Due to additional security measures, we have implemented Multi-Factor Authentication (MFA) on this Support Portal. Please log in using your registered email ID or phone number. In case of any difficulty, kindly reach out to Seqrite Support by emailing us at "support@seqrite.com".

How-To Articles

How to configure web security policy in Seqrite cloud console: EPS Cloud (UEM)

16-06-2020 18:01:23

Overview:
This feature helps you create security policies for an endpoint or group where Browsing and Phishing Protection can be enabled. It blocks malicious and phishing Web sites. 

You can restrict or allow access to the internet and Web sites as per your requirement.

Applicable Versions:
Seqrite Endpoint Security Cloud 1.0 and above

Please follow the below steps:

1. Log on to the Seqrite Endpoint Security Cloud.

2. Open web security policy.

On the Policy page, you can see the list of settings with expand sign and toggle button. Expand and Enable settings that you want to configure.

● Browsing and Phishing
● Web Categories
● Block Specific Websites
● Schedule Internet Access
● Alerts and Reports

3. Browsing and Phishing.
Browsing Protection ensures that malicious Web sites are blocked while the users in a group are accessing the Internet. Once the feature is enabled, the site that is accessed is scanned and is blocked if found to be malicious.

Phishing is a fraudulent attempt, usually made through email, to steal your personal information. These emails usually appear to have been sent from seemingly well-known organizations and sites such as banks, companies and services seeking for your personal information such as credit card number, social security number, account number or password.

To exclude the site from browsing and phishing protection
1. In the Browsing and Phishing section, under Exclude URLs, type the URL and then click Add.
2. The Report Miscategorized URL dialog appears. You can report about miscategorization of the URL to the Seqrite lab if the URL is detected as malicious or phishing site.
3. Select one of the reasons from the following:
• URL is getting detected as Malicious
• URL is getting detected as Phishing
4. To report about miscategorization, click yes. If you do not want to report about miscategorization, click no.
5. The URL is added in the Exclude URL list.
6. Click on save policy to save settings.

4. Enable Display Alert Message to get an alert message when a blocked Web site is accessed
by a user.
Enable and expand Alerts and Reports to generate reports for all blocked Web sites.
If you select this option, a large number of reports will be generated depending upon the
Web usage.

5. Enable and Expand Web Categories. This restricts or allows access to the Web sites based
on their categories as per the security policy of your organization. If you block a category, all
the Web sites referring to the category will be blocked.
I. The Web categories are enabled, and you can allow or deny access to each category.
II. From Status column, select either Allow or Deny.
III. To exclude the website
IV. Type the URL and then click Add. The URL is added in the Exclude URL list.
V. To exclude the subdomains, in the column Exclude Subdomain, select option Yes or No

6. Enable and expand Block specified websites. You can enter the Web sites that you want to block.
I. Type a URL and then click Add.
II. If you want to block the subdomains, select the option Yes or No in Block Subdomains column.
III. For example, if you block www.google.com and enable ‘Block Subdomains', all its subdomains such as mail.google.com will also be blocked.
IV. You can delete the URL, if required.

7. Enable and expand Schedule Internet Access and do the following:
• Select one of the following options:

a) Always allow access to the internet

b) Allow access to the internet as per schedule
When you select the option, Allow access to the internet as per schedule, you can add the schedule time.
a) Click Add to add the schedule.
b) Add Time Interval dialog appears.
c) Select the Weekday from the list.
d) Select the Start at and End at hours.
e) Click OK.
You can delete the schedule entry if the entry is not required.

8.Importantly, if you have customized the settings and later you want to revert to the default settings, click the Reset Default button.

Please contact Seqrite Technical Support for more assistance.