icon-zia.svg
Secure Internet and SaaS Access (ZIA)

Adding an Instant Messaging Rule for Cloud App Control

You can create rules to control access to specific cloud applications. Cloud Apps are organized into categories to facilitate defining rules for similar applications.

Instant messaging (IM) has become nearly as universal as email. Today, more and more people depend on this simple text-based application to stay in touch with friends and colleagues. Instant messaging introduces potential risk and liability to enterprises in several ways, such as:

  • Instant messaging provides transport for proprietary data to escape the corporate network via file transfers.
  • Users might get involved in conversations and relationships that violate corporate policy.
  • Instant messaging can affect productivity at work.

You can completely block or selectively disable IM applications. Popular client-based IMs, such as Yahoo! Messenger, as well as web IMs, such as Meebo and GTalk Gadget, are supported. Admins can completely block the IM or just block file transfers. IM file transfers are scanned for viruses and for DLP (if the respective policies are set).

Adding a Rule for Instant Messaging Apps

To add a rule for Instant Messaging apps:

  1. Go to Policy > URL & Cloud App Control.
  2. From the Cloud App Control Policy tab, click Add and select Instant Messaging.
  3. Enter the rule attributes:
    • Rule Order: Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule’s place in the order. You can change the value, but if you’ve enabled Admin Rank, your assigned admin rank determines the Rule Order values you can select.
    • Admin Rank: Enter a value from 0-7 (0 is the highest rank). Your assigned admin rank determines the values you can select. You cannot select a rank that is higher than your own. The rule’s Admin Rank determines the value you can select in Rule Order, so that a rule with a higher Admin Rank always precedes a rule with a lower Admin Rank.
    • Rule Name: Enter a unique name for the rule or use the default name.
    • Rule Status: An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
    • Rule Label: Select a rule label to associate it with the rule. To learn more, see About Rule Label.
  4. Define the criteria:
    • Cloud Applications: Select Any to apply the rule to all cloud applications in this category, or select any number of cloud applications. You can also search for applications.

      By default, this field displays the first 100 cloud applications. The subsequent 100 cloud applications are displayed when you click the Click to see more link at the bottom of the list. You can repeat this process to view the remaining cloud applications.

    • Cloud Application Instances: Select the cloud application instances to which the rule applies. You can select a maximum of 8 instances per rule.

      The cloud application instance appears only if its parent application is selected as the cloud application.

    • Cloud Application Risk Profile: Select a profile to which the rule applies.

      You can either select the Cloud Application Risk Profile or the Cloud Applications field for the rule.

    • Users: Select Any to apply the rule to all users, or select up to 4 users under General Users. If you've enabled the Policy for Unauthenticated Traffic, you can select Special Users to apply this rule to all unauthenticated users, or select specific types of unauthenticated users. You can search for users or click the Add icon to add a new user.
    • Groups: Select Any to apply the rule to all groups, or select up to 8 groups. You can search for groups or click the Add icon to add a new group.
    • Departments: Select Any to apply the rule to all departments, or select up to 8 departments. If you've enabled the Policy for Unauthenticated Traffic, you can select Special Departments to apply this rule to all unauthenticated transactions. You can search for departments or click the Add icon to add a new department.

      Any rule that applies to unauthenticated traffic must apply to all Groups and Departments. So, if you have chosen to apply this rule to unauthenticated traffic for either Users or Departments, select Any from the drop-down menus for Groups and Departments.

    • Locations: Select Any to apply the rule to all locations, or select up to 8 locations. You can also search for a location or click the Add icon to add a new location.
    • Location Groups: Select Any to apply the rule to all location groups, or select up to 32 location groups. You can also search for a location group.
    • Time: Select Always to apply this rule to all time intervals, or select up to two time intervals. You can also search for a time interval or click the Add icon to add a new time interval.
    • Devices: Select the devices to which the rule applies. You can also search for a device. Selecting no value ignores this criterion in the policy evaluation.
    • Device Groups: Select the device groups to which the rule applies. For Zscaler Client Connector traffic, select the appropriate group based on the device platform. Select Cloud Browser Isolation or No Client Connector to apply the rule to the Cloud Browser Isolation traffic or for traffic that is not tunneled through Zscaler Client Connector, respectively. You can also search for a device group. Selecting no value ignores this criterion in the policy evaluation.

      The Cloud Browser Isolation group is available only if Cloud Browser Isolation is enabled for your organization.

    • Device Trust Level: Select the device trust level values (High Trust, Medium Trust, Low Trust, or Unknown) to which the rule applies. While the High Trust, Medium Trust, or Low Trust evaluation is applicable only to Zscaler Client Connector traffic, Unknown evaluation applies to all traffic. Selecting no value ignores the criterion in the policy evaluation.

      The trust levels assigned to the devices are based on your posture configurations in the Zscaler Client Connector Portal.

    • User Agent: Select Any to apply the rule to all user agents, or select any number of user agents. You can also search for an agent.
    • User Risk Profile: Select the user risk score levels to which the rule applies. Selecting no value ignores this criterion in the policy evaluation.

      Users are assigned a risk score based on their browsing activities. A range of risk scores is grouped as a risk score level.

      By default, the following user risk score levels are available:

      • Low: Level with user risk scores ranging from 0 to 29
      • Medium: Level with user risk scores ranging from 30 to 59
      • High: Level with user risk scores ranging from 60 to 79
      • Critical: Level with user risk scores ranging from 80 to 100

      Contact Zscaler Support to customize the user risk score range of these levels for your organization.

