Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

You can create a new security policy by cloning an existing one.

To clone a security policy:

  1. From the Cloud Services Portal, click Policies -> Security Policies.
  2. On the Security Policies page, select a policy you want to use as the baseline and click Clone at the top Action bar. The Clone Security Policy wizard appears.
  3. On the General page, complete the following:
    • Name: Enter a name for the security policy. Ensure that you enter a unique name for each security policy. This is a required field.
    • Description: This is inherited from the original policy. You cannot modify this. 
    • Precedence: Enter the precedence order for this policy, or use the arrows in the field to choose the precedence order for the policy. If you do not set a precedence order, the system will set this policy as the last on the list.
    • Geolocation: Toggle the Geolocation switch from Disable to Enable to enable the geolocation for the security policy, or accept the default disabled configuration for the security policy to preserve privacy. For more information about geolocation support, see Enabling and Disabling Geolocation for a Security Policy.
    • Safe Search: Toggle this switch from Disable to Enable (disabled by default). When safe search is enabled, inappropriate content from search results obtained from four major search engines (Google, Bing, YouTube, and Yandex) is filtered and restricted. Enabling safe search ensures that protected users will be unable to access or view inappropriate content. Enabling safe search does not override any configured custom lists or the default redirect. 
    • Local On-Prem Resolution: Toggle the Local On-Prem Resolution switch from Disable to Enable to enable local on-prem DNS resolution for the security policy, or accept the default disabled configuration to have DNS requests and responses validated per policy by BloxOne Cloud.
  4. Click Next.
  5. On the Network Scope page, define your network scope for this security policy. No network scope is inherited from the original security policy. For more information, see Configuring Network Scopes.
  6. Click Next.
  7. On the Policy Rules page, all the policy rules are inherited from the original security policy. You cam make modifications to them. For more information, see Adding Policy Rules and Setting Precedence.
  8. Click Next.
  9. On the Bypass Codes page, all the bypass codes are inherited from the original security policy. You can make modifications to them. For more information, see Adding Bypass Codes to a Security Policy.
  10. Click Next.
  11. On the Summary page, review your configuration. This page displays the configuration details. You can click the icon next to a network scope or policy rule to view the details in the Selected panel. Before saving the security policy, you can make modifications by clicking the respective pages on the left navigation panel. You can also click the Back button to navigate back to previous steps in the wizard.
  12. Click Save & Close to save the configuration.

For additional information on security policies, see the following:

  • No labels