Manage Prisma Access Browser Access and Data Control Rules
Focus
Focus
Prisma Access Browser

Manage Prisma Access Browser Access and Data Control Rules

Table of Contents

Manage
Prisma Access Browser
Access and Data Control Rules

Learn how to manage access and data control rules for
Prisma Access Secure Enterprise Browser
(
Prisma Access Browser
).
Where Can I Use This?
What Do I Need?
  • Strata Cloud Manager
  • Prisma Access Browser
    standalone
  • Prisma Access
    with
    Prisma Access Browser
    bundle license or
    Prisma Access Browser
    standalone license
  • Superuser or
    Prisma Access Browser
    role
Access & Data Control Rules are designed to create the environment to keep the data safe per application, website classification, or URL. You can create Rules that help make enforcement effective.

View the Rules

To view the rules:
  1. From
    Strata Cloud Manager
    , select
    Manage
    Configuration
    Prisma Access Browser
    Policy
    Rules
    .
  2. Select the
    Access & Data Control
    tab.
    The Access & Data Control displays the following information for each Rule:
    The information displays changes based on the Policy Rule type selected.
    • Priority
      - The order in which the Rules are enforced. Once a Rule is matched, the Browser stops looking for another match.
      1. Select the
        cog icon
        to the left of Change priorities to modify which of the following fields you want to display.
      2. Select
        Change priorities
        to reorder the rules in the list. The rules are processed in order, and once a rule is matched, the processing stops.
    • Mode
      - The behavior of the Rule applied on the end users. The options are:
      • Active
        - The Rule will be applied and enforced on all end users.
      • Monitoring
        - The Rule will only create logging events without affecting the end users.
      • Disabled
        - The Rule won't be applied on end users.
    • Name
      - The name of the Rule.
    • Scope
      - A combination of the Users, User Groups, Device Groups, Networks, and Locations that will be included in the rule.
    • Web application
      - The specific applications, website classifications, and URLs that this Rule covers.
      The Rule will match if any one application, classification, or URL is matched.
    • Web Access
      - Defines the behavior of the ability to access the websites defined in the Rule.
    • Data controls
      - The Data controls that are used as part of the Rule. This can include either inline data controls set per Rule or preexisting Profiles that can be reused in different Rules. If the Rule uses a profile, the name of the Profile is highlighted in the display.
    • Hits
      - The number of times the Rule was applied in the past 7 days. This feature is especially useful when examining Rules before implementation.
    • Updated
      - The date and name of the person who made the most recent update. Hover over the entry to see the full timestamp.
    • Log level
      - The type of logging that is applied to the Rule.

Search and Filter

You have the opportunity to search and filter for particular Rules. This helps you investigate rules that have common components. This makes it easier to check for rules that might be duplicated or to find rules that might be operating improperly.
  1. From
    Strata Cloud Manager
    , select
    Manage
    Configuration
    Prisma Access Browser
    Policy
    Rules
    .
  2. Select the
    Access & Data Control
    tab.
  3. Search
    for rules by the rule name.
  4. Filter on rules based on specific criteria:
    • Users
      – The Users and User Groups that are included in a Rule.
    • Device group
      - The Device groups that are included in a Rule.
    • Applications
      - Web applications that are included in the Rule.
    • Web classifications
      - The categories of applications that are covered by the Rule.
    • Web access
      - The access options that will be enforced for this Rule. The options are:
      • Prompt
        - Web access is restricted, but there is an option to proceed.
      • Allow
        - Web access is permitted.
      • Block
        - Web access isn't permitted.
    • Controls
      - The Data controls that are used in the Rule.
    • Mode
      (available in
      Add Filter
      ) - The filter can include the following options:
      • Monitoring
        - Rules that only write an entry to the Events Log. See below for more information.
      • Active
        - Rules that are active and are used by the Policy Engine.
      • Disabled
        – Inactive Rules are skipped by the Policy Engine.
    • Content configured
      - The filter can include rules that have configured content in the "When contains" section of the rule configuration. The options are:
      • Yes
        - Select Rules that contain configured content.
      • No
        – Select Rules that don't contain configured content.
    • Log level
      - Select the level of logging that will be performed on the Rule. The options are:
      • Enhanced
        - All user actions involving this Rule are fully logged with the Prisma Access Browser creating a session recording of the activity. This can assist with compliance and regulation requirements, or to carefully monitor actions within sensitive applications.
      • On
        - All user actions involving this Rule are logged.
      • Anonymized
        - Actions involving this Rule are logged without personal details.
      • Off
        - User actions involving this Rule are not logged.
    • Profile
      - If the Rule uses External Controls (Profiles) as part of the Policy Rules, then you can use this filter to assist the search.
For example, if you want to see the way that downloads work across different sites for a particular user, do the following:
  1. Filter the list by the username.
  2. Filter the resulting list by the Control -
    File Download
    .
  3. Manually review the list. The first rule to match the website is the behavior for the file download.

