Prisma Access Browser
Manage Prisma Access Browser Access and Data Control Rules
Table of Contents
Expand All
|
Collapse All
Prisma Access Browser Docs
Manage Prisma Access Browser Access and Data Control Rules
Learn how to manage access and data control rules for Prisma Access Secure Enterprise Browser (Prisma Access Browser).
Where Can I Use This? | What Do I Need? |
---|---|
|
|
Access & Data Control Rules are designed to create the environment to keep the
data safe per application, website classification, or URL. You can create Rules that
help make enforcement effective.
View the Rules
- From Strata Cloud Manager, select ManageConfigurationPrisma Access Browser PolicyRules.
- Select the Access & Data Control tab.The Access & Data Control displays the following information for each Rule:The information displays changes based on the Policy Rule type selected.
-
Priority - The order in which the Rules are enforced. Once a Rule is matched, the Browser stops looking for another match.
- Select the cog icon to the left of Change priorities to modify which of the following fields you want to display.
- Select Change priorities to reorder the rules in the list. The rules are processed in order, and once a rule is matched, the processing stops.
-
Mode - The behavior of the Rule applied on the end users. The options are:
-
Active - The Rule will be applied and enforced on all end users.
-
Monitoring - The Rule will only create logging events without affecting the end users.
-
Disabled - The Rule won't be applied on end users.
-
-
Name - The name of the Rule.
-
Scope - A combination of the Users, User Groups, Device Groups, Networks, and Locations that will be included in the rule.
-
Web application - The specific applications, website classifications, and URLs that this Rule covers.The Rule will match if any one application, classification, or URL is matched.
-
Web Access - Defines the behavior of the ability to access the websites defined in the Rule.
-
Data controls - The Data controls that are used as part of the Rule. This can include either inline data controls set per Rule or preexisting Profiles that can be reused in different Rules. If the Rule uses a profile, the name of the Profile is highlighted in the display.
-
Hits - The number of times the Rule was applied in the past 7 days. This feature is especially useful when examining Rules before implementation.
-
Updated - The date and name of the person who made the most recent update. Hover over the entry to see the full timestamp.
-
Log level - The type of logging that is applied to the Rule.
-
Search and Filter
You have the opportunity to search and filter for particular Rules. This helps
you investigate rules that have common components. This makes it easier to check
for rules that might be duplicated or to find rules that might be operating
improperly.
- From Strata Cloud Manager, select ManageConfigurationPrisma Access Browser PolicyRules.
- Select the Access & Data Control tab.
- Search for rules by the rule name.
- Filter on rules based on specific criteria:
-
Users – The Users and User Groups that are included in a Rule.
-
Device group - The Device groups that are included in a Rule.
-
Applications - Web applications that are included in the Rule.
-
Web classifications - The categories of applications that are covered by the Rule.
-
Web access- The access options that will be enforced for this Rule. The options are:
-
Prompt - Web access is restricted, but there is an option to proceed.
-
Allow - Web access is permitted.
-
Block - Web access isn't permitted.
-
-
Controls - The Data controls that are used in the Rule.
-
Mode (available in Add Filter) - The filter can include the following options:
-
Monitoring - Rules that only write an entry to the Events Log. See below for more information.
-
Active - Rules that are active and are used by the Policy Engine.
-
Disabled – Inactive Rules are skipped by the Policy Engine.
-
-
Content configured- The filter can include rules that have configured content in the "When contains" section of the rule configuration. The options are:
-
Yes - Select Rules that contain configured content.
-
No – Select Rules that don't contain configured content.
-
-
Log level- Select the level of logging that will be performed on the Rule. The options are:
-
Enhanced - All user actions involving this Rule are fully logged with the Prisma Access Browser creating a session recording of the activity. This can assist with compliance and regulation requirements, or to carefully monitor actions within sensitive applications.
-
On - All user actions involving this Rule are logged.
-
Anonymized - Actions involving this Rule are logged without personal details.
-
Off - User actions involving this Rule are not logged.
