Using device based policiesIn this document
OverviewIn DefensX, policies are consistently executed based on users' group memberships. When Active Directory (AD) or Azure Active Directory (AzureAD) is in use, user group memberships are automatically detected by the DefensX Agent without requiring any additional configuration. This approach offers a significant advantage in shared server environments such as Terminal Server, Citrix, or Azure Virtual Desktop Pool. Unlike other DNS-only solutions that treat all users on the same server uniformly, DefensX can apply distinct policies for different users even when they are logged into the same server simultaneously. This capability ensures that security and access controls are tailored to each user, enhancing both flexibility and security in multi-user environments. However, you may want to apply additional restrictions when users are not using their own computers and are instead using shared computers. This document provides instructions for applying device-based policies. Configuring Device Based PoliciesUse Case DefinitionTo clarify the configuration process, consider the following scenario:
Creating the PoliciesTo configure the policies as described:
In this case, policies should be created like this: Key configuration points:
Policy ExecutionJohn Doe is not a member of the user group "Shared PCs". However, when he logs into an Azure Virtual Desktop computer under the "Shared PCs" deployment, his DefensX session on that computer automatically receives the "Shared PCs" user group from the deployment definition. As a result, the policy engine applies the "Shared PCs" policy first and blocks access to hulu.com. When John Doe uses his personal notebook under the "Default" deployment, he is not attached to the "Shared PCs" user group. Therefore, the policy engine skips the "Shared PCs" policy and allows access to hulu.com based on the "Default" policy. SummaryUsing a specific deployment for shared computers is advisable for future planning. Even if device-based policies are not initially planned, this approach simplifies future changes.
You can also check the logs and click on the "Check with current policies" button to verify how the policy engine executed for a specific log. |
||