S W G U s e r G u i d e
Chapter 3: Defining and Customizing Security Policies
22
6. Click
Save
.
7. If you are ready to distribute and implement the changes in your system devices, click
.
Defining a Security Policy in Advanced Mode
NOTE:
This
procedure
does
not
apply
to
edits
that
you
can
perform
on
the
actual
predefined
M86
Basic,
Medium,
and
Strict
Security
Policies.
For
instructions
on
directly
editing
those
predefined
policies,
see
Editing a Pre‐supplied Security Policy in Simplified Mode
.
Â
To define a Security Policy in Advanced mode
1. Select
Policies
Æ
Security
Æ
Advanced
.
2. Do one of the following:
• To create a policy from scratch, right click the
Policies
root node in the tree, and choose
Add
Policy
.
• To duplicate an existing security policy, right click the policy in the tree that you want to dupli‐
cate, and choose
Duplicate
Policy
.
• To re‐edit a security policy that you previously created from scratch or created by duplicating,
select the policy in the tree, and then in the main window, click the
Edit
button.
The Policy Definition is displayed in the main window.
3. Enter a name for the policy.
4. Add or modify the policy description as needed.
5. When done, click
Save
.
6. Continue with
Defining a Rule in a Security Policy
.
Defining a Rule in a Security Policy
If you duplicated a policy, it already has the same rules as were found in the original policy. You can
edit these rules. You can also create new rules from scratch.
You can specify if the rule should be applied to specific users and/or if specific users should be
excluded. One method is by specifying User Lists to which the rule should or should not apply.
Â
To define a rule in a Security Policy
1. In the Policy tree, expand the policy so that you display its existing rules. For instructions on
displaying the Policy tree, see
Step 1
. in the procedure
To define a Security Policy in Advanced
mode
.
You
cannot
edit
a
pre
supplied
Advanced
Security
Policy.
However,
you
can
duplicate
a
pre
supplied
Advanced
Security
Policy
and
edit
the
duplicate;
you
can
also
create
an
Advanced
Security
policy
from
scratch.
NOTE:
If
you
will
be
using
User
Lists
to
identify
users
to
which
the
rule
should
or
should
not
apply,
be
sure
to
define
those
lists.
For
instructions,
see
Defining User Lists
.