Last adaptation to the version: 2.14 (02.2026)
- The "Number of requests to external devices" has been removed
- 04.2026
- Note regarding SafeSearch restrictions added
Overview
| Under an overview of all current Cloud Shield Profiles is displayed. Using the Add profile button, a new profile can be created. |
![]() | ||
General Options
| |||
| Filters the display | |||
| Sort |
Clicking this button opens a menu where tiles can be sorted by specific criteria | ||
| Name | |||
| Displays the search results alphabetically ascending/descending | |||
Tile overview | |||
| Managed Devices |
The profile has the type Managed Devices | ||
| External devices |
The profile has the type External devices | ||
| Managed by ICS notempty New as of: 2.10 |
The profile has been migrated from Intelligent Cloud Shield (ICS)
| ||
| Allowed hosts: | 0 | Number of hosts explicitly authorized by this profile | |
| Blocked hosts: | 0 | Number of hosts blocked by this profile | |
| Filter categories: | 3 | Number of selected categories in this profile | |
| 3 | Number of countries filtered by this profile | ||
| Protocols: | Deaktiviert | Status of the logs for this profile | |
| MDM profiles: Only for Managed devices |
Doku | MDM profiles that use this Cloud Shield profile | |
| Number of devices: Only for External devices |
10 | Number of devices using this Cloud Shield profile. | |
| UTM-Profiles: | Doku | UTM profiles using this Cloud Shield profile | |
| Configuration: |
show | Opens a dialog in which the setup of the Cloud Shield profile is displayed for all possible devices, as well as the data required in each case (e.g. configuration ID).
For profiles of type Verwaltete Geräte, the profile can be added to MDM profiles. For profiles of type External devices, there are explanations for using the Cloud Shield for the following options: notempty New as of: 2.8.x
Chrome:
Firefox:
Edge:
notempty
No changes need to be made to existing router configurations.
notempty
New as of: 2.10 | |
Tile Options | |||
| Using the button at the top right of each profile tile, the following options are available: | |||
| Edit | View and edit profile settings. For details, see Create/Edit | ||
| Copy | Copies this profile | ||
| Deactivate blocking | The blocklist and external lists of the profile is disabled for a configuration period of time
| ||
| Delete | Deletes the profile from the portal. The deletion must be confirmed withOK
notempty Profiles can only be deleted if they are not assigned to any MDM or UTM profile. notempty Only for Cloud Shield profiles of the type external devices When a Cloud Shield Profile is deleted, a push notification is sent to the device indicating that the Cloud Shield configuration has been removed. An appropriate error message is displayed in the Cloud Shield app. | ||
Create/Edit
Security Security | |||
| DNS rebinding protection | By enabling this feature, attackers are prevented from gaining control over local devices via the internet by automatically blocking DNS responses that contain private IP addresses. Both private IPv4 and private IPv6 addresses are blocked. | ![]() | |
| Extended DNS Rebinding Protection | When activated , IPv6 addresses that are reserved for special network purposes such as documentation, tunneling or packet discarding are blocked. These are not typically used on the internet. | ||
| IDN Homograph Attack protection | By activating this option, domains that pretend to be other domains by misusing the large character encoding that is available with the introduction of Internationalized Domain Names (IDNs) are blocked. With this option, only domains with ASCII characters are permitted. | ||
| Blocking of disguised third-party trackers | The activation blocks third-party trackers that disguise themselves as first-party providers. This attack is also known as CNAME cloaking. | ||
| Safe Search | Activation filters the results in most major search engines, including images and videos. notempty
Not all search engines support SafeSearch in a way that is usable for Cloud Shield! Show supported search engines hide Klicken für dauerhafte Anzeige Search engines with Safe Search support in Cloud Shield:
| ||
| Restricted youtube mode | By activating this, YouTube content for adults is filtered. All comments will also be hidden. | ||
| Block Private Relay |
| ||
AI Filter AI Filter Experimental | |||
| The AI-based filter detects previously unknown threats through real-time risk analysis. Only domains that are not already classified by our content filter are checked. | ![]() | ||
notempty
No data transfer: All analyses take place in the Securepoint infrastructure - there is no transmission to third parties!
