Policies are the heart of Umbrella and define how security and access controls are applied to identities. Through policies, you determine whether traffic is inspected and either blocked or allowed.
Packages and Feature Availability
The following policy types are available for configuration:
- DNS—Provides DNS-layer visibility, security, and enforcement with the ability to selectively proxy risky domains for added security.
- Web—Provides URL-layer visibility, security, and enforcement of your web traffic
- Firewall—Provides firewall services without the need to deploy, maintain and upgrade physical or virtual appliances at each site. For more information, see Manage Firewall.
This section of documentation only covers DNS and Web policies. For firewall and tunneling information, see Manage Firewall.
For DNS and Web policies, you can have more than one policy of each type and your identities can be added to any number of policies. However, Umbrella applies the first matching policy to your identity and immediately stops evaluating policies. If no matching policy is found, Umbrella applies either the DNS or Web default policy, respectively. Because of the way Umbrella evaluates identities against policies, it's important that you configure policies correctly for each of your organization's identities. An error in configuration may result in unintended results: identities being left unprotected to various threats or users accessing destinations you may want blocked. We suggest planning and designing your policies before building them. For some helpful suggestions, see Best Practices for Policy Creation.
When accessing either DNS or Web policies, there is always at least one policy—the Default policy, which is always a DNS policy. This policy applies to all identities and cannot be deleted—you can, however, configure it to meet your organization's unique requirements. The default policy is applied to an identity when no other policy matches that identity. Thus, the Default policy is a catch-all to ensure that all identities within your organization receive at least a minimum of Umbrella protection.
You create DNS and Web policies through the Policy wizard, which is made up of two parts. In the first part of the wizard, you select the identities to which the policy applies and lets you select which components should be enabled and configured for the policy. In the second part of the wizard, you configure each component of the policy that was selected in part one of the wizard. These components are made available as steps in the wizard. Once the new policy is saved, it may take upwards of five minutes for the policy to replicate through Umbrella’s global infrastructure and start taking effect.
The Policy wizard includes many and varied access control and security-related components for you to consider when defining policies for your identities.
- Security Settings—Allows you to select which security threat categories Umbrella blocks. For example, malware.
- Content Categories—Allows you to block access to categories of websites—groupings of sites with similarly-themed content. For example, sports, gambling, or astrology.
- Application Settings—Allows you to block access to specific applications. For example, Netflix, Facebook, or Amazon.
- Destination Lists—Allows you to create a unique list of destinations (for example, domain name or URL) to which you can block or allow access.
- Block Pages—Allows you to configure the web page users see when an attempt is made to reach a blocked destination.
Note: Depending on the policy type (DNS or Web), some destination types may or may not be supported by the policy.
- File Analysis—Inspect files through signature-based and file reputation using third party industrial-strength anti-virus and Advanced Malware Protection (AMP), respectively; and behavior analysis using Threat Grid for advanced and targeted malware.