This article explains how to set up and maintain policies for Mimecast Web Security, and is intended for use by Administrators.
Introduction to Mimecast Web Security Policies
-
-
- Define specific domains that should be blocked or allowed.
- Define the site categories that should be blocked from user access.
- Select whether a policy applies to everyone in your organization, or to a specific user or group.
- Select whether a policy applies to a specific location.
-
If you have previously configured a policy covering a target, creating another policy for the same target could render both policies ineffective. See Policy Precedence and Specificity for full details.
Policy Types
This article will guide you through the process of creating the following policy types:
-
-
- Advanced Security: Allows you to configure advanced options (e.g. SafeSearch, Web Proxies).
- Application Control: Allows you to control the use of cloud applications.
-
Block or Allow List: Allows you to specify whether to block or allow access to one or more domain / URLs. This policy type overrides all other web security policies.
A Block or Allow List policy takes precedence over any TTP managed URL. For example, if .com is in your managed URL list, but blocked in a policy, access to the domain is blocked. If your Block or Allow List contains URLs, you must have an Advanced Security policy with the Web Proxy option enabled for those targets.
- Category Filtering: Allows you to block domains / URLs based on their category (e.g. security, adult, etc.). You can block or allow all domains in a category group, or choose the block individual categories in a group.
- Log Settings: Allows you to comply with regional specific data and privacy regulations by managing what web security information is logged.
-
Targeted Threat Protection: Allows you to utilize the managed URLs and advanced similarity checks in the URL Protection product. This policy type is only visible if the URL Protection package is enabled for your account. See Configuring URL Protection for more information.
If your managed URLs list contains both URLs and domains and you wish to filter both, you must have an Advanced Security policy with the Web Proxy option enabled for those targets.
-
Reviewing your Default Category Policy
A default category policy is created on your account, but it should be reviewed to ensure it meets your requirements.
You can do this by using the following steps:
- Log into the Mimecast Administration Console.
- Navigate to Web Security | Policies.
- Click on the "..." icon to the right of the Default Category Policy.
- Select the Edit menu item.
- Review the following sections:
Click on each section in the left hand navigation panel to progress to each one.
-
-
- Security Categories: We recommend you block all Security Categories.
-
Content Categories: Click on the triangle to the left of a category to expand its contents.
Web-based email is blocked by default in the "Productivity" category. Uncheck this if your users are allowed access to web-based email.
- Applies To.
-
- Click on the Save & Close button.
Configuring a Block or Allow List Policy
To configure a Block or Allow List policy, you can block or allow access to:
-
-
- Individual domains / URLs by manually entering them.
- Multiple domains / URLs by importing a CSV file.
-
If your policy contains URLs, you must have an Advanced Security policy with the "Web Proxy" option enabled for those targets.
Manually creating a new Block or Allow List Policy
You can create a new policy, by using the following steps:
- Log on to the Mimecast Administration Console.
- Navigate to Web Security | Policies.
- Click on the Create New Policy button.
- In the Set the policy details screen, enter the required details for your policy:
-
-
- In the Name field, enter a name for your policy.
- Select the Type of Block or Allow List.
-
- Click on the Next button.
- In the Add blocked and allowed domains and URLs screen, add items as required:
-
-
- To Block a domain or URL:
- Select the Block radio button.
- Enter the domain or URL you wish to block, e.g. company.com.
- Click on the Block button.
- Repeat the process to add any further domains or URLs to be blocked.
- To Allow a domain or URL:
- Select the Allow radio button.
- Enter the domain or URL you wish to allow, e.g. company.com. See Block or Allow List Syntax and Examples for further details.
- Click on the Allow button.
- Repeat the process to add any further domains or URLs to be blocked.
- To Block a domain or URL:
-
- Click on the Next button.
- In the Select who this policy applies to screen, select who the policy applies to:
-
-
- Everyone: The policy applies to all users in your organization.
-
Locations, Groups and Users: Select specific Locations, Groups and users in your organization, to apply the policy to.
You can add multiple locations, users, and groups to a single policy.
-
Devices and Device Groups: Select specific Devices and Device Groups in your organization, to apply the policy to.
You can add multiple Devices or Device Groups. To enforce device-based policy over user-level policy, enable the Enforce Device Policy option.
-
- Click on the Next button.
- In the Review and create the policy screen, check that all details are correct. You can click on Previous to step back, review and amend, as required.
- Click on Create Policy.
Amending a Policy
You can amend the details or status of a policy, by using the following steps:
- Log on to the Mimecast Administration Console.
- Navigate to Web Security | Policies.
- There are several ways of selecting a policy for amendment:
-
-
- Click on it directly, to bring up the Policy Details slide-out, which allows you to:
- Edit the policy (follow sub-steps under b. below, to complete the editing process).
- Duplicate the policy, which allows you two create a copy of the policy, amend it, and Save & Close as required.
- Delete the policy (you'll be prompted, to confirm deletion).
