs are sent, set the client
task to run on a randomized schedule.

For information about client tasks and the Client Task Catalog, see the McAfee ePO documentation.

See also
How Web Control works with Web Reporter on page 17
Client tasks and Web Control on page 20
How policies work on page 31

Manage blocked and allowed sites


Define which websites are always allowed or always blocked based on their URL or domain in the Block and Allow
List settings.

Use the policy options for Enforcement Messaging to customize the message that is displayed to users for
blocked and warned downloads.

Task
1 Select Menu | Policy | Policy Catalog, then select Endpoint Security Web Control from the Product list.

2 From the Category list, select Block and Allow List.

3 Click the name of an editable policy.

4 Select one of these.

Action Steps
Add allowed or blocked sites to the Block and On the Block and Allow List tab:
Allow List.
1 Click Add.

2 From the drop-down, select either Allow or Block.

3 Enter URLs or partial URLs (site patterns) of at least 3


characters.
For multiple sites, enter a comma-separated list or enter
each site on a separate line.
4 Enter a comment or note to associate with the site
(optional).
5 Click OK.

Delete sites from the Block and Allow List. On the Block and Allow List tab, select the checkbox next to a
site, then click Delete.

McAfee Endpoint Security 10.6.0 - Web Control Product Guide 37


3 Configuring Web Control
Manage blocked and allowed sites

Action Steps
Change information (URL, site pattern, or On the Block and Allow List tab:
comment) for a site.
1 Select the checkbox next to a site, then click Edit.

2 Change the site pattern or comment as needed.


3 Click OK.

Search the Block and Allow List. On the Block and Allow List tab:
This feature is useful for finding sites in large 1 Enter a URL, site pattern, or text in the Search field.
lists.
2 Click Search.
Web Control searches all site patterns and comments in
the list and shows matches.
To remove the search criteria and redisplay the list, click
Clear.

Test whether specific sites or site patterns are On the Block and Allow List tab:
included in the Block and Allow List.
1 Enter a URL or partial URL in the Search field.
For example, when a Block and Allow List is
implemented as a multiple-instance policy, 2 Click Test Pattern.
use these steps to test the resulting effective
policy. Web Control displays any site patterns that match your
entry. If no site patterns are displayed, the list allows
access to the specified URL.
To remove the test criteria and results, click Clear.

Block or warn file downloads on allowed sites. 1 Click Show Advanced.


An allowed site with an overall rating of green
can contain individual download files that are 2 Select Enforce actions for file downloads based on their rating.
rated yellow or red. To protect users, specify
an action that is specific to the rating for an 3 Select an action (Allow, Warn, or Block) for Red, Yellow, and
individual file. Unrated files.

Set action precedence. 1 Click Show Advanced.


By default, when a site is set to both Allow and
Block, the block action takes precedence and 2 Select Enable allowed sites to take precedence over blocked
the site is blocked. sites.
Select this option to override the default
behavior and make sure that users can access
allowed sites, even if they are also blocked.

Use caution when selecting this option.


Make sure that allowed sites are safe so
that client systems remain protected from
web-based threats.

5 Click Save.

See also
How site patterns work on page 25
Policies and Web Control on page 29
Customize user notifications for blocked content on page 40

38 McAfee Endpoint Security 10.6.0 - Web Control Product Guide


Configuring Web Control
Prohibit use of specific browsers 3

Prohibit use of specific browsers


Use Browser Control settings to prohibit client systems from using supported or unsupported browsers.

The Browser Control settings require that Self Protection is enabled in the Common settings.

Task
1 Select Menu | Policy | Policy Catalog, then select Endpoint Security Web Control from the Product list.

2 From the Category list, select Browser Control.

3 Click the name of an editable policy.

4 Select the browsers to block from being started on the client systems.

5 Click Save.

See also
Policies and Web Control on page 29
Supported and unsupported browsers on page 10

Specify rating actions and block site access based on web category
Specify actions, based on safety ratings, to apply to sites and file downloads in the Content Actions settings. You
can also block or allow sites in each web category.
Web Control applies the rating actions to sites in the unblocked categories specified in the Web Category
Blocking section under Advanced.

Use the settings in Enforcement Messaging to customize the message to display for blocked and warned sites
and file downloads, and blocked phishing pages.

Task
1 Select Menu | Policy | Policy Catalog, then select Endpoint Security Web Control from the Product list.

