Blocking malicious content is a function of managing Internet Threat Protection (ITP) policies, which are designed to protect users and devices from untrusted internet resources. Administrators can create and manage ITP policies in the Command Center and assign them to users and devices via Roles, like other protected services in Cloud Secure Edge.
In addition to the procedure below, you can refer to the video that describes how to block malicious or inappropriate content.
To create and select ITP Policy
If SCIM (System for Cross-domain Identity Management) is enabled, assign the users to your ITP Policy.
If SCIM Is not enabled, admins should instruct end users to log into Cloud Secure Edge and register their devices. When done, the admin can assign the end users to the policy.
To validate that your Internet Threat Protection (ITP) Policy is active, navigate to Internet Access > Internet Threat Protection. Select your ITP policy from the list, under Policies. Verify that the status is green and reads Up to Date. Under the Reporting tab, select Generate to generate an ITP Report.