Chapter 3: Defining and Customizing Security Policies
20
C
HAPTER
3:
D
EFINING
AND
C
USTOMIZING
S
ECURITY
P
OLICIES
NOTE:
The
process
of
implementing
security
for
users
at
your
site
involves
performing
the
following
tasks:
SWG provides a number of pre‐defined policies for different purposes. A main purpose is setting
security ‐‐ determining how content is handled. Policies consist of three basic components: the
Policy
itself,
rules
which determine how to handle the content (for example, block or allow), and
conditions
which determine whether a particular rule is activated (for example, if a particular type
of content is detected).
SWG provides two modes for defining and customizing Security Policy:
•
Simplified
— in Simplified mode, you can check or uncheck pre‐supplied, customizable content
items appearing in lists, to set whether those items, if detected, should activate the policy rule.
•
Advanced
— in Advanced mode, you edit actual policies, rules and conditions. Note that you
cannot directly edit pre‐supplied policies, but you can duplicate policies and edit the duplicates, or
you can create policies from scratch.
Pre‐supplied security policies come in three security levels —
Basic
,
Medium
, and
Strict
.
M86 also provides special purpose advanced Security policies for different users and situations.
These include:
•
X
ray
policy
—allows the potential effect of the policy on the system to be evaluated without
implementing its security actions. For non‐X‐ray policies, you can define rules as X‐ray rules,
also for purposes of evaluation. You can make a policy an X‐ray policy by selecting the
X
ray
checkbox in the policy definition.
•
Full
Bypass
Policy
— permits users to surf through the M86 SWG Appliance without any
scanning.
•
Cloud
User
Policies
—
M86
Blocked
Cloud
Users
Policy
and
M86
Revoked
Cloud
Users
Policy
for temporarily blocking or revoking the permissions of specific cloud users.
• Defining Security Policy, as described in this chapter.
• Defining User Groups and Users, and assigning them security policies. For instructions,
see
Chapter 4: Defining and Managing Users
.
• Defining Identification policy. For instructions, see
Chapter 5: Implementing
Identification Policy
.
NOTE:
Because
of
the
order
in
which
security
policies
are
implemented,
some
policies
might
not
be
implemented
due
the
nature
of
a
preceding
policy,
which
can
effect
subsequent
policies.