Skip to main content

Policy Configuration

This page will provide steps on how to successfully configure a SWG policy. As there are several aspects of the security policy configuration section that require configuration of other sections, those parts will have links to the relevant guide and will proceed as if it has been previously configured.

Configuration Guide

Step 1: Navigate to SWG > Policy > Create

In this menu, a new security policy can be created.

image.png

Step 2: Set the action

Web policies can be set to:

  • Block
  • Allow
  • Logging
  • Reconfiguration

image.png

Block will block the traffic triggered by the conditions set to the right. Allow will explicitly allow it. Logging will make a log. Reconfiguration allows the admin to make a rule reconfiguring HTTP URLs or headers.

Step 3: Choose the User

This section is for choosing the user or user groups who will be affected by the policies. Due to the large numbers of users organizations could have, it's important to set up user groups for easy policy creation.

image.png

In this example there are only two users. However, one or all must be chosen to apply a policy.

Step 4: Set the Conditions

The most crucial part of setting a policy is selecting the conditions. These conditions are what the security policy will check against before taking action.

In this menu, all are AND rules.

image.png

In the above example, all PUT requests going to an art, alcohol, or tobacco website based in Europe will be blocked.

For convenience, below are a full read out of the conditions:

Request-Based Conditions
Block C&C TrafficDetects and blocks connections to known command-and-control (C&C) servers used by malware
Source IPApplies policy rules based on the originating IP address of the request.
Source IP GeolocationFilters or restricts requests based on the geographic location of the source IP
Destination IPEnforces policies targeting specific destination IP addresses
Destination IP GeolocationControls access to destinations located in specified geographic regions
Block Access to Public Proxy ServerPrevents users from connecting to open or anonymous proxy servers
Block Access to Risky WebsitesRestricts access to domains categorized as unsafe or potentially harmful
HTTP CategoryApplies filtering based on predefined website categories (e.g., social media, gambling)
HTTP BrowserEnforces policy rules according to the web browser type or version used in the request
HTTP URLMatches specific URLs to allow, block, or monitor web traffic
HTTP PathTargets URL path components to control access to specific resources within a site
HTTP MethodRegulates HTTP request types (e.g., GET, POST, PUT, DELETE) for security or compliance
HTTP VersionFilters requests based on the HTTP protocol version used (e.g., 1.1, 2.0)
HTTP POST PayloadAnalyzes data sent in POST requests to detect sensitive or malicious content
HTTP GET QueryExamines query parameters in GET requests for suspicious or policy-violating content
HTTP Upload File ContentScans the actual contents of uploaded files for threats or sensitive data
HTTP Upload File ExtensionRestricts or allows uploads based on file extension types
HTTP Content LengthApplies limits or rules based on the size of HTTP request or response bodies
HTTP GET Query Value LengthRestricts excessive query string lengths to prevent injection or buffer overflow attacks
HTTP POST Payload Value LengthLimits POST data field sizes to reduce risk of data exfiltration or abuse
Response-Based Conditions
Advanced Threat ProtectionDetects and blocks advanced or zero-day threats in web responses
Anti-VirusScans and removes known malware signatures in downloaded or viewed content
HTTP Response Includes Malicious CodeIdentifies and blocks responses that contain embedded malicious scripts or code
HTTP Download File ContentAnalyzes downloaded files in real time for hidden malware or policy violations
HTTP Download File ExtensionControls which file types users are permitted to download based on extension