Own AI development: The filter is based on Securepoint's own machine learning model - specifically trained on current threat patterns on the web. | |||
| Activate AI Filter | When activated , malicious domains are blocked with the Securepoint machine learning model, which has been trained with tens of thousands of benign and malicious domains. | ||
| Rating | Adjust the threshold individually to the security needs. The lower the threshold, the more potentially harmful pages will be blocked - even if this can lead to some false positives. | ||
| 50% | A page is blocked with a probability of 50%.
| ||
| 70% | Blocks pages that are classified as threatening with a probability of least 70%.
| ||
| 90% | Ideal for uasers who want maximum freedom on the web while still being protected from clearly malicious pages.
| ||
Allow list Allow list | |||
| Allowed IPs | Explicitly allowed IP addresses (even if they are on the block list) | ![]() | |
| Allowed domains | Domains that should be allowed. A subdomain can also be added to allow this if the associated higher domain is not allowed. | ||
Block list Block list | |||
| Blocked IP's | IP addresses that are to be blocked | ![]() | |
| Blocked domains | Domains that are to be blocked. This also blocks all associated subdomains. If certain subdomains are to be allowed, they can be explicitly added to the allow list. | ||
External Lists External Lists | |||||||||||||
| Custom Blocklists | Add Blocklist | Adding custom blocklists. All common formats are supported, e.g. hosts and ABP. | ![]() | ||||||||||
| Custom Blocklists | |||||||||||||
| Activated | When activated , the blocklist is activated | ||||||||||||
| Name | Name of the blocklist | ||||||||||||
| URL | URL of the blocklist | ||||||||||||
| Authentication notempty
New as of: 2.12 | |||||||||||||
| Authentication method | No authentication | Sets the authentication method for accessing the list | |||||||||||
| |||||||||||||
| Username For the Basic-Authentication method |
The username for authentication | ||||||||||||
| Password For the Basic-Authentication method |
Show password Hide password |
The password for authentication | |||||||||||
| Bearer-Token For the Bearer-Token method |
Show password Hide password |
Enter the required Bearer-Token | |||||||||||
| HTTP-Header notempty New as of: 2.12 |
Add HTTP-Header | Add custom HTTP headers for accessing the list | |||||||||||
| Header | |||||||||||||
| Key | X-Example-Header | The key for the HTTP-Header | |||||||||||
| Value | 12345 | The value for the HTTP-Header key | |||||||||||
| Custom Allowlists | Add Blocklist | Adding custom allowlists. All common formats are supported, e.g. hosts and ABP. | |||||||||||
| Custom Allowlists | |||||||||||||
| Activated | When activated , the allowlist is activated | ||||||||||||
| Name | Name of the allowlist | ||||||||||||
| URL | URL of the allowlisten | ||||||||||||
| Authentication notempty
New as of: 2.12 | |||||||||||||
| Authentication method | No authentication | Sets the authentication method for accessing the list | |||||||||||
| |||||||||||||
| Username For the Basic-Authentication method |
The username for authentication | ||||||||||||
| Password For the Basic-Authentication method |
Show password Hide password |
The password for authentication | |||||||||||
| Bearer-Token For the Bearer-Token method |
Show password Hide password |
Enter the required Bearer-Token | |||||||||||
| HTTP-Header notempty New as of: 2.12 |
Add HTTP-Header | Add custom HTTP headers for accessing the list | |||||||||||
| Header | |||||||||||||
| Key | X-Example-Header | The key for the HTTP-Header | |||||||||||
| Value | 12345 | The value for the HTTP-Header key | |||||||||||
DNS-Rewrites DNS-Rewrites | |||||||||||||
| DNS-IP-Rewrites | Add IP-Rewrite | Define or overwrite the DNS response for any domain. Any IP address can be used as the response. | ![]() | ||||||||||
