Add a list to a policy

Before you begin

If you plan to assign users and groups that can access blocked websites in a custom list, make sure you complete these configuration steps in the policy settings.
  1. Enable ETP Proxy
  2. Select Require or Optional as an Authentication Mode
  3. Associate an identity provider to the policy.

For more information, see Require authentication to access a website.

If you want to associate a custom, top-level domains list, exception, or file hash list to a policy, you must add the list to the policy.

You must be an ETP administrator to perform this task. If you are a delegated administrator or a tenant administrator, you can modify the policy you created or the policies that you are allowed to access.

How to

  1. In the navigation menu, select Configuration > Policies.
    Note: If you are trying the new Enterprise Center interface, in the navigation menu, select Policies > Policies.
  2. If you are modifying an existing policy, click the name of the policy that you want to edit.
  3. Click the Custom Lists tab.
  4. For a custom, top-level domains, exception list, or file hash list, click the chain icon.
  5. In the pop-up window, select one or more lists and click Associate.
  6. To define a policy action for all known threats in a custom list, select an action from the menu beside the Known option. Otherwise, expand the Known option. Complete these steps:
    1. In the Action menu, select an action.
    2. If you select the Block action, you can select a specific response to the user. In the Response to User menu, select a response.
    3. If Error Page is selected as a response to the user and you want to direct traffic to Security Connector, in the Security Connector menu, select a security connector.
  7. If you want to configure the same policy actions to suspected threats in a custom list, in the menu beside the Suspected option, select Same as Known. Otherwise, expand the Suspected option, and complete steps 6a to 6c.
  8. If you assigned the block action to a custom list and you want to configure specific users and groups that can access known or suspected threats in a list, complete these steps:
    1. In the Exceptions column for a list, click the link icon.
    2. In the Groups tab, select a group or groups.
    3. In the Users tab, search for the users and select a user or multiple users. If the user you searched for is not in the search results, you can click the add icon to add the user to the selected list.
    4. Click Associate.
  9. To define a policy action for all domains in a top-level domains list, select an action from the menu beside the All Domains option. Otherwise, expand the All Domains option. Complete steps 6a to 6c.
  10. Click Save.

Next steps

After you edit a policy, you must deploy the configuration changes to the ETP network. For instructions see Deploy configuration changes.