2 From the Category list, select Content Actions.

3 Click Show Advanced.

4 In the Web Category Blocking section, for each Web Category, enable or disable the Block option.

For sites in the unblocked categories, Web Control also applies the rating actions.

5 In the Rating Actions section, specify the actions to apply to any sites and file downloads, based on safety
ratings defined by McAfee.

These actions also apply to sites that web category blocking doesn't block.

6 Click Save.

See also
Policies and Web Control on page 29
Using safety ratings to control access on page 26
Using web categories to control access on page 27

McAfee Endpoint Security 10.6.0 - Web Control Product Guide 39


3 Configuring Web Control
Customize user notifications for blocked content

Customize user notifications for blocked content


Notifications appear when users access a site blocked by ratings or content, or sites in the Block and Allow List.
Customize notifications using Enforcement Messaging settings. Instead of navigating to the site, users are
redirected to a page displaying the customized notification. You might use the notification to explain why a site
is blocked.

The notification appears on client systems in the language configured for the client software, if you create the
notification in that language.

Task
1 Select Menu | Policy | Policy Catalog, then select Endpoint Security Web Control from the Product list.

2 From the Category list, select Enforcement Messaging.

3 Click the name of an editable policy.

4 Configure messages and explanations for sites and content.


Don't type Enter when specifying enforcement messages. If a message in the policy includes Enter, the
enforcement message appears blank in the browser.

5 Add an image, such as your company logo, to warn or block pages by specifying the URL link to the image.

6 Click Save.

See also
Policies and Web Control on page 29
How Web Control blocks or warns about a site or download on page 13

40 McAfee Endpoint Security 10.6.0 - Web Control Product Guide


4 Monitoring browser protection and security
with McAfee ePO

Contents
Dashboards, monitors, and Web Control
Queries, reports, and Web Control
Server tasks and Web Control
Events, responses, and Web Control

Dashboards, monitors, and Web Control


Keep watch on the status of your managed systems and any threats in your environment using your
customizable dashboard.

Dashboards are collections of monitors that track activity in your McAfee ePO environment.

Default dashboards and monitors


The module provides default dashboards and monitors. Depending on your permissions, you can use them as
is, modify them to add or remove monitors, or create custom dashboards using McAfee ePO.

Web Control includes the following default dashboards.


Table 4-1 Web Control dashboards and monitors
Dashboard Monitor Description
Endpoint Security Web Activity reported by Web Control.
Control: Activity
Endpoint Security Web Control: Top 100 Visited Red Top 100 visited sites for each rating.
Sites
Endpoint Security Web Control: Top 100 Visited Yellow
Sites
Endpoint Security Web Control: Top 100 Visited
Unrated Sites
Endpoint Security Web Control: Top 100 Red Top 100 download sites for each rating.
Downloads
Endpoint Security Web Control: Top 100 Yellow
Downloads
Endpoint Security Web Control: Top 100 Unrated
Downloads
Endpoint Security Web Endpoint Security Web Control: Top 100 Sites on Block Top 100 sites set to allow in the Block
Control: Block and List and Allow List.
Allow Lists

McAfee Endpoint Security 10.6.0 - Web Control Product Guide 41


4 Monitoring browser protection and security with McAfee ePO
Dashboards, monitors, and Web Control

Table 4-1 Web Control dashboards and monitors (continued)


Dashboard Monitor Description
Endpoint Security Web Control: Top 100 Sites on Allow Top 100 sites set to block in the Block
List and Allow List.
Endpoint Security Web Control: Top 100 Red Sites on Top 100 sites rated as red allowed in
Allow List the Block and Allow List.
Endpoint Security Web Endpoint Security Web Control: Visits by Content Activity based on content type.
Control: Content
Summary
Endpoint Security Web Control: Top Sites Grouped by Top site visits organized by content.
Content
Endpoint Security Web Control: Visits by Action Site visits organized by action taken
Grouped by Content based on content.
Endpoint Security Web Endpoint Security Web Control: Visits by Rating Site visits organized by content rating.
Control: Security
Summary
Endpoint Security Web Control: Visits by Action Site visits organized by action taken.
Endpoint Security Web Control: Downloads by Rating Downloads organized by content rating.
Endpoint Security Web Control: Downloads by Action Downloads organized by action taken.
Endpoint Security Web Endpoint Security Web Control: Top 100 Blocked Sites Top 100 sites, which Web Control
Control: Warned/ blocked.
Blocked
Endpoint Security Web Control: Top 100 Blocked Red Top 100 sites rated as red, which Web
Sites Control blocked.
Endpoint Security Web Control: Top 100 Top 100 sites where Web Control
Warned-Cancelled Sites warned the user and the user canceled
the operation.
Endpoint Security Web Control: Top 100 Top 100 sites where Web Control
Warned-Continued Sites warned the user and the user
continued to the site.

