Retrieving Event Stream via SES API
Scenario and Goal We want to retrieve real-time event streams from Symantec Endpoint Security (SES) and output them locally or forward them to a log platform. This article demonstrates how to: 1. Create a...
Scenario and Goal We want to retrieve real-time event streams from Symantec Endpoint Security (SES) and output them locally or forward them to a log platform. This article demonstrates how to: 1. Create a...
This tutorial shows how to compile and configure Duo Unix to protect SSH logins with system password + Duo Mobile Push.It covers Duo portal preparation, source installation, and all necessary server-side configuration files. 1....
Squid is a mature and stable web proxy that provides caching, traffic forwarding, and access control.This article walks you through deploying Squid on Ubuntu Server using Docker, enabling quick installation, persistent configuration, and convenient...
When integrating Symantec/Broadcom Edge SWG (formerly ProxySG) with Cloud SWG Hosted Reporting, there are two supported approaches: This article describes both methods, common pitfalls, and how to verify that your logs are visible in...
Why use Tika Copy-pasting from some PDFs shows garbled characters because of custom font encoding.Apache Tika reads the real text layer directly, so it returns clean Unicode text without OCR. 1. Install Docker (Ubuntu)...
This guide walks through creating a Manifest V3 Chrome extension using Vite + Vue 3 + Element Plus,and setting up an environment that supports instant rebuilds and automatic reload during development. 1. Project Structure...
This guide describes how to integrate Symantec Cloud SWG (formerly WSS) with Symantec Endpoint Protection (SEP) or Symantec Endpoint Security (SES) clients using a Provisioning Token and SAML authentication.The integration ensures that all endpoint...
Terminology and Scope Step 0: Prerequisites Step 1: Create a Broadcom Support Portal Account Step 2: Associate Site ID in Support Portal Step 3: Create Environment and Bind Subscription Click Submit after enter Tenant...
Terminology and Scope Step 0: Prerequisites Step 1: Create a Broadcom Support Portal Account Step 2: Associate Site ID in Support Portal Step 3: Register / Activate the Cloud SWG Portal Step 4: Create...
Introduction In modern enterprise security, Single Sign-On (SSO) and directory-based access control are foundational components. Okta provides seamless integration with on-premises Active Directory (AD) and can act as a SAML Identity Provider (IdP) for...
Broadcom Symantec On-Premises Security products—such as Management Center, ISG SSLV, Edge SWG, and Symantec Content Analysis—require a valid license before you can fully deploy and manage them. This guide provides the essential first steps:...
Introduction Manually starting and stopping Azure VMs is time-consuming.With Azure Automation you can use Runbooks and Webhooks to control VMs automatically, and trigger them from your local PC. Step 1. Configure Automation Account and...
To test the reverse proxy functionality, we prepared two ESXi servers as backend web services.The goal is to use a single Edge SWG device to expose these services with different domain names. This article explains how...
In my lab environment, I deploye Symantec VIP Enterprise Gateway(EG) and integrated it with a Windows Active Directory domain controller to enable multi-factor authentication (MFA). During the process, I encountered some DNS resolution issues...
1. Introduction In enterprise environments, secure web access requires user identity verification, not just IP-based identification. Symantec/Broadcom Edge SWG (Secure Web Gateway, formerly ProxySG/ASG) supports multiple authentication methods. One of the most commonly deployed...
When importing VMware OVA/OVF files, you may encounter issues such as: This post documents how to manually edit OVF files to solve these issues. 1. File Structure Overview A typical OVF package includes: – .ovf: the XML...
The Linux audit subsystem (auditd) is a powerful way to track what happens on your system at the syscall level. Security teams, system administrators, and incident responders often need to know who created or deleted...
Prerequisites Upload the VHD to Azure Storage Create an Image from the VHD Create a VM from the Image Initial Access Activate the License Next Steps
Recent Comments