Skip to main content

Check out Interactive Visual Stories to gain hands-on experience with the SSE product features. Click here.

Skyhigh Security

About Configuring Remote Browser Isolation

You can use browser isolation, which is also known as Remote Browser Isolation (RBI), to ensure web access is secure for users of your organization.

When a user sends a request to access a website with browser isolation enabled, the original content of that website is not sent in response to the user's browser, but to a browser on a remote server. From there, a real-time, interactive image of this content is transferred to the user's browser. This ensures the user's browser and system are protected against threats arising from the original content, for example, against infections by viruses and other malware inhering in this content.

Using browser isolation, you can allow users access to websites that would otherwise be blocked under your web policy because accessing them was considered an unacceptable risk. The user is notified when browser isolation is applied. For this purpose, the representation of the original web content is marked by a green border around any page that is displayed in the user's browser.

The browser isolation process is controlled by the rules of your web policy. These rules filter web traffic relying for their execution on the web proxy functions that are implemented under Secure Web Gateway.

There are two rule sets offering different modes of browser isolation. You can configure them as part of configuring your web policy under Secure Web Gateway.

You must obtain an additional license from Skyhigh Security to be able to use the Full Isolation mode of browser isolation.

For details on supported browsers for RBI, see Browsers Supported by Remote Browser Isolation. To learn more about RBI - best practices, see Remote Browser Isolation - Best Practices.



  • Was this article helpful?