- Toggle the status of the policy between Enabled and Disabled (you'll be prompted, to confirm this change the state).
- Click on the ellipsis "..." next to the policy, which allows you to:
- Edit the policy Name.
- Toggle the status of the policy between Enabled and Disabled (you'll be prompted, to confirm this change the state).
- Amend further policy details as required.
- Amend who the policy applies to.
- You can then Save & Close to save the changes.
Clicking on the ellipsis "..." next to a policy also gives you the options to Disable, Duplicate, or Delete it.
- Click on it directly, to bring up the Policy Details slide-out, which allows you to:
-
You can amend any policy type by following the above steps. Note that what can be amended will vary according to policy type, e.g. for Block or Allow List policies, you're able to:
-
-
- Add blocked and allowed domains and URLs
- Remove blocked and allowed domains and URLs, by clicking on the Delete icon next to them.
-
Blocking / Allowing Multiple Domains / URLs
You can block or allow access to multiple domains / URLs by downloading a file template, adding the required entries, and importing it:
A maximum of 5000 entries can be uploaded in the CSV file.
Create the new policy as per Manually creating a new Block or Allow List Policy, but with the following differences:
- In the Add blocked and allowed domains and URLs screen:
-
-
- Click on the upload a CSV File link.
- Click on the Download button. The CSV file is downloaded to your browser’s download location.
- Delete the first line of the template and enter:
- The Domains / URLs in column A. See Block or Allow List Syntax and Examples for further details.
- Allow or Block in column B
- Save the CSV file.
- Click on the Upload button.
- Click on the Import button.
-
Complete the creation process by selecting who it applies to, reviewing your details, then clicking on Create Policy.
Configuring Exceptions and Top Level Domains
You can allow or block top-level domains (TLDs) in a Block or Allow List policy. This offers you granular control, to allow or block a sub-domain under the same TLD. For example, you can block the TLD "cn" by adding it to the block list but allow the subdomain "thepaper.cn", and vice versa.
TLDs are accepted without punctuation (i.e. you don't need to include a period "." symbol before to the TLD.)
If there are applications that all users should have access to (e.g. Dropbox, Slack), we recommend adding the domains to your exceptions list, as this overrides all other policies. See the Managing Exceptions page.
Configuring an Application Control Policy
You can block access to web applications by configuring an Application Control policy.
Create the new Application Control policy as per Manually creating a new Block or Allow List Policy, but with the following differences:
- In the Set the policy details screen, select the Type of Application Control.
- Click on the Next button.
- Select the required Web Applications from the list:
-
-
- Click the Block button to block an application.
- Click the Clear Action button to remove the block or allow status for the application.
-
Use the Search field, to search for web applications.
To block access to all web based email applications, apart from one (e.g. Google Gmail):
- Filter the applications list using the Web-Based Email Application Category.
- Select all filtered applications except Google Gmail.
- Click the Block button.
Complete the creation process by selecting who it applies to, reviewing your details, then clicking on Create Policy.
Configuring a Category Filtering Policy
You can block domains / URLs based on their category (e.g. security, adult, etc.). You can then block or allow all domains in a category group, or choose to block individual categories in a group.
If a category isn't blocked, further block rules may still apply from other policies.
If you want to block access to all web based email applications, apart from one (e.g. Google Gmail) we recommend creating an Application Control policy.
Create the new Category Filtering policy as per Manually creating a new Block or Allow List Policy, but with the following differences:
- In the Set the policy details screen, select the Type of Category Filtering.
- Click on the Next button.
- In the Select categories to block screen, chose the required option:
-
-
- Select None to select no Security Categories.
- Select All to select all Security Categories..
- Select Custom, then select the required Security Categories values from the list supplied.
You can search for a category by entering text in the Search field. This finds a category matching the search string even if the category group is expanded. For example, a search for Pers whilst inside the Content Category group finds both the Dating & Personals and Personal Sites categories.
- Click on the Next button.
-
Select the Content Categories to block.
All category filters are displayed in groups of similar domain types. Each category group allows you to select one of the following options:
- None: Allows users to access all domains in a category group.
- All: Blocks users from access to all domains in a category group.
- Custom: Allows you to allow or block user access to individual categories in a category group. Selecting this option expands the category group, allowing you to select the categories to be blocked.
See Policy Categories for a full list of the categories and subcategories, complete with a description.
Complete the creation process by selecting who it applies to, reviewing your details, then clicking on Create Policy.
Configuring a Targeted Threat Protection Policy
You can utilize the managed URLs and advanced similarity checks in the URL Protection product in Mimecast Web Security by configuring a policy. This policy type is only visible if the URL Protection package is enabled for your account. If your managed URLs list contains URLs and domains and you wish to filter both, you must have an Advanced Security policy with the Web Proxy option enabled for those targets.
See the Configuring URL Protection Definitions and URL Protection Policy Configuration pages for more information on Managed URLs.
