Knowledge Base
Browse Docs
  • Introduction
    1. DefensX
    2. DNS & Web Filtering
    3. Zero Trust Files
    4. Zero Trust Credentials
    5. ADWare Protection
    6. Remote Browser Isolation
    7. Secure Browser Extension
    8. Secure Mobile Browser
  • Management
    1. Role-Based Access Control
  • Deployment
    1. Deployment via RMM
    2. Operating System Agent
    3. Deployment via GPO
    4. Deployment via Intune
    5. VDI and Terminal Servers
    6. Windows Manual Deployment
    7. Mac MDM Deployment
    8. Mac Manual Deployment
    9. Network Deployment
    10. Secure Mobile Browser
    11. Bypass Option
    12. AI Protections
    13. SaaS Restrictions
    14. Bookmark Manager
  • Secure Access (ZTNA)
    1. Configuration
  • Integrations
    1. Azure AD
    2. Identity Providers
    3. SIEM
  • Policy Management
    1. Configuring Policies
    2. Configuring Consents
  • Questions & Answers
    1. Licensing
    2. Incognito Mode
    3. Onboarding
    4. Active Directory
    5. Group Synchronization
    6. Agent
    7. Conflicting Softwares
    8. Reporting
    9. Virtual Desktops
    10. Using the Backend
    11. DNS & Web Filtering
  • Training Videos
    1. Onboarding Videos
    2. Attack Scenarios
    3. MSP Admin Training Series
  • MSP Automation
    1. Overview
    2. External Notifications
    3. Integrations
    4. Partner API
ONLINE DOCUMENTATION

Configuring Consents

In this document
  • Consents for zero-trust
  • Consent Types

Consents for zero-trust

Interacting with the end-users and getting their consent on security decisions has a major role in effectively implementing zero-trust web browsing.

DefensX provides an ability to give end-users the right to override some of the security decisions. Consents minimize end-user friction to security policies and reduce the number of tickets opened. It helps to improve a self-enforced cybersecurity posture during the everyday web life of the end-users.

Following is an end-user consent for a block page:

web%20page%20blocked%20with%20consent%201

Once the end-user takes the risk and proceeds with their consent, we will create a related consent log under the Logs→ Consent Logs.

consent%20log%20detail%203

Also it is possible to have the visibility per end user from the consent logs. Which is one of the key in-context visibility that you can extract from DefensX. Following are two examples of such reports:

consent%20logs%20not%20found%203

and

consent%20logs%20high%20risk%204
Tip
You can enable and disable consent rights for a customer through Policies → Consents menu item.

Consent Types

Credential Exposure Consent When enabled, DefensX users can give consent to allow access to input boxes protected by DefensX Credential Exposure Protection rules.

File Download Consent DefensX users can consent to allow file downloads blocked by the policy rules when enabled.

File Download Mime and Type Check Consent When enabled, DefensX users can give consent to allow file downloads which is blocked by the mime-type.

File Upload Consent When enabled, DefensX users can give consent to allow file uploads which is blocked by the policy rules.

File Upload Mime Type Check Consent When enabled, DefensX users can give consent to allow file uploads which is blocked by the mime type.

Readonly Consent When enabled, DefensX users can give consent to change the read-only status of a web page.

URL Block Consent When enabled, DefensX users can give consent to blocked URLs. Use with caution!

AD Blocker Consent When enabled, DefensX users can give consent to disable AD Blocker on some websites.

www.defensx.com
Secure Industries, Inc 101 Avenue of The Americas, Floor 9 New York, NY 10013