Your web policy consists of rules that control web access of users within your organization when they are working with cloud services.
The rules filter web traffic originating from users accessing the web and block or allow, for example, downloads from the web. This ensures protection against web threats such as viruses and other malware, which can be incurred through uncontrolled web access.
You configure the rules you want to apply under your web policy on the pages of the user interface that are provided for this purpose. Additionally, you can configure features that support the rules to fine-tune the settings used in the filtering process. More configuration tasks can be completed in the code view.
- Rules and rule sets — The rules of your web policy are grouped in rule sets. Each rule set usually covers a particular field of web security. For example, there can be rule sets for blocking malware or for blocking or allowing access to websites with particular URLs or to particular media types, services, and applications.
A number of rule sets are provided by default. You can view and access them on a tree structure called the policy tree. You can copy (clone) any default rule set and configure the cloned rule set according to your requirements. You can then keep the default rule set or delete it and only work with your own rule set instead.
For information about the rule sets that are provided by default, see Default Rule Sets. For information about how to configure rules that cover an important field of web security, as an example, see About Blocking Malware and Block Access to Malware-infected Objects.
Feature configuration — You can fine-tune your settings by configuring features that are related to rule sets and support them in the filtering process. For more information, see About Feature Configuration.
Code view — In the code view, you can view and modify the code that underlies the rules of your web policy. This allows you to complete configuration tasks that you cannot complete elsewhere on the user interface. For example, you can remove individual rules from a rule set.
Be sure to understand the code before you work in the code view, as inappropriately modifying it can severely damage your rules and the functions they execute to ensure protection against web threats.
For more information, see About the Web Policy Code View.