Secure Web Gateway Product Guide
- Proxies
- About Proxies
- Configure Proxies
- Network Modes
- Network Setup Settings
- Explicit Proxy Mode
- Transparent Proxy Settings
- Transparent Proxy with WCCP Mode
- Transparent Proxy with L2 Transparent Mode
- Proxy HA Mode
- Transparent Router Mode
- Transparent Bridge Mode
- Network Protocols
- HTTP Proxy
- FTP Proxy
- ICAP Server
- SOCKS Proxy
- TCP Proxy
- IFP Proxy
- Instant Messaging
- XMPP Proxy
- Enable ICMP Redirects
- Controlling Outbound Source IP Addresses
- Node Communication Protocols
- Packet Size Handling
- Advanced and Extended Proxy Settings
- Advanced Settings (for Proxies)
- Timeouts for HTTP(S), FTP, and ICAP
- Domain Name System
- Data Exchange Layer
- Best Practices - Working with the User-Agent Header
- Bypassing for Office 365 and other Microsoft services
- Reverse HTTPS proxy
- Proxy Auto-Configuration
- Return to Sender
- Central Management
- About Central Management
- Nodes in a Central Management Cluster
- Overview of the Cluster Configuration
- Add an appliance to a Central Management cluster
- Join an Appliance to a Central Management Cluster
- Generate a Cluster CA and Private key
- Import a Cluster CA and Private key
- Assign a Node to Network Groups
- Assign a Node to a Runtime Group
- Assign a Node to an Update Group
- Best Practice: Configuring Central Management Node Groups
- Verify the Synchronization of Nodes
- Create a Tenant ID
- Add a Scheduled Job
- Update the Appliance Software in a Central Management Cluster
- Configure a Cluster from the Command Line Interface
- Anti-Malware Filtering
- About Anti-Malware Filtering
- Anti-malware Filtering Process
- Use Case: Blocking the Download of a Virus-Infected File
- Configure Anti-Malware Filtering
- Configure the Use of the Scanning Engines
- Extending the Anti-Malware Filtering Process
- Using URL Information for Anti-Malware Filtering
- Integrating TIE Server Information with Anti-Malware Filtering
- Anti-Malware Queue
- Media Stream Scanning
- Dealing with a Missing Host Header
- GAM Engine
- URL Filtering
- About URL Filtering
- URL Filtering Process
- URL Filtering Administration
- Configure URL Filtering
- Extending the URL Filtering Process
- Use Case: Blocking a URL in a Forbidden Category
- Best Practices - Using URL Properties to Whitelist Web Objects
- URL Filtering Using the Dynamic Content Classifier
- Using Your Own URL Filter Database
- Using a GTI Private Cloud Service for URL Filtering
- URL Filtering Using an IFP Proxy
- URL Filter Settings
- FAQs for Web Categorization and Reputation Lookup
- HTTPS Scanning
- About HTTPS scanning
- HTTPS Scanning Process and Administration
- Configure HTTPS Scanning
- Configure the Modules for HTTPS Scanning
- Managing Certificates
- Managing Certificates for Cloud Use
- Replace the Default Root Certificate Authority
- Client Certificate List
- Using Skype for Business
- Using AIA Entries for Certificate Downloads
- Sending Tapped SSL Traffic to a Monitoring Device
- Native Browser CA
- Advanced Threat Defense
- About Advanced Threat Defense
- Workflows for Using Advanced Threat Defense
- Criteria for Additional Scanning by Advanced Threat Defense
- Configuration Elements for Using Advanced Threat Defense
- Using an Existing Advanced Threat Defense Scanning Report
- Using an Ongoing Advanced Threat Defense Scanning Run
- Limiting Object Sizes for Scanning by Advanced Threat Defense
- Configure the Use of Advanced Threat Defense
- Configure Key Elements for Using Advanced Threat Defense
- Configure Settings for Using Advanced Threat Defense
- Gateway Anti-Malware Settings
- Monitoring the Use of Advanced Threat Defense
- Data Loss Prevention
- About Data Loss Prevention
- Configure Data Loss Prevention
- Configure Data Loss Prevention Using Default Classifications
- Configure Data Loss Prevention Using Dictionary Entries
- Best practice: Set a Size Limit of Your Own for DLP filtering
- Preventing Data Loss Using an ICAP server
- Using an On-Premise DLP Server from the Cloud
- Authentication
- About Authentication
- Authenticating Users
- Configure Authentication
- Configure the Authentication Module
- Implement a Different Authentication Method
- Using System Settings to Configure Authentication
- NTLM Agent Authentication
- LDAP Digest Authentication
- Enforce RADIUS Authentication Through Use of a Pam-Radius Module
- Retrieving User Group Lists from an Azure AD
- Best Practices - Configuring Authentication for Deployment Types
- Best practices - Configuring LDAP Authentication
- Instant Messaging Authentication
- One-time Passwords
- Client Certificate Authentication
- Monitoring
- About Monitoring
- Dashboard
- Logging
- Error Handling
- Performance Measurement
- Event Monitoring with SNMP
- Transferring Data for Skyhigh ePO Monitoring
- Best Practice: Monitoring File System Usage
- Best Practices - Sending Access Log Data to a Syslog Server
- Best Practice: Implementing TLS-Secured Usage of Syslog Data
- Sending Syslog Data to Skyhigh Enterprise Security Manager
- Troubleshooting
- Troubleshooting Methods
- Rule Tracing
- Using a Diagnostic Tool to Evaluate Regex Terms
- Create a Feedback File
- Enable the Creation of Core Files
- Enable the Creation of Connection Tracing Files
- Create a Packet Tracing File
- Work with System and Network Tools
- Restart a Service of the Operating System
- Display Running AV Threads
- Back Up and Restore an Appliance Configuration
- Reset the Appliance Password
- Migration to Skyhigh FQDN
- SSH/SCP Connectivity Issue
- Tenant Restrictions in Microsoft O365
- REST Interface
- Authenticating to the interface
- Enable use of the interface
- Give permission to access the interface
- Performing basic REST operations
- Prepare use of the REST interface
- Requesting resources
- Requesting version information
- Secure Web Gateway REST Interface
- Using curl as the data transfer tool
- Working on appliances
- Working with configurations and settings
- Working with files uploaded for troubleshooting
- Working with lists
- Working with log files
- Working with rule sets
- Working with system file
- Working with the REST interface