In addition to the default Web Control dashboards, Web Control contributes monitors to several Common
dashboards.

Table 4-2 Common dashboards and Web Control monitors


Dashboard Monitor Description
Endpoint Security: Whether a technology is enabled (protection
Compliance Status status).
Endpoint Security Web Control: Number of systems with Web Control protection
Compliance Status enabled or disabled.
Endpoint Security: Installation Whether a module is installed.
Status
Endpoint Security Web Control: Number of systems with Web Control hotfixes
Hotfixes Installed installed, including hotfix version numbers.
Endpoint Security: Threat How threats are entering the environment.
Event Origins
Endpoint Security Web Control: Web Top 10 categories of websites that cause the
Content Categories that Caused the most infections in the environment.
Most Infections in the Last 7 Days

42 McAfee Endpoint Security 10.6.0 - Web Control Product Guide


Monitoring browser protection and security with McAfee ePO
Queries, reports, and Web Control 4

Custom dashboards
Depending on your permissions, you can create custom dashboards and add monitors using default Endpoint
Security queries.

For information about dashboards, see the McAfee ePO documentation.

See also
Frequently asked questions on page 21
Permission sets and Web Control on page 19
Track browser events to use for reports on page 34

Queries, reports, and Web Control


Use queries to retrieve detailed information about the status of your managed systems and any threats in your
environment. You can export, download, or combine queries into reports, and use queries as dashboard
monitors.

Queries are questions that you ask McAfee ePO, which returns answers as charts and tables. Reports enable you
to package one or more queries into a single PDF document, for access outside of McAfee ePO.

Similar information is available by accessing activity logs from the Endpoint Security Client on individual
systems.

You can view query data only for resources where you have permissions. For example, if your permissions grant
access to a specific System Tree location, your queries return data only for that location.

Default queries
The module adds default queries to McAfee Groups. Depending on your permissions, you can use them as is,
modify them, or create custom queries from events and properties in the McAfee ePO database.

• Endpoint Security Web Control: Compliance Status

• Endpoint Security Web Control: Download Log

• Endpoint Security Web Control: Downloads by Action

• Endpoint Security Web Control: Downloads by Rating

• Endpoint Security Web Control: Hotfixes Installed

• Endpoint Security Web Control: Top 100 Blocked Red Sites

• Endpoint Security Web Control: Top 100 Blocked Sites

• Endpoint Security Web Control: Top 100 Red Downloads

• Endpoint Security Web Control: Top 100 Red Sites on Allow List

• Endpoint Security Web Control: Top 100 Sites on Allow List

• Endpoint Security Web Control: Top 100 Sites on Block List

• Endpoint Security Web Control: Top 100 Unrated Downloads

• Endpoint Security Web Control: Top 100 Visited Red Sites

• Endpoint Security Web Control: Top 100 Visited Unrated Sites

• Endpoint Security Web Control: Top 100 Visited Yellow Sites

McAfee Endpoint Security 10.6.0 - Web Control Product Guide 43


4 Monitoring browser protection and security with McAfee ePO
Queries, reports, and Web Control

• Endpoint Security Web Control: Top 100 Warned-Cancelled Sites

• Endpoint Security Web Control: Top 100 Warned-Continued Sites

• Endpoint Security Web Control: Top 100 Yellow Downloads

• Endpoint Security Web Control: Top Sites Grouped by Content

• Endpoint Security Web Control: Visit Log

• Endpoint Security Web Control: Visits by Action

• Endpoint Security Web Control: Visits by Action Grouped by Content

• Endpoint Security Web Control: Visits by Content

• Endpoint Security Web Control: Visits by Rating

• Endpoint Security Web Control: Web Content Categories that Caused the Most Infections in the Last 7 Days

Custom queries
The module adds default properties to the Endpoint Security feature group. You can use these properties to
create custom queries.