Create the new Targeted Threat Protection policy as per Manually creating a new Block or Allow List Policy, but with the following differences:
- In the Set the policy details screen, select the Type of Targeted Threat Protection.
- Click on the Next button.
- In the Managed URLs screen, enable this option, if required.
Click on the Managed URLs link to view your managed URLs and domains.
- Click on the Next button.
- In the Advanced Similarity Checks screen, enable this option if required, to detect the use of special characters that look like other characters in the domain. This checks DNS requests against Mimecast's managed domain lists and your custom-monitored internal and external domains.
- Click the Custom Monitored External Domains link to view your custom external domain list. For further information, see the Custom Monitored External Domains page.
- Select from one of the following Action options:
-
-
- Block: Blocks the user from accessing the link and displays a block page.
- Warn: Displays a warning page to the user, allowing them to access the link.
-
Complete the creation process by selecting who it applies to, reviewing your details, then clicking on Create Policy.
Configuring an Advanced Security Policy
Create the new Advanced Security policy as per Manually creating a new Block or Allow List Policy, but with the following differences:
- In the Set the policy details screen, select the Type of Advanced Security.
- Click on the Next button.
- In the Turn SafeSearch on by site screen, you can toggle the Google, Bing and YouTube fields, to enabled or disabled.
When SafeSearch is enabled, it helps block explicit images, videos, and websites from search results. While SafeSearch isn't 100% accurate, it can help your organization avoid explicit and inappropriate search results on user's phones, tablets, and computers.
- Click on the Next button.
- In the Newly Observed Domains screen, you can toggle the Block newly observed domains, which have a higher risk of malicious content. field to to enabled or disabled. This blocks newly observed domains that might be malicious.
- Click on the Next button.
- In the Configure Web Proxy screen, you can toggle the Web Proxy field to enabled or disabled. Proxying suspicious sites allows SSL inspection, URL categorization, and antivirus scanning.
-
-
- If Web Proxy is enabled, you can then toggle the Antivirus Scanning field to enable or disable anti-virus scanning. If enabled, proxied traffic is scanned for malware.
- If Antivirus Scanning is also enabled, you can then:
- Toggle the Browser Isolation field to enabled or disabled. This opens suspicious sites in an isolated environment. By configuring a Browser Isolation policy, you can control what end users can do in it. See Configuring Browser Isolation Policies for full details.
This option is only available if your Mimecast account has the Browser Isolation add on enabled on it. You can configure how your users interact with these sites in Services | Browser Isolation.
- Use the Unscannable Content field, to select to Block or Allow files which cannot be scanned due to encryption or corruption.
- Use the Proxy Extensions section, to:
- Select None.
- Select All.
- Select Custom values from the list supplied (Dropbox, Facebook, LinkedIn, Twitter, Yahoo! Mail, Egnyte, GMail and GDrive, ShareFile and We Transfer). See Supported Web Proxy Services and Support Modes for full details.
Complete the creation process by selecting who it applies to, reviewing your details, then clicking on Create Policy.
When any of these services are selected, we'll proxy any domains known to Mimecast that are associated with them.
- Toggle the Browser Isolation field to enabled or disabled. This opens suspicious sites in an isolated environment. By configuring a Browser Isolation policy, you can control what end users can do in it. See Configuring Browser Isolation Policies for full details.
-
Supported Web Proxy Services and Support Modes
This section describes the supported modes for the extended web proxy functionality:
| Application | Web Application | Windows Desktop App | Mac Desktop App | iOS Mobile App | iOS Browser |
|---|---|---|---|---|---|
| Dropbox | ✓ | ✕ | ✕ | ✕ | ✓ |
| ✓ | ✕ | ✕ | ✕ | ✓ | |
| ShareFile | ✓ | ✕ | ✕ | ✕ | ✓ |
| YahooMail | ✓ | ✕ | ✕ | ✕ | ✓ |
| ✓ | ✕ | ✕ | ✕ | ✓ | |
| ✓ | ✕ | ✕ | ✕ | ✓ | |
| GMail | ✓ | ✕ | ✕ | ✕ | ✓ |
| GoogleDrive | ✓ | ✕ | ✕ | ✕ | ✓ |
| WeTransfer | ✓ | ✕ | ✕ | ✕ | ✓ |
| Egnyte | ✓ | ✕ | ✕ | ✕ | ✓ |
Dropbox URL are not supported, e.g. dropbox.com/url.
Requests from mobile applications are exempted from extended proxy, but requests from mobile browsers are proxied. See Mimecast Security Agent for iOS.
Configuring a Log Settings Policy
Configuring a Log Settings policy allows you to comply with regional specific data and privacy regulations, by managing what web security information is logged.
Create the new Log Settings policy as per Manually creating a new Block or Allow List Policy, but with the following differences:
- In the Set the policy details screen, select the Type of Log Settings.
- Click on the Next button.
