Manage Prisma Access Browser Access and Data Control Rules
Focus
Focus
Prisma Access Browser

Manage Prisma Access Browser Access and Data Control Rules

Table of Contents

Manage Prisma Access Browser Access and Data Control Rules

Learn how to manage access and data control rules for Prisma Access Secure Enterprise Browser (Prisma Access Browser).
Where Can I Use This?What Do I Need?
  • Strata Cloud Manager
  • Prisma Access Browser standalone
  • Prisma Access with Prisma Access Browser bundle license or Prisma Access Browser standalone license
  • Superuser or Prisma Access Browser role
Access & Data Control Rules are designed to create the environment to keep the data safe per application, website classification, or URL. You can create Rules that help make enforcement effective.

View the Rules

To view the rules:
The last rule on the list is the Access & Data - baseline, also known as the Default Rule.
The Default Rule is the policy rule that is used when no other policy rule is applicable. Since this rule must be available for any given user or device, only certain controls can be edited.
  1. From Strata Cloud Manager, select ManageConfigurationPrisma Access Browser PolicyRules.
  2. Select the Access & Data Control tab.
    The Access & Data Control displays the following information for each Rule:
    The information displays changes based on the Policy Rule type selected.
    • Priority - Access & Data Control rules are enforced based on Zero Trust Access scope, the applications in the rule, and the enabled controls. The result of this is to enforce least privileged access (most restrictive context) for users and the applications that they are accessing.
      Rules are inspected from top to bottom based on the priority. But all rules are inspected which can result in multiple rules being matched to a user's session.
      The resulting access policy that is applied is a merge of all controls that are applicable to the user's context. If there is a conflict between the controls, the control in a higher priority rule supersedes a control in a lower priority rule.
      1. Select the cog icon to the left of Change priorities to modify which of the following fields you want to display.
      2. Select Change priorities to reorder the rules in the list. The rules are processed in order, and once a rule is matched, the processing stops.
    • Mode - The behavior of the Rule applied on the end users. The options are:
      • Active - The Rule will be applied and enforced on all end users.
      • Monitoring - The Rule will only create logging events without affecting the end users.
      • Disabled - The Rule won't be applied on end users.
    • Name - The name of the Rule.
    • Scope - A combination of the Users, User Groups, Device Groups, Networks, and Locations that will be included in the rule.
    • Destinations - The specific applications, website classifications, and URLs that this Rule covers.
      The Rule will match if any one application, classification, or URL is matched.
    • Web Access - Defines the behavior of the ability to access the websites defined in the Rule.
    • Data controls - The Data controls that are used as part of the Rule. This can include either inline data controls set per Rule or preexisting Profiles that can be reused in different Rules. If the Rule uses a profile, the name of the Profile is highlighted in the display.
    • Hits - The number of times the Rule was applied in the past 7 days. This feature is especially useful when examining Rules before implementation.
    • Updated - The date and name of the person who made the most recent update. Hover over the entry to see the full timestamp.
    • Log level - The type of logging that is applied to the Rule.

Search and Filter

You have the opportunity to search and filter for particular Rules. This helps you investigate rules that have common components. This makes it easier to check for rules that might be duplicated or to find rules that might be operating improperly.
  1. From Strata Cloud Manager, select ManageConfigurationPrisma Access Browser PolicyRules.
  2. Select the Access & Data Control tab.
  3. Search for rules by the rule name.
  4. Filter on rules based on specific criteria:
    • Users – The Users and User Groups that are included in a Rule.
    • Device group - The Device groups that are included in a Rule.
    • Applications - Web applications that are included in the Rule.
    • Web classifications - The categories of applications that are covered by the Rule.
    • Web access- The access options that will be enforced for this Rule. The options are:
      • Prompt - Web access is restricted, but there is an option to proceed.
      • Allow - Web access is permitted.
      • Block - Web access isn't permitted.
    • Controls - The Data controls that are used in the Rule.
    • Mode (available in Add Filter) - The filter can include the following options:
      • Monitoring - Rules that only write an entry to the Events Log. See below for more information.
      • Active - Rules that are active and are used by the Policy Engine.
      • Disabled – Inactive Rules are skipped by the Policy Engine.
    • Content configured- The filter can include rules that have configured content in the "When contains" section of the rule configuration. The options are:
      • Yes - Select Rules that contain configured content.
      • No – Select Rules that don't contain configured content.
    • Log level- Select the level of logging that will be performed on the Rule. The options are:
      • Enhanced - All user actions involving this Rule are fully logged with the Prisma Access Browser creating a session recording of the activity. This can assist with compliance and regulation requirements, or to carefully monitor actions within sensitive applications.
      • On - All user actions involving this Rule are logged.
      • Anonymized - Actions involving this Rule are logged without personal details.
      • Off - User actions involving this Rule are not logged.
    • Profile - If the Rule uses External Controls (Profiles) as part of the Policy Rules, then you can use this filter to assist the search.
For example, if you want to see the way that downloads work across different sites for a particular user, do the following:
  1. Filter the list by the username.
  2. Filter the resulting list by the Control - File Download.
  3. Manually review the list. The first rule to match the website is the behavior for the file download.

