Secure Web Gateway Product Guide
- Proxies
 - About Proxies
 - Configure Proxies
 - Network Modes
 - Network Setup Settings
 - Explicit Proxy Mode
 - Transparent Proxy Settings
 - Transparent Proxy with WCCP Mode
 - Transparent Proxy with L2 Transparent Mode
 - Proxy HA Mode
 - Transparent Router Mode
 - Transparent Bridge Mode
 - Network Protocols
 - HTTP Proxy
 - FTP Proxy
 - ICAP Server
 - SOCKS Proxy
 - TCP Proxy
 - IFP Proxy
 - Instant Messaging
 - XMPP Proxy
 - Enable ICMP Redirects
 - Controlling Outbound Source IP Addresses
 - Node Communication Protocols
 - Packet Size Handling
 - Advanced and Extended Proxy Settings
 - Advanced Settings (for Proxies)
 - Timeouts for HTTP(S), FTP, and ICAP
 - Domain Name System
 - Data Exchange Layer
 - Best Practices - Working with the User-Agent Header
 - Bypassing for Office 365 and other Microsoft services
 - Reverse HTTPS proxy
 - Proxy Auto-Configuration
 - Return to Sender
 
- Central Management
 - About Central Management
 - Nodes in a Central Management Cluster
 - Overview of the Cluster Configuration
 - Add an appliance to a Central Management cluster
 - Join an Appliance to a Central Management Cluster
 - Generate a Cluster CA and Private key
 - Import a Cluster CA and Private key
 - Assign a Node to Network Groups
 - Assign a Node to a Runtime Group
 - Assign a Node to an Update Group
 - Best Practice: Configuring Central Management Node Groups
 - Verify the Synchronization of Nodes
 - Create a Tenant ID
 - Add a Scheduled Job
 - Update the Appliance Software in a Central Management Cluster
 - Configure a Cluster from the Command Line Interface
 
- Anti-Malware Filtering
 - About Anti-Malware Filtering
 - Anti-malware Filtering Process
 - Use Case: Blocking the Download of a Virus-Infected File
 - Configure Anti-Malware Filtering
 - Configure the Use of the Scanning Engines
 - Extending the Anti-Malware Filtering Process
 - Using URL Information for Anti-Malware Filtering
 - Integrating TIE Server Information with Anti-Malware Filtering
 - Anti-Malware Queue
 - Media Stream Scanning
 - Dealing with a Missing Host Header
 - GAM Engine
 
- URL Filtering
 - About URL Filtering
 - URL Filtering Process
 - URL Filtering Administration
 - Configure URL Filtering
 - Extending the URL Filtering Process
 - Use Case: Blocking a URL in a Forbidden Category
 - Best Practices - Using URL Properties to Whitelist Web Objects
 - URL Filtering Using the Dynamic Content Classifier
 - Using Your Own URL Filter Database
 - Using a GTI Private Cloud Service for URL Filtering
 - URL Filtering Using an IFP Proxy
 - URL Filter Settings
 - FAQs for Web Categorization and Reputation Lookup
 
- HTTPS Scanning
 - About HTTPS scanning
 - HTTPS Scanning Process and Administration
 - Configure HTTPS Scanning
 - Configure the Modules for HTTPS Scanning
 - Managing Certificates
 - Managing Certificates for Cloud Use
 - Replace the Default Root Certificate Authority
 - Client Certificate List
 - Using Skype for Business
 - Using AIA Entries for Certificate Downloads
 - Sending Tapped SSL Traffic to a Monitoring Device
 - Native Browser CA
 
- Advanced Threat Defense
 - About Advanced Threat Defense
 - Workflows for Using Advanced Threat Defense
 - Criteria for Additional Scanning by Advanced Threat Defense
 - Configuration Elements for Using Advanced Threat Defense
 - Using an Existing Advanced Threat Defense Scanning Report
 - Using an Ongoing Advanced Threat Defense Scanning Run
 - Limiting Object Sizes for Scanning by Advanced Threat Defense
 - Configure the Use of Advanced Threat Defense
 - Configure Key Elements for Using Advanced Threat Defense
 - Configure Settings for Using Advanced Threat Defense
 - Gateway Anti-Malware Settings
 - Monitoring the Use of Advanced Threat Defense
 
- Data Loss Prevention
 - About Data Loss Prevention
 - Configure Data Loss Prevention
 - Configure Data Loss Prevention Using Default Classifications
 - Configure Data Loss Prevention Using Dictionary Entries
 - Best practice: Set a Size Limit of Your Own for DLP filtering
 - Preventing Data Loss Using an ICAP server
 - Using an On-Premise DLP Server from the Cloud
 
- Authentication
 - About Authentication
 - Authenticating Users
 - Configure Authentication
 - Configure the Authentication Module
 - Implement a Different Authentication Method
 - Using System Settings to Configure Authentication
 - NTLM Agent Authentication
 - LDAP Digest Authentication
 - Enforce RADIUS Authentication Through Use of a Pam-Radius Module
 - Retrieving User Group Lists from an Azure AD
 - Best Practices - Configuring Authentication for Deployment Types
 - Best practices - Configuring LDAP Authentication
 - Instant Messaging Authentication
 - One-time Passwords
 - Client Certificate Authentication
 
- Monitoring
 - About Monitoring
 - Dashboard
 - Logging
 - Error Handling
 - Performance Measurement
 - Event Monitoring with SNMP
 - Transferring Data for Skyhigh ePO Monitoring
 - Best Practice: Monitoring File System Usage
 - Best Practices - Sending Access Log Data to a Syslog Server
 - Best Practice: Implementing TLS-Secured Usage of Syslog Data
 - Sending Syslog Data to Skyhigh Enterprise Security Manager
 
- Troubleshooting
 - Troubleshooting Methods
 - Rule Tracing
 - Using a Diagnostic Tool to Evaluate Regex Terms
 - Create a Feedback File
 - Enable the Creation of Core Files
 - Enable the Creation of Connection Tracing Files
 - Create a Packet Tracing File
 - Work with System and Network Tools
 - Restart a Service of the Operating System
 - Display Running AV Threads
 - Back Up and Restore an Appliance Configuration
 - Reset the Appliance Password
 - Migration to Skyhigh FQDN
 - SSH/SCP Connectivity Issue
 - Tenant Restrictions in Microsoft O365
 - Microsoft Entra Conditional Access IP Geo-localization
 
- REST Interface
 - Authenticating to the interface
 - Enable use of the interface
 - Give permission to access the interface
 - Performing basic REST operations
 - Prepare use of the REST interface
 - Requesting resources
 - Requesting version information
 - Secure Web Gateway REST Interface
 - Using curl as the data transfer tool
 - Working on appliances
 - Working with configurations and settings
 - Working with files uploaded for troubleshooting
 - Working with lists
 - Working with log files
 - Working with rule sets
 - Working with system file
 - Working with the REST interface
 
