Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. From the Cloud Services Portal, click Policies -> Security Policies.
  2. On the Security Policies page, select a policy you want to use as the baseline and click Clone at the top Action bar. The Clone Security Policy wizard appears.
  3. On the General page, complete the following:
    • Name: Enter a name for the security policy. Ensure that you enter a unique name for each security policy. This is a required field.
    • Description: This is inherited from the original policy. You cannot modify this. 
    • Precedence: Enter the precedence order for this policy, or use the arrows in the field to choose the precedence order for the policy. If you do not set a precedence order, the system will set this policy as the last on the list.
    • Geolocation: Toggle the Geolocation switch from Disable to Enable to enable the geolocation for the security policy, or accept the default disabled configuration for the security policy to preserve privacy. For more information about geolocation support, see Enabling and Disabling Geolocation for a Security Policy.
    • Safe Search: Toggle this switch from Disable to Enable (disabled by default). When safe search is enabled, inappropriate content from search results obtained from four major search engines (Google, Bing, YouTube, and Yandex) is filtered and restricted. Enabling safe search ensures that protected users will be unable to access or view inappropriate content. Enabling safe search does not override any configured custom lists or the default redirect. 
    • Local On-Prem Resolution: Toggle the Local On-Prem Resolution switch from Disable to Enable to enable local on-prem DNS resolution for the security policy, or accept the default disabled configuration to have DNS requests and responses validated per policy by BloxOne Cloud.
  4. Click Next.
  5. On the Network Scope page, define your network scope for this security policy. No network scope is inherited from the original security policy. For more information, see Configuring Network Scopes.
  6. Click Next.
  7. On the Policy Rules page, all the policy rules are inherited from the original security policy. You cam make modifications to them. For more information, see Adding Policy Rules and Setting Precedence.
  8. Click Next.
  9. On the Bypass Codes page, all the bypass codes are inherited from the original security policy. You can make modifications to them. For more information, see Adding Bypass Codes to a Security Policy.
  10. Click Next.
  11. On the Summary page, review your configuration. This page displays the configuration details. You can click the the encircled, right-facing arrow iconImage Modifiedicon next to a network scope or policy rule to view the details in the Selected panel. Before saving the security policy, you can make modifications by clicking the respective pages on the left navigation panel. You can also click the Back button to navigate back to previous steps in the wizard.
  12. Click Save & Close tosave the configuration.

...