Create Custom Web Access Policies

Web Security Administrators can customize and create web access policies.
  1. Select
    Web Security
    Web Access Policy
    Here, you can view and customize your web access policies. To create a new Custom Web Access Policy, select
    Add Policy
    . Or, you can skip down to Step 3,
    Default Web Access Policies
  2. Review the following:
  3. Review and
    Default Web Access Policies
    • Global Web Access
      Enforces your web application and URL category access restrictions for all users.
    • Global Catch All Policy
      Sets the default action for all outbound traffic to any Web Application or URL Category to allow. It’s a good practice to you leave the Global Catch All Policy enabled. Otherwise, any traffic not matching your Web Security rules is enforced according to the policies defined under
      Security Services
      Security Policy
  4. Use this table to guide you as you put together your policy.
    Web access policies are enforced from top to bottom. Blocked applications and URLs always supersede applications or URLs that you allow.
    Action to take:
    What's the purpose of this policy
    Give your policy a name. Optionally, you can add a description, tags, and a schedule for your policy. Giving your policy a descriptive name and a meaningful description of its purpose makes it easier to manage later on not just for you, but for other admins as well. Tags can help you group policies with similar characteristics. Schedules can help you manage policies that need to be enforced at regular intervals.
    Where and for whom your policy is enforced
    In the
    section, define traffic to enforce based on its source.
    - Enforce web traffic based on where it originates. You can add locations by address, groups of addresses, and geographical region.
    - Add users and groups of users whom your policy affects.
    Advanced Settings
    - You can enforce traffic based on the deployment type:
    • All
    • GlobalProtect
    • Explicit Proxy
    • Remote Networks
    - Add a device posture profile to use device state information such as whether a device is jailbroken for policy enforcement.
    What gets blocked
    In the
    Blocked Web Applications
    Blocked URL Categories
    sections, add applications and URL categories to block - Focus on unsanctioned and risky applications that do not have legitimate use in your network and malicious websites.
    What’s allowed
    In the
    Allowed Web Applications
    Allowed URL Categories
    sections, add sanctioned applications and URL categories to explicitly allow for enterprise use. You can even restrict access to certain features within an allowed application. For example, you may want to allow Gmail, but block access to chat or calls within Gmail.
  5. Select
    Push Config
    at the top right corner of your screen.
    window opens.
  6. Enter a description if you’d like, and then
    your new policy and settings to the cloud for enforcement.
    If you’re an Account, App, or Instance admin, the
    window you see may look like the second image above. Just be sure to select the checkbox for
    Web Security
    , and then

Recommended For You