Symantec Web Gateway can block file transfers, Internet applications, malware phone home attempts, and Web pages. The method that Symantec Web Gateway uses to block these activities depends on the source, action, and the policy that applies.
For downloads and the URL access that a user initiates in a Web browser.
Symantec Web Gateway displays an end user blocking page to block access. The requested action does not occur and the blocking page is displayed instead.
A user's computer is part of a malware policy. The user attempts to download a file using a Web browser. Symantec Web Gateway detects a virus in the file. Symantec Web Gateway displays a blocking page instead of allowing the file download.
For file uploads in a Web browser and file downloads not in a Web browser. Symantec Web Gateway also enters text into the binary to identify it blocked the file.
The default text is as follows:
Malware has been detected by Symantec Web Gateway.
A user's computer is part of a malware policy. The user attempts to download a file using FTP. Symantec Web Gateway detects a virus in the file. The download proceeds. However, Symantec Web Gateway corrupts the contents of the file to disable the virus.
For malware phone home attempts, application control, and IM file transfers.
Symantec Web Gateway interrupts the connection to block access.
A user attempts to use a peer-to-peer file sharing application that is blocked in an application control policy. The peer-to-peer file sharing application does not work for the user. The peer-to-peer file sharing application may display an error.
If you configure Symantec Web Gateway in the port span/tap network configuration, it cannot provide the same level of blocking as the inline network configuration.