- In the Select your log settings screen, select one of the following options:
-
-
- Log All Activity: All user activities are logged. This is the default setting if there is no Log Settings policy.
- Log No Activity: No user activity is logged.
- Log Security Events Only: Only attempts to visit infected sites are logged. Activity and security logs display all security events.
-
Complete the creation process by selecting who it applies to, reviewing your details, then clicking on Create Policy.
Block Page Settings
You can customize a Block Page for when your end users contact their administrators regarding blocked access.
They will see the reason for the block, followed by helpful security tips and engaging, memorable visuals.
You can specify the informational tips displayed to the end user based on the type of the block.
You can customize Block Page Settings, by using the following steps:
- Log on to the Mimecast Administration Console.
- Navigate to Web Security | Policies.
- Click on the Block Page Settings button.
- In the Block Page Settings screen, you can:
-
-
- Toggle the state of the Customize button:
- If Disabled, Mimecast default settings are applied to block pages.
- If Enabled, this allows you to enter your required custom Title and Footer text.
- Enabling this option makes the Web Security Tips button appear.
- Toggle the state of the Web Security Tips button:
- If Disabled, Mimecast default tips are applied to block pages.
- If Enabled, this allows you to enter your required custom Footer text.
- Enabling this option hides the Title field.
- Toggle the state of the Customize button:
-
- Click on Save and Close.
The Footer field allows you to enter up to 1000 characters of text (e.g. email addresses, domain name, IT Support telephone numbers).
Email addresses and domain names (e.g., a link to your corporate acceptable use policy) automatically render a link.
To further customize this page, you can incorporate your company branding. For instance, you can include your company logo, company colors, and a disclaimer. For further assistance on branding, see the Stationery Branding page.
Mimecast diagnostics and domain/URLs cannot be customized, as diagnostic information will differ based on the reason for the block.
Further Information About Using Policies
This section gives more information, including some example policies and how multiple policies interact with each other.
Block or Allow List Policy Syntax and Examples
When using Block or Allow List policies, a URL takes precedence over a domain as it is more specific.
If your Block or Allow List contains URLs, you must have an Advanced Security policy with the Web Proxy option enabled for those targets.
Domain / URL Syntax
When you're adding a domain / URL to a Block or Allow List policy, consider the following syntax rules:
| Rule | Entered Domain / URL | Accepted Domain / URL |
|---|---|---|
| Wildcard characters are not accepted and are treated as normal alphanumeric characters. | http://www.domain.co* | The domain is not accepted and must be corrected.
The * character is not accepted as part of a domain. It is accepted as part of a URL, but not as a wildcard character. |
| "http://"", "https://"", and FTP prefixes are stripped from the URL. | http://www.domain.com | www.domain.com |
| https://www.domain.com/ | www.domain.com | |
| https://subdomain.domain.com | subdomain.domain.com | |
| Ports are stripped from the URL. | http://subdomain.domain.user:8080/path/ | subdomain.domain.user/path |
| Fragments are stripped from the URL. | www.domain.com/#anchor | www.domain.com |
| https://example.com/index.html#foo | example.com/index.html | |
| Query parameters are accepted. | http://subdomain.com/abccd?z=1&text=yes | subdomain.com/abccd?z=1&text=yes |
Domain / URL Examples
The following examples outline the domains / URLs that will be blocked or allowed if the Block or Allow List policy is set to the specified value.
URL Paths
URL used: http://domain.com/abc/
| URL | Allowed / Blocked | Comments |
|---|---|---|
| http://domain.com/abc | Yes | This is an exact match. |
| http://domain.com/abc/text | Yes | Sub-paths are covered by a higher level path. |
| https://domain.com/abc | Yes | This is an exact match as the scheme is ignored. |
| http://domain.com/abc?q=searchtext | Yes | Any parameters specified are covered by a higher level path. |
| http://domain.com/abc&key=value | Yes | |
| http://domain.com/abc?q=searchtext | Yes | |
| http://www.domain.com/abc/ | Yes | A wildcard is implicit for a sub-domain. |
| http://otherdomain.com/abc/ | No | The top level domain is different. |
| https://domain.com/ABC/text | No | The path is case sensitive. |
| http://domain.com | No | The path is shorter / longer than the specified URL. |
| http://domain.com/ab | No | |
| http://domain.com/abcdef | No |
Query Parameters
URL used: https://domain.com/abccd?z=1&text=yes
| URL | Allowed / Blocked | Comments |
|---|---|---|
| http://domain.com/abc-cd?z=1&text=yes | Yes | This is an exact match. |
| http://domain.com/abc-cd?text=yes&z=1 | Yes | The parameter order is ignored. |
| http://domain.com/abc-cd?text=YES&z=1 | No | Parameters are case sensitive. |
| https://domain.com/abc-cd?z=1&text=yes&id=1234 | Yes | Additional query parameters are ignored. |
| http://domain.com/abc? | No | The path is shorter / longer than the specified URL. |
Managing Domains
This section lists additional domains of well-known applications that you can Allow or Block. Use the table below to add domains to your:
-
-
- Allow or block a list in a domain filtering policy. This provides more granular control over the sites users or groups can access. See Amending a Policy.
