Skip to main content

Check out Interactive Visual Stories to gain hands-on experience with the SSE product features. Click here.

Skyhigh Security

About Configuring a Web Policy — Old View

Your web policy consists of rules that control web access of users within your organization when they are working with cloud services. The rules filter web traffic originating from users accessing the web and block or allow, for example, downloads from the web.

This ensures protection against web threats such as viruses and other malware, which can be incurred through uncontrolled web access. 

You configure the rules you want to apply under your web policy on the pages of the user interface that are provided, including configuration of the lists that rules rely on.

Additionally, you can configure features that support the rules to fine-tune the settings used in the filtering process.

More configuration tasks can be completed in the code view.

  • Rules and rule sets — The rules of your web policy are grouped in rule sets. Each rule set usually covers a particular part of web security. For example, there can be rule sets for blocking malware or for blocking or allowing access to websites with particular URLs or to particular media types, services, and applications.

    A number of rule sets are provided by default. You can view and access them on a tree structure called the policy tree.

    You can copy (clone) any default rule set and configure the cloned rule set according to your requirements. You can then keep the default rule set or delete it and only work with your own rule set instead.

    For information about the rule sets that are provided by default, see Overview of Default Rule Sets — Old View

    For an example of how to configure a rule set with rules that cover an important part of web security, see Anti-Malware

    For information about how to copy (clone) rule sets, delete them, revert to their default settings, and complete several other rule set handling activities, see Web Policy Page — Old View and the Working with Rule Sets section. 
  • Lists — Many rules rely on lists. For example, a rule that allows requests for web access to skip anti-malware filtering based on domains relies on a list with entries for domains.

    You can fill entries in lists, delete lists, create lists of your own, and complete several other list handling activities.

    For more information, see the Working with Lists section. 

  • Feature configuration — You can fine-tune your settings by configuring features that are related to rule sets and support them in the filtering process. 

    For more information, see About Configuring Default Rule Sets and Feature Configurations

  • Code view — In the code view, you can view and modify the code that underlies the rules of your web policy. This allows you to complete configuration tasks that you cannot complete elsewhere on the user interface. For example, you can remove individual rules from a rule set.

    Be sure to understand the code before you work in the code view, as inappropriately modifying it can severely damage your rules and the functions they execute to ensure protection against web threats.

    For more information, see About the Web Policy Code View.

  • Was this article helpful?