Document toolboxDocument toolbox

Custom TIDE Feeds

Creating a TIDE Profile for Custom TIDE Feeds (BYOF)

Custom TIDE feeds can be added by first creating a new TIDE data profile and then adding a custom created TIDE feed to the profile. For information on creating TIDE data profiles, see Data Profiles. 

Viewing Custom TIDE Feed Details

Custom TIDE BYOF details can be viewed in the Threat Feed Details panel in the Cloud Services Portal. To view the Threat Feed Details panel, log into the Cloud Services Platform and navigate to Policies > On-Prem DNS Firewall Policies. In the Threat Feed Details panel, you will find the address for your custom TIDE RPZ feed. On the On-Prem DNS Firewall Policies page, click Feed Configuration Values (Step 2) to view your organization's feeds, including your organization's custom created RPZ feeds. 

Adding a Custom TIDE Feed to a Security Policy

Custom TIDE feeds (TIDE BYOF feeds) can be added to a new or existing security policy as a policy rule. To add a custom TIDE feed to a security policy, do the following:

  1. Select Feeds and Threat Insight as a rule type on the Policy Rules pane. 
  2. On the Policy Rules pane, select Feeds and Threat Insight as a rule type.
  3. From the Name column, scroll through the list of available feeds under the Choose a Feeds and Threat Insight menu until you locate the desired custom TIDE feed. The custom RPZ feed description is the same description as what was provided when the data profile for the feed was created. 
  4. Select the custom TIDE feed from the feeds listed and apply an action (Action list) 
  5. From the Action column, select a rule action for the custom TIDE feed. Action options include: 
    • Allow - No Log
    • Allow - With Log
    • Block - No Redirect
    • Block - Default Redirect
    • Block - Custom Redirect
    • Block (No Log) - No Redirect 
    • Block (No Log) - Default Redirect
    • Block (No Log) - Custom Redirect
  6. Click Next to complete the Security policy wizard, or click Finish to finalize the security configuration process. 

For information on adding policy rules to a security policy, see Adding Policy Rules and Setting Precedence.Â