- Exceptions List. This applies to everyone in the organization and overrides any existing policies. See Managing Exceptions.
-
| Service | Domain |
|---|---|
| Adobe |
Refer to the Adobe Creative Cloud Network Endpoints page on the Adobe support site for an updated list of network endpoints. Alternatively:
|
| Atlassian Services | atlassian.com, atlassian.io, atlassian.net, atl-paas.net, bitbucket.org, braintreegateway.com, cdnjs.cloudflare.com, hipchat.com, jira.com trello-attachments.s3.amazonaws.com, trello-avatars.s3.amazonaws.com, trello-backgrounds.s3.amazonaws.com, trello.com, trello-emoji.s3.amazonaws.com, trello-logos.s3.amazonaws.com, trello.services, trellostatus.com, trello-stickers.s3.amazonaws.com |
| facebook.com, fbcdn.net, fbsbx.com | |
| Google Drive | Refer to the Drive Firewall and Proxy Settings page of the Google Google Workspace administrator's help. |
| Hulu Streaming Service | www.hulu.com, a248.e.akamai.net, a.huluad.com, assets.hulu.com, assets.huluim.com, assetshuluimcom-a.akamaihd.net, bartender2.hulu.com, fa.hulu.com, huluqa.com, ib1.huluim.com, ib2.huluim.com, ib3.huluim.com, ib4.huluim.com, ib.hulu.com, ib.huluim.com, ibhuluimcom-a.akamaihd.net, mozart.hulu.com, p.hulu.com, player.huluqa.com, play.hulu.com pt.hulu.com, secure.hulu.com, secure.huluim.com, secure.huluqa.com, s.hulu.com, s.huluqa.comassets.huluqa.com, smoke.hulu.com, ss-e-darwin.hulu.com, static.huluim.com, t2.hulu.com, t2.huluqa.com, t2.qa.hulu.com, tempo-fallback.hulu.com, tempo-fallback.huluqa.com, tempo.hulu.com, tempo.huluqa.commozart.huluqa.com, t.hulu.com, urlcheck.hulu.com, vortex.hulu.com, www.huluqa.com |
| cdninstagram.com, instagram.com | |
| iTunes | albert.apple.com, appstore.com, ax.init.itunes.apple.com, ax.itunes.apple.com, gs.apple.com, itunes.apple.com, mzstatic.com, phobos.apple.com, s.mzstatic.com |
| linkedin.com, edge.quantserve.com, secure-us.imrworldwide.com, b.scorecardresearch.com, pixel.quantserve.com, licdn.com | |
| MalwareBytes AntiVirus | cdn.mwbsys.com |
| McAfee AV Updates | download.nai.com, ftp.nai.com, update.nai.com |
| OneDrive for Business |
Refer to the Microsoft 365 URLs and IP Address Ranges (One Drive for Business) or Required URLs and Ports for OneDrive (OneDrive for Personal) page on the Microsoft Microsoft 365 support site for an updated network endpoints list. Alternatively:
|
| OneDrive for Personal | |
| Netflix | btstatic.com, netflix.com, nflxext.com, nflximg.com, nflximg.net, nflxso.net, nflxvideo.net |
| Slack | slack.com, slack-core.com, slack-edge.com, slack-files.com, slack-imgs.com, slack-msgs.com, slack-redir.net |
| Sophos AV Updates | d1.sophosupd.com, d1.sophosupd.net, d2.sophosupd.com, d2.sophosupd.net, d3.sophosupd.com, d3.sophosupd.net, dci.sophosupd.com, dci.sophosupd.net |
| Spotify | apresolve.spotify.com, ap.spotify.com, cdn.betrad.com, d2c87l0yth4zbw.cloudfront.net, embed.spotify.com, gslb.spotify.com l.betrad.com, play.spotify.com, play.spotify.edgekey.net, spapps.co, spapps.spotify.edgekey.net |
| Symantec AV Updates | liveupdate.symantec.com, liveupdate.symantecliveupdate.com, update.symantec.com |
| Telegram | telegram.me, telegram.org, t.me |
| api.twitter.com, dev.twitter.com, pic.twitter.com, platform.twitter.com, search.twitter.com, wimg0-a.akamaihd.net, twimg.com, upload.twitter.com, userstream.twitter.com | |
| whatsapp.com, whatsapp.net | |
| Zoom | zoom.us |
Policy Precedence and Specificity
As you create your Mimecast Web Security policies, it is important to understand how their settings affect your desired result. Failure to do so could render them ineffective (e.g. if you've previously configured two policies for the same target).
Policy Precedence
When a user attempts to access a domain or URL, the Web Security policies are applied in the following order:
- Block/Allow: A check is made to see if the domain / URL is explicitly blocked or allowed as part of a Block or Allow List policy, and the appropriate action is applied.
