Skip to main content
Skyhigh Security

Allow Some Content to Skip Inspection

To save on resources, you can allow content going to trusted destinations or coming from trusted sources to skip or bypass inspection. You can also manage content inspection of archives and transfers of risky media types.

From this rule set, you can open and configure the Composite Opener feature.

  1. In Skyhigh CASB, select Policy > Web Policy > Policy.
  2. In the policy tree, select Content Inspection > Archive and Transfer.
  3. Optionally configure criteria to limit the scope of this rule set.
  4. Select the rules that allow web requests to skip content inspection and continue to the next rule set. When selected, the rules:
    • Skip all inspection for these domains, hosts or URLs — Allows web requests sent to the domains, hosts, and
      URLs in this list to skip content inspection.
    • Skip all inspection for these User Groups — Allows web requests sent by members of the groups in this list to skip content inspection.
    • Skip all inspection for these User Names — Allows web requests sent by users whose names are in this list to skip content inspection.
    • Skip all inspection for these Client IPs — Allows web requests sent from the client IP addresses in this list to skip content inspection.
    • Skip all inspection for these Private Applications — Allows web requests sent from the private applications in this list to skip content inspection.  This option is available only when you have the Skyhigh Private Access license. 
  5. Select the rules that allow upload requests to skip content inspection and continue to the next rule set.
    When selected, the rules:
    • Skip upload inspection for these Domains — Skips inspection of content uploaded to the domains in this list.
    • Skip upload inspection for these User Groups — Skips inspection of content uploaded by members of the groups in this list.
    • Skip upload inspection for these User Names — Skips inspection of content uploaded by users whose names are in this list.
    • Skip upload inspection for these Client IPs — Skips inspection of content uploaded from the client IP addresses in this list.
    • Skip upload inspection for these Private Applications — Skips inspection of content uploaded from the private applications in this list.  This option is available only when you have the Skyhigh Private Access license. 
  6. Select the rules that allow download requests to bypass content inspection. When selected, the rules:
    • Don't inspect downloads for these Domains — Allows content downloaded from the domains in this list to bypass inspection.
    • Don't inspect downloads for these User Groups — Allows content downloaded to members of the groups in this list to bypass inspection.
    • Don't inspect downloads for these User Names — Allows content downloaded to users whose names are in this list to bypass inspection.
    • Don't inspect downloads for these Client IPs — Allows content downloaded to the client IP addresses in this list to bypass inspection.
    • Don't inspect downloads larger than specified limit — Allows downloads larger than the specified size to bypass content inspection.
    • Don't inspect downloads for these Private Applications — Allows content downloaded to the private application in this list to bypass inspection.  This option is available only when you have the Skyhigh Private Access license. 
  7. Select the rules that limit the size of archives that can be inspected and block transfers of risky media types.
    When selected, the rules:
    • Do not scan archives larger than specified limit — Skips content inspection of archives larger than the specified size.
    • Block all transfers of encrypted media types — Blocks all downloads and uploads of encrypted media types.
    • Block all transfers of multipart media types — Blocks all downloads and uploads of multipart media types.
    • Block all transfers of corrupted media — Blocks all downloads and uploads of corrupted media.
  8. Configure the lists associated with the rules as needed.

Changes to the policy tree, rule sets, or rules are automatically saved. You can publish them to the cloud now or keep working and publish later.

  • Was this article helpful?