Beruflich Dokumente
Kultur Dokumente
6 Basic Administration
© 2017 Symantec Corporation. All Rights Reserved. Symantec, the Symantec Logo and the Checkmark Logo are trademarks or registered trademarks of
Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
Use the Management Console to access
on-box help and Symantec product Module 7: Filtering Web Content
documentation
Describe the main concepts of web
filtering
Module 4: Traffic Interception Using Proxy
Services Describe the primary category
databases
Understand the functions of proxy
services, listeners, and proxy types Describe the category types available to
policy
Describe the three most common proxy
services Describe how WebFilter and WebPulse
work together
Explain how the intercept and bypass
settings affect what happens to
Module 8: Using Threat Intelligence to
network traffic passing through the
Defend the Network
ProxySG
Understand Intelligence Services as
Explain the function of common global
provided by the Global Intelligence
proxy service settings
Network
Understand Geolocation and Threat
Module 5: Hypertext Transfer Protocol
Risk Levels and how they can be used in
Understand how a connection is policy
initiated over the transport layer
Identify the components of an HTTP Module 9: Ensuring Safe Downloads
URL Describe how malware can be
Explain the two types of HTTP transmitted via HTTP
messages: request and response Explain the methods, advantages, and
Identify common response codes disadvantages of file type detection
Describe some of the considerations in
Module 6: Introduction to the Visual Policy deciding what content to block as
Manager possible malware sources
Describe the relationship among the
VPM, CPL, and the Management Module 10: Notifying User of Internet
Console Usage Policies
Describe the default processing order Explain the function and various
for policy layers and rules components of built-in and custom
exception pages
Describe triggers and actions that can
be used in writing policy Describe the function of Notify User
objects
Identify the types of objects that the
VPM supports Identify the types of pages that can be
sent to users by using Notify User
Describe some of the best practices to objects
be followed when using the VPM to
create policy
© 2017 Symantec Corporation. All Rights Reserved. Symantec, the Symantec Logo and the Checkmark Logo are trademarks or registered trademarks of
Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
Describe splash pages and coaching
pages using Notify User objects in the
VPM
© 2017 Symantec Corporation. All Rights Reserved. Symantec, the Symantec Logo and the Checkmark Logo are trademarks or registered trademarks of
Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.