Skyhigh Secure Web Gateway (On-Prem)
- Secure Web Gateway Hardware
- Working with the Hardware for Secure Web Gateway
- Secure Web Gateway Appliance Hardware Models
- Adding a Module Card
- Replacing a Disk Using the mwg-raid Tool
- Updating the Appliance Software with a Disk Tool
- Assigning Ports on a Blade Server
- Hardware Administration Functions and Tools
- Replacing a Hard-disk Drive
- Replacing a Power Supply Unit
- Secure Web Gateway Installation
- System Requirements for Installing Secure Web Gateway
- Installing Secure Web Gateway for the First Time
- Upgrading to a New Web Gateway Version
- Installing Secure Web Gateway in AWS
- Installing Secure Web Gateway in Azure
- Installing Secure Web Gateway in Azure with Hyper-V
- Installing Secure Web Gateway in L2 Transparent Mode as a Virtual Cloud Resource on AWS or Azure
- Troubleshooting the Secure Web Gateway Installation
- Installing Secure Web Gateway on Nutanix
- Installing Secure Web Gateway on KVM
- Anti-malware Filtering
- About Anti-malware Filtering
- Anti-malware Filtering Process
- Anti-malware Queue
- Blocking the Download of a Virus-infected File
- Configure Anti-malware Filtering
- Configure Integrating TIE Server with Anti-malware Filtering
- Configure Settings for Reduced Use of the Gateway Anti-Malware Engine
- Configure the Scanning Engines
- Dealing with a Missing Host Header
- Extending the Anti-malware Filtering Process
- How to obtain beta GAM engine
- Integrating TIE Server Information with Anti-malware Filtering
- Malware Submission - How to submit false positive/negative samples for review
- Media Stream Scanning
- Using URL Information for Anti-malware Filtering
- URL Filtering
- About URL Filtering
- Best Practices - Use URL Properties for Configuring Bypass Lists
- Block a URL in a Forbidden Category
- Configure the IFP Proxy Settings
- Configure URL Filtering
- Create a Rule Set to Filter IFP Requests
- Extend the URL Filtering Process
- FAQs for Web Categorization and Reputation Lookup
- Modify an Authentication Rule Set to Include the IFP Protocol
- URL Filtering Administration
- URL Filtering Process
- URL Filtering Using an IFP Proxy
- URL Filtering Using the Dynamic Content Classifier
- URL Filter Settings
- Using a GTI Private Cloud Service for URL Filtering
- Using Your Own URL Filter Database
- Media Type Filtering
- About Media Type Filtering
- Configure Key Elements for Media Type Filtering
- Configure Media Type Filtering Using the Complete Rules View
- Create a Filter List for a Modified Rule
- Media Type Detection for InDesign
- Media Type Filtering Administration
- Media type filtering issue while downloading files through Gmail
- Media Type Filtering Process
- Replace a Property in a Media Type Filtering Rule
- HTTPS Scanning
- About HTTPS Scanning
- Client Certificate List
- Configure HTTPS Scanning
- Configure the Modules for HTTPS Scanning
- HTTPS Scan Process and Administration
- Managing Certificates
- Managing Certificates for Cloud Use
- Native Browser CA
- Replace the Default Root Certificate Authority
- Sending Tapped SSL Traffic to a Monitoring Device
- Using AIA Entries for Certificate Downloads
- Using Skype for Business
- Hardware Security Module
- About the Hardware Security Module
- Components of a Hardware Security Module Solution
- Hardware Security Module Versions for Secure Web Gateway
- Key Handling with a Hardware Security Module
- Limitations When Working with a Hardware Security Module
- Using Private Keys from an Azure Key Vault
- Work with a Hardware Security Module
- Advanced Threat Defense
- About Advance Threat Defense
- Configuration Elements to Use Advanced Threat Defense
- Configure Advanced Threat Defense
- Configure Key Elements to Use Advanced Threat Defense
- Configure Settings to use Advanced Threat Defense
- Criteria for Additional Scanning by Advanced Threat Defense
- Gateway Anti-Malware Settings
- Limit Object Sizes for Scanning by Advanced Threat Defense
- Monitor Advanced Threat Defense
- Use an Existing Advanced Threat Defense Scanning Report
- Use an Ongoing Advanced Threat Defense Scanning Run
- Workflows to Use Advanced Threat Defense
- Data Loss Prevention
- About Data Loss Prevention
- Best Practice: Set a Size Limit for DLP Filtering
- Configure Data Loss Prevention
- Configure Data Loss Prevention Using Default Classifications
- Configure Data Loss Prevention Using Dictionary Entries
- Migrating Web Protection Suite and Web Gateway Cloud Service to Web Protection Suite 2 and Skyhigh SWG
- Prevent Data Loss Using an ICAP Server
- Use an On-premises DLP Server from the Cloud
- Troubleshooting
- Back up and restore an appliance configuration
- Create a Feedback File
- Create a packet tracing file
- Display running AV threads
- Enable the creation of connection tracing files
- Enable the creation of core files
- Migration to Skyhigh FQDN
- Reset the appliance password
- Restart a service of the Operating System
- Rule Tracing
- Tenant Restrictions in Microsoft O365
- Troubleshooting methods
- Use a diagnostic tool to evaluate Regex terms
- Work with System and Network tools
- REST Interface
- Authenticating to the interface
- Enable use of the interface
- Give permission to access the interface
- Performing basic REST operations
- Prepare use of the REST interface
- Requesting resources
- Requesting version information
- Secure Web Gateway REST Interface
- Using curl as the data transfer tool
- Working on appliances
- Working with configurations and settings
- Working with files uploaded for troubleshooting
- Working with lists
- Working with log files
- Working with rule sets
- Working with system file
- Working with the REST interface
- Cloud Single Sign-on
- About Cloud single sign-on
- Connector List for Connector Catalog as a Service (CCaaS) v141 with known issues
- Considerations when exporting and importing the SSO rule set
- Creating bookmarks to cloud services for your organization
- Customizing the application launchpad
- How cloud single sign-on is configured
- How users work with the application launchpad
- Locate information about the latest SSO updates
- Monitoring logons to cloud services on the dashboard
- New Connector List for Connector Catalog as a Service (CCaaS) v141
- Providing SSO services for .NET and Java web applications
- Providing SSO services for HTTP cloud applications
- Providing SSO services for SAML 2.0 cloud applications
- Resolving SSO issues
- SAML authentication using an external Identity Provider
- Single Sign On rule set summary
- SSO Catalog of supported cloud services
- SSO Connector Lists
- SSO logging overview
- SSO process in proxy and non-proxy modes
- Supported authentication methods
- Content Security Reporter (CSR)
- Working with Content Security Reporter
- Content Security Reporter System Requirements
- Content Security Reporter Installation
- Content Security Reporter Post-installation Tasks
- Getting Started with Content Security Reporter
- Upgrade Content Security Reporter
- Uninstall Content Security Reporter
- Report Server Settings
- Reporting
- Content Security Reporter Interface Reference
- Content Security Reporter Maintenance
- Known Issues and Workarounds