Create New Access & Data Control Rules

Adding a new Access & Data Control Rule can be done easily with an understanding of the way that the rule is going to be used and enforced. Each Rule needs to be planned carefully, taking into consideration the way that each element will be configured. This will make sure that the enforcement can be done effectively.
You can create Rules using a wizard interface. This allows you to have full control over the entire policy.
When you set up a Rule, you can click on the Wizard controls on the left side, or the
Next
button at the bottom of the page.
  1. From
    Strata Cloud Manager
    , select
    Manage
    Configuration
    Prisma Access Browser
    Policy
    Rules
    .
  2. Select the
    Access & Data Control
    tab and
    + Add Rule
    .
    1. Enter a
      Name
      for the rule.
    2. Select the
      Mode
      .
      • Monitoring
        - Rules that only write an entry to the Events Log. A Rule set to monitoring can be used for testing new rules.
      • Active
        - Rules that are active and are used by the Policy Engine. This is the default action.
      • Disabled
        – These are inactive Rules that are skipped by the Policy Engine.
    3. Select
      Next: Scope
      .
  3. On the Scope page, enter the following information:
    The Scope combines the selections in Users, User Groups, Device Groups, Networks, and Location. This means that the rule scope requires that all conditions be met for a match to occur.
    • Users/User Groups
      - Select the Users and User Groups that will be covered by the Rule. It's possible to select multiple Users and User Groups. The default is
      Any user
      .
    • Device groups
      - Select the Device groups that will be covered by this Rule. It's possible to select multiple device groups. The default is
      Any device group
      .
    • Networks
      - Enter a Public IP address with a subnet, if needed, or a CIDR.
      • The default is Any Network.
    • Location
      – Enter the geolocation used for the rule application.
      • The default is any Location.
    • Select
      Next: Web application
      .
  4. On the Web Application page, choose the applications for this Rule. Select from the following options:
    • If the Rule is supposed to cover all applications, select
      Any application
      (this is the default).
    • If specific applications and websites need to be included in the Rule, select
      Specific web applications
      .
    1. Applications
      - you can select the web applications for the rule. It's also possible to create custom applications. Click Select applications to select the type of application to add to the Rule. The following options can be used to filter the selection:
      • Catalog - A preconfigured listing of applications provided with the Prisma Access Browser. For more information, refer to the Applications directory.
      • Private - A listing of applications that are privately maintained within the data center and are not publicly accessible. For more information, refer to
        Private Applications
        .
      • Custom - Applications that are added to the applications available to the users. When configuring this application, you can select specific domains, subdomains, ports, and paths to provide custom setups to the application.
    2. Website classification (Categories)
      - You select entire classifications to add to the rule. The classification is divided into two categories - Malicious (for example, Phishing sites, Ransomware, Grayware) and Benign (for example, News and Media, Dating, Shopping).
    3. URL
      - You can directly add the URL to the rule. Click
      Add
      after you have configured the URL.
    4. Select
      Next: Web access
      .
  5. On the Web Access page, choose the access options that will be enforced for this Rule. The options are:
    • Allow
      - allow users to access the applications, websites, and URLs.
    • Prompt
      - inform the user that the access is restricted, but allow the user the option of continuing. When a user selects an option that allows them to
      Proceed anyway
      or use any option that requires
      Admin Approval
      , an event will be written to the log.
      Using
      Prompt
      grants limited access permission depending on how you configure the setting. You can set it to be once (one-time access for the account) or unlimited access for a limited time frame.
    1. Warn and allow to proceed anyway
      - Users will receive a warning, but will be allowed to proceed anyway.
    2. Warn and allow to proceed anyway with a reason
      - Users will receive a warning, but will be allowed to proceed anyway if they provide a reason.
    3. Permission request
      - Users will be required to provide a reason that you must approve before they are allowed to proceed. For more information, see Requests.
      Mobile Rules with this option will result in a Block.
    4. Block -
      Block users from accessing the applications, websites, and URLs.
    5. Require MFA
      - If a PIN code or biometric authenticator is used for authentication then the PIN code authentication can be set to require the user to enter the code to proceed.