Create New Access & Data Control Rules

Adding a new Access & Data Control Rule can be done easily with an understanding of the way that the rule is going to be used and enforced. Each Rule needs to be planned carefully, taking into consideration the way that each element will be configured. This will make sure that the enforcement can be done effectively.
You can create Rules using a wizard interface. This allows you to have full control over the entire policy.
When you set up a Rule, you can click on the Wizard controls on the left side, or the Next button at the bottom of the page.
  1. From Strata Cloud Manager, select ManageConfigurationPrisma Access Browser PolicyRules.
  2. Select the Access & Data Control tab and + Add Rule.
    1. Enter a Name for the rule.
    2. Select the Mode.
      • Monitoring - Rules that only write an entry to the Events Log. A Rule set to monitoring can be used for testing new rules.
      • Active - Rules that are active and are used by the Policy Engine. This is the default action.
      • Disabled – These are inactive Rules that are skipped by the Policy Engine.
    3. Select Next: Scope.
  3. On the Scope page, enter the following information:
    The Scope combines the selections in Users, User Groups, Device Groups, Networks, and Location. This means that the rule scope requires that all conditions be met for a match to occur.
    • Users/User Groups - Select the Users and User Groups that will be covered by the Rule. It's possible to select multiple Users and User Groups. The default is Any user.
    • Device groups - Select the Device groups that will be covered by this Rule. It's possible to select multiple device groups. The default is Any device group.
    • Networks - Enter a Public IP address with a subnet, if needed, or a CIDR.
    • Location – Select the geolocation from which to enable the Prisma Access Browser rule. If the OS Location services are not enabled on the device, the PAB will use the GeoIP. For more information, refer to Location-based Policy
    • Select Next: Destinations.
  4. On the Destinations page, choose the Destination types for this rule. Select from the following options:
    You can select any combination of Internet & SaaS applications, Private applications, and Application Groups.
    • Internet & SaaS applications - For applications stored on Public websites and SaaS applications.
      • Any internet & SaaS - Allows you to include any Web and SaaS application.
      • Custom - Allows you to:
        • Choose Web or SaaS applications directly from a list.
        • Select any website falling within a specific classification. The classification is divided into two categories - Malicious (for example, Phishing sites, Ransomware, Grayware) and Benign (for example, News and Media, Dating, Shopping).
        • Enter a specific URL. You can select specific domains, subdomains, ports, and paths to provide custom setups to the application.
    • Private applications - Allows you to include applications that are privately maintained within the data center and are not publicly accessible.
      Tenants with the Private Application feature will be able to create a second default rule to manage access to Private apps (under access and data).
      For more information, refer to Private Applications.
      • Any private application - Allows you to include any application that is hosted on your internal network.
        This feature only works with:
        • Prisma Access Browser versions after 1.199.0
        • Prisma Access Browser Extension versions after 1.244.0
      • Specific private application - Choose private applications directly from a list.
    • Application Groups - Allows you to select Application groups that you created.
    • Select Next: Web access
  5. On the Web Access page, choose the access options that will be enforced for this Rule. The options are:
    • Allow - allow users to access the applications, websites, and URLs.
    • Prompt - inform the user that the access is restricted, but allow the user the option of continuing. When a user selects an option that allows them to Proceed anyway or use any option that requires Admin Approval, an event will be written to the log.
      Using Prompt grants limited access permission depending on how you configure the setting. You can set it to be once (one-time access for the account) or unlimited access for a limited time frame.
    1. Warn and allow to proceed anyway - Users will receive a warning, but will be allowed to proceed anyway.
    2. Warn and allow to proceed anyway with a reason - Users will receive a warning, but will be allowed to proceed anyway if they provide a reason.
    3. Permission request - Users will be required to provide a reason that you must approve before they are allowed to proceed. For more information, see Requests.
      Mobile Rules with this option will result in a Block.
    4. Block - Block users from accessing the applications, websites, and URLs.
    5. Require MFA - If a PIN code or biometric authenticator is used for authentication then the PIN code authentication can be set to require the user to enter the code to proceed.
