This document describes how to configure domain name blacklist and whitelist policies for fine-grained control over employee Internet access. It also explains how to audit all access behaviors to ensure corporate network security and compliance.
Background
As digital transformation progresses, employees increasingly need to access the Internet for their daily work. This creates security risks, such as data breaches and unauthorized access. To secure your corporate network and control employee Internet activity, you can configure domain name blacklists and whitelists. This provides fine-grained access control for specific domain names and wildcard domain names. The system also records and audits all access behaviors. This helps you meet compliance requirements and provides a reliable basis for tracing security events. This approach helps you build a more secure and compliant network environment.
Behavior management policy detection logic
Internet access management supports whitelist and blacklist policies. Access behaviors that match a policy are handled based on the configured action. You can configure management policies based on your business needs and the detection logic of blacklist and whitelist policies. You can add trusted users, user groups, and domain names to a whitelist. After you add them to a whitelist, their access behavior is not controlled.
Check whitelists
SASE checks whether the user, user group, and domain name are in a whitelist.
Check blacklist policies
If the access does not hit a whitelist, SASE checks whether a blacklist policy is configured for the domain name that the user attempts to access.
If a blacklist policy is hit, the configured action is executed, such as Block and Warn, Block Only, or Monitor.
Check whitelist policies
If no blacklist policy is hit, SASE checks whether a whitelist policy is configured.
If a whitelist policy is hit, the action configured in the whitelist policy is executed, such as Block and Warn, Block Only, or Monitor.
If no policy is configured, Internet access from users and user groups and access to domain names are not controlled or restricted.
Scope
You have purchased SASE Internet Access DLP (data loss prevention).
The SASE App installed on enterprise endpoints is version 4.0.5 or later.
A user group is created. For more information, see Create a user group.
Configure the list library
You can add domain names or wildcard domain names to the list library and create custom categories. This allows for flexible selection when you configure blacklist and whitelist policies for Internet access management.
Go to the Behavior Management page. Based on your requirements, select the Whitelist Management or Blacklist Management tab, and then click List Group Management in the upper-right corner of the page.

In the List Group Management panel, click Add to create a custom list type. Then, add domain names or wildcard domain names to the list type and click Close.
Whitelist group management: Create a custom Whitelist Type and add domain names to it.
Blacklist group management: Create a custom Blacklist Type and add domain names to it.
Configure an Internet access management policy
Go to the Behavior Management page. Based on your requirements, select the Whitelist Management tab or the Blacklist Management tab, and then click Create Policy.
In the Create Policy panel, configure the parameters.
Parameter
Description
Policy Name
Enter a name for the whitelist or blacklist policy.
Priority
Set the execution priority of the policy. A smaller value indicates a higher priority.
Whitelist policy: For different policies applied to the same user:
Different priorities: If multiple policies are enabled, only the policy with the highest priority is executed.
Same priority: If multiple policies are enabled, only the most recently created policy is executed.
Blacklist policy: All blacklist policies are evaluated. If a user matches multiple policies with the same configuration but different actions, the action of the policy with the highest priority is executed.
NoteIf a user accesses the Alibaba Cloud official website and matches two blacklist policies (Policy A action is Monitor, Policy B action is Block and Warn, and Priority A > Priority B), the system logs the behavior for observation and does not block access.
Action
Set the action to take. Three actions are supported.
ImportantBlacklist and whitelist policies take effect on different objects.
For more information about scenarios of whitelist and blacklist policies, see Examples for configuring Internet access management.
Blacklist policy: The action takes effect on the domain names that are configured for the Blacklist Type parameter.
Whitelist policy: The action takes effect on domain names that are not configured for the Whitelist Type parameter.
Block and Warn: Blocks the user's access and displays a pop-up prompt.
Block Only: blocks requests that hit the policy.
Monitor: Records logs and allows normal user access.
Validity Period
Set the time when the policy is in effect.
Permanently Valid
Business Days in Each Week
Policy Status
The policy is enabled by default.
Blacklist Type/Whitelist Type
Select a custom domain name type configured in the list library.
Effective Scope
Select the user groups to which the policy applies. You can select multiple user groups.
Approval Process Configuration
When you configure Block and Warn, you can configure whether to allow employees to submit applications for approval.
If you allow users to submit an application for approval, you must select a proper approval workflow. For more information, see Create an approval workflow.
Pop-up Prompt Configuration
Set the notification message for blocked outbound file transfers. You can set the message in Chinese and English.
After you complete the configuration, click OK.
Example: Configure Internet access management
For example, an enterprise wants to configure a Whitelist, a Blacklist Policy, and a Whitelist Policy for Internet access management to achieve the following results:
All employees can access the primary corporate domain name for their daily work.
Employees in the human resources department can access only recruitment-related websites.
Employees in the R&D department are prohibited from accessing certain forum websites.
Step 1: Configure a whitelist
To ensure that all employees can access the primary corporate domain name, you must configure a whitelist.
Step 2: Configure a whitelist policy
To restrict employees in the human resources department to accessing only recruitment-related websites, you can add the recruitment-related domain names to the whitelist library and configure a whitelist policy with the following settings.

Step 3: Configure a blacklist policy
To prohibit employees in the R&D department from accessing certain forum websites, you can add the forum-related domain names to the blacklist library and configure a blacklist policy with the following settings.

Configure a whitelist
You can add a user, user group, or domain name to a whitelist. After an item is added to a whitelist, SASE no longer controls or blocks the online activities of the user or user group, or access to the domain name.
Go to the Behavior Management page and click Configure Whitelist in the upper-right corner to go to the tab.

Configure the User Whitelist, User Group Whitelist, and Exceptional Domain Name parameters. Then, click Submit.
View audit logs
SASE performs log audits of Internet access behavior to provide a valid basis for subsequent event tracing and compliance queries.
Behavior audit
SASE provides log auditing for actions that are triggered by whitelist and blacklist policies.
Go to the Behavior Audit page.
On the Whitelist Audit and Blacklist Audit tabs, you can view the audit logs for access control types such as Block and Warn, Block Only, or Monitor Mode - Allow.
You can filter data by criteria such as time, username, department, and domain name.
Log audit
You can view all types of Internet access records for corporate employees, including normal access.
Go to the Log Audit page.
On the Internet Access Audit tab, you can view the website access records of enterprise users. You can view records for access control types such as Block and Warn, Block Only, Monitor Mode - Allow, Add to Whitelist - Allow, and Trusted Request.