Hello CheckMates,
This short video is part of the hands-on videos refreshing knowledge based on R82 JHF 25 posted here.
This video covers...
Quantum Firewall used as Non-Transparent Proxy
Using an upstream proxy for Internet access
With HTTPS inspection, Application control and Threat Prevention
- Proxy chaining Configuration
- Required Access Rule
- Outbound HTTPS inspection configuration
- Client side behavior
- Understanding the Access control logs from the gateway
- Threat prevention using Threat Emulation
- Analyze security events from clients being attacked
- Understanding the Threat prevention log information
- Understanding the Threat Prevention protection activation
Greetings
pelmer