
S W G U s e r G u i d e
Chapter 21: Implementing Cloud Security
126
i. Click the
Generate
CSR
link that is under the
Import
CSR
based
CA
button.
The window displays fields for defining the Certificate Authority.
ii. In the
Common
Name
field, specify a name for the CA. It is mandatory to specify a CA
name.
iii. Optionally, fill in relevant data in the other fields.
iv. Click
OK
.
A CA Certificate request is generated and displayed.
v. Copy the Certificate request to provide to the trusted CA for signing.
vi. Click
OK
.
vii. Have the trusted CA sign the Certificate Request.
viii.Click the
Import
CSR
based
CA
button.
ix. In the displayed
Certificate
field paste the signed Certificate and click
OK
.
• To import a CA
i. Click the
Import
CA
button.
ii. Paste the certificate information into the appropriate entry fields in the window. Then
click
OK
.
Regardless of the method you chose to define the system CA, the
CA
Management
tab is re‐
displayed, and all information provided is displayed in the appropriate column and fields.
7. According to need, define
Non
Routable
Network
Bypass
and
Trusted
URL
Bypass
settings in
the
Bypass
tab, as follows.
a. For each network or domain to be bypassed while the Mobile Security Client agent is
browsing in Cloud proxy or local proxy, add it to the bypass list, as follows:
i. Click the
icon.
ii. In the opened detail line, specify the Network IP and Network Mask.
iii. To delete a network bypass, right‐click the
icon and choose
Delete
Row
.
b. To enable security to bypass the URLs appearing in a particular type of URL list (for example,
Customer Defined White List), select the URL type in the
Trusted
URL’s
drop‐down list.
8. Set Client Configuration in the
Client
Configuration
tab, as follows:
a. By default, users can only browse using an M86 agent and PAC file. To eliminate either or
both of these restrictions, do the following:
i. To allow the user to disable the client and browse using a non‐M86 client, clear the
Prevent
user
from
disabling
client
checkbox.
ii. If a proprietary PAC file is used, clear the
Enforce
PAC
file
usage
via
the
Mobile
Security
Client
checkbox.
b. To ensure that a warning is issued if a user tries to uninstall the client, ensure that the
Enable
Client
Uninstall
Warning
Text
checkbox is selected, and if desired, edit the message text in
the accompanying text box.
WARNING:
Disabling
the
Mobile
Security
Client
agent
might
contravene
your
site’s
Acceptable
Use
Policy.
Therefore,
consider
carefully
before
clearing
this
checkbox,
which
gives
users
the
ability
to
disable
the
agent.
This
can
also
be
done
as
a
group
configuration
affecting
all
clients
in
the
group.
For
more
information
see
Chapter 4: Defining and
Assigning Policies to User‐Defined User Groups
.