- Managed URLs: If there is no Block or Allow List policy with the explicit domain / URL, a check is made for a Targeted Threat Protection policy with:
-
-
- The Managed URLs option is enabled.
- Where the domain/URL is defined as a managed URL in Targeted Threat Protection - URL Protect
-
- Newly Observed Domain: If there is no Targeted Threat Protection policy with the “Managed URL” option enabled, a check is made for an Advanced Security policy with:
-
-
- The Newly Observed Domains Block option is enabled.
- Where the domain / URL is exhibiting behavior associated with malicious activity (e.g. command and control)
-
- Application Control Policy: A check is made to verify if the domain accessed is associated with any of the applications currently being blocked using the App Control Policy and appropriate action is applied.
- Category Filtering: If there is no Application Control policy with blocked applications, a check is made to see if the domain / URL is part of a Category Filtering policy. If it is, access is blocked.
- Similarity Check: If there is no category filtering policy, a check is made for a Targeted Threat Protection policy with:
-
-
- The Advanced Similarity Checks option is enabled.
- Where the domain / URL employs some homoglyph or homograph impersonation.
-
- Anti-Virus: Finally if a domain / URL doesn't trigger any other web security policy, anti-virus checks are made to ensure the link isn't suspicious or contains malicious content.
Policy Specificity
The more specific a policy, the higher its priority. For example, policy that targets:
- User takes precedence over those that target a Group of users.
- Group take precedence over those that target a Location.
- Location takes precedence over those that target Everyone.
If you have multiple Mimecast Web Security policies of the same type (e.g. Category Filtering), they are applied to web requests based on their specificity. You must avoid configuring two policies of the same type with the same specificity, as this can cause issues with which policy is applied. Take the following example:
The above shows Category Filtering policies, set to apply to "Everyone". Even if the policies are configured to allow or block different categories, the order in which they are applied is not absolute. As a result, one policy may be applied before the other and vice versa.
In the example below, one of the two policies has been changed to apply only to a group of users (IT Team). With this configuration, there can be no confusion as to which policy is applied first.
Policy Categories
This section lists the categories used by a category filtering policy.
Security Category Group
| Category | Description |
|---|---|
| Anonymizers | Sites that attempt to make activity untraceable (e.g. proxy servers that act as an intermediary and privacy shield between a client computer and the internet). Example: https://2ip.io/anonim/ |
| Attacker Controlled Infrastructure | Sites that prevent communication with malicious networks (botnet infrastructure) and block communication between botnet controllers and any bots on your network. |
| Botnets | Sites that are landing pages for botnets or are infected by botnets. |
| Compromised | Sites that are infected with viruses or distribute viruses. |
| Hacking | Sites with resources for the illegal or questionable use of computer hardware/software. Sites that describe how to gain unauthorized access to systems and distribute copyrighted material that has been cracked to bypass licensing. Example: http://mirror-h.org |
| Malware | Sites that may contain malware or promote the distribution of malware. A virus may infect these sites. |
| Phishing & Fraud | Sites used in phishing attacks. |
| Potentially Malicious | Sites that attempt to install malware onto a device. |
| Spam Sites | Sites that typically are contained in spam messages and are associated with mischievous or unsolicited efforts. |
Adult Category Group
| Category | Description |
|---|---|
| Alcohol & Tobacco | Sites that are manufacturers/distributors of tobacco products or that promote their use. Also, sites that are restaurants/bars that primarily serve alcoholic drinks or that promote the use of alcohol. Examples: http://rooseveltdenver.com or http://marlboro.com |
| Hate & Intolerance | Sites promoting aggressive, degrading, or abusive opinions about any section of the population that could be identified by race, religion, gender, age, nationality, physical disability, economic situation, sexual preferences, or any other lifestyle choice. Example: http://kkk.com |
| Nudity | Sites that provide full frontal and semi-nude images/videos (typically in artistic form) that might allow the download or sale of such materials. Example: http:// www.roystuart.net |
| Pornography / Sexually Explicit | Sites containing sexually explicit content in an image-based or textual form. Any other form of adult / sexually oriented material is also listed here. Example: http://xhamster.com |
| Sex Education | Sites that discuss sex and sexuality in an informative and non-voyeuristic way. Topics include education about human reproduction and contraception, advice on preventing infection from sexual diseases such as HIV, and advice to the LGBT communities on sexual health matters. Example: http://tradesexualhealth.com |
| Tasteless | Sites that aren't pornographic or violent but are oriented towards content unsuitable for children or that an employer would be uncomfortable with their staff accessing. Example: http://specialfriedrice.net |
| Violence | Sites that display or promote content related to violence against humans or animals, as well as those that advocate any means of harming oneself, such as self-mutilation or euthanasia. Example: http://peacefulpillhandbook.com |
| Weapons | Sites that sell weapons/ammunition or advocate the use of weapons. Sites of weapons manufacturers. Example: http://smith-wesson.com |