      You can configure the length of time between MFA requests so that your users don't have to enter their authentication every time. The options are:
      • Every time.
      • A configured time between 10 minutes and 90 days.
    6. Enforce Extension traffic redirection to Prisma Access Browser - Access to web apps from the Prisma Access Browser Extension will trigger an “Open in Prisma Access Browser” dialog. The access is still subject to the options selected above. If you select this option, you can use your own dialog text to replace the default. To set the text, click Set dialog text. This option will be ignored for mobile rules.
    7. Pick a Label - Select the label to appear in the browser address bar. This will display the basic information on the site policy. Note: This option will be ignored in the mobile rules.
    8. Select Next: Login restrictions.
  6. The Login restriction page allows you to control logging into the applications and websites using the Prisma Access browser. Use the feature as follows:
    1. Set the login restrictions.
      1. Allow - Allow login to the selected sites using any username and password.
      2. Block - Block login to the selected sites.
      3. Allow specific email domains - Allow login to the selected sites with usernames that are from specific email domains only.
      4. Block specific email domains - Block login to the selected sites with usernames that are from specific email domains only.
    2. Prompt for allowed logins - Inform the user of the restriction and allow bypassing. Select the notification and the authentication.
      1. Pop-up notification - Select one of the following options:
        1. Warn and allow to proceed anyway - Users will receive a warning but they can proceed anyway.
        2. Warn and allow to proceed anyway with a reason - Users will receive a warning but they can proceed if they provide a reason.
        3. Permission Request – You will receive a message requesting permission.
      2. Bypass timeframe – Indicate how long any bypass will be valid.
    3. Require MFA - If a PIN code or biometric authenticator is used for authenticationthen the PIN code authentication can be set to require the user to enter the code to proceed.
    4. Set account protection – Ensure that login is only possible from the browser by protecting the password during password reset.
      1. Shared accounts – All shared accounts will have the same password protection.
    5. Select Next: Data controls.
  7. On the Data controls page, select the controls that the rule will use.
    1. The following search and filter options are available:
      1. Active only - Display controls that are already in use in the Rule.
      2. Enterprise browser - Display only those controls that are available for the Enterprise browser.
      3. Mobile browser - Display only the available controls for the mobile browser.
      4. Extension – Display only the available controls for the browser extension.
    2. Select and configure the Data controls for the rule. The rule can contain multiple controls. For information on configuring the individual controls, refer to:
      1. Data Leak Prevention
      2. Malware Protection
    3. You can add Profiles that you manage outside of the rule. Click Saved Profiles to select a preconfigured profile in place of the Data controls.
    4. Select Next: When contains.
  8. The When Contains (Content Settings) page allows you to condition the configured Data controls. This allows you to create rules that trigger only if specific data types occur. You can also create custom data types that can condition the rules.
    You can create data pattern combinations (from either the predefined values, or the custom values).
    For example, you can set File Download control to Block, and add an email content detector to the rule. This means that if a file includes an email address, the file download control in the rule will activate and block the download. The content types can be incorporated into rules containing the following Data control types:
    • File Download
    • File Upload
    • Clipboard
    • Webpage data masking
    • Typing Guard
    • Screen Sharing
    • Print
    1. On the Content Settings page, select Specific content.
    2. Select Select in the Content detectors field.
    3. Select the preconfigured content detectors from the list.
      In addition, you can create custom content detectors to add to the list, based on regular expressions.
    4. Select Next: Log level.
  9. On the Log level page, select the Log privacy level for the rule. Select one of the following levels:
    1. Enhanced – The Browser fully logs all user actions involving this rule. The Browser creates a session recording of the activity. This can assist with compliance and regulation requirements, or to carefully monitor actions within sensitive applications.
    2. On – This Rule logs all user actions.
    3. Anonymized – This Rule logs all user actions without personal details.
    Off – This Rule does not log user actions.
  10. Save.

