Set up a custom header

In ETP, you can configure custom headers to control access to your enterprise SaaS applications. For example, you can use custom headers to restrict user access to only your organization's application account.

You configure custom headers in a policy configuration. As part of this configuration, you provide the domain of the application or the website that users access. You then enter the header name and value. The header name is inserted into the request and used to control access. The header name is usually defined by the provider of the application, while the header value is specific for your enterprise. For example, the header value may be an ID associated with your organization's application account.

📘

To use this feature, your organization need to be licensed for ETP Advanced Threat and configure ETP Proxy as a full web proxy.

After custom headers are used to grant user access to an application, you can use other ETP features to scan content that is downloaded or uploaded. These features include:

  • Data loss prevention. You can use DLP to scan uploaded files. For more information about DLP, see Data loss prevention.

  • Inline payload analysis. You can use inline payload analysis to scan downloaded content with ETP Proxy. For more information about inline payload analysis, see Inline payload analysis.

You can add a maximum of 1,000 headers.

Add a custom header

You can use custom headers to control access to your SaaS application and limit access to only the corporate account of the application.

To to add a custom header to a policy:

  1. In the Threat Protection menu of Enterprise Center, select Policies > Policies.

  2. To edit a policy, click the name of the policy that you want to edit.

    If you are creating a policy, see Create a policy.

  3. Click the Custom Header tab, and click the plus sign icon.

  4. In the Domain field, enter the domain or domains that users request to access the application.

  5. In the Header Name field, enter the header that's inserted into the request.

  6. In the Header Value field, enter the header value.

  7. Click Save. If you want to save and deploy the policy, click Save and Deploy.

Next steps

If you haven’t deployed the policy, make sure you deploy it to the ETP network. For instructions, see Deploy configuration changes.

Headers for common SaaS applications

This table lists domains and headers for some common applications. For instructions on configuring custom headers for any of these applications, see the provided link:

Application

Domains

Header

Header Configuration Steps

Dropbox

dropbox.com

X-Dropbox-allowed-Team-Ids

See Set up a custom header for Dropbox

Google G Suite

  • drive.google.com
  • .google.com
  • .googleusercontent.com
  • .gstatic.com

X-GooGApps-Allowed-Domains

See Set up a custom header for Google G Suite

Microsoft 365

  • login.microsoftonline.com
  • login.microsoft.com
  • login.windows.net
  • `Restrict-Access-To-Tenants`
  • `Restrict-Access-Context`

See Set up custom headers for Microsoft 365

YouTube

  • www.youtube.com
  • m.youtube.com
  • youtubei.googleapis.com
  • youtube.googleapis.com
  • www.youtube-nocookie.com

YouTube-Restrict

See Set up custom headers for YouTube

Set up a custom header for Dropbox

Before you begin

Make sure Network Control is enabled in the Dropbox Admin Console. For instructions, see Network Control in the Dropbox help. Take note of the Team ID that is associated with your organization's account.

To set up a custom header for Dropbox, your organization needs to be on a Dropbox Enterprise plan and have access to the Network Control feature in the Dropbox Admin Console. Network Control allows an administrator to identify the user accounts that can access Dropbox in the corporate network.

To create a custom header that block users from accessing personal Dropbox accounts:

  1. In the Threat Protection menu of Enterprise Center, select Policies > Policies.

  2. To edit a policy, click the name of the policy that you want to edit.

    If you are creating a policy, see Create a policy.

  3. Click the Custom Header tab, and click the plus sign icon.

  4. In the domain field, enter dropbox.com.

  5. In the Header Name field, enter X-Dropbox-allowed-Team-Ids.

  6. In the Header Value field, enter the team ID that is associated with your organization's Dropbox account.

  7. Click Save If you want to save and deploy the policy, click Save and Deploy.

Next steps

If you haven’t deployed the policy, make sure you deploy it to the ETP network. For instructions, see Deploy configuration changes.

Set up a custom header for Google G Suite

Before you begin

In the Google Admin Console, make sure you block access to personal accounts and allow access to your corporate G Suite account. For instructions, see Block access to consumer accounts in the Google Admin Help.

