Skyhigh Secure Web Gateway (On Prem)
- Secure Web Gateway Hardware
- Working with the Hardware for Secure Web Gateway
- Secure Web Gateway Appliance Hardware Models
- Adding a Module Card
- Replacing a Hard-disk Drive
- Using the mwg-raid Tool To Replace a Disk
- Replacing a Power Supply Unit
- Reimaging the Appliance Software with a Disk Tool
- Port Assignments on a Blade Server
- Hardware Administration Functions and Tools
- Secure Web Gateway Installation
- System Requirements for Installing Secure Web Gateway
- Installing Secure Web Gateway for the First Time
- Upgrading the Secure Web Gateway Software Version
- Installing Secure Web Gateway in AWS
- Installing Secure Web Gateway in Azure
- Installing Secure Web Gateway in Azure with Hyper-V
- Installing Secure Web Gateway on Nutanix
- Installing Secure Web Gateway on KVM
- Installing Secure Web Gateway in L2 Transparent Mode
- Troubleshooting the Secure Web Gateway Installation
- Secure Web Gateway Appliance System
- About Configuring the Appliance System
- Bonding Network Interfaces
- Closed Networks
- Configuring Network Interfaces
- Configuring System Settings
- Handling Updates
- Resize the Cache Volume
- Secure Web Gateway System Settings
- Source-based Routing
- System Files
- Troubleshooting an Issue with IP Addresses for Network Interfaces
- Using a Browser Without Java Support for Working with Secure Web Gateway
- Secure Web Gateway Proxy Configuration
- About Proxy Configuration
- Explicit Proxy Mode
- Proxy HA Mode
- Transparent Proxy with WCCP Mode
- Transparent Proxy with L2 Transparent Mode
- Transparent Router Mode
- Transparent Bridge Mode
- HTTP Proxy
- FTP Proxy
- ICAP Server
- SOCKS Proxy
- TCP Proxy
- IFP Proxy
- XMPP Proxy
- Reverse HTTPS Proxy
- Proxy Auto-configuration
- Advanced Proxy Settings
- Secure Web Gateway Cluster Configuration
- About Cluster Configuration
- Add an Appliance as a Node to a Cluster
- Add a Scheduled Job
- Assign a Node to an Update Group
- Assign a Node to a Runtime Group
- Assign a Node to Network Groups
- Best Practices — Configuring Node Groups in a Cluster
- Configure a Cluster from the Command Line Interface
- Create a Tenant ID
- Generate Secure Communication Items on an Appliance
- Import Secure Communication Items on an Appliance
- Join an Appliance as a Node to a Cluster
- Nodes in a Cluster
- Update the Appliance Software in a Cluster
- Verify the Synchronization of Nodes
- Workflow for Configuring a Cluster — Overview
- Anti-malware Filtering
- About Anti-malware Filtering
- Anti-malware Filtering Process
- Anti-malware Queue
- Blocking the Download of a Virus-infected File
- Configure Anti-malware Filtering
- Configure Integrating TIE Server with Anti-malware Filtering
- Configure Settings for Reduced Use of the Gateway Anti-Malware Engine
- Configure the Scanning Engines
- Dealing with a Missing Host Header
- Extending the Anti-malware Filtering Process
- How to obtain beta GAM engine
- Integrating TIE Server Information with Anti-malware Filtering
- Malware Submission - How to submit false positive/negative samples for review
- Media Stream Scanning
- Using URL Information for Anti-malware Filtering
- URL Filtering
- About URL Filtering
- Best Practices - Use URL Properties for Configuring Bypass Lists
- Block a URL in a Forbidden Category
- Configure the IFP Proxy Settings
- Configure URL Filtering
- Create a Rule Set to Filter IFP Requests
- Extend the URL Filtering Process
- FAQs for Web Categorization and Reputation Lookup
- Modify an Authentication Rule Set to Include the IFP Protocol
- URL Filtering Administration
- URL Filtering Process
- URL Filtering Using an IFP Proxy
- URL Filtering Using the Dynamic Content Classifier
- URL Filter Settings
- Using a GTI Private Cloud Service for URL Filtering
- Using Your Own URL Filter Database
- Media Type Filtering
- About Media Type Filtering
- Configure Key Elements for Media Type Filtering
- Configure Media Type Filtering Using the Complete Rules View
- Create a Filter List for a Modified Rule
- Media Type Detection for InDesign
- Media Type Filtering Administration
- Media type filtering issue while downloading files through Gmail
- Media Type Filtering Process
- Replace a Property in a Media Type Filtering Rule
- HTTPS Scanning
- About HTTPS Scanning
- Client Certificate List
- Configure HTTPS Scanning