      You can configure the length of time between MFA requests so that your users don't have to enter their authentication every time. The options are:
      • Every time
      • A configured time between 10 minutes and 90 days
    6. Enforce Extension traffic redirection to Prisma Access Browser
      - Access to web apps from the Prisma Access Browser Extension will trigger an “Open in Prisma Access Browser” dialog. The access is still subject to the options selected above. If you select this option, you can use your own dialog text to replace the default. To set the text, click Set dialog text. This option will be ignored for mobile rules.
    7. Pick a Label
      - Select the label to appear in the browser address bar. This will display the basic information on the site policy. Note: This option will be ignored in the mobile rules.
    8. Select
      Next: Login restrictions
      .
  6. The Login restriction page allows you to control logging into the applications and websites using the Prisma Access browser. Use the feature as follows:
    1. Set the login restrictions.
      1. Allow
        - Allow login to the selected sites using any username and password.
      2. Block
        - Block login to the selected sites.
      3. Allow specific email domains
        - Allow login to the selected sites with usernames that are from specific email domains only.
      4. Block specific email domains
        - Block login to the selected sites with usernames that are from specific email domains only.
    2. Prompt for allowed logins
      - Inform the user of the restriction and allow bypassing. Select the notification and the authentication.
      1. Pop-up notification
        - Select one of the following options:
        1. Warn and allow to proceed anyway
          - Users will receive a warning but they can proceed anyway.
        2. Warn and allow to proceed anyway with a reason
          - Users will receive a warning but they can proceed if they provide a reason.
        3. Permission Request
          – You will receive a message requesting permission.
      2. Bypass timeframe
        – Indicate how long any bypass will be valid.
    3. Require MFA
      - If a PIN code or biometric authenticator is used for
      authentication
      then the PIN code authentication can be set to require the user to enter the code to proceed.
    4. Set account protection
      – Ensure that login is only possible from the browser by protecting the password during password reset.
      1. Shared accounts
        – All shared accounts will have the same password protection.
    5. Select
      Next: Data controls
      .
  7. On the Data controls page, select the controls that the rule will use.
    1. The following search and filter options are available:
      1. Active only
        - Display controls that are already in use in the Rule.
      2. Enterprise browser
        - Display only those controls that are available for the Enterprise browser.
      3. Mobile browser
        - Display only the available controls for the mobile browser.
      4. Extension
        – Display only the available controls for the browser extension.
    2. Select and configure the
      Data controls
      for the rule. The rule can contain multiple controls. For information on configuring the individual controls, refer to:
      1. Data Leak Prevention
      2. Malware Protection
    3. You can add Profiles that you manage outside of the rule. Click
      Saved Profiles
      to select a preconfigured profile in place of the Data controls.
    4. Select
      Next: When contains
      .
  8. The When Contains (Content Settings) page allows you to condition the configured Data controls. This allows you to create rules that trigger only if specific data types occur. You can also create custom data types that can condition the rules.
    You can create data pattern combinations (from either the predefined values, or the custom values).
    For example, you can set File Download control to Block, and add an email content detector to the rule. This means that if a file includes an email address, the file download control in the rule will activate and block the download. The content types can be incorporated into rules containing the following Data control types:
    • File Download
    • File Upload
    • Clipboard
    • Webpage data masking
    1. On the Content Settings page, select
      Specific content.
    2. Select
      Select
      in the Content detectors field.
    3. Select the preconfigured content detectors from the list.
      In addition, you can create custom content detectors to add to the list, based on regular expressions.
    4. Select
      Next: Log level
      .
  9. On the Log level page, select the Log privacy level for the rule. Select one of the following levels:
    1. Enhanced
      – The Browser fully logs all user actions involving this rule. The Browser creates a session recording of the activity. This can assist with compliance and regulation requirements, or to carefully monitor actions within sensitive applications.
    2. On
      – This Rule logs all user actions.
    3. Anonymized
      – This Rule logs all user actions without personal details.
    Off
    – This Rule does not log user actions.
  10. Save
    .

