
S W G U s e r G u i d e
23
Chapter 3: Defining and Customizing Security Policies
2. Do any of the following:
• To edit an existing rule, click the rule in the tree, and then in the main pane, click
Edit
.
• To add a rule to a policy that has no rules, or to add a rule to the bottom of the rule list in the
policy, right‐click the policy and choose
Add
Rule
.
• To add a rule directly above an existing rule, right click the existing rule, and select I
nsert
Rule
.
The main window displays the Rule Definition screen. The screen contains three tabs:
General
,
Applies
, and
Except
.
3. Fill in the
General
tab as follows.
a. Enter a name for the rule.
b. Provide a description of the rule. the description is optional.
c. For a rule that has an
Enable
Rule
checkbox: Ensure that the checkbox is appropriately
selected or cleared depending on whether or not the rule should be enabled after being
committed.
d. If the rule should be an X‐ray rule, but the policy is not an X ray policy, select the
X
Ray
checkbox.
e. Select the Action for the rule
Allow
,
Block
, or
Coach
.
f. Do the following, as appropriate:
• If you chose
Allow
as the action, select the appropriate
Advanced
Action
.
• If you chose
Block
or
Coach
as the action, select the desired End‐User Message. For
information on creating/editing End User Messages, see
Creating a Block/Warn Message
.
• For
Block
actions only: If the End User Message should not be displayed, select the
Do
Not
Display
End
User
Message
checkbox.
4. To apply the rule to specific users, select the
Applies
tab, and click the radio button for the cate‐
gory of users to which the rule should apply. Note the following:
•
All
Users
is the default.
•
All
Recognized
Users
All users identified by the system
•
All
Unrecognized
users
are Unknown users and/or Unassigned LDAP users. For more infor‐
mation, see the
Management
Console
Reference
Guide
.
• If you chose Select User Lists, select the checkboxes of the User Lists that contain the users to
which the rule should apply.
5. To exclude specific users from application of the rule, select the
Except
tab, and select the check‐
boxes of the User Lists which contain the users who should be excluded.
6. Click
Save
.
7. To set conditions that should trigger the rule, continue with
Defining Conditions in a Security
Policy Rule
.
8. To define additional rules in this policy, repeat this procedure.
9. If you are ready to distribute and implement the changes in your system devices, click
.
NOTE:
Rules
in
a
policy
are
checked
sequentially
from
the
top,
and
the
first
rule
to
be
activated
in
a
policy
determines
the
handling
of
the
content.
Therefore,
the
sequential
placement
of
rules
in
a
policy
is
significant.
For
instructions
on
moving
a
rule
within
a
policy,
see
Relocating an Item in a Tree
.