- Configure the Modules for HTTPS Scanning
- HTTPS Scan Process and Administration
- Managing Certificates
- Managing Certificates for Cloud Use
- Native Browser CA
- Replace the Default Root Certificate Authority
- Sending Tapped SSL Traffic to a Monitoring Device
- Using AIA Entries for Certificate Downloads
- Using Skype for Business
- Hardware Security Module
- About the Hardware Security Module
- Components of a Hardware Security Module Solution
- Hardware Security Module Versions for Secure Web Gateway
- Key Handling with a Hardware Security Module
- Limitations When Working with a Hardware Security Module
- Using Private Keys from an Azure Key Vault
- Work with a Hardware Security Module
- Advanced Threat Defense
- About Advance Threat Defense
- Configuration Elements to Use Advanced Threat Defense
- Configure Advanced Threat Defense
- Configure Key Elements to Use Advanced Threat Defense
- Configure Settings to use Advanced Threat Defense
- Criteria for Additional Scanning by Advanced Threat Defense
- Gateway Anti-Malware Settings
- Limit Object Sizes for Scanning by Advanced Threat Defense
- Monitor Advanced Threat Defense
- Use an Existing Advanced Threat Defense Scanning Report
- Use an Ongoing Advanced Threat Defense Scanning Run
- Workflows to Use Advanced Threat Defense
- Data Loss Prevention
- About Data Loss Prevention
- Best Practice: Set a Size Limit for DLP Filtering
- Configure Data Loss Prevention
- Configure Data Loss Prevention Using Default Classifications
- Configure Data Loss Prevention Using Dictionary Entries
- Migrating Web Protection Suite and Web Gateway Cloud Service to Web Protection Suite 2 and Skyhigh SWG
- Prevent Data Loss Using an ICAP Server
- Use an On-premises DLP Server from the Cloud
- Troubleshooting
- Back up and restore an appliance configuration
- Create a Feedback File
- Create a packet tracing file
- Display running AV threads
- Enable the creation of connection tracing files
- Enable the creation of core files
- Migration to Skyhigh FQDN
- Reset the appliance password
- Restart a service of the Operating System
- Rule Tracing
- Tenant Restrictions in Microsoft O365 for SWG (On-Prem)
- Troubleshooting methods
- Use a diagnostic tool to evaluate Regex terms
- Work with System and Network tools
- REST Interface
- Authenticating to the interface
- Enable use of the interface
- Give permission to access the interface
- Performing basic REST operations
- Prepare use of the REST interface
- Requesting resources
- Requesting version information
- Secure Web Gateway REST Interface
- Using curl as the data transfer tool
- Working on appliances
- Working with configurations and settings
- Working with files uploaded for troubleshooting
- Working with lists
- Working with log files
- Working with rule sets
- Working with system file
- Working with the REST interface
- Cloud Single Sign-on
- About Cloud single sign-on
- Connector List for Connector Catalog as a Service (CCaaS) v141 with known issues
- Considerations when exporting and importing the SSO rule set
- Creating bookmarks to cloud services for your organization
- Customizing the application launchpad
- How cloud single sign-on is configured
- How users work with the application launchpad
- Locate information about the latest SSO updates
- Monitoring logons to cloud services on the dashboard
- New Connector List for Connector Catalog as a Service (CCaaS) v141
- Providing SSO services for .NET and Java web applications
- Providing SSO services for HTTP cloud applications
- Providing SSO services for SAML 2.0 cloud applications
- Resolving SSO issues
- SAML authentication using an external Identity Provider
- Single Sign On rule set summary
- SSO Catalog of supported cloud services
- SSO Connector Lists
- SSO logging overview
- SSO process in proxy and non-proxy modes
- Supported authentication methods
- Content Security Reporter (CSR)
- Working with Content Security Reporter
- Content Security Reporter System Requirements
- Content Security Reporter Installation
- Content Security Reporter Post-installation Tasks
- Getting Started with Content Security Reporter
- Upgrade Content Security Reporter
- Uninstall Content Security Reporter
- Report Server Settings
- Reporting
- Content Security Reporter Interface Reference
- Content Security Reporter Maintenance
- Known Issues and Workarounds