Page tree

Contents

A security policy is a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. 

To create a security policy, complete the following:

  1. From the Cloud Services Portal, click Policies -> Security Policies.
  2. On the Security Policies page, click Create Security Policy at the top Action bar. The Create New Security Policy wizard appears.
  3. On the General page, complete the following:
    • Name: Enter a name for the security policy. Ensure that you enter a unique name for each security policy. This is a required field.
    • Description: Enter a brief description of the security policy. You can enter up to 256 characters. This is not a required field, but it is recommended. 
    • Precedence: Enter the precedence order for this policy, or use the arrows in the field to choose the precedence order for the policy. You can reorder security policy rules precedence using drag-and-drop functionality. Click on the policy rule to be reordered on the Policy Rules page and drag it to its new location. Repeat the process as necessary until all policy rules precedence have been reordered as required. If you do not set a precedence order, the system will set this policy.
    • Geolocation: Toggle the Geolocation switch from Disable to Enable (disabled by default) in order to enable the geolocation for the security policy, or accept the default disabled configuration for the security policy to preserve privacy. For more information about geolocation support, see Enabling and Disabling Geolocation for a Security Policy.
    • Local On-Prem ResolutionToggle the Local On-Prem Resolution switch from Disable to Enable (disabled by default) to enable local on-prem DNS resolution for a security policy, or accept the default disabled configuration to have DNS requests and responses validated per policy by BloxOne Cloud. When local on-prem resolution is enabled, all DNS requests will be resolved locally, on the on-prem host. For more information on local on-prem resolution breakout, see Using Local On-prem Resolution.
       
  4. Click Next.
  5. On the Network Scope page, define your network scope for this security policy. For more information, see Configuring Network Scopes.
  6. Click Next.
  7. On the Policy Rules page, add policy rules, and set their actions and precedence. For more information, see Adding Policy Rules and Setting Precedence.
  8. Click Next.
  9. On the Bypass Codes page, add bypass codes to your security policy. For more information, see Adding Bypass Codes to a Security Policy.
  10. Click Next.
  11. On the Summary page, review your configuration. This page displays the configuration details. You can click the icon next to a network scope or policy rule to view the details in the Selected panel. Before saving the security policy, you can make modifications by clicking the respective pages on the left navigation panel. You can also click the Back button to navigate back to previous steps in the Create New Security Policy wizard.
  12. Click Save & Close to save the configuration.

For additional information on security policies, see the following:

  • No labels

This page has no comments.