Set Rule Monitoring

Rules can be configured for Monitoring purposes only. Monitoring only writes an entry to the Event Log. This allows you to test how the Rule affects the browser usage before actually putting it into regular production. By using Monitoring, it's possible to apply multiple Rules on a single action, one for a monitoring action and one for an actual action.
  1. From
    Strata Cloud Manager
    , select
    Manage
    Configuration
    Prisma Access Browser
    Policy
    Rules
    .
  2. Select the
    Access & Data Control
    tab.
  3. Save
    the rule.
  4. On the Rule List, click the
    ellipse
    , and select
    Set to Monitoring
    . This can also be done in the first step of the wizard, in the Mode option.
  5. The rule will be available, but whenever it comes into effect, it will ignore actions, and merely write to the Events log.

Use Predefined Content Types

The Prisma Access Browser has some predefined content items included. These predefined content types can be used when you need to add a specific content item that isn't included in the database.
The Content Types are divided into two categories - Data Profiles and Data Patterns. With these features, you now have more control over the data that you can add.
The content types are grouped into categories. You have the ability to filter the Patterns to see the information that relates directly to your requirements.
  • Privacy
  • Finance
  • Healthcare
  • Other
  • Custom
To select preconfigured Content items:
  1. From
    Strata Cloud Manager
    , select
    Manage
    Configuration
    Prisma Access Browser
    Policy
    Rules
    .
  2. Select the
    Access & Data Control
    tab.
    1. Be sure to configure the When contains information.
    2. Click
      Specific content
      .
    3. Click the tab for
      Data Profiles
      or
      Data Patterns
      .
    4. If you have any questions regarding a particular data item, click the
      (i)
      on the side of the list. This will open a page containing more information regarding the item.
    5. Select the required Content Detectors - either
      Data Profiles
      or
      Data Patterns
      .
    6. Select the Content types, then click the appropriate content item. The rule can contain any combination of items.
  3. Save
    .

Create Custom Content Types for the
Prisma Access Browser
Rules

You can define additional Data Patterns to meet your specific organizational-related needs. The file definitions are based on
ECMAScript (JavaScript) Syntax
.
  1. From
    Strata Cloud Manager
    , select
    Manage
    Configuration
    Prisma Access Browser
    Policy
    Rules
    .
  2. When you're configuring your rule, in the When Contains (Content Settings), select
    Specific content.
  3. Select the content detectors from the list, either Data Profiles or Data Patterns. You can create custom content detectors to add to the list, based on regular expressions.
    To add a custom data type:
    1. Select the
      Data Patterns
      tab. Go to the bottom of the list and click
      Manage custom content types
      .
    2. In the
      Custom content types
      window, click
      Add type
      .
    3. In the
      Add Custom Content Type
      window, add the appropriate pattern for the content.
    4. “Custom data types” support ECMAScript (JavaScript) Syntax.
  4. The configured custom content types will be matched against the configured data controls that support content inspection.
    Configured Data Controls that don't support content inspection (e.g. screenshot) will ignore the specific content condition and will be applied according to all other rule conditions (scope, web application).
    The content types can be incorporated into rules containing the following Data control types:
    • File Download
    • File Upload
    • Clipboard
    • Webpage data masking

Configure External Controls (Profiles)

Inline profiles should be configured within the Rules in the Controls sections. This allows you to create specialized rules containing different combinations and configurations of controls.
The Profiles feature is used when you want to use legacy profiles and add them to the rules.
Rules can contain either inline data controls or external controls.
The Controls for the
Prisma Access Browser
rules are configured internally, within the body of the individual rule. This means that each rule contains its own unique set of controls.
There are some use cases when you might want to create multiple rules using the same list of controls. To accomplish this task,
Prisma Access Browser
has a mechanism to create external controls that are not built into a rule but exist separately. Each control defines a particular use case containing configurations for the Policy control types.
  1. Manage
    Configuration
    Prisma Access Browser
    Rules
    Data Access & Control
  2. Add rule
    .
  3. Data controls
    These controls access to websites and data, preventing organizational data from being accidentally (or maliciously) released. For information on configuring the individual controls, configure data controls:
    • Data Leak Prevention
    • Malware Protection

Recommended For You