Cloud Secure Edge Getting Started Guide

Blocking Malicious Content

Blocking malicious content is a function of managing Internet Threat Protection (ITP) policies, which are designed to protect users and devices from untrusted internet resources. Administrators can create and manage ITP policies in the Command Center and assign them to users and devices via Roles, like other protected services in Cloud Secure Edge.

In addition to the procedure below, you can refer to the video that describes how to block malicious or inappropriate content.

To create and select ITP Policy

  1. Navigate to the document Managing Internet Threat Protection Policies.
  2. Scroll down to Step1: Create an ITP Policy and follow the directions for creating the ITP Policy.
  3. If SCIM (System for Cross-domain Identity Management) is enabled, assign the users to your ITP Policy.

    If SCIM Is not enabled, admins should instruct end users to log into Cloud Secure Edge and register their devices. When done, the admin can assign the end users to the policy.

  4. Scroll down to Exclude Users from ITP Policies in Managing Internet Threat Protection Policies and follow the steps provided.

To validate that your Internet Threat Protection (ITP) Policy is active, navigate to Internet Access > Internet Threat Protection. Select your ITP policy from the list, under Policies. Verify that the status is green and reads Up to Date. Under the Reporting tab, select Generate to generate an ITP Report.