Contexts are a powerful way of implementing different security policies depending on the computer's network environment.
Contexts are designed to be associated with Firewall and Intrusion Prevention Rules. If the conditions defined in the Context associated with a Rule are met, the Rule is applied. (To link a Security Rule to a Context, go to the Options tab in the Security Rule's Properties window and select the Context from the "Context" drop-down menu.)
Contexts can be used to provide Agents with "location awareness". To determine a computer's location, Contexts examine the nature of the computer's connection to its domain controller and connectivity to the Internet. Select the Context applies when Domain Controller connection is option and choose from the following:
By assessing the ability of the computer to connect with its domain controller or the Internet, the Agent can then implement rules such as restricting HTTP traffic to non-routable ("private") IP addresses only.
From the toolbar or the right-click shortcut menu on the Contexts page, you can:
Clicking New (
) or Properties (
) displays the Context Properties window.
The name and description of the Context Rule as well as the earliest version of the Vulnerability ProtectionDeep Security Agent the rule is compatible with.
Specifying an option here will determine whether or not the Firewall Rule is in effect depending on the ability of the computer to connect to its Domain Controller or its Internet Connectivity. (Conditions for testing Internet Connectivity can be configured in Administration > System Settings > Contexts.)
If the Domain Controller can be contacted directly (via ICMP), the connection is "Local". If it can be contacted via VPN only, then the connection is "Remote (VPN) ".
The time interval between Domain Controller connectivity tests is the same as the Internet Connectivity Test interval which is also configurable in Administration > System Settings > Contexts.
This context will apply to network interfaces on which traffic has been restricted through the use of Interface Isolation. (Primarily used for Allow or Force Allow Firewall Rules.)
The Assigned To tab displays a list of the rules making use of this Context.