-
-
Profile - If the Rule uses External Controls (Profiles) as part of the Policy Rules, then you can use this filter to assist the search.
-
For example, if you want to see the way that downloads work across
different sites for a particular user, do the following:
-
Filter the list by the username.
-
Filter the resulting list by the Control - File Download.
-
Manually review the list. The first rule to match the website is the behavior for the file download.
Create New Access & Data Control Rules
Adding a new Access & Data Control Rule can be done easily with an
understanding of the way that the rule is going to be used and enforced. Each
Rule needs to be planned carefully, taking into consideration the way that each
element will be configured. This will make sure that the enforcement can be done
effectively.
You can create Rules using a wizard interface. This allows you to have
full control over the entire policy.
When you set up a Rule, you can click on the Wizard controls on the left side, or
the Next button at the bottom of the page.
- From Strata Cloud Manager, select ManageConfigurationPrisma Access Browser PolicyRules.
- Select the Access & Data Control tab and
+ Add Rule.
- Enter a Name for the rule.
- Select the Mode.
-
Monitoring - Rules that only write an entry to the Events Log. A Rule set to monitoring can be used for testing new rules.
-
Active - Rules that are active and are used by the Policy Engine. This is the default action.
-
Disabled – These are inactive Rules that are skipped by the Policy Engine.
-
- Select Next: Scope.
- On the Scope page, enter the following information:The Scope combines the selections in Users, User Groups, Device Groups, Networks, and Location. This means that the rule scope requires that all conditions be met for a match to occur.
-
Users/User Groups - Select the Users and User Groups that will be covered by the Rule. It's possible to select multiple Users and User Groups. The default is Any user.
-
Device groups - Select the Device groups that will be covered by this Rule. It's possible to select multiple device groups. The default is Any device group.
-
Networks - Enter a Public IP address with a subnet, if needed, or a CIDR.
-
The default is Any Network.
-
-
Location – Enter the geolocation used for the rule application.
-
The default is any Location.
-
- Select Next: Web application.
-
- On the Web Application page, choose the applications for this Rule. Select
from the following options:
-
If the Rule is supposed to cover all applications, select Any application (this is the default).
- If specific applications and websites need to be included in the Rule, select Specific web applications.
- Applications - you can select the web
applications for the rule. It's also possible to create custom
applications. Click Select applications to select the type of
application to add to the Rule. The following options can be used to
filter the selection:
-
Catalog - A preconfigured listing of applications provided with the Prisma Access Browser. For more information, refer to the Applications directory.
-
Private - A listing of applications that are privately maintained within the data center and are not publicly accessible. For more information, refer to Private Applications.
-
Custom - Applications that are added to the applications available to the users. When configuring this application, you can select specific domains, subdomains, ports, and paths to provide custom setups to the application.
-
- Website classification (Categories) - You select entire classifications to add to the rule. The classification is divided into two categories - Malicious (for example, Phishing sites, Ransomware, Grayware) and Benign (for example, News and Media, Dating, Shopping).
- URL - You can directly add the URL to the rule. Click Add after you have configured the URL.
- Select Next: Web access.
-
- On the Web Access page, choose the access options that will be enforced for
this Rule. The options are:
-
Allow - allow users to access the applications, websites, and URLs.
-
Prompt - inform the user that the access is restricted, but allow the user the option of continuing. When a user selects an option that allows them to Proceed anyway or use any option that requires Admin Approval, an event will be written to the log.Using Prompt grants limited access permission depending on how you configure the setting. You can set it to be once (one-time access for the account) or unlimited access for a limited time frame.
- Warn and allow to proceed anyway - Users will receive a warning, but will be allowed to proceed anyway.
- Warn and allow to proceed anyway with a reason - Users will receive a warning, but will be allowed to proceed anyway if they provide a reason.
- Permission request - Users will be required to provide a
reason that you must approve before they are allowed to proceed. For
more information, see Requests.Mobile Rules with this option will result in a Block.
- Block - Block users from accessing the applications, websites, and URLs.
