Apply policies based on the constraint profile

Apply policies based on the constraint profile

To apply inline policies based on security needs and various constraints such as AD/user groups/Organizational unit, Source of traffic/Trusted or untrusted, networks/Forward or reverse proxy, Application instance, Constraint profile or augmenting authentication (Multifactor authentication),  follow the steps as shown below:

  1. Navigate to Policies > Real time Protection > New Policy > Cloud App access.
  2. Under ‘Source’ section, select Users/User groups or Organizational Unit. Options selected here will apply in the policy being created.
    VRP_use_case_1-7.jpg
  3. Under ‘Source’ section, select ‘ADD CRITERIA’ drop down option.
    VRP_Use_Case_1-7_step3.jpg
  4. Select the ‘Access method’ option and select the required source of traffic and proxy type (forward, reverse).
    VRP_use_case_1-7_step4.jpg
  5. For trusted or untrusted networks, select ‘Source IP’ and provide the details.
    VRP_use_case_1-7_step5.jpg
  6. To apply policies based on application  instance, navigate to ‘Destination’ section of the policy creation template, and select the ‘App Instance’ option.
    VRP_use_case_1-7_step6.jpg
  7. Selection of a cloud app or an app instance activates the ‘Activities and Constraints’ section where activities that have to act as constraints can be placed in the policy.
    VRP_use_case_1-7_step7.jpg
  8. To include multi factor authentication in policies, ensure that Multifactor authentication is enabled for the tenant.
  9. Under the Profiles & Action section in the policy creation template, select the Action = Multifactor authentication. This will help to provide layered security for higher risk activity.
    vrp_use_case_1-7_step9.jpg

To learn more: Real-time Protection Policies

Share this Doc

Apply policies based on the constraint profile

Or copy link

In this topic ...