
S W G U s e r G u i d e
35
Chapter 4: Defining and Managing Users
5. For the predefined
Unknown
Users
group only: If you want unidentified User IDs or IP addresses
added to the Unknown Users group, select the checkbox in the
New
Users
area.
6. Click
Save
.
7. If you are ready to distribute and implement the changes in your system devices, click
.
Adding and Defining Users
You can create users in the relevant user‐defined User Groups, or in the pre‐supplied
Independent
Users
group if the user should not belong to a group.
Users in user‐defined User Groups are automatically assigned the group’s Security, Logging, and
HTTPS policies; these assignments cannot be changes at the user level.
Users in the
Independent
Users
group are automatically assigned the site‐default Security,
Logging, and/or HTTPS policies. You can, however, change these assignments individually for each
user.
Â
To add/define a user
1. Select
Users
Æ
Users/User
Groups
.
2. In the tree, do either of the following:
• To create a user, right‐click the user‐defined User Group to which the user will belong or the
Independent
Users
node if the user will not belong to a group, and select
Add
User
. The User
Details screen is displayed in the main window.
• To edit an existing use, select the user. Then, in the User Details screen that is displayed in the
main window, click
Edit
.
3. Specify a User Name and email address for the user. Note that you can supply descriptive name
instead of the real or full name. You can specify the real or full name in the
Identifiers
area below.
4. In the
Identifiers
section, specify the identifiers that can be used to uniquely identify the user to
the system. You can specify an IP address or range, and/or a user name: Select the identifier type
and specify the value. Click
to add a row. For user name, you can specify an appropriate
domain_name\user_name.
5.
For
Independent
Users
only
: If the user should be assigned Security, Logging, and/or HTTPS
policies other than those defined as the site‐defaults, select the desired policies in the drop down
lists.
6. Click
Save
.
7. If you are ready to distribute and implement the changes in your system devices, click
.
NOTE:
In
the
Blocked
Cloud
Users
and
Revoked
Cloud
Users
groups,
the
IP
Ranges
section
is
not
relevant
and
should
be
ignored.