Before configuring any connection policies, it is important to review the Bypass and Exclusion Controls and Bypass Domains, Host IPs or Subnets for SmartEdge Agent and Bypass Domains, Host IPs or Subnets for Cloud SWG.
This will walk you through setting up the agent or Cloud SWG to either proxy all traffic or just specific traffic. Customers who proxy all traffic might need to configure exceptions based on variables such as groups, device, host app, category, etc.
You can select one of the following options to filter the rules and make sure if the rules are configured correctly for Agent and Cloud SWG:
If no connection policy rules are configured, then the implicit policy automatically continues evaluation to the authentication and content policies.
You can configure a number of variables and apply an exception action to prevent Forcepoint ONE SSE from proxying traffic:
While Groups, Location, and Device are treated the same as any of our other policy setups, the other columns are unique to SWG Connection Policy.
Locally defined groups or security groups and OUs pulled from active directory. You can add as many groups as are needed for the policy. You can also negate the group so that policy line applies to everyone except the group you selected.
The Location column allows you to restrict or control where a user is accessing the cloud application from (either geographic location or IP).
To use a location based policy for managed applications, the location object must contain the IP address of the Cloud-SWG datacenter. When the device is in the office, since traffic is tunneled to the Cloud-SWG, the Reverse Proxy sees the Cloud-SWG IP address and uses it to match the location configured in the managed app policy. Additionally, the location object should also contain other remote office locations that are also permitted.
The Device column allows you to set contextual access controls based on the users device (OS/user agent, managed vs unmanaged, and so on).
The Traffic Type (Cloud SWG only) column allows you to select the traffic type so that policy can be applied to the group. You can select from the options in the drop-down or you can go to the page to create a custom traffic type.
The Domain Category column allows admins to provide controls over entire categories of applications. This allows you to configure if the end user connecting to specific category over the cloud proxy should be redirected to the domain's identity provider for authentication or not.
Refer to Webroot URL Categories.
Refer to ThreatSeeker URL Categories.
You can use the inbuilt URL Lookup page to know the ThreatSeeker URL Categories, Enterprise App Categories, Web Browsing Categories along with their respective reputation scores for the entered URL or IP. Refer to Understanding URL Lookup page to know in detail.
Webroot URL Categories
You can select Webroot URL category from the options in the dropdown or you can go to the Common Objects page and create your own.
Custom URL Categories: These can be defined on the page where you can create a custom domain category to use in policies (that is creating a allow list or a custom list of domains to block).
On clicking Save on the page, the save action will fail and will display an error message if the number of unique custom URLs is more than 3000 across all or any of the SWG policies.
When you click Save after adding more than 50 categories per a policy rule, then the Error saving, status: error - Please check the following policies with IDs xxxx to ensure the amount of URL Categories per policy are 50 or under. error is displayed. You can avoid this error by creating two or more policy rules within SWG policy, with each policy rule having a URL category limit set to 50 or fewer.
ThreatSeeker URL Categories
You can select ThreatSeeker URL category from the options in the drop-down or you can go to the Common Objects page and create your own.
You can select all the ThreatSeeker URL Categories by selecting the All option or select desired category or categories by selecting the Selected option.
When ThreatSeeker URL Categories feature is enabled and when you modify an existing policy containing Webroot URL categories, then the URL Categories dialog displays the selected Webroot URL categories in red chips under the Web Browsing Categories - Deprecated section.
You should replace the Webroot URL Categories with the equivalent ThreatSeeker URL Categories. To know the mapping of Webroot to ThreatSeeker URL categories, refer to Mapping between Webroot URL Categories and ThreatSeeker URL Categories.
To submit uncategorized or incorrectly categorized sites, refer to How to submit uncategorized or incorrectly categorized sites.
Custom Categories: These can be defined on the page where you can create a custom domain category to use in policies (that is creating a allow list or a custom list of domains to block).
On clicking Save on the page, the save action will fail and will display an error message if the number of unique custom URLs is more than 3000 across all or any of the SWG policies.
You can also filter categories by entering the text in the Search field.
When you select Custom categories, Enterprise Categories or ThreatSeeker URL Categories, the selected categories are displayed as chips under their own section on the right of the dialog.
When you click OK after adding more than 50 categories per a policy rule, then the Please limit your entry to 50 URL categories or fewer to proceed successfully. error is displayed. You can avoid this error by creating two or more policy rules within SWG policy, with each policy rule having a URL category limit set to 50 or fewer.
When ThreatSeeker URL Categories feature is enabled and when you save the existing policy containing Webroot URL categories after modifying the policy, then the Following categories cannot be saved and need to be replaced or removed: error will be displayed.
For example:
The Host App column allows you to select a preconfigured app that will be recognized in order for the policy to apply. You can create new Host App objects under .
The Host Network object allows you to specific DNS servers/ranges to identify in order to match devices coming from the corporate network to apply exclusions (users coming from a corporate secure location can have the proxy bypassed).
You will see two text boxes to fill out (DNS Server and DNS Suffix). The policy is an "And" of both boxes but both do not need to be filled out.
Once your column variables have been configured, you can now select the action to apply.
Your options are: