Your web policy consists of rules, which are embedded in rule sets. Each rule set usually covers a particular field of web security, for example, anti-malware filtering or URL filtering. A number of default rule sets are implemented on Secure Web Gateway when it is set up initially.
Rule sets are shown using a tree structure on the Web Policy page of the user interface and can be accessed there. This tree structure is also known as policy tree. Within this structure, rule sets are themselves embedded in what is referred to as branches. For example, the Anti-Malware rule set is embedded in the Web Threat branch.
The following table shows the branches that are available by default after the initial setup. The branches are shown in the order they appear on the policy tree. When web traffic is filtered on Secure Web Gateway, the branches and their rule sets are processed in this order, beginning at the top.
In addition to the default rule sets, the policy tree will also show the rule sets that you have imported or created on your own later on.
|Blocks web access globally.
For information about how to configure this blocking, see Block Access to Web Objects Globally.
|Allows web access globally through bypassing all filters.
For information about how to configure this bypassing, see Allow Access to Web Objects Globally.
|Inspects web traffic going on over secure connections.
For information about how to configure this inspection, see Filtering Web Traffic on Secure Connections.
|Inspects content transferred through web traffic.
|Provide functions that support the rules for allowing or blocking web traffic.
For example, an anti-malware filtering rule initiates the scanning of a files that is downloaded. A common rule then shows the download progress to the user.
For information about how to configure these functions, see Improving User Experience.
|Blocks access to websites based on their URLs.
For information about how to configure this blocking, see Blocking URLs.
|Blocks applications and services.
For information about how to configure this blocking, see Blocking Applications and Services.
|Media Type Settings
|Blocks media types.
For information about how to configure this blocking, see Blocking Media Types.
|Data Loss Protection (DLP)
|Prevents sensitive data from trickling out.
For information about how to configure this prevention, see Preventing Data Loss.
For information about how to configure this blocking, see Blocking Malware.