- Require MFA - If a PIN code or biometric authenticator is
used for authentication then the PIN code authentication can be set
to require the user to enter the code to proceed. You can configure the length of time between MFA requests so that your users don't have to enter their authentication every time. The options are:
-
Every time
-
A configured time between 10 minutes and 90 days
-
- Enforce Extension traffic redirection to Prisma Access Browser - Access to web apps from the Prisma Access Browser Extension will trigger an “Open in Prisma Access Browser” dialog. The access is still subject to the options selected above. If you select this option, you can use your own dialog text to replace the default. To set the text, click Set dialog text. This option will be ignored for mobile rules.
- Pick a Label - Select the label to appear in the browser address bar. This will display the basic information on the site policy. Note: This option will be ignored in the mobile rules.
- Select Next: Login restrictions.
-
- The Login restriction page allows you to control logging into the
applications and websites using the Prisma Access browser. Use the feature
as follows:
- Set the login restrictions.
-
Allow - Allow login to the selected sites using any username and password.
-
Block - Block login to the selected sites.
-
Allow specific email domains - Allow login to the selected sites with usernames that are from specific email domains only.
-
Block specific email domains - Block login to the selected sites with usernames that are from specific email domains only.
-
- Prompt for allowed logins - Inform the user of the
restriction and allow bypassing. Select the notification and the
authentication.
-
Pop-up notification - Select one of the following options:
-
Warn and allow to proceed anyway - Users will receive a warning but they can proceed anyway.
-
Warn and allow to proceed anyway with a reason - Users will receive a warning but they can proceed if they provide a reason.
-
Permission Request – You will receive a message requesting permission.
-
-
Bypass timeframe – Indicate how long any bypass will be valid.
-
- Require MFA - If a PIN code or biometric authenticator is used for authenticationthen the PIN code authentication can be set to require the user to enter the code to proceed.
- Set account protection – Ensure that login is only possible
from the browser by protecting the password during password
reset.
- Shared accounts – All shared accounts will have the same password protection.
- Select Next: Data controls.
- Set the login restrictions.
- On the Data controls page, select the controls that the rule will
use.
- The following search and filter options are available:
-
Active only - Display controls that are already in use in the Rule.
-
Enterprise browser - Display only those controls that are available for the Enterprise browser.
-
Mobile browser - Display only the available controls for the mobile browser.
-
Extension – Display only the available controls for the browser extension.
-
- Select and configure the Data controls for the rule. The
rule can contain multiple controls. For information on configuring
the individual controls, refer to:
-
Data Leak Prevention
-
Malware Protection
-
- You can add Profiles that you manage outside of the rule. Click Saved Profiles to select a preconfigured profile in place of the Data controls.
- Select Next: When contains.
- The following search and filter options are available:
- The When Contains (Content Settings) page allows you to condition the
configured Data controls. This allows you to create rules that trigger only
if specific data types occur. You can also create custom data types that can
condition the rules.You can create data pattern combinations (from either the predefined values, or the custom values).For example, you can set File Download control to Block, and add an email content detector to the rule. This means that if a file includes an email address, the file download control in the rule will activate and block the download. The content types can be incorporated into rules containing the following Data control types:
-
File Download
-
File Upload
-
Clipboard
-
Webpage data masking
- On the Content Settings page, select Specific content.
- Select Select in the Content detectors field.
- Select the preconfigured content detectors from the list.In addition, you can create custom content detectors to add to the list, based on regular expressions.
- Select Next: Log level.
-
- On the Log level page, select the Log privacy level for the rule. Select
one of the following levels:
-
Enhanced – The Browser fully logs all user actions involving this rule. The Browser creates a session recording of the activity. This can assist with compliance and regulation requirements, or to carefully monitor actions within sensitive applications.
-
On – This Rule logs all user actions.
-
Anonymized – This Rule logs all user actions without personal details.
Off – This Rule does not log user actions. -
- Save.
