Content rules

Overview

Content rules are the rules that define how to process your content security policy.

Each content rule specifies:

For example, within a content rule, you set a What To Look For? clause that checks for viruses in particular traffic. For What To Do?, your Primary Action might be to block the traffic. You can also add a What Else To Do? action to generate a notification to an administrator.

You can create content rules that suit your content security policy from a set of pre-configured adaptable templates. See Content rule templates for more information.

Content rules must be applied to Web Policy Routes to define two points (From and To) between which the rules can operate.

Peered Secure ICAP Gateway

It is possible to add and modify content rules which are licensed on any of the Gateways in a peer group. However, Peer Gateway (each Gateway in the peer group) applies the local licensed policy. This might result in redundant content rules on other peers which are not licensed to apply them.

For example, in a peer group, Peer A might be installed with a supplementary license feature for redaction, whereas Peer B is not. It is possible to add a Redact Text content rule to a policy route on Peer B, but redaction will not be applied to content processed by Peer B.

How content rules are applied

When Secure ICAP Gateway has selected the route to follow, it will check each configured content rule for that route and do one of the following:

Example of content rules application

Consider the following content rules as they are applied to the Everyone to Web Mail & Chat route:

Efficient ordering of content rules

It is important that rules for a given route are configured in the right order. You need to consider the level of threat and machine processing time and resources. The greater the threat, the higher the rule should be on the rules table.

Consider the following content rules as they are applied to the Everyone to Web Mail & Chat route:

The first rule will scan the traffic looking for keywords as configured in the rule. However, there is little point in doing this because the second rule will block the traffic if a virus is detected.

A more efficient and safer order for this set of rules would be to place this rule after rules that deal with specific threats:

See also...