Policies govern the connections that are attempted from users to applications. A policy prevents unauthorized users from accessing any applications. It also grants access to authorized users to access specific applications as required.
On this page, you can create policies for users and applications and publish them. If the policies are pushed to the gateway and successfully applied, the status is updated as published.
At the top of the page, few widgets display the count for All, Published, Draft, Publish Failed and Observe Policies.
Policy States
Policy State | Description |
---|---|
Published | A policy that is successfully configured and allows a user to access applications accordingly is a Published Policy. |
Draft | Administrator can create some policies that may not be implemented immediately or may be needed later. Such policies are saved as Draft Policies. |
Publish failed | If a policy fails to be applied to a site, it is a Publish Failed policy. |
Observe
An administrator may want to monitor certain connection attempts. So, Administrator can create a policy with Observe mode on. This type of policy is an Observe policy.
Connections attempted under such policy will be allowed but will be represented with a different color on the Visibility page.
Further, the following details of all the existing policies are listed.
Column Name | Description |
---|---|
IDENTIFIER | Suitable identifier for the policy. |
NAME | Name of the policy. |
STATUS | Current status of the policy. |
OBSERVE | Denotes whether the connections allowed under the policy will be observed or not. |
STATE | Current state of the policy. |
LAST UPDATED ON | The date and time on which the policy was last updated. |
Add Filter | To add a filter. To know more, refer the Adding a filter to refine the view section on Visibility page. |
Refresh | Click the icon on the upper right corner to refresh the page. |
Add Policy | Click the Add Policy icon in the upper right corner to add a policy. |
The policies can be sorted by name when you click the sorting symbol next to the NAME column.
Actions available with policies
When you hover over each policy, the following options appear on the right side next to the Last Updated On column.
Action Icon | Action Label | Description |
---|---|---|
![]() |
Edit | To edit the details of the policy. |
![]() |
Delete | To delete the policy. |
Click a policy to view policy details in the right pane.
Fields | Description |
---|---|
Identifier | Policy Identifier. |
Name | Policy Name. |
Status | Current status of the policy. |
Observe | Whether connection is being observed or not. |
State | Current state of the policy. |
Last Updated On | The date and time on which the policy was last updated on. |
Last Updated by | The administrator who last updated the policy. |
Description | Policy description. |
User Tags | The tags applied on users according to which connection is allowed. |
Application Tags | The tags applied on applications/ services according to which connection is allowed. |
Enable/ Disable | To enable or disable the policy. |
Observe | To mark the connections allowed under the selected policy as ‘observed’ connection type. |
Adding a policy
To add a new policy, follow these steps.
- Log on to Seqrite HawkkProtect portal. Navigate to Policy Management in the left pane.
- Click the Add Policy button. A new page appears.
Enter the following information on this page.- Policy Information
- Allow Rule
Enter the following information.
Policy Information
In this section, enter the following information.
- Enter the identifier for the policy.
- Enter the policy name.
- Select On or OFF under Observe.
This indicates whether the connections allowed under this policy are being observed. -
Enter the detailed description of the policy.
Allow Rule
In this section, enter the following information.
- Enter the user tags.
These are the tags applied on user from where the connection is established.
- Enter the application Tags.
These are the tags applied on applications where the connection is received.
- Enter the user exception tags.
Based on connection requirement, these tags will exclude users to whom available source tags are applicable.
- After entering this information, you can click Save as Draft or Add policy as required.