Set Rule Monitoring
Rules can be configured for Monitoring purposes only. Monitoring only writes
an entry to the Event Log. This allows you to test how the Rule affects the
browser usage before actually putting it into regular production. By using
Monitoring, it's possible to apply multiple Rules on a single action, one
for a monitoring action and one for an actual action.
- From Strata Cloud Manager, select ManageConfigurationPrisma Access Browser PolicyRules.
- Select the Access & Data Control tab.
- Create a new Access & Data Control Rule.
- Save the rule.
- On the Rule List, click the ellipse, and select Set to Monitoring. This can also be done in the first step of the wizard, in the Mode option.
- The rule will be available, but whenever it comes into effect, it will ignore actions, and merely write to the Events log.
Use Predefined Content Types
The Prisma Access Browser has some predefined content items
included. These predefined content types can be used when you need to add a
specific content item that isn't included in the database.
The Content Types are divided into two categories - Data Profiles
and Data Patterns. With these features, you now have more control over the
data that you can add.
The content types are grouped into categories. You have the ability
to filter the Patterns to see the information that relates directly to your
requirements.
-
Privacy
-
Finance
-
Healthcare
-
Other
-
Custom
To select preconfigured Content items:
- From Strata Cloud Manager, select ManageConfigurationPrisma Access Browser PolicyRules.
- Select the Access & Data Control tab.
- Create a new Access & Data Control
Rule.
- Be sure to configure the When contains information.
- Click Specific content.
- Click the tab for Data Profiles or Data Patterns.
- If you have any questions regarding a particular data item, click the (i) on the side of the list. This will open a page containing more information regarding the item.
- Select the required Content Detectors - either Data Profiles or Data Patterns.
- Select the Content types, then click the appropriate content item. The rule can contain any combination of items.
- Save.
Create Custom Content Types for the Prisma Access Browser Rules
You can define additional Data Patterns to meet your specific
organizational-related needs. The file definitions are based on ECMAScript (JavaScript)
Syntax.
- From Strata Cloud Manager, select ManageConfigurationPrisma Access Browser PolicyRules.
- When you're configuring your rule, in the When Contains (Content Settings), select Specific content.
- Select the content detectors from the list, either Data Profiles or
Data Patterns. You can create custom content detectors to add to the
list, based on regular expressions.To add a custom data type:
-
Select the Data Patterns tab. Go to the bottom of the list and click Manage custom content types.
- In the Custom content types window, click Add type.
- In the Add Custom Content Type window, add the appropriate pattern for the content.
- “Custom data types” support ECMAScript (JavaScript) Syntax.
- Advanced flags (https://developer.mozilla.org/en-US/docs/Web/JavaScript/Guide/Regular_expressions#advanced_searching_with_flags) are currently not supported.
-
- The configured custom content types will be matched against the
configured data controls that support content inspection.Configured Data Controls that don't support content inspection (e.g. screenshot) will ignore the specific content condition and will be applied according to all other rule conditions (scope, web application).The content types can be incorporated into rules containing the following Data control types:
-
File Download
-
File Upload
-
Clipboard
-
Webpage data masking
-
Configure External Controls (Profiles)
Inline profiles should be configured within the Rules in the
Controls sections. This allows you to create specialized rules containing
different combinations and configurations of controls.
The Profiles feature is used
when you want to use legacy profiles and add them to the rules.
Rules can contain either inline data controls or external controls.
The Controls for the Prisma Access Browser rules are configured
internally, within the body of the individual rule. This means that each rule
contains its own unique set of controls.
There are some use cases when you might want to create multiple rules
using the same list of controls. To accomplish this task, Prisma Access Browser has
a mechanism to create external controls that are not built into a rule but exist
separately. Each control defines a particular use case containing configurations
for the Policy control types.
- ManageConfigurationPrisma Access Browser RulesData Access & Control
- Add rule.
- Data controlsThese controls access to websites and data, preventing organizational data from being accidentally (or maliciously) released. For information on configuring the individual controls, configure data controls:
-
Data Leak Prevention
-
Malware Protection
-