The content security policy comprises a number of combined components that determine the content that is allowed to flow between web sites and your organization. You create your policy by adding Content Rules and other Policy References to Web Policy Routes.
When data flows through the
In addition to routes and rules, you can configure a Global Web Policy and determine if your
You define your content policy from the Policy Center Home Page.
If you have a conjoined policy where you have a Web and Email
Content rules are the processing rules of your content security policy. Each content rule states that if a communication meets a specified set of conditions, the Policy Engine will perform a specified set of actions.
When you configure content rules in your
Policy references are items that can be referenced when you define your security policy. For example, you can add the Informs reference to your policy route to send notifications when specific content rule conditions are met.
If you have a conjoined policy where, for example, a Web and Email
For a list of policy references and what action they perform, see the About Policy Reference topic.
A Machine List is a listing of the machine addresses for one or more users to whom you want to apply a common policy. Similarly, User Names lists is a grouping of user names of one or more users to whom you want to apply a common policy. These groupings typically represent users who share a common link within your organization, for example:
By defining and using machine lists, you can choose not to authenticate individual users. Any machine whose IP address is contained in a machine list will have access to the Gateway, regardless of the user.
Internet Zones is a
To help with caricaturization, your
You can also create an Internet Zone comprising sites that do not require policy enforcement. For example, you could create an Internet Zone called 'Trusted Sites' and add your organization's own web site, or servers that are used to update machines with security updates and patches.
The use of Internet Zones is an efficient way of making use of the computing resources on your
A Web policy route defines two endpoints, one being associated within your organization, for example, a list of users or machines, and one or more Internet Zones, for example, web sites that are associated with gambling.
Your |
You apply a default action to all traffic that takes a given route and then apply any content rules.
The Global Web Policy contains a number of options that add to your security policy including safe Search, file upload and download size restrictions
By default, your A digital means of proving your identity. When you send a digitally-signed message, you are sending your certificate and public key. Certificates are issued by a certification authority and can expire or be revoked. verification. For more information, see the HTTPS Certificate Policy Settings topic.
With Adaptive Redaction you can detect and manage sensitive data from information that flows through your
You use Sanitization to detect and remove active content, embedded content, URLs or hyperlinks, scripts or macros and document properties from communications. Sanitization purges potential harmful content from documents, attachments and media types. For more information on using this feature, see Sanitization.