Web Security Cloud | Help
Search
Getting Started
Introduction
Initial steps
Logging on and portal security
Cloud Web setup
Using the Resource Center
Navigating the cloud portal
Cloud portal dashboards
Alerts
Account Settings
Introduction
My Account
Configuring SIEM storage
Contacts
Identity Management
End Users
Groups
Licenses
Administrator single sign-on
Privacy protection
Data Protection Settings
Important rules for configuring accounts
Working with External Directories
Introduction
What is SCIM?
How the service works with SCIM
What is LDAP?
How the service works with LDAP
Planning for your first synchronization
Basic steps
Although the steps for your use case may vary, the basic steps for setting up user provisioning follow:
Cloud portal tasks
Maintenance
Configuring Web Settings
Introduction
Configure General settings
Configure Remote Browser Isolation
Configure File Sandboxing settings
Configure End User Single Sign-On settings
Configure Bypass Settings
Configure Domain settings
Configure Endpoint settings
Configure protected cloud apps
Configure Full Traffic Logging settings
Configure custom categories
Time periods
Configure custom protocols
Configure block and notification pages
Configure Content Classifiers for Data Security (DLP Lite)
Managing Network Devices
Introduction
Global options
Managing edge devices
Generating device certificates
Managing EasyConnect services
Managing I Series appliances
Defining Web Policies
Introduction
Creating a new policy
Testing policy enforcement
Uploading a policy assignment file
General tab
Connections tab
Access Control tab
Endpoint tab
End Users tab
Cloud Apps tab
Custom Categories tab
Web Categories tab
Protocols tab
Application Control tab
File Blocking tab
Data Protection tab
Data Security tab (DLP Lite)
Web Content & Security tab
Report Center
Introduction
Using the Report Catalog
Using the Report Builder
Scheduling reports
Exporting data to a third-party SIEM tool
Web Reporting Tools
Introduction
Using the Transaction Viewer
Using the Incident Manager
Report attributes: Web and Data Security
Report metrics: Web and Data Security
Web predefined reports
Account Reports
Introduction
Endpoint Auditing Report (Classic Proxy Connect and Direct Connect)
Service reports
Downloading report results
Saving reports
Scheduling reports
Audit Trails
Introduction
Configuration audit trail
SCIM audit trail
Standard Web Configuration
Overview
Appendices
Use Cases for Setting up User Provisioning
Data Security Content Classifiers (DLP Lite only)