Module 1: Introduction to Symantec Edge SWG
- Overview of Web Protection Suite
- Overview of Edge SWG components
Module 2: Intercepting web traffic and applying policy
- How the ProxySG intercepts traffic
- Writing policy on the ProxySG
- Layer and rule evaluation order in the VPM
Module 3: Applying security and web usage policy to encrypted traffic
- Introduction to TLS
- Managing HTTPS traffic on the ProxySG
Module 4: Providing security and web usage policies based on role or group
- Authentication basics on the ProxySG
- Using IWA authentication on the ProxySG
- Authentication modes in explicit and transparent modes
- Connecting to the Windows domain directly using IWA direct
- Connecting to the Windows domain using IWA BCAAA
- Using roles and groups in policy
Module 5: Enforcing corporate guidelines for acceptable Internet browsing behavior
- Create strong corporate guidelines for acceptable Internet use
- Use website categorization to enforce acceptable use guidelines
- Provide the ProxySG with categorization databases to be referenced in policy
- Set the Request URL Category object in policy to enforce acceptable use guidelines
- Inform users when web access is denied or restricted due to policy
Module 6: Protecting the endpoint from malicious activity
- WebPulse technical details
- Introduction to Intelligence Services
- Using Intelligence Services data feeds in policy
- Ensuring safe downloads
Module 7: Centrally managing devices with Management Center
- How Management Center centralizes and simplifies device management
- Configuring the ProxySG with the ProxySG Admin Console
- Creating and distributing VPM policies
- Creating and managing jobs
- Use reports to analyze web browsing activity
Module 8: Reporting for Edge SWG features
- How Reporter delivers centralized web reporting
- Configuring access logging on the ProxySG
- Using the Reporter Admin Console to configure log processing on Reporter
Module 9: Enhancing security with virus scanning
- Introduction to Content Analysis
- Exploring the Content Analysis management console
- Configuring communication with the ProxySG over ICAP
- Configuring malware scanning options
Module 10: Using malware analysis to analyze potentially malicious files
- Introduction to malware analysis
- Preparing the use malware analysis
- Performing malware analysis
Module 11: Providing security for risky and unknown websites with High Risk Isolation
- Introduction to High Risk Isolation
- Configuring HRI
- Overview of Symantec Web Isolation
Module 12: Monitoring Edge SWG features
- Monitoring devices from within Management Center
- Monitor and maintain the Content Analysis
- Troubleshooting tips
Module 13: Understanding SGOS architecture and caching on the Edge SWG
- SGOS architecture
- Caching on the Edge SWG
- Using HTTP compression
Module 14: Using built-in diagnostic tools on the Edge SWG
- Exploring sysinfo files
- Using policy tracing and policy coverage
- Using packet captures
- Sending service information to Symantec
Module 15: Expanding security with cloud integrations
- Introduction to Cloud SWG
- Using Universal Policy Enforcement
- Integrating CloudSOC with Symantec Web Protection
Module 16: Course review
- Symantec Web Protection--Edge SWG Planning, Implementation, and Administration course review
Appendix A: Using Content Policy Language (CPL)
- Basic CPL concepts
- Intermediate CPL concepts
- Using CPL best practices
Appendix B: Introduction to Hypertext Transport Protocol (HTTP)