Bandwidth Intensive Category Group
| Category | Description |
|---|---|
| Advertisements & Pop-Ups | Sites that advertise. Example: http://pubmatic.com |
| Download Sites | Sites whose primary function is to allow users to download media content, except computer programs and mobile apps. This includes computer wallpaper, icons, fonts, etc. Example: http://zedge.net/wallpapers/ |
| Image Sharing | Sites that facilitate the sharing of or searching for photos. This can include social aspects of clubs or other organizations to share information (e.g. schedules and forums). This category can also include image-hosting sites. Example: http://flickr.com |
| Peer-to-Peer | Sites that facilitate file sharing using P2P software. This includes but is not restricted to, sites that host P2P software or allow users to search for files that can be downloaded using P2P software. Example: http://utorrent.com |
| Streaming Media & Downloads | Sites whose primary function is to allow users to watch streaming media. Example: http://youtube.com |
| Content Delivery Networks | Sites including CDN (Content Delivery Networks) or hosts/servers that provide back-end services or functions for sites that make the internet or network function (e.g. DNS, gateways, APIs). Example: http://cloudflare.com |
| File Sharing | Sites that facilitate file sharing using P2P software. This includes but is not restricted to, sites that host P2P software or allow users to search for files that can be downloaded using P2P software. Example: http://utorrent.com |
Legal Risk Category Group
| Category | Description |
|---|---|
| Illegal | Sites containing instructions, recipes, or advice on creating illegal items (e.g. explosives) or selling them. Sites that instruct, advise about or promote illegal acts. Example: http://fakepassport.info |
| Illegal Drug | Sites that sell illegal/controlled substances promote substance abuse or sell related paraphernalia. Example: http://www.drug-testing-detox.com |
Business Category Group
| Category | Description |
|---|---|
| Business | Sites of businesses and commercial organizations don't fit into any other category. This includes groups that represent, report, or provide commentary specifically targeting business and commercial. Example: http://accenture.com |
| Computers & Technology | Sites related to computer hardware and software. This category includes sales, news and current industry trends, and professional bodies. Example: http://microsoft.com |
| Finance | Sites covering aspects of personal/corporate finance provide price comparisons between financial products or report or comment on financial matters. Example: http://bankofamerica.com |
| Hosting | Sites that provide hosting services for websites. Example: http://hostgator.com |
| Reference | Sites that provide online encyclopedias, dictionaries, thesauruses, atlases, and other information resources. Example: http://wikipedia.org |
| Cryptocurrency | Sites that enable, distribute, trade, mine, or promote cryptocurrencies. Example: https://www.bitcoin.com |
| Search Engine & Portals | Sites that are search engine caches. Example: http://webcache.googleusercontent.com |
Social Media Category Group
| Category | Description |
|---|---|
| Chat | Sites that are web-based chat rooms. Example: http://lingr.com |
| Dating & Personals | Sites that contain matchmaking/personal listings or discuss romance and interpersonal relationships, whether partnership is the resultant goal. Example: http://match.com |
| Instant Messaging | Sites that offer services for downloading instant message software and other related information, as well as client-based instant messaging. Example: http://aim.com |
| Personal Sites | Sites that host personal pages (e.g. blogs) created by an individual to contain content of a personal nature rather than a company, organization, or institution. Example: http://www.blogger.com |
| Social Networking | Social networking sites (SNS) focus on personal and professional services unless defined in another category. Example: http://www.swarmapp.com |
Productivity Category Group
| Category | Description |
|---|---|
| CAdvice | Sites that offer advice and training make employees more productive. This includes time management, distraction elimination, mailbox management, etc. Example: https://www.kanbanchi.com/ |
| Arts | Sites that promote or provide information about the arts. These can include art galleries, art instruction, art information, theater, symphonies, orchestras, operas, etc. Example: http://aspenartmuseum.org |
| Auctions | Sites that offer online auction sites or services to aid buying or selling via online auctions/auction sniping. This category includes traditional auction companies and/or sites promoting traditional auctions. Example: http://webidz.com |
| Restaurants & Dining | Sites relating to restaurants (eat-in and takeaway) and pubs/bars. Recipes, cuisine, farms, and other food-related sites are also listed in this category. Example: http://goodfoodgourmet.com |
| Education | Sites for colleges, universities, primary/secondary schools, online educational resources (e.g., exam syllabuses, example questions), and support organizations (e.g., admissions bodies, research councils). Example: http://newlosangeles.org |
| Entertainment | Sites providing information about entertainers and famous people. Example: http://celebritynetworth.com |
| Fashion & Beauty | Sites related to the fashion and beauty industry, including pages with models, clothing, and the discussion of current fashion trends. Example: http:// fashionspot.com |
| Forums & Newsgroups | Sites offering access to Usenet newsgroups or similar services or any other discussion forum that doesn't sit well in another category. Example: http://4chan.org |
| Gambling | Sites offering online / offline gambling or that promote gambling skills and practice. Example: http://irpoker.com |
