Set Default Web Application Policy to Block

The
WSS
allows you to select specific web applications that you feel are detrimental to the effectiveness of your workforce or the security of your network and set the
default
policy to block. For example, you think access to personal webmail accounts, such as
yahoo
and
gmail
, provide a greater security threat. Or you need to block resource intensive or time-wasting applications, such as streamed sports and social network destinations.
As stated above, this is the default policy and
WSS
performs the check on the connection inbound from the origin content server. You can create additional policy that allows specific users, groups, and locations access to the Web applications that are blocked for anyone else.

Reference

For the current list of web applications that the
WSS
recognizes, see the following article.

Procedure

This procedure demonstrates how to select specific applications and specify them as unavailable to any employee (client) that is routing web traffic to
WSS
.
  1. Navigate to
    Policy > Content Filtering
    .
  2. In the
    Group B > G4
    rule, click the
    Blocked Web Applications
    link in the
    Destinations
    column. The portal displays the Object Edit: Blocked Web Applications dialog.
    1. The initial dialog is read-only. Click
      Edit
      .
      Blocked Web Apps -- global
    2. Optional—Enter a
      Comment
      that describes the reason for the policy.
    3. Select web applications from one or more high-level categories.
    4. Click
      Save
      .
  3. Click
    Activate
    .