How to Block More Malware on Symantec Secure Web Gateway
Would you like to increase your malware threat protection on Symantec Secure Web Gateway and downloads? Metascan can be used with ProxySG to significantly improve your malware threat protection. If you already use ProxyAV, Metascan can be used on top of ProxyAV to block more known and unknown threats. Metascan uses ICAP in the same way as ProxyAV does, but offers superior threat detection rates by scanning web traffic with up to 35+ anti-malware engines as well as performing data sanitization to remove possible embedded threats in documents. Find out more about the benefits of using Metascan with Symantec ProxySG.
Ready to find out how many more threats Metascan can block? Download the 14-day evaluation version of Metascan and follow the steps in the Getting Started Guide below to configure Metascan and Symantec Secure Web Gateway and experience the benefits of multi-scanning for yourself:
Metascan and Symantec Secure Web Gateway Getting Started Guide
This Getting Started Guide describes in easy steps how to configure Metascan with Symantec ProxySG to start scanning your web traffic and downloads.
System Requirements:
The following systems are required for this deployment
- Symantec Secure Web Gateway Server
- One or more Metascan servers
Configuring Metascan
By default, the ICAP service is disabled in Metascan. To enable the ICAP service, please do the following:
- Open the Metascan Management Console (http://<server ip>:8008/management)
- Navigate to the Sources-> ICAP Server Configuration page
- Click the 'Start ICAP Service' button
This will start the Metascan ICAP server with the default settings.
Note on Metascan Licensing: Metascan must have a valid license, including licensing for the appropriate number of remote clients to function correctly.
Configuring the Symantec Secure Web Gateway Server
Log into your ProxySG Management Console (e.g. https://<ip address>:8082).
Disable Automatic Cache Refresh
- Click on the 'Configuration' tab, and navigate to 'Proxy Settings'->'HTTP Proxy'
- Select the 'Freshness' tab and select the 'Disable refreshing' option
- Select the 'Acceleration Profile' tab and uncheck the following options
- Pipeline embedded objects in client request
- Pipeline redirects for client request
- Pipeline embedded objects in prefetch request
- Pipeline redirects for prefetch request
- Click 'Apply' to save these settings
Adding REQMOD Service
- Within the 'Configuration' tab, navigate to 'External Services'->'ICAP'
- Click 'New'
- Enter a service name for the Metascan service (in this example we use 'MetascanReqmod') and click 'OK'
- In the services list, select 'MetascanReqmod' and click 'Edit'
- Update the following values
- In ICAP Service
- Set Service URL to 'icap://<Metascan Server>/OMSScanReq-AV'
- Select 'Use vendor's "virus found" page'
- In ICAP Service Ports
- Check 'This service supports plain ICAP connections
- Set the 'Plain ICAP port' value to your Metascan's ICAP port (1344 by default)
- In ICAP v1.0 Options
- Check 'Request modification'
- Check 'Send Client address'
- In ICAP Service
- Click 'OK'
- Click 'Apply' to save the configuration
Adding RESPMOD Service
- Within the 'Configuration' tab, navigate to 'External Services'->'ICAP'
- Click 'New'
- Enter a service name for the Metascan service (in this example we use 'MetascanRespmod') and click 'OK'
- In the services list, select 'MetascanReqmod' and click 'Edit'
- Update the following values
- In ICAP Service
- Set Service URL to 'icap://
/OMSScanResp-AV' - Select 'Use vendor's "virus found" page'
- In ICAP Service Ports
- Check 'This service supports plain ICAP connections
- Set the 'Plain ICAP port' value to your Metascan's ICAP port (1344 by default)
- In ICAP v1.0 Options
- Check 'Response modification'
- Check 'Send Client address'
- Click 'OK'
- Click 'Apply' to save the configuration
Create Metascan REQMOD Policy
- Within the 'Configuration' tab, navigate to 'Policy'->'Visual Policy Manager'
- Click the 'Launch' button
- In the 'Symantec Visual Policy Manager' window, navigate to 'Policy'->'Add Web Content Layer'
- Enter a layer name (in this example we use 'Metascan ICAP ReqMod') and click 'OK'
- In the newly created 'Metascan ICAP ReqMod' tab, right click on 'Use Default Caching' and choose 'Set...'
- In the 'Set Action Object' window, click 'New' and select 'Set ICAP Request Service...'
- In the 'Add ICAP Request Service Object' window, set the following values
- Set 'name' to 'Metascan ICAP Request Service'
- In 'Available services', select 'MetascanReqMod' and click 'Add'
- Click 'OK' to finish and 'Apply' to save
Create Metascan RESPMOD Policy
- Within the 'Configuration' tab, navigate to 'Policy'->'Visual Policy Manager'
- Click the 'Launch' button
- In the 'Symantec Visual Policy Manager' window, navigate to 'Policy'->'Add Web Content Layer'
- Enter a layer name (in this example we use 'Metascan ICAP RespMod') and click 'OK'
- In the newly created 'Metascan ICAP RespMod' tab, right click on 'Use Default Caching' and choose 'Set...'
- In the 'Set Action Object' window, click 'New' and select 'Set ICAP Request Service...'
- In the 'Add ICAP Response Service Object' window, set the following values
- Set 'name' to 'Metascan ICAP Response Service'
- In 'Available services', select 'MetascanRespMod' and click 'Add'
- Click 'OK' to finish and 'Apply' to save
Did you find this guide helpful? Tweet at us @OPSWAT and let us know if you have any questions!
For more information, please contact one of our cybersecurity experts.

- Academy 22
- Advanced Threat Prevention 69
- CEO's Blog 25
- Company Announcements 143
- Company Culture 15
- CVEs 285
- Deep CDR 68
- DevSecOps 3
- Email Security 32
- Engineering Blog 3
- File Upload Security 26
- Industrial Cybersecurity 26
- Kiosk & USB Security 38
- Malware Analysis 83
- OACCP Certification 46
- OESIS Framework 131
- Product Announcements 349
- Reports 28
- Secure Access 27
- Secure Data Storage 26
- Technology Partnerships 42
- Vulnerabilities 29
- File Upload Protection – 10 Best Practices for Preventing Cyber Attacks
- Protecting Critical Infrastructure from Advanced Cyberattacks
- 6 Potential Security Gaps in File Transfer Process for Critical Infrastructure
- How the Energy Industry Can Survive Targeted Attacks
- Smarter Malware Analysis Starts Here
- Research Highlights Significant Challenges for Organizations in Responding to Malware Threats
- MetaDefender Prevents Emotet - The World’s Most Dangerous Malware
- OPSWAT Takes Proactive Steps to Close the Critical Infrastructure Protection Skills Gap
- Can A Video File Contain A Virus?