The Barracuda SecureEdge Manager allows administrators with appropriate permissions to configure Web Filter policies to protect against potential threats and enforce corporate policies. Barracuda Networks provides a large database, organized in categories, for web filtering. You can either use the provided categories to create rules, or you can specify the domains yourself. Malicious URLs are blocked in the default configuration. For example, web filtering is set to allow all and to block only defined exceptions, whereas the corresponding ACL is set to block all and to allow only defined exceptions.

Scope-Based Web Filter Policies
You can now create scope-based web filter policies via the SecureEdge Manager. When you create a web filter policy, it will be scoped to the sources it comes from. You can now define the scope (such as Site/Edge Service, Agents, All Sources, or DNS Location) of your Web Filter policies. This provides a way to group Web Filter policies based on the service that will apply them. There are currently four scopes under the Security > Web Filter > Policies.
Site/Edge Service – The Web Filter rule applies to Site devices / Edge Services. For the Site/Edge Service scope, a Web Filter rule either blocks or allows a domain, URL category, or custom category from any source (such as IP/Network, Site, or User/Group). In addition, for the Web Filter rule, you can now either alert or warn users against suspicious traffic. For the Site/Edge Service scope, the following actions are available for the Web Filter policy:
Allow – The user can access the website.
Block – The user is blocked from viewing the website.
Alert – The user is allowed to access websites in this category, but the action is silently logged.
Warn – The user is redirected to a warning page and must click Continue to access the requested website. For example, a web filter rule exists with SSL Inspection enabled and with a Warn action for different types of selected URL categories (such as social media and lottery). If a user visits a website that matches the filter rule, it allows access to the specific URL categories and/or websites. However, a warning page is shown. When a user clicks Continue in the browser, it will implicitly cause a security inspection.
All Sources – For the All Sources scope, a Web Filter rule either blocks or allows a domain, URL category, or custom category from all sources. The following actions are available for the Web Filter policy:
Allow – The user can access the website.
Block – The user is blocked from viewing the website.
DNS Location – With the DNS Location scope, Web Filter policies can be applied to specific locations. Note the following information with respect to the scope DNS Location:
For a rule with the DNS Location scope, you can select one or more locations as a source you configured via Infrastructure > Locations. For more information, see How to Add a Location in SecureEdge. You must select at least one location for your source.
You cannot change the scope of an existing Web Filter policy.
For rules with the scope DNS Location, the following parameters are not applicable:
Actions – Alert and Warn
Sources – IP/Network, Site, and User/Group
The Silent option
Agents – This scope enables the evaluation of web filtering rules for the SecureEdge Access Agent. Note the following information regarding the scope Agents:
You cannot change the scope of an existing Web Filter policy.
You need to select at least one user or one group in the Source Criteria section of the Add New Rule page.
You can verify that changes to the Agents scope setting in the Audit Log have been made.
Agents-scoped rules have precedence over DNS Location-scoped rules in the Web Filter rule.
The following actions are available for the Web Filter policy:
Allow – The user can access the website. This is the default action.
Block – The user is blocked from viewing the website.
Alert – The user is allowed to access websites in this category, but the action is silently logged.
Warn – The user is redirected to a warning page and must click Continue to access the requested website.
Additional Information
Firefox Browser Settings for SecureEdge Access
On the Firefox browser, the Encrypted Client Hello (ECH) is enabled by default. ECH relies on DNS over HTTPS (DoH) to fetch the necessary public key. For Firefox to work as expected for SecureEdge Access, you must disable DoH from a network by blocking their canary domain.
For example, you create a Web Filter policy to block a specific website (e.g., http://yahoo.com) for all users. When a user tries to access the website using Firefox, the website loads without getting blocked and the notification does not pop up on the SecureEdge Agent. However, the same page is blocked when the user uses a different browser. The reason is that you must disable DoH on Firefox.
Reporting
SecureEdge Reporting allows you to collect data for reports for your connected Sites when Web Filtering is enabled. The Reporting data is streamed according to your selected region.
For more information on logs and reporting, see:
In addition, you can create reports and notifications using an Azure Log Analytics workspace. Your Barracuda SecureEdge service must be connected to the Azure Log Analytics workspace via the Azure Log Analytics Daemon.
For more Information, see:
How to Configure Log Streaming to Microsoft Azure Log Analytics Workspace.
How to Configure Log Streaming via the Azure Log Analytics Daemon in SecureEdge.
Further Information
For more information on User and Groups, see How to Connect Microsoft Entra ID with Barracuda Cloud Control.