Feature Group Result Type Property (Column) Property (Column)


Endpoint Security Endpoint Security Web Control Compliance Status Language
Systems
Compliance Status License Status
Additional Reasons
Compliance Status Reason Web Control Enabled
Functional in Chrome Web Control Functional
Status
Functional in Firefox Web Control Hotfixes
Functional in Internet Web Control Patch
Explorer Version
Functional in Safari (macOS
only)
Endpoint Security Web Control Language (Endpoint Security Product Version
Properties Web Control) (Endpoint Security Web
Control)
Events Web Control Events Action email
Affiliations Exploits
Annoyances List Type
Content Observe Mode
Count Rating
Domain Reason
Download URL
e-Commerce
Endpoint Security Platform Web Control Debug Logging Web Control Event Filter
Systems Enabled Level

For information about queries and reports, see the McAfee ePO documentation.

44 McAfee Endpoint Security 10.6.0 - Web Control Product Guide


Monitoring browser protection and security with McAfee ePO
Server tasks and Web Control 4

See also
Frequently asked questions on page 21
Permission sets and Web Control on page 19
Track browser events to use for reports on page 34

Server tasks and Web Control


Automate server management or maintenance using server tasks.

Server tasks are scheduled management or maintenance tasks that you run on your McAfee ePO server. Server
tasks enable you to schedule and automate repetitive tasks. Use server tasks to monitor your server and
software.

Depending on your permissions, you can use default server tasks as is, edit them, or create new server tasks
using McAfee ePO.

Default server tasks


Web Control does not provide predefined server tasks. You can use predefined McAfee ePO server tasks to
manage Web Control.

Custom server tasks


To create a custom server task, run the Server Task Builder and select from the Action drop-down list.

Server tasks Description


Run Query Runs default queries at a specified time and schedule.
Purge Threat Event Purges threat event logs based on a query.
Log Select a Endpoint Security Web Control: Download Log or Endpoint Security Web
Control: Visit Log query to purge from the log.

Export Policies Downloads an XML file that contains the associated policy.
Export Queries Creates a query output file that can be saved or emailed.
Roll Up Data Rolls up system or event data from multiple servers at the same time.
Select Endpoint Security Web Control Rolled-Up Events, Endpoint Security Web Control Rolled-Up
Systems, or Endpoint Security Rolled-Up Threat Events for the Data type.

For information about server tasks, see the McAfee ePO documentation.

See also
Permission sets and Web Control on page 19
Roll up system or event data for Endpoint Security on page 45
Events, responses, and Web Control on page 46

Roll up system or event data for Endpoint Security


Compile data from multiple servers at the same time using McAfee ePO Roll Up Data server tasks.

Task
1 Select Menu | Automation | Server Tasks, then click New Task.

2 On the Description page, type a name and description for the task, and select whether to enable it, then
click Next.

McAfee Endpoint Security 10.6.0 - Web Control Product Guide 45


4 Monitoring browser protection and security with McAfee ePO
Events, responses, and Web Control

3 Click Actions, then select Roll Up Data.

4 From the Roll up data from: drop-down list, select one:


• All registered servers

• Selected registered servers — Select the servers you want, then click OK.

5 To roll up system data:


a For the Data Type, select Managed Systems.

b Select the Additional Types: Configure link, and select the Endpoint Security types you want to include.

6 To roll up event data:


a Click the + button at the end of the table heading to add another data type, then select Threat Events.

b Click Additional Types: Configure, and select the Endpoint Security types you want to include.

7 Schedule the task, then click Next.

8 Review the settings, then click Save.

Events, responses, and Web Control


Configure Automatic Responses to react to threat events.
The Threat Event Log is a log file of all threat events that McAfee ePO receives from managed systems.

In McAfee ePO, you can define which events are forwarded to the McAfee ePO server. To display the complete
list of events in McAfee ePO, select Menu | Configuration | Server Settings, select Event Filtering, then click Edit.

Set up a Purge Threat Event Log server task to purge the Threat Event Log periodically.

For information about Automatic Responses and working with the Threat Event Log, see the McAfee ePO Help.

See also
Server tasks and Web Control on page 45

46 McAfee Endpoint Security 10.6.0 - Web Control Product Guide


5 Using Web Control on a client system

Contents
Enable the Web Control plug-in from the browser on a client system
Get information about a site that you're viewing
Get information about a site from search results

Enable the Web Control plug-in from the browser on a client system
Depending on settings, you must manually enable the Web Control plug-in to be notified about web-based
threats when browsing and searching.

Before you begin


The Web Control module must be enabled in the settings.

Plug-ins are also called add-ons in Internet Explorer and extensions in Firefox and Chrome.

