Nov 17, 2020 — Application visibility and control (AVC) beta release

If your organization is participating in the AVC beta, you can now control access to web applications. You can define default policy behavior, or you can create a policy that is based on risk level, acceptable use policy (AUP) categories, category operations, applications, or specific operations for an application. You assign actions to each area of the AVC policy. As you configure each component, the detailed settings you set take precedence over more general settings. For example, the policy action you apply to an application takes precedence over an action that’s applied to its corresponding category or category operation.

You can also select the users and groups that can access a blocked web application and perform specific operations in the application. AVC supports the following ​SIA​ setups:

  • ​SIA​ DNS. If ​SIA​ Proxy is not enabled, you can still control access to applications based on the application’s domain and IP address.
  • ​SIA​ Secure Web Gateway. If ​SIA​ Proxy is enabled and configured as a full web proxy, you can control access to applications based on URLs, domains, IP addresses, and other attributes.

For more information, see the ​SIA​ documentation. To participate in the beta, contact your ​Akamai​ representative.

Known Issues and Limitations

Issue: Depending on the domain that’s used to access Google Gmail, an allow action for Gmail may not override a block action with a user exception to the Web-Based Email category. It also may not override the Very High risk level.
Workaround: There is currently no workaround.