Module 1: Introduction to Symantec Edge SWG
- Symantec Edge SWG overview
- Introduction to the Edge SWG Admin Console
- Key Edge SWG use cases
Module 2: Intercepting traffic and applying policy
- How Edge SWG intercepts traffic
- Writing Edge SWG policy in the Visual Policy Manager
- Informing users when web access is denied or restricted due to policy
- Best practices to avoid troubleshooting issues related to policy
Module 3: Applying security and web usage policy to encrypted traffic
- Introduction to TLS encryption
- Managing HTTPS traffic on Edge SWG
- Offloading HTTPS traffic to the SSL Visibility Appliance to boost performance
- Best practices to avoid troubleshooting issues related to SSL interception
Module 4: Providing security and web usage policies based on role or group
- Authentication basics on Edge SWG
- Using IWA authentication on Edge SWG
- Authentication modes in explicit and transparent proxy deployments
- Connecting to the Windows domain directly using IWA direct
- Connecting to the Windows domain using IWA BCAAA
- Introduction to role-based access control
- Using roles and groups in policy
- Best practices to avoid troubleshooting issues related to authentication
Module 5: Enforcing corporate guidelines for acceptable Internet browsing behavior
- Creating strong corporate guidelines for acceptable Internet use
- Using website categorization to enforce acceptable use guidelines
- Providing Edge SWG with categorization databases to be referenced in policy
- Setting the Request URL Category object in policy to enforce acceptable use guidelines
- Applying policy in order to enforce acceptable use guidelines
- Best practices to avoid troubleshooting issues related to enforcing acceptable use guidelines
Module 6: Protecting the endpoint from malicious activity
- Requirements for a pre-emptive, layered web defense
- WebPulse technical details
- Introduction to Intelligence Services
- Using Intelligence Services data feeds in policy
- Ensuring safe downloads
- Combined policy example
- Best practices to avoid troubleshooting issues related to protecting the endpoint from malicious activity
Module 7: Using built-in diagnostic tools on Edge SWG
- Kery sources of information
- Sending service information to Symantec support
Module 8: Edge SWG integrations
- Centrally managing devices with Management Center
- Enhancing security with virus scanning
- Providing security for risky and unknown websites with High Risk Isolation
- Introduction to Cloud SWG
- Reporting on Edge SWG activity
Module 9: Course review
- Symantec Edge SWG Administration R3 course review
Appendix A: Overview of the SSP hardware platform and Integrated Secure Gateway (ISG)
Appendix B: Understanding SGOS architecture and caching on Edge SWG
Appendix C: Introduction to Content Policy Language (CPL)