When you first start Internet Explorer or Chrome, you might be prompted to enable plug-ins. For the latest
information, see Knowledge Base article KB87568.

Task
• Depending on the browser, enable the plug-in.

Internet • Click Enable.


Explorer
• If more than one plug-in is available, click Choose add-ons, then click Enable for the Web
Control toolbar.

Chrome Click Enable extension.


If you aren't prompted to enable the Web Control plug-in, you can enable it manually.
1 Click Settings | Extensions.

2 Click Enable to activate Endpoint Security Web Control.

3 Restart Firefox.

Firefox 1 From the Mozilla Firefox Start Page, Add-ons | Extensions.

2 Select Enable to activate Endpoint Security Web Control.

In Internet Explorer, if you disable the Web Control toolbar, you are prompted to also disable the Web Control
plug-in. If policy settings prevent uninstalling or disabling the plug-in, the Web Control plug-in remains
enabled even though the toolbar isn't visible.

See also
Enable Web Control and configure its options on a client system on page 51

McAfee Endpoint Security 10.6.0 - Web Control Product Guide 47


5 Using Web Control on a client system
Get information about a site that you're viewing

Get information about a site that you're viewing


View information about a site using the Web Control button on the browser. The button works differently
depending on the browser.

Before you begin


• The Web Control module must be enabled.

• The Web Control plug-in must be enabled in the browser.

• The Hide the toolbar on the client browser option in the Options settings must be disabled.

Task
1 Display the menu:

Internet Explorer
Click the button in the toolbar.
Firefox
When Internet Explorer is in full-screen mode, the Web Control toolbar doesn't appear.

Chrome
Click the button in the address bar.
Safari

2 (Internet Explorer and Firefox only) Display a summary of the safety rating for the site: Hover the cursor over
the button in the browser.

3 Display details about the site, including analysis results, rating, and category:
a Click the button on the browser and select View Site Report.
The View Popular Domains page opens in another browser window.

b From Search the Library, select Website URL / Address.

c Enter the site name and click Go.

See also
Identifying threats while browsing on page 11
Site reports provide details on page 12

Get information about a site from search results


Get detailed information about a site using the safety icon on a search results page.

Task
1
Hover the cursor over the safety icon, such as .
A balloon displays a high-level summary of the safety report for the site.

2 Display details about the site, including analysis results, rating, and category:
a Click Read site report in the balloon.
The View Popular Domains page opens in another browser window.

b From Search the Library, select Website URL / Address.

c Enter the site name and click Go.

48 McAfee Endpoint Security 10.6.0 - Web Control Product Guide


Using Web Control on a client system
Get information about a site from search results 5

See also
Identifying threats while searching on page 12
Site reports provide details on page 12

McAfee Endpoint Security 10.6.0 - Web Control Product Guide 49


5 Using Web Control on a client system
Get information about a site from search results

50 McAfee Endpoint Security 10.6.0 - Web Control Product Guide


6 Managing Web Control on a client system

Contents
Enable Web Control and configure its options on a client system
Specify rating actions and block site access based on web category on a client system

Enable Web Control and configure its options on a client system


You can enable Web Control and configure its options from Endpoint Security Client.

Before you begin


The interface mode for the Endpoint Security Client is set to Full access or you are logged on as
administrator.

Task
1 Open the Endpoint Security Client.

2 Click Web Control on the main Status page.

Or, from the Action menu , select Settings, then click Web Control on the Settings page.

3 Click Show Advanced.

4 Click Options.

McAfee Endpoint Security 10.6.0 - Web Control Product Guide 51


6 Managing Web Control on a client system
Enable Web Control and configure its options on a client system

5 Select Enable Web Control to make Web Control active and change its options.

To... Do this... Notes


Hide the Web Control Select Hide the toolbar on the
toolbar on the browser client browser.
without disabling
protection.
Allow users to run Select Allow user to run Internet
Internet Explorer with Explorer in extension-off mode. In extension-off mode, Internet Explorer
the -extoff doesn't load any extensions or add-ons.
command-line option. Although Web Control is enabled on the
system, it isn't loaded in the browser, which
leaves the system vulnerable to threats.

