Skip to main content

Check out Interactive Visual Stories to gain hands-on experience with the SSE product features. Click here.

Skyhigh Security

Configure Activity Control and Monitor User Activities

You can configure your web policy to block user activities for shadow cloud services based on service groups, service categories, and individual services. 

  1. On the user interface for Secure Web Gateway, go to Policy > Web PolicyPolicy.
    You are redirected to the Getting Started page under the Web Policy tree.
  2. From the Web Policy tree, select Application Control, and click Activity Control.
  3. The Activity Control rule set provides the following rules which can be configured to block user activities for the corresponding shadow cloud services.
    • Service Groups
    • Service Category
    • Individual Services

The blocked user activities are displayed corresponding to the service groups, service categories and individual services.

After configuring the Activity Control rules in the ruleset, make sure that you select the checkbox corresponding to the service groups, service categories, and individual services. This applies a Block on the selected activities for the service groups, service categories and individual services.

IMPORTANT: Ensure that the Status of the Activity Control rule set is On.

The Activity Control rule set is applied to your web policy so that the selected user activities are blocked based on the service groups, service categories and individual services configured in your Activity Control rule set. 

Any changes to the policy tree, rule sets, or rules are saved automatically. You can either publish them to the cloud right away or continue working and publish them later. For details, see Applying Web Policy Changes Globally.

View updated Activity Control Ruleset

You can find the new or updated version of your Activity Control ruleset on the Web Policy Overview page under New/Updated Rulesets.

Activity Monitoring

You can monitor the user activities for all shadow cloud services listed in the Skyhigh Security registry to detect risky activity trends. For details, see Monitor User Activities for Shadow Cloud Services.

  • Was this article helpful?