Lookout Product Documentation

Find answers about using and optimizing Lookout products.

TLS Policies

TLS policies enable you to apply the Transport Layer Security (TLS) protocol to unsanctioned cloud applications, websites, or categories of applications and sites.

TLS policies also are applied to managed applications if they are matched with the selected category or website.

  1. Select Protect > Access Control Policy and click the TLS tab.
  2. Click New.
  3. Enter a Policy Name (required) and a Description (optional).
    Click Next.
  4. From the left menu, select one or more categories, cloud applications, or websites from the following lists.
    Click the > icon to expand each list.
    • Under Unsanctioned Clouds: Category or Any Cloud
    • Under Websites: Category or Any Website.

  5. Under Context Rules, select a context type and context.

  6. (Optional) Select any context type exceptions.
  7. Click Next.
  8. Select Session Action options:
    • Allow & Proxy - Access is allowed, and the TLS protocol is applied for the applications, sites, or categories included in the policy.
    • Deny - Access is denied for the applications, sites, or categories included in the policy.
    • TLS Bypass - Access is allowed. The policy will direct the Lookout proxy to bypass TLS interception and not decrypt content in the applications or sites, or categories of applications and sites being accessed. The certificate for a site will not be the Lookout proxy certificate.
  9. For a Deny action, select a Secondary Action:
    • Remediation - From the prompt, select a remediation template, which provides instructions for remediation steps needed.

    • Notification -- Check one or more notifications to include.

      For Allow & Proxy or TLS Bypass actions, no secondary action is offered.

  10. Click Next to review the policy settings on the Summary page.
    If you need to change anything, click

    Previous and edit as needed.

  11. If the policy settings are correct, click Confirm to save the policy.