This procedure describes how to create a custom header in ETP and block users from accessing personal accounts to G Suite applications such as Gmail, Google Drive, Google Doc, Google Calendar, and more.

To create a custom header that block users from accessing personal accounts to G Suite applications:

  1. In the Threat Protection menu of Enterprise Center, select Policies > Policies.

  2. To edit a policy, click the name of the policy that you want to edit.

    If you are creating a policy, see Create a policy.

  3. Click the Custom Header tab, and click the plus sign icon.

  4. In the domain field, enter:

    • drive.google.com
    • .google.com
    • .googleusercontent.com
    • .gstatic.com
  5. In the Header Name field, enter X-GooGApps-Allowed-Domains.

  6. In the Header Value field, enter the domains for your organization that you want to allow.

    This would be the domains and subdomains that your organization registered with Google.

  7. Click Save. If you want to save and deploy the policy, click Save and Deploy.

Next steps

If you haven’t deployed the policy, make sure you deploy it to the ETP network. For instructions, see Deploy configuration changes.

Set up custom headers for Microsoft 365

Before you begin

You can use a tenant restriction in Azure AD to control application access based on the Azure AD tenant that's used for single sign-on (SSO). For more information on tenant restrictions, see Use tenant restrictions to manage access to SaaS cloud applications in the Microsoft Azure documentation.

This procedure describes how to create a custom header in ETP and block users from accessing personal accounts to Microsoft 365 apps.

To create a custom header that block users from accessing personal accounts to Microsoft 365 apps:

  1. In the Threat Protection menu of Enterprise Center, select Policies > Policies.

  2. To edit a policy, click the name of the policy that you want to edit.

    If you are creating a policy, see Create a policy.

  3. Click the Custom Header tab, and click the plus sign icon.

  4. In the domain field, enter:

    • login.microsoftonline.com
    • login.microsoft.com
    • login.windows.net
  5. In the Header Name field, enter:

    Restrict-Access-To-Tenants

  6. In the Header Value field, enter the domains that are registered with your tenant. This would be the domains that are specific to your organization's account.

  7. Click the plus sign icon to add another header.

  8. Repeat step 4

  9. In the Header Name field, enter:

    Restrict-Access-Context

  10. In the Header Value field, enter the directory ID that is associated with your organization's AD.

    📘

    You can find this ID in the Azure Active Directory portal. Log in as an administrator and from the navigation menu, select Azure Active Directory and then click Properties.

  11. Click Save. If you want to save and deploy the policy, click Save and Deploy.

Next steps

If you haven’t deployed the policy, make sure you deploy it to the ETP network. For instructions, see Deploy configuration changes.

Set up custom headers for YouTube

You can use custom headers to control the video content that users can access while on the corporate network. You can restrict access through DNS with the YouTube menu that is available in a policy, while custom headers allows you to restrict access through HTTP. To restrict access through DNS, see SafeSearch and YouTube restricted mode.

For more information, see Restrict YouTube content available to users in the Google documentation. You need to be a G Suite administrator to access these instructions from Google.

To set up custom headers for YouTube:

  1. In the Threat Protection menu of Enterprise Center, select Policies > Policies.

  2. To edit a policy, click the name of the policy that you want to edit.

    If you are creating a policy, see Create a policy.

  3. Click the Custom Header tab, and click the plus sign icon.

  4. In the domain field, enter:

    • www.youtube.com
    • m.youtube.com
    • youtubei.googleapis.com
    • youtube.googleapis.com
    • www.youtube-nocookie.com
  5. In the Header Name field, enter:

    YouTube-Restrict

  6. In the Header Value field, enter one of these values depending on the type of restriction you want to configure:

    • Strict. Provides access to a limited collection of video content. This is the most restricted mode.

    • Moderate. Provides some restricted access but is less strict than Strict mode. Moderate mode allows users to access a larger collection of video content.

  7. Click Save. If you want to save and deploy the policy, click Save and Deploy.

Next steps

If you haven’t deployed the policy, make sure you deploy it to the ETP network. For instructions, see Deploy configuration changes.


Did this page help you?