Set Rule Monitoring

Rules can be configured for Monitoring purposes only. Monitoring only writes an entry to the Event Log. This allows you to test how the Rule affects the browser usage before actually putting it into regular production. By using Monitoring, it's possible to apply multiple Rules on a single action, one for a monitoring action and one for an actual action.
  1. From Strata Cloud Manager, select ManageConfigurationPrisma Access Browser PolicyRules.
  2. Select the Access & Data Control tab.
  3. Save the rule.
  4. On the Rule List, click the ellipse, and select Set to Monitoring. This can also be done in the first step of the wizard, in the Mode option.
  5. The rule will be available, but whenever it comes into effect, it will ignore actions, and merely write to the Events log.

Use Predefined Content Types

The Prisma Access Browser has some predefined content items included. These predefined content types can be used when you need to add a specific content item that isn't included in the database.
The Content Types are divided into two categories - Data Profiles and Data Patterns. With these features, you now have more control over the data that you can add.
The content types are grouped into categories. You have the ability to filter the Patterns to see the information that relates directly to your requirements.
  • Privacy
  • Finance
  • Healthcare
  • Other
  • Custom
To select preconfigured Content items:
  1. From Strata Cloud Manager, select ManageConfigurationPrisma Access Browser PolicyRules.
  2. Select the Access & Data Control tab.
  3. Create a new Access & Data Control Rule.
    1. Be sure to configure the When contains information.
    2. Click Specific content.
    3. Click the tab for Data Profiles or Data Patterns.
    4. If you have any questions regarding a particular data item, click the (i) on the side of the list. This will open a page containing more information regarding the item.
    5. Select the required Content Detectors - either Data Profiles or Data Patterns.
    6. Select the Content types, then click the appropriate content item. The rule can contain any combination of items.
  4. Save.

Create Custom Content Types for the Prisma Access Browser Rules

You can define additional Data Patterns to meet your specific organizational-related needs. The file definitions are based on ECMAScript (JavaScript) Syntax.
  1. From Strata Cloud Manager, select ManageConfigurationPrisma Access Browser PolicyRules.
  2. When you're configuring your rule, in the When Contains (Content Settings), select Specific content.
  3. Select the content detectors from the list, either Data Profiles or Data Patterns. You can create custom content detectors to add to the list, based on regular expressions.
    To add a custom data type:
    1. Select the Data Patterns tab. Go to the bottom of the list and click Manage custom content types.
    2. In the Custom content types window, click Add type.
    3. In the Add Custom Content Type window, add the appropriate pattern for the content.
    4. “Custom data types” support ECMAScript (JavaScript) Syntax.
    5. Advanced flags (https://developer.mozilla.org/en-US/docs/Web/JavaScript/Guide/Regular_expressions#advanced_searching_with_flags) are currently not supported.
  4. The configured custom content types will be matched against the configured data controls that support content inspection.
    Configured Data Controls that don't support content inspection (e.g. screenshot) will ignore the specific content condition and will be applied according to all other rule conditions (scope, web application).
    The content types can be incorporated into rules containing the following Data control types:
    • File Download
    • File Upload
    • Clipboard
    • Webpage data masking

Configure External Controls (Profiles)

Inline profiles should be configured within the Rules in the Controls sections. This allows you to create specialized rules containing different combinations and configurations of controls.
The Profiles feature is used when you want to use legacy profiles and add them to the rules.
Rules can contain either inline data controls or external controls.
The Controls for the Prisma Access Browser rules are configured internally, within the body of the individual rule. This means that each rule contains its own unique set of controls.
There are some use cases when you might want to create multiple rules using the same list of controls. To accomplish this task, Prisma Access Browser has a mechanism to create external controls that are not built into a rule but exist separately. Each control defines a particular use case containing configurations for the Policy control types.
  1. ManageConfigurationPrisma Access Browser RulesData Access & Control
  2. Add rule.
  3. Data controls
    These controls access to websites and data, preventing organizational data from being accidentally (or maliciously) released. For information on configuring the individual controls, refer to Configure Data Controls.