Apply policies based on the source of traffic, trusted, or untrusted networks

Apply policies based on the source of traffic, trusted, or untrusted networks

To apply inline policies based on security needs and various constraints such as AD/user groups/Organizational unit, Source of traffic/Trusted or untrusted, networks/Forward or reverse proxy, Application instance, Constraint profile or augmenting authentication (Multifactor authentication),  follow the steps as shown below:

  1. Navigate to Policies > Real time Protection > New Policy > Cloud App access.
  2. Under ‘Source’ section, select Users/User groups or Organizational Unit. Options selected here will apply in the policy being created.
    VRP_use_case_1-7.jpg
  3. Under ‘Source’ section, select ‘ADD CRITERIA’ drop down option.
    VRP_Use_Case_1-7_step3.jpg
  4. Select the ‘Access method’ option and select the required source of traffic and proxy type (forward, reverse).
    VRP_use_case_1-7_step4.jpg
  5. For trusted or untrusted networks, select ‘Source IP’ and provide the details.
    VRP_use_case_1-7_step5.jpg
  6. To apply policies based on application  instance, navigate to ‘Destination’ section of the policy creation template, and select the ‘App Instance’ option.
    VRP_use_case_1-7_step6.jpg
  7. Selection of a cloud app or an app instance activates the ‘Activities and Constraints’ section where activities that have to act as constraints can be placed in the policy.
    VRP_use_case_1-7_step7.jpg
  8. To include multi factor authentication in policies, ensure that Multifactor authentication is enabled for the tenant.
  9. Under the Profiles & Action section in the policy creation template, select the Action = Multifactor authentication. This will help to provide layered security for higher risk activity.
    vrp_use_case_1-7_step9.jpg

To learn more: Real-time Protection Policies

Share this Doc

Apply policies based on the source of traffic, trusted, or untrusted networks

Or copy link

In this topic ...