Track browser events to Configure settings in the Event


use for reports. Logging section.
Block or warn unknown In Action Enforcement, select the
URLs. action (Block, Allow, or Warn) for
sites not yet verified by
McAfee GTI.
Scan files before In Action Enforcement, select If users specify the complete URL to a file
downloading. Enable file scanning for file whose reputation is not malicious, Web Control
downloads. allows the file download, even if the site is
blocked.
Add external sites to the In Exclusions, under Specify IP
local private network. addresses or ranges to exclude
from Web Control rating or
blocking, click Add, then enter
an external IP address or
range.
Block risky sites from In Secure Search, select Enable Secure Search automatically filters the
appearing in search Secure Search, select the search malicious sites in the search result based on
results. engine, then specify whether their safety rating. Web Control uses Yahoo as
to block links to risky sites. the default search engine and supports Secure
Search on Internet Explorer only.
If you change the default search engine, restart
the browser for the changes to take effect.
The next time the user opens Internet Explorer,
Web Control displays a pop-up prompting the
user to change to McAfee Secure Search with
the specified search engine. For Internet
Explorer versions where the search engine is
locked, the Secure Search pop-up doesn't
appear.

6 Configure other options as needed.

7 Click Apply.

See also
How file downloads are scanned on page 16
How McAfee GTI works on page 17
Enable the Web Control plug-in from the browser on a client system on page 47

52 McAfee Endpoint Security 10.6.0 - Web Control Product Guide


Managing Web Control on a client system
Specify rating actions and block site access based on web category on a client system 6

Specify rating actions and block site access based on web category on a
client system
Specify actions, based on safety ratings, to apply to sites and file downloads in the Content Actions settings. You
can also block or allow sites in each web category.

Before you begin


The interface mode for the Endpoint Security Client is set to Full access or you are logged on as
administrator.

Task
1 Open the Endpoint Security Client.

2 Click Web Control on the main Status page.

Or, from the Action menu , select Settings, then click Web Control on the Settings page.

3 Click Show Advanced.

4 Click Content Actions.

5 In the Web Category Blocking section, for each Web Category, enable or disable the Block option.

For sites in the unblocked categories, Web Control also applies the rating actions.

6 In the Rating Actions section, specify the actions to apply to any sites and file downloads, based on safety
ratings defined by McAfee.

These actions also apply to sites that web category blocking doesn't block.

7 Click Apply.

See also
Using web categories to control access on page 27
Using safety ratings to control access on page 26
How safety ratings are compiled on page 15

McAfee Endpoint Security 10.6.0 - Web Control Product Guide 53


6 Managing Web Control on a client system
Specify rating actions and block site access based on web category on a client system

54 McAfee Endpoint Security 10.6.0 - Web Control Product Guide


7 Monitoring Web Control activity on a client
system

Contents
Check the Event Log for recent activity
Web Control log file names and locations

Check the Event Log for recent activity


The Event Log in the Endpoint Security Client displays a record of events that occur on the McAfee-protected
system.

Task
1 Open the Endpoint Security Client.

2 Click Event Log on the left side of the page.

The page shows any events that Endpoint Security has logged on the system in the last 30 days.
If the Endpoint Security Client can't reach the Event Manager, it displays a communication error message. In
this case, reboot the system to view the Event Log.

3 Select an event from the top pane to display the details in the bottom pane.
To change the relative sizes of the panes, click and drag the sash widget between the panes.

4 On the Event Log page, sort, search, filter, or reload events.

5 Navigate in the Event Log.

By default, the Event Log displays 20 events per page. To display more events per page, select an option
from the Events per page drop-down list.

See also
Web Control log file names and locations on page 55

Web Control log file names and locations


The activity, error, and debug log files record events that occur on systems with Endpoint Security enabled.

All activity and debug log files are stored in the following default location:

%ProgramData%\McAfee\Endpoint Security\Logs

McAfee Endpoint Security 10.6.0 - Web Control Product Guide 55


7 Monitoring Web Control activity on a client system
Web Control log file names and locations

Each module, feature, or technology places activity or debug logging in a separate file. All modules place error
logging in one file, EndpointSecurityPlatform_Errors.log.

Enabling debug logging for any module also enables debug logging for the Common module features, such as
Self Protection.

Table 7-1 Log files


Module File name Notes
Web Control WebControl_Activity.log
WebControl_Debug.log
Common EndpointSecurityPlatform_Errors.log Contains error logs for all modules.

By default, installation log files are stored here:

TEMP\McAfeeLogs, which is the Windows system TEMP folder.

See also
Check the Event Log for recent activity on page 55

56 McAfee Endpoint Security 10.6.0 - Web Control Product Guide


0-00

You might also like