Content security policy

Overview

You define your content security policy from the Policy menu. The content security policy determines the content that is allowed to flow between websites and your organization, and it comprises a number of combined components. You create this policy by adding content rules and other policy references to Web Policy Routes. Web Policy Routes defines traffic between two points. The first point identifies entities within your organization by using policy references, such as User Name Lists and Machine Lists. The second point identifies groups of websites known as Internet Zones, which is another policy reference in Secure Web Gateway.

When data flows through the Gateway, it is checked against content rules that have been configured for the route the traffic is taking. When any of such content rules are triggered, a number of actions can be performed. For example, inappropriate or malicious content, such as sensitive information, hidden macros, scripts and document properties are removed, or modified by applying adaptive redaction and sanitization.

In addition to Web Policy Routes, you can configure Global Web Policy and HTTPS Policy.

 

Peer Gateways

When you peer Secure Web Gateway with other types of Gateways, you will see features in one that are only supported in the other. For more information, see Peer Gateways.

Content security policy FAQ

See also...