Sie sind auf Seite 1von 3

PROXYSG 6.

6 Basic Administration

COURSE DESCRIPTION Hands-On


This course includes practical hands-on
The ProxySG 6.6 Basic Administration course is exercises that enable you to test your new skills
an introduction to deployment options and and begin to use those skills in a working
management of the individual key features environment.
offered using the ProxySG 6.6 solution. This an
introductory course and is designed for
students who are new to the ProxySG solution. COURSE OUTLINE
Delivery Method Module 1: Introduction to the Symantec
Instructor-led and Virtual Academy ProxySG Secure Web Gateway

Duration  Describe the functions of a proxy server


Two days  Differentiate proxy servers from
firewalls
Course Objectives
 Describe the key features and benefits
By the completion of this course, you will be
able to: of the ProxySG
 Describe the major Secure Web Gateway  List the various ProxySG models
functions of the ProxySG  Access online Symantec community
 License and configure a ProxySG resources
 Deploy a ProxySG in either explicit or
transparent mode Module 2: ProxySG Security Deployment
 Use the Visual Policy Manager to write Options
policies to manage web filtering,
authentication, and SSL traffic management  Describe the three network deployment
 Use ProxySG access logs to generate reports. methods
 Describe the three possible roles of the
Who Should Attend ProxySG
The ProxySG 6.6 Basic Administration course is
intended for students who wish to master the Module 3: ProxySG Management Console
fundamentals of the ProxySG. It is designed for
 Describe the relationship between the
students who have not taken any previous
Management Console and the ProxySG
training courses about the ProxySG.
CLI
Prerequisites  Describe the primary function of the
This course assumes that students have a basic major areas of the Management
understanding of networking concepts, such as Console
local-area networks (LANs), the Internet,
security, and IP protocols.

© 2017 Symantec Corporation. All Rights Reserved. Symantec, the Symantec Logo and the Checkmark Logo are trademarks or registered trademarks of
Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
 Use the Management Console to access
on-box help and Symantec product Module 7: Filtering Web Content
documentation
 Describe the main concepts of web
filtering
Module 4: Traffic Interception Using Proxy
Services  Describe the primary category
databases
 Understand the functions of proxy
services, listeners, and proxy types  Describe the category types available to
policy
 Describe the three most common proxy
services  Describe how WebFilter and WebPulse
work together
 Explain how the intercept and bypass
settings affect what happens to
Module 8: Using Threat Intelligence to
network traffic passing through the
Defend the Network
ProxySG
 Understand Intelligence Services as
 Explain the function of common global
provided by the Global Intelligence
proxy service settings
Network
 Understand Geolocation and Threat
Module 5: Hypertext Transfer Protocol
Risk Levels and how they can be used in
 Understand how a connection is policy
initiated over the transport layer
 Identify the components of an HTTP Module 9: Ensuring Safe Downloads
URL  Describe how malware can be
 Explain the two types of HTTP transmitted via HTTP
messages: request and response  Explain the methods, advantages, and
 Identify common response codes disadvantages of file type detection
 Describe some of the considerations in
Module 6: Introduction to the Visual Policy deciding what content to block as
Manager possible malware sources
 Describe the relationship among the
VPM, CPL, and the Management Module 10: Notifying User of Internet
Console Usage Policies
 Describe the default processing order  Explain the function and various
for policy layers and rules components of built-in and custom
exception pages
 Describe triggers and actions that can
be used in writing policy  Describe the function of Notify User
objects
 Identify the types of objects that the
VPM supports  Identify the types of pages that can be
sent to users by using Notify User
 Describe some of the best practices to objects
be followed when using the VPM to
create policy

© 2017 Symantec Corporation. All Rights Reserved. Symantec, the Symantec Logo and the Checkmark Logo are trademarks or registered trademarks of
Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
 Describe splash pages and coaching
pages using Notify User objects in the
VPM

Module 11: Access Logging on the ProxySG


 Describe, at a high level, how the
ProxySG performs access logging
 Describe the components of a ProxySG
access log facility
 Identify default log facilities and log
formats
 Describe common use cases for periodic
and continuous uploading of access logs

Appendix A: ProxySG Initial Configuration

Appendix B: IPv6 in ProxySG Deployments

© 2017 Symantec Corporation. All Rights Reserved. Symantec, the Symantec Logo and the Checkmark Logo are trademarks or registered trademarks of
Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

Das könnte Ihnen auch gefallen