Skyhigh Secure Web Gateway (Cloud)
- Start Here with Secure Web Gateway
- About Working with Secure Web Gateway
- Sign In to Skyhigh Security Cloud for the First Time
- Applying Setup and Web Policy Changes Globally
- Using Different Views for Working with Secure Web Gateway
- Upgrade from the Old to the New View of the User Interface
- Finding Documentation for Secure Web Gateway
- Review Configuration Changes When Working with Secure Web Gateway
- Secure Web Gateway Setup
- Completing the Secure Web Gateway Setup
- Configuring Skyhigh Client Proxy
- Managing Certificate Authorities
- Configuring SAML Authentication
- Enabling Active Directory Lookups for User Groups
- Configuring Locations
- Configuring Log Data Residency
- Configuring a Device Profile
- Importing an On-prem Policy
- Backing Up and Restoring Secure Web Gateway
- Configuring Rule Tracing in SWG (Cloud)
- Skyhigh Mobile Cloud Security (SMCS)
- Skyhigh Dedicated Egress IP Capability
- Secure Web Gateway Concepts
- Allocating GRE Tunnels
- Allow IP Address Ranges for Points of Presence
- Before Configuring IPsec
- Benefits of SAML Authentication
- Cloud Connector User Role for SSE Hybrid Users
- Configure Trust between WGCS and Endpoints
- Configuring SAML Parties to Work Together
- Enable Dashboard Notifications for Fallback Policies
- Hiding Sensitive Information in Logs and on the User Interface
- How Mobile Cloud Security Protects Devices
- Isolated Sites Page
- Lists of IP Addresses and Other Parameters for Use in Network Configuration
- Proxy and Customer ID
- Required Roles for Web Setup and Policy Management
- Requirements for Certificate Security
- Routing Web Traffic to PoPs
- Rule Set Scopes
- SAML Authentication Alone or with Location
- Secure Communication between Client Proxy and Secure Web Gateway
- Skyhigh Security Peering Partners
- Updating Secure Web Gateway IP Address Ranges and the Legacy Proxy Domain Name
- Use DNS Prefixes for Countries and Regions to Route Web Traffic
- Web Access Data for Storage and Reporting
- Web Components, Technologies, and Policies
- Web Dashboard
- Web Malware Page
- Web Traffic Page
- Web Users Page
- Work with Operators When Scheduling a Report
- Configuring a Web Policy
- Completing Your Web Policy Configuration
- Configuring Rules and Rule Sets
- Working with Default and Library Rule Sets
- Configuring Rules for Key Fields of Web Security
- Working with Lists
- Working with Feature Configurations
- Working with End User Notification Pages
- Lists of Web Policy Configuration Elements
- Troubleshooting
- Remote Browser Isolation (RBI)
- About Configuring Remote Browser Isolation
- Browsers Supported by Remote Browser Isolation (RBI)
- Browser Isolation Dashboard
- Control Licenses to Apply Full Isolation to Browser Sessions
- Enable Remote Browser Isolation for Any Website — Old View
- Enable Remote Browser Isolation for a Risky Website — Old View
- Enable Remote Browser Isolation for SWG On-Prem and Hybrid
- Full Isolation — Use Browser Isolation for Websites Based on Your Customized Selection
- Isolated File Transfers Page
- Isolated Sites Page
- Remote Browser Isolation - Best Practices
- Restriction to Working with Remote Browser Isolation
- Risky Web — Use Browser Isolation for Websites Considered a Risk
- Troubleshooting an Issue with Remote Browser Isolation and HTTPS Scanning
- Migrating WGCS to SWG
- About Migrating from WPS to WPS2 and from WGCS to SWG Cloud
- Migrate from WGCS to SWG Cloud (ePO-Cloud-managed SCP Agent and Policy)
- Migrate from WPS to WPS2 (ePO-managed SCP Agent and Policy)
- Migration Steps for Reporting(Content Security and Logging Client
- Reconfigure IP Authentication for ePO Cloud
- Reconfigure SAML Authentication with Explicit Proxy
- Reconfigure IPSec Tunnels in ePO Cloud