What is the simplest way to block all users from visiting a TLD? This seems like a basic functionality but I haven't found a good answer.
This thread was automatically locked due to age.
Badrobot said:https?://[A-Za-z0-9.-]*\.ru/
http?://[A-Za-z0-9.-]*\.ru/
If working with this REGEX Snippets, then the pattern for an URL with Path behind should be added as well (for Example mydomain.ru/mypage/index.php wouldnt be affected by this REGEX Snippets above). Afterwards this Regex Snippet can be used to create an URL Group that afterwards can be used in Webfilter Policy.
By the way... Why do you want to block all *.ru pages? not all of those are bad... I don't se a usecase for something like this :-S
Please try adding one of those snippets in a URL Group entry. The Sophos won't accept it: You must enter a valid domain name
Some TLDs simply aren't hosting anything that would be needed in our line of business. If that changes we have a process for whitelisting.
Good Point, I have been playing around with it, https://regex101.com/r/UPBMbG/1/tests has a nice engine for testing if anyone is interested.
Since we are not really trying to block a TLD but a domain suffix I wonder if this would work
[.](ru)
Have not tested it though.
Custom categories and URL Groups do not support RegEx.
See here for more details:
https://community.sophos.com/kb/en-us/127270
I'm not 100% sure but I believe a URL Group just containing "ru" will do it.
FQDN Host objects appear to not like a top level domain.
You should also consider country blocking (uses GeoIP). Set the Destination Zone to WAN and the Destination Network to Russian Federation. This will block anything hosted in Russia but not .ru sites that are hosted elsewhere.
I would be careful of Country Blocking, all be it some are obvious i.e. you probably do not do anything with Russia or China and most businesses are not going to establish a data hub there with all the malicious hacking going on from either of them. However you need to know your countries if you are doing this, for example Microsoft has data hubs in Singapore, Germany and many other countries that can cause issues with Office 365. Many AWS servers are not always native to the US either, anyway good practice but don't just blanket the planet, do a few at a time and check things in the logs to see what is being blocked.
In our business users have no need to be on sites outside Australia, Japan, NZ, Singapore etc so for them to be going to China, Russia, etc is really a no no.
That said we all understand not all these locations host bad content.
An interesting fact from a recent Webroot report:
Russia only hosts 3% of the bad URLs and China 5%
The really worrying thing is:
LOL yeah that will fix it.
It's bad enough using Office 365 and with the "Load Balancing" we get our data hitting servers in HK and China (I am in Melbourne)
Then there is TeamViewer with servers all over Europe
A few exceptions need to be created to my world of blocking everything LOL
Seriously though, as a completely separate thing from website categorization there is a large effort within Sophos Labs to block malware URLs and domains. To this end, everyone should make sure they are always blocking the "Criminal Activities" User Activity (or the categories within it).
As examples, regardless of geography, I don't know where a ".online" or ".loan" domain might be physically hosted but I know my users don't have any business going there.