| DNS-IP-Rewrites | |||||||||||||
| Domain | printer.lan | Domain which is to be overwritten | |||||||||||
| Answer | 192.168.0.42 | IPs that are sent in response to the overwritten domain | |||||||||||
| DNS-CNAME-Rewrites | Add CNAME rewrites | Define or overwrite the DNS response for any domain. Any other domain can be used as the response. | |||||||||||
| DNS-CNAME-Rewrites | |||||||||||||
| Domain | ttt-point.de | Domain which is to be overwritten | |||||||||||
| Answer | intern.ttt-point.de | Domain that is sent in response to the overwritten domain | |||||||||||
Protocols Protocols | |||||||||||||
| Activate protocols | Activates the recording of DNS logs. This setting is required for evaluating the statistics. | ![]() | |||||||||||
| Log domains is only displayed if Enable protocols is activated |
If this setting is set, domain names are saved for the statistics and logs. Otherwise, a placeholder is displayed. | ||||||||||||
| Log device names is only displayed if Enable protocols is activated |
If this setting is set, the device names for the statistics and logs are saved independently of the client setting. | ||||||||||||
Others Others | |||||||||||||
| Performance | ![]() | ||||||||||||
| Cache-Boost | Reduces the number of DNS queries by enforcing a minimum TTL (Time-To-Live) of 5 minutes. Higher TTLs are not overwritten. | ||||||||||||
| Behavior for blocked domains | |||||||||||||
| Behaviour | Block page | Specifies the action for blocked domains | |||||||||||
| |||||||||||||
Assignment
A Cloud Shield profile can be assigned to an iOS profile under / Tab Cloud Shield.
iOS Cloud Shield
iOS Cloud Shield| Caption | Value | Description | ![]() | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| Activate Cloud Shield |
Activate Cloud Shield with this profile. This allows the profile to be linked with a Cloud Shield profile
notempty A corresponding message will be displayed if no VPP license is available: To use the Cloud Shield feature, you need a VPP license for the Securepoint Cloud Shield app from Apple Business Manager
New as of: 2.12 | ||||||||||
| Profile | TTT-Point DNS | Select Cloud Shield profile whose Cloud Shield configuration should be used.
| |||||||||
| Name | Device Custom name | Choose which attribute should be used as the device name to identify the devices in Cloud Shield statistics and logs | |||||||||
| |||||||||||
| Install CA for block page | When enabled the CA certificate for the block page is installed on the device, so that no certificate warnings are shown when a page is blocked. | ||||||||||
| Allow Cloud Shield deactivation notempty New as of: 2.13 |
| ||||||||||
| Exclude SSIDs notempty New as of: 2.13 |
Add SSIDs | Enter the Wi-Fi SSIDs where the Cloud Shield service should be disabled | |||||||||
A Cloud Shield profile can be assigned to an Android profile under / Tab Cloud Shield.
Android Cloud Shield
Android Cloud Shield| Caption | Value | Description | ![]() | |
|---|---|---|---|---|
| Activate Cloud Shield | After enabling a Cloud Shield Profile can be selected, and the Cloud Shield App for Android will be installed automatically. In the Applications tab, the Securepoint Cloud Shield app is automatically added
| |||
| Profile |
Select Profile | The Cloud Shield profile to be used for the Cloud Shield configuration.
| ||
| Install CA for block page | If is activated, the CA certificate for the block page is installed on the device so that certificate warnings are no longer displayed if a page is blocked. In the
| |||
| Allow interruption of Cloud Shield notempty New as of: 2.13 |
| |||
| Exclude SSIDs notempty New as of: 2.13 |
Add SSIDs |
| ||
| Exclude apps notempty New as of: 2.13 |
Add package names | Enter the package names of the apps that should bypass the Cloud Shield service | ||

















