• Total activity 14
  • Last activity
  • Member since
  • Following 0 users
  • Followed by 0 users
  • Votes 0
  • Subscriptions 7

Activity overview

Latest activity by johndav2
  • johndav2 created an article,

    Reserved IP is now Generally Available and New Egress Information in Activity Search

    Reserved IP allows SIG customers to obtain a dedicated IP address in an Umbrella datacenter, reserved for use only by the customer, as an add-on to a new or existing SIG subscription.  More informa...

  • johndav2 created an article,

    Web Policy Tester Is Generally Available

    The web policy tester can be found in the Web Policy UI in the upper-right corner, and is designed to produce an outcome given one or two identities and a destination.  The web policy tester querie...

  • johndav2 created an article,

    Tunnel Agnostic Internal Networks for Web Policy is Generally Available

    Internal networks can now be associated with all tunnels when created, and used as an identity in Web Policy.  Please refer to the on-line documentation for more details here.

  • johndav2 created an article,

    Ability to Enable/Disable Web Rules is now Generally Available

    In Web Policy, rules within a ruleset may now be enabled or disabled.  A disabled rule will not be evaluated nor effect the outcome of a web transaction.  New rules will be created in a disabled st...

  • johndav2 created an article,

    GA For DNS Inside The IPSec Tunnel

    This feature simplifies Umbrella SIG deployments by allowing all network traffic across SIG tunnels.  Customers will have the same DNS experience both on network and off-network providing the quick...

  • johndav2 created an article,

    Remote Browser Isolation Now GA!

    Similar to the networking concept of an air gap, Remote Browser Isolation creates a physical barrier between the end-user’s browser and a web page’s content. Isolated web requests are forwarded by ...

  • johndav2 created an article,

    Web Rule-Based Policy Now GA!

    Rule-base policy allows customers to be the masters of their own destiny.  With legacy web policies customers were locked into a hard coded order of operations for enforcing web security. Legacy we...