TMWS Best Practices - 1-2
TMWS Best Practices - 1-2
Version 1.2
Contents
TMWS Best Practices ........................................................................................................ 1
1. How to set up the Authentication for your company? ......................................................... 3
2. How to set up Authentication on the TMWS on-premises?.................................................. 6
3. How to set up Authentication on the TMWS virtual gateways? ........................................... 7
4. How to get threat protection on your Cloud Access Rules? .................................................. 8
5. What is the scanning order of the scanning policies?........................................................... 9
6. How to customize the Cloud Applications in the Cloud Access Rules? ................................ 12
7. How to allow specific traffic in TMWS? ............................................................................. 13
8. How to use the Customized URL Categories in the Cloud Access Rules? ............................. 14
9. How to chain the TMWS decryption CA into your company’s trusted CAs? ........................ 15
10. How to manage HTTPS Tunnels?....................................................................................... 16
Tables
TMWS provides many authentication methods to adapt to your company’s authentication system.
TMWS also provides some add-on methods to co-work with these authentication methods.
You can balance your choice according to the company’s present situation.
The following table shows the available authentication methods. The “Requirements & Guides”
column gives the basic requirements and the available guides for setting the corresponding
authentication method.
The following table shows the available add-on methods to co-work with the authentication methods.
Refer to https://docs.trendmicro.com/en-
us/enterprise/trend-micro-web-security-
online-help/administration_001/hosted-
users.aspx
1.2 Allow to visit the external dependent services
TMWS has dependencies on some external services. Make sure your company’s network allows the
users to access these external services.
Refer to https://docs.trendmicro.com/en-us/enterprise/trend-micro-web-security-online-
help/introduction-and-get_001/task-overview-for-ne.aspx for the external services used by the
system.
1.3.4 Setup your Authentication settings according to your chosen authentication method.
1.3.4.1 For Direct/AD FS/Agent authentication method, please go to each domain’s setting page
to customize the detailed settings.
How to visit the domain setting page:
o Go to Administration -> Directory Services.
o Find your AD domain.
o Click the edit button in the column “AD Integration” of your AD domain
1.3.4.2 For the Okta/Azure AD authentication method, please go to the authentication method
page to customize the detailed settings.
How to visit the authentication method setting page:
o Go to Administration -> Directory Services.
o Click “here” to go to your authentication method page.
2 How to set up Authentication on the TMWS on-premises?
Available Helps:
Available Helps:
The cloud access rule without threat/DLP template has no threat protection. Please choose a
threat/DLP template for your cloud access rule to get the threat protection ability.
Available Helps:
Refer to https://docs.trendmicro.com/en-us/enterprise/trend-micro-web-security-online-
help/policies_001/approved_blocked-url.aspx
Blocked URLs Blocked URLs are used to block unwanted web traffic. Traffic matching the Blocked URLs
will be blocked immediately. Forbidden web sites can be added into the Blocked URLs.
Refer to https://docs.trendmicro.com/en-us/enterprise/trend-micro-web-security-online-
help/policies_001/approved_blocked-url.aspx
Decryption Decryption Rules are used to decide what kind of HTTPS traffic should be decrypted for
Rules content scanning. Traffic matching the Decryption Rules will be decrypted.
Refer to https://docs.trendmicro.com/en-us/enterprise/trend-micro-web-security-online-
help/policies_001/https-inspection/decryption-rules.aspx
HTTPS HTTPS Tunnels are used to decide what kind of HTTPS traffic should be bypassed directly.
Tunnels Traffic matching the HTTPS Tunnels will be allowed immediately without further scanning.
The manually added tunneled list will never expire. The system auto-added tunneled list
will expire in 24 hours.
Refer to https://docs.trendmicro.com/en-us/enterprise/trend-micro-web-security-online-
help/policies_001/https-inspection/https-tunnels.aspx
CA CA Certificates are used to manage the trusted status of the CAs. Traffic matching the
Certificates distrusted CAs will be blocked directly. Traffic matching the inactive CAs will be warned
immediately except if the user decides to continue to access the traffic. Traffic matching the
trusted CAs will continue to be scanned by other policy types.
