Monthly Archive: August 2025

Using Edge SWG as a Reverse Proxy

To test the reverse proxy functionality, we prepared two ESXi servers as backend web services.The goal is to use a single Edge SWG device to expose these services with different domain names. This article explains how...

Configuring Kerberos Authentication on Edge SWG with BCAAA

1. Introduction In enterprise environments, secure web access requires user identity verification, not just IP-based identification. Symantec/Broadcom Edge SWG (Secure Web Gateway, formerly ProxySG/ASG) supports multiple authentication methods. One of the most commonly deployed...

Monitoring File Activities with Linux Auditd

The Linux audit subsystem (auditd) is a powerful way to track what happens on your system at the syscall level. Security teams, system administrators, and incident responders often need to know who created or deleted...

Integrating Symantec Cloud SWG with Azure Entra ID (SAML SSO)

Introduction Symantec Cloud SWG (formerly Web Security Service, WSS) provides cloud-based secure web gateway functionality, enforcing traffic inspection and access policies.Azure Entra ID (formerly Azure Active Directory) is Microsoft’s identity platform that supports SAML...

Installing Symantec Content Analysis on VMware ESXi

Symantec Content Analysis (CA) provides advanced malware analysis and detection capabilities, designed to integrate seamlessly with Symantec security products. This guide explains how to install Content Analysis on a VMware ESXi host. Prerequisites Make...

Deploying Edge SWG Virtual Appliance on Azure

1. Download the Installation Package From the Broadcom support portal, download the Edge SWG Azure installation package.This package includes: 2. Create a Storage Account in Azure Click Review + Create, then Create. Deployment takes a few minutes....

Streamlining Symantec Cloud SWG Management with Python APIs

Symantec Cloud Secure Web Gateway (Cloud SWG) offers a powerful REST API interface, enabling seamless integration and automation for your security operations. This post will walk you through three common, practical use cases, demonstrating...