Secure Access Service Edge (SASE) makes dynamic decisions based on employee operations, behavior, and device security status. This allows SASE to detect and respond to security threats in real time and automatically adjust security measures. This helps protect your organization's data and resources. This topic describes how to configure a dynamic policy.
Prerequisites
You have activated SASE. If you have not activated SASE, purchase and activate the service. For more information, see Purchase the service. You can also apply for a 7-day free trial. For more information, see Apply for a free trial.
You must use an Alibaba Cloud account or a Resource Access Management (RAM) user that has permissions to access the SASE service. If you use a RAM user, grant the required access permissions. For more information, see Grant permissions to a RAM user.
The SASE client installed on office devices is version 4.5.1 or later.
Procedure
Log on to the Secure Access Service Edge console.
In the navigation pane on the left, choose . On the Dynamic Policy page, click Create Policy.
In the Create Policy panel, configure the policy parameters.
Configuration Item
Description
Basic Information
Policy Name
Enter a name for the dynamic policy.
Policy Status
Enable the dynamic policy.
Effective Scope
Set the user group to which the policy applies.
Trigger Settings
Trigger Mode
Dynamic: The policy is triggered in real time when the device properties, network environment, or device compliance baseline changes, or when a security event related to a person occurs.
Trigger Settings
Two methods are supported to configure the trigger:
Manually set policy: Set trigger conditions based on information such as Device Information, Behavior Information, Compliance Baseline, and Time Rule. You can configure one or more trigger conditions and set the logical relationship between them as needed. For more information about the trigger policy parameters, see Trigger configuration parameters. You can click Save as Template to save a manually configured policy as a template for future use.
Import existing template: Click : Click Import Existing Template. In the Import Existing Template dialog box, select a custom trigger template and click OK. For more information about how to configure a trigger template, see Configure a trigger template.
Handling Settings
Prohibition
Prohibit App-initiated Connections to Internal Networks: The option takes effect only after you configure a network access policy for users in SASE.
WarningThis feature requires the SASE app version to be 4.7.0 or later.
Prohibit Use of Software: Restricts employees from using specified software, applicable only on qualifying devices.
Prohibit Connection to Office Network: The Prohibit Connection to Office Network option takes effect only after you configure a network access policy for users in SASE. For users or devices for which a network access policy is configured, the option takes effect upon their next connection.
Access Control Downgrade: You can de-escalate the permissions for a user in violation. In this case, you must first configure a downgrade policy.
Notifications & Audit
Audit: Audit response and recovery operations. View response and recovery logs in Log Audit. For more information about how to view dynamic decision-making logs, see View the response process.
In-client Notification to User: Set the pop-up title and content. If a user triggers the dynamic policy, the SASE client is forcibly logged off, and a pop-up notification is displayed. You can set prompts in both Chinese and English.
CloudMonitor Notification to System Administrator: SASE delivers response events to Cloud Monitor.
Restoration Method
Automatic Restoration After Remediation
If an employee or device that triggered a rule is remediated and does not hit the trigger condition the next time the dynamic policy is checked, the response is automatically recovered.
Restoration After Authentication and Reporting
Validity Period of Reporting: Set the Reported Effective Time. If a user triggers the dynamic policy, the SASE client is forcibly logged off. The user can log on again to resume use. The dynamic policy will not be triggered again within the reported effective time.
Authentication Method: Log On Again is selected by default. Log on to the SASE client again to complete the authentication.
Click OK.
Example of manually setting a trigger policy
In the example shown in the following figure, a dynamic policy is configured. If the SASE client version is earlier than v4.5.1 or the QQ application is detected on an office device, the configured response action is executed.

Trigger configuration parameters
Other operations
The created policy appears in the dynamic policy list. SASE handles the behavior of devices that match the policy based on your settings.
You can perform the following operations as needed:
Filter: Filter policies by Policy Name.
Edit: Click Details to view or modify the configuration of a dynamic policy.
Delete: Click Delete to delete a dynamic policy. You can also select multiple policies and delete them in a batch.
Status: Click the switch in the Status column to enable or disable a dynamic policy.
References
For more information about how to view SASE product events in Cloud Monitor, see View system events.