Refer to https://docs.trendmicro.com/en-us/enterprise/trend-micro-web-security-online-
help/policies_001/https-inspection/digital-certificates.aspx
Server Server Certificate Exceptions are used to manage the trusted status of Server certificates.
Certificate Traffic matching the blocked common names will be blocked directly. Traffic matching the
warning common names will be warned immediately except if the user decides to continue
Exceptions
to access the traffic. Traffic matching the allowed common names will bypass scanning the
CA Certificates and will continue to be scanned by other policy types.
Refer to https://docs.trendmicro.com/en-us/enterprise/trend-micro-web-security-online-
help/policies_001/https-inspection/digital-certificates.aspx
Cloud Access TMWS provides a uniform cloud access rule to manage and control the company’s web
Rules traffic. The cloud access rule can match the web traffic with one or more conditions to
adapt to the company’s requirements.
Refer to https://docs.trendmicro.com/en-us/enterprise/trend-micro-web-security-online-
help/policies_001/cloud-access-rules/configuring-a-cloud-.aspx
5.3 Scanning HTTP Traffic
Scanning HTTP Traffic is straightforward, as the following table shows. The HTTP traffic will be
scanned by the scan steps in order. If the scan step matches the traffic, it will take the action or go to
the next scan step in the “Match” column; if it does not match the traffic, it will take the action or go
to the next scan step in the “Not Match” column.
The following table shows how the scan action of the Cloud Access Rule is decided according to the
Rule-action and the threat detection result. If a threat is detected, the system will take the action in
the “Threat detected” column for the matched rules with the action in the “Cloud Access Rule Actions”
column. If a threat is not detected, the system will take the action in the “No threat detected” column
for the matched rules with the action in the “Cloud Access Rule Actions” column.
Threat detection is not mandatory for the cloud access rules. Refer to How to get threat protection
on your Cloud Access Rules? on how to enable the threat detections for your Cloud Access Rules.
Match Cloud Access Rules (Conditional) means matching WRS Score, URL Categories, Application
Categories and Cloud Applications. For Application Categories, the system may not identify the
Application Categories correctly if it does not decrypt the https traffic.
6 How to customize the Cloud Applications in the Cloud Access Rules?
Refer to https://docs.trendmicro.com/en-us/enterprise/trend-micro-web-security-online-
help/policies_001/objects/cloud-application-ac.aspx
Refer to https://docs.trendmicro.com/en-us/enterprise/trend-micro-web-security-online-
help/policies_001/cloud-access-rules/configuring-a-cloud-.aspx
7 How to allow specific traffic in TMWS?
There are different ways to allow specific traffic in TMWS. Read the description column in the following
table to know how to use them.
Method Description
Use the PAC file You can add websites into the skip-host list of the PAC file in
order not to forward their related web traffic to TMWS. In this
way, your traffic will not be blocked by TMWS.
Refer to https://docs.trendmicro.com/en-us/enterprise/trend-micro-web-security-online-
help/policies_001/https-inspection/decryption-rules/configuring-a-decryp.aspx
8.4 Apply the customized URL Categories to your Cloud Access Rules
Choose your Customized URL Categories in the Traffic Types section of your Cloud Access Rules to
apply them.
Refer to https://docs.trendmicro.com/en-us/enterprise/trend-micro-web-security-online-
help/policies_001/cloud-access-rules/configuring-a-cloud-.aspx
9 How to chain the TMWS decryption CA into your company’s trusted CAs?
You can cross-sign your TMWS CA to chain our CA as the subordinate CA of your company trusted
CAs. In this way your clients, which install your company’s trusted CAs, can trust the TMWS CA
without deploying the TMWS CA in your environment.
Refer to What is the scanning order of the scanning policies? for all the available scanning policies
and their scanning orders.
10.2.2 Policies -> HTTPS INSPECTION -> HTTPS Tunnels -> Failed HTTPS Access
Enable auto tunneling for fatal failures