Get Started With Internet Access Policy
Policies are the heart of Secure Access and define how security and access controls are applied to identities/sources. Through policies, you determine whether traffic is inspected and either blocked or allowed.
Packages and Feature Availability
Not all features of the policy wizard explained here are available to all Secure Access packages. To determine your current package, navigate to Admin > Subscription. For more information, see Determine Your Current Package.
If you encounter a feature described here that you do not have access to, contact your sales representative for more information. See also, Cisco Umbrella and Cisco Secure Access packages.
You can have more than one policy and your identities can be added to any number of policies. However, Secure Access applies the first matching policy to your identity and immediately stops evaluating policies. If no matching policy is found, Umbrella applies the Default policy. Because of the way Umbrella evaluates identities against policies, it's important that you configure policies correctly for each of your organization's identities. An error in configuration may result in unintended results: identities being left unprotected to various threats or users accessing destinations you may want blocked. Plan and design your policies before you build them. For some helpful suggestions, see Best Practices for Policy Creation.
There is always at least one policyâthe Default policy. This Default policy applies to all identities and cannot be deletedâyou can, however, configure it to meet your organization's unique requirements. The Default policy is applied to an identity when no other policy matches that identity. Thus, the Default policy is a catch-all to ensure that all identities within your organization receive at least a minimum of Secure Access protection.
Policy Creation Basics
You create policies through the Policy wizard, which is made up of two parts. In the first part of the wizard, you choose the identities to which the policy applies and which components should be enabled and configured for the policy. In the second part of the wizard, you configure each component of the policy that was selected in part one of the wizard. These components are made available as steps in the wizard. Once the new policy is saved, it may take upwards of five minutes for the policy to replicate through Secure Accessâs global infrastructure and start taking effect.
The Policy wizard includes many and varied access control and security-related components for you to consider when defining policies for your identities.
- Security SettingsâAllows you to select which security threat categories Secure Access blocks. For example, malware.
- Content CategoriesâAllows you to block access to categories of websitesâgroupings of sites with similarly themed content. For example, sports, gambling, or astrology.
- Application SettingsâAllows you to block access to specific applications. For example, Netflix, Facebook, or Amazon.
- Destination ListsâAllows you to create a unique list of destinations (for example, domain name or URL) to which you can block or allow access.
- Block PagesâAllows you to configure the web page users see when an attempt is made to reach a blocked destination.
- File InspectionâScan and inspect files for malicious content hosted on risky domains before those files are downloaded.
Troubleshoot Private Access Rules < Manage Policies > Add a Policy
Updated 7 months ago