Adding a protection rule

To add a protection rule:

  1. In the application web interface window, select one of the following sections:
    • for global rules, the Rules section;
    • for workspace rules, the Workspaces section.
  2. If you added a workspace, select one of the following tabs:
    • Before workspace rules.
    • After workspace rules.
  3. In the Protection groups list, select a group of protection rules.

    The traffic processing rules table opens.

    If there is no group of protection rules in the list, you must create one.

  4. Click Add protection rule.

    The window for adding a rule opens.

  5. Select the General settings tab.
  6. If you want to apply the rule immediately after adding it, select the Enable rule check box.
  7. In drop-down lists under Actions, select an action for each of the following parameters:
    1. Malware:
      • Deny, disinfect if possible.
      • Skip scanning.

      The default setting is Deny, disinfect if possible.

    2. Phishing, Encrypted archive, File with a macro, and Object that has failed to be scanned:
      • Deny.
      • Skip scanning.

      The default setting is Deny.

  8. If you want to use a template different from the default access denial template when there is an attempt to open a forbidden resource:
    1. Select the Specify text to display in blocking template check box.
    2. Type the message text.
    3. If you want to add a macro to the message text, select one of the options from the Insert macro drop-down list:
      • %URL% to add the URL of the blocked website.
      • %RULE_NAME% to add the name of the traffic processing rule.
      • %APPLICATION% to add the application name.
      • %DATE% to add the date and time when the traffic processing rule came into force.
  9. In the Rule name box, type the name of the protection rule.
  10. In the Comment (optional) box, type the comment.

    Optional setting.

  11. Click Add.

The protection rule is added.

See also

Using traffic processing rules

Scenario for configuring access to Internet resources

Adding an access rule

Configuring a rule triggering initiator

Configuring traffic filtering criteria

Adding an exclusion for a traffic processing rule

Configuring the schedule of a traffic processing rule

Modifying a traffic processing rule

Deleting a traffic processing rule

Creating a copy of a traffic processing rule

Enabling and disabling a traffic processing rule

Working with traffic processing rule groups

Monitoring traffic processing rules

Page top