Create a policy

You configure a policy to define how your company handles known or suspected threats, as well as violations of an AUP. You can also enable additional features such as the ETP proxy. For more information, see the Enterprise Threat Protector online help.

How to

  1. In the navigation menu, select Configuration > Policies.
    Note: If you are trying the new Enterprise Center interface, in the navigation menu, select Policies > Policies.
  2. On the Policies page, click the plus sign icon.
  3. Enter a name and description for the policy.
  4. To configure a policy with settings from a predefined template, select one of these templates:
    • Strict. Contains settings that block known and most suspected threat categories. Select this template to apply settings that are a best practice for a policy.
    • Monitor-only. Logs and reports threats but it does not block them. This template is ideal for testing or assessing policy impact before using the Strict template. This template assigns the monitor policy action to all known and suspected threat categories.
    • Custom. Lets you define policy actions for known and suspected threats.
  5. Click Continue.
  6. To assign a location, in the Locations area, click the link icon and select a location or multiple locations.
  7. Click the Settings tab.
  8. In the Proxy Settings area:
    1. To enable ETP Proxy, toggle Enable Proxy to on.
    2. For the Proxy Logging Mode, make sure Level 1 is selected.
    3. Make sure Classify is selected in the Risky Domains menu.
    4. Make sure Classify is selected in the File Sharing menu.
    Note: If you are a tenant administrator, ETP Proxy is not available with your contract. To upgrade your contract, contact your Akamai representative.
  9. If you enabled the proxy and your organization is licensed for ETP Advanced Threat, in the Payload Analysis area, toggle Enable Inline Payload Analysis to on.
  10. To assign policy actions to threat categories:
    1. Click the Threat tab.
    2. Select an action for each threat category. You can select to use the same actions across all Known or Suspected threat categories.
    3. If you assigned the Block action, select a response to users. With the Error Page response, you can also assign a Security Connector.
  11. To enable alerts for a security category, toggle the Send Alert option until it’s enabled.
  12. To configure the acceptable use policy:
    1. In the Acceptable Use Policy tab, click the arrow icon to expand categories that contain subcategories.
    2. To block content in any of the provided categories or subcategories and issue a warning message to users who attempt to access this content, select or toggle the Block option to on.
    3. To allow content for any AUP category or subcategory, make sure that the Block option is disabled.
  13. Click Save.