  5. Define the rule expiry:
    • Enable Rule Expiration: Enable this option to set a validity period for the rule.
      • Start Date and Time: Select a start date and time. The rule will be valid starting on this date and time.
      • End Date and Time: Select an end date and time. The rule will cease to be valid on this date and time.
      • Time Zone: Select the time zone in which the rule should be valid.
  6. Specify the action by choosing one of the following options for Chatting and File Transfers:

    You can choose either Allow or Block for File Transfers.

    • Choose to allow the users to chat and/or transfer files on the selected applications.

      • Daily Bandwidth Quota: (Optional) The bandwidth quota includes data uploaded to and downloaded from the cloud application. To enforce the quota on each location, do not select specific users, groups, or departments. To enforce the quota on specific users, groups, or departments, SSL inspection and authentication must be enabled. If a user comes from a known location, the quota is reset at midnight based on the location time zone; for remote users, the quota is reset based on the organization’s time zone. The minimum value you can enter is 10 MB and the maximum value is 100,000 MB.
      • Daily Time Quota: (Optional) The time quota is based on the amount of time elapsed in a session while uploading and downloading data. The session idle times are ignored. The minimum value you can enter is 15 minutes and the maximum value is 600 minutes.
      Close
    • Choose to display an EUN that cautions users before allowing them access to the selected applications.

      You can select this action for only one of the following request methods: CONNECT, GET, or HEAD.

      • Daily Bandwidth Quota: (Optional) The bandwidth quota includes data uploaded to and downloaded from the cloud application. To enforce the quota on each location, do not select specific users, groups, or departments. To enforce the quota on specific users, groups, or departments, SSL inspection and authentication must be enabled. If a user comes from a known location, the quota is reset at midnight based on the location time zone; for remote users, the quota is reset based on the organization’s time zone. The minimum value you can enter is 10 MB and the maximum value is 100,000 MB.
      • Daily Time Quota: (Optional) The time quota is based on the amount of time elapsed in a session while uploading and downloading data. The session idle times are ignored. The minimum value you can enter is 15 minutes and the maximum value is 600 minutes.
      Close
    • Choose to block the users from chatting and/or transferring files on the selected applications.

      Close
    • Choose to isolate all the traffic that matches the cloud app control rule through a remote browser. To learn more, see What Is Isolation?.

      • Isolation Profile: Appears when you select Isolate. You can choose the isolation profiles to which the rule applies.

        Ensure to create isolation profiles for your organization.

      • Daily Bandwidth Quota: (Optional) The bandwidth quota includes data uploaded to and downloaded from the cloud application. To enforce the quota on each location, do not select specific users, groups, or departments. To enforce the quota on specific users, groups, or departments, SSL inspection and authentication must be enabled. If a user comes from a known location, the quota is reset at midnight based on the location time zone; for remote users, the quota is reset based on the organization’s time zone. The minimum value you can enter is 10 MB and the maximum value is 100,000 MB.
      • Daily Time Quota: (Optional) The time quota is based on the amount of time elapsed in a session while uploading and downloading data. The session idle times are ignored. The minimum value you can enter is 15 minutes and the maximum value is 600 minutes.
      Close

    The Isolate option is available only if Isolation is enabled for your organization.

    • Cascade to URL Filtering: Enable if you want to enforce the URL Filtering policy on a transaction, even after it's explicitly allowed by the Cloud App Control policy. However, the URL Filtering policy doesn't apply if the Cloud App Control policy blocks the transaction.

      This field appears only when the Allow Cascading to URL Filtering option is disabled on the Advanced Settings page (Administration > Advanced Settings).

  7. (Optional) Define the notification settings:
    • Browser Notification Template: Select a browser-based EUN message from the drop-down menu to display the message on the browser when the user activity triggers the Cloud App Control Policy rule.

      This field appears when the application access is set to either Caution or Block.

    • End User Notification: Appears only when a granular action is blocked for the selected application. Select Show to show the Zscaler Client Connector-based EUN message on endpoints when the user activity triggers the Cloud App Control Policy rule, or select Hide if you don't want an EUN message to appear. This field is set to Show by default.
      • Custom Message: Select a custom notification message that you want to show as the Zscaler Client Connector-based EUN. This field is set to the Default notification message if no message is selected from the drop-down menu.
  8. (Optional) In the Description field, enter additional notes or information. The description cannot exceed 10,240 characters.
  9. Click Save and activate the change.

To see how this policy fits into the overall order of policy enforcement, see Understanding Policy Enforcement.

Related Articles
About Cloud App ControlUnderstanding Cloud App CategoriesAdding Rules to the Cloud App Control PolicyAdding an AI & ML Applications Rule for Cloud App ControlAdding a Collaboration & Online Meetings Rule for Cloud App ControlAdding a Consumer Rule for Cloud App ControlAdding a Custom Applications Rule for Cloud App ControlAdding a DNS Over HTTPS Services Rule for Cloud App ControlAdding a File Sharing Rule for Cloud App ControlAdding a Finance Rule for Cloud App ControlAdding a Health Care Rule for Cloud App ControlAdding a Hosting Providers Rule for Cloud App ControlAdding a Human Resources Rule for Cloud App ControlAdding an Instant Messaging Rule for Cloud App ControlAdding an IT Services Rule for Cloud App ControlAdding a Legal Rule for Cloud App ControlAdding a Productivity & CRM Tools Rule for Cloud App ControlAdding a Sales & Marketing Rule for Cloud App ControlAdding a Social Networking Rule for Cloud App ControlAdding a Streaming Media Rule for Cloud App ControlAdding a System & Development Rule for Cloud App ControlAdding a Webmail Rule for Cloud App Control