WikiArtifactsWeb Filtering Configuration

Web Filtering Configuration

Technical Measure
Updated: 2026-02-21

Web filtering configuration serves as a critical technical measure designed to monitor, restrict, and manage user access to external websites across an organization's network and endpoint devices. Its primary purpose is to drastically reduce exposure to malicious content, such as malware distribution sites, phishing domains, and unauthorized data exfiltration channels. This configuration typically encompasses a blend of DNS filtering rules, URL blocklists, secure web gateways, and endpoint security settings. For compliance purposes, this artifact must contain exported policy configurations, screenshots of active category blocks, and logs demonstrating that the filters are actively intercepting unauthorized access attempts. During an audit, an auditor will review these configuration settings and system logs to verify that the organization proactively enforces acceptable use policies and systematically protects internal assets from external web-based threats, ensuring that both remote and on-premises traffic remains continuously monitored and controlled.

Web Filtering Request Flow

A workflow demonstrating how web requests are evaluated against web filtering rules before granting or denying access.

Rendering diagram...

Command Line Examples

aws network-firewall describe-firewall-policy --firewall-policy-arn arn:aws:network-firewall:region:account:firewall-policy/policy-name

Web filtering restricts user access to external websites based on specific criteria to protect systems. DNS filtering blocks requests at the domain resolution level, while URL filtering inspects the full web address path for more granular control.

Common security control expectations require organizations to manage access to external websites to reduce exposure to malicious content. This typically involves implementing technical controls to filter, monitor, and block harmful domains and categories, while keeping evidence that controls are operating as intended.

Deploy DNS filtering, URL blocklists, secure web gateways, web proxies, or endpoint security tools that enforce access policies across your organization. Ensure the configuration is applied consistently to in-scope users and devices, and retain configuration exports and logs that demonstrate enforcement.

The policy should define acceptable use rules, specify categorically blocked sites like malware or phishing, outline the exception request process, and detail how filtering rules are technically enforced and periodically reviewed by management.

For strict security compliance, organizations must block known malware distributors, phishing sites, botnet command-and-control servers, illegal content repositories, and anonymizer services that bypass network security monitoring.

Exceptions must follow a documented approval workflow requiring clear business justification, managerial sign-off, a strictly defined expiration date, and periodic access reviews to ensure the temporary access is still necessary and justified.

While SSL/TLS inspection allows deeper visibility into encrypted traffic, it introduces significant privacy risks and performance overhead. DNS filtering and endpoint-level categorization serve as highly effective alternatives without breaking native encryption.

Enforce remote filtering using cloud-based secure web gateways, endpoint security agents installed directly on the device, or always-on VPNs that route external internet traffic through your web filtering infrastructure when appropriate.

Retain system block logs, threat prevention dashboard reports, configuration exports showing active blocked categories, and exception approval tickets. Auditors review these to verify the technical controls are actively functioning.

Conduct regular tests by attempting to access safe test resources such as EICAR or standardized blocking URLs, capturing screenshots of the resulting block pages, and verifying the associated alert generation in your centralized logging system.

VersionDateAuthorDescription
1.0.02026-02-21WatchDog Security GRC Wiki TeamInitial publication