| Games | Sites relating to video, computer, online games, or support gaming through hosting online services, cheat information, general advice, etc. Example: http://piratesarena.net |
| Government | Sites of all central/local government websites, as well as related bodies and agencies. Example: http://gov.ph |
| Health & Medicine | Sites offering over-the-counter/prescription drugs, common medicines, natural products, and prescription medications. Example: http://rxlist.com |
| Job Search | Sites that are employment agencies, recruitment consultancies, headhunters, contractors, or agencies assisting anyone seeking employment. This includes those that allow job vacancies to be posted, offer career advice, describe how to get through interviews or prepare a resume. It also includes human resource services, outsourcing, training, and technology related to human resources. Example: http://indeed.com |
| Kids Sites | Sites that are safe for or are of interest to children (e.g. games, educational portals, and multimedia sites). Example: http://pbskids.org |
| Law | Sites for law firms, attorneys, legal resources, materials, and news. This category does not include government websites or legal information that governments provide. Example: http://law.com |
| Leisure & Recreation | Sites covering all activities or interests, other than sport, that someone might pursue for their pleasure and not as a primary occupation. This includes clubs and groups that pursue or meet specific interests. Example: http://knittinghelp.com |
| Marijuana | Sites offering information, discussion, and/or resale of marijuana and associated products and/or services. Example: http://www.marijuana.com |
| Military | Sites belonging to official military organizations or containing information relevant to their activities. Example: http://sealswcc.com |
| News | Sites that report/deliver news of interest to the public (e.g. online news sites, printed / online newspapers, current affairs sites not exclusively focused on entertainer news/gossip). Example: http://bbc.com Sites focused on specific industry news (e.g. finance, travel, health, etc.) are listed in those specific categories. Sites providing news, information, and/or gossip about celebrities and entertainers are listed in the Entertainment category). |
| Non-profits & NGOs | Sites that are, or provide services for, charities, non-profit organizations, foundations, trusts, fundraising events for nonprofit and philanthropic organizations, and seeking donations. Example: http://madd.org |
| Politics | Sites that provide political information. Example: http://politifact.com |
| Real Estate | Sites oriented to the selling, letting, and building of private/commercial property. Example: http://rent.com |
| Religion | Sites that relate to religion, except for the traditional religions. Example: http://religioustolerance.org |
| Shopping | Sites that allow the purchase of various products. Example: http://amazon.com |
| Sports | Sites for professional sports or sports, whether media-related or fan-related, except those related to gambling. Example: http://espn.com |
| Transportation | Sites providing public transit services and/or information about those services. Example: http://rtddenver.com |
| Travel | Sites related to travel agents, travel advice, timetable information, or car hire. Example: http://tripadvisor.com |
| Web Based Email | Sites offering web-based email services. Example: http://gmail.com |
Other Category Group
| Category | Description |
|---|---|
| Cults | Sites are used by groups with the same religious beliefs or ideas that others view as strange or disturbing. Example: http://www.heavensgate.com |
| General | Sites containing information provided by webmasters to promote their opinions on a subject or topic. |
| Parked Domains | Placeholders for sites that have not been created yet or parked domains. |
| Translators | Sites that translate a web page from one language to another or transform the text in a web page. Example: http://translate.google.com |
| Unknown | Sites that are not known to fall into any other category. |
Device Groups
You can create and manage Device Groups, that can be used as targets in all Mimecast Web Security policies.
For more information about Protected Devices, see Protected Devices.
Creating a Device Group
You can create a Device Group, by using the following steps:
- Log on to the Mimecast Administration Console.
- Navigate to Web Security | Protected Devices.
- Click on the Device Group tab.
- Click on the Create Group button.
- Complete the Details as follows:
| Field / Option | Description |
|---|---|
| Name | Enter a name for the group. |
| Description | Enter an optional description. |
- Click on the Next button.
- Select the required Device from the list.
You can search for a device by entering text in the Search field.
- Click on the Next button.
- To ensure all details are correct, review the Summary displayed.
- Click on the Create Group button.
- The new group is displayed
Managing Device Groups
You can manage your groups from the Device Group tab under Protected Devices.
You can edit a Device Group, by using the following steps:
- Log on to the Mimecast Administration Console.
- Navigate to Web Security | Protected Devices.
- Click on "..." / More next to the Device Group that requires editing.
- Select Edit.
- Update the Device Group as required.
- Click on the Save and Close button.
You can delete a Device Group, by using the following steps:
- Log on to the Mimecast Administration Console.
- Navigate to Web Security | Protected Devices.
- Click on "..." / More next to the Device Group to be deleted.
- Select Delete.
- A confirmation box appears.
- Click on the Delete button.
Only empty Device Groups and those not associated with a policy can be deleted.
Comments
Please sign in to leave a comment.