ProxySG 6.6 Basic Administration:
Module 1: Introduction to the Symantec ProxySG Secure Web Gateway
Module 2: ProxySG Security Deployment Options
Module 3: ProxySG Management Console
Module 4: Traffic Interception Using Proxy Services
Module 5: Hypertext Transfer Protocol
Module 6: Introduction to the Visual Policy Manager
Module 7: Filtering Web Content
Module 8: Using Threat Intelligence to Defend the Network
Module 9: Ensuring Safe Downloads
Module 10: Notifying User of Internet Usage Policies
Module 11: Access Logging on the ProxySG
- Appendix A: ProxySG Initial Configuration
- Appendix B: IPv6 in ProxySG Deployments
ProxySG v6.6 Advanced Administration
Module 1: Using Authentication Realms
Module 2: Understanding Authentication Credentials
Module 3: Understanding Authentication Modes
Module 4: Understanding HTTPS
Module 5: Managing SSL Traffic on the ProxySG
Module 6: Optimizing SSL Interception Performance
Module 7: SGOS Architecture
Module 8: Caching Architecture
Module 9: System Diagnostics
Module 10: Introduction to Content Policy Language (CPL)
Module 11: Using Policy Tracing for Troubleshooting
Module 12: ProxySG Integration
Introduction
- Course environment
- Lab environment
Install and Implement Content Analysis.
- Initial Content Analysis configuration
- ICAP Overview and configuration
- API Setup
- Performance Profile configuration
Content Analysis Protection Layers.
- Technology Overview
- Preventing known bad files from reaching your environment
- Protect against known threats
- Detecting threats with artificial intelligence
- Detecting emerging threats through a sandboxed execution
Interface Content Analysis with other Symantec Solutions.
- Increase visibility with Symantec Reporter and Management Center
- Increase forensic knowledge with Security Analytics
- Extending mitigation and filtering with Symantec Endpoint Protection
Maintenance and troubleshooting for Content Analysis.
- Monitoring Content Analysis
- Troubleshooting Content Analysis