cyber-101
What criteria can Zscaler Client Connector consider during trusted network detection?
How can Zscaler client connector tell it's on a trusted network?
cyber-101
Sequential steps and thought process for deploying the Zscaler client connector app.
cyber-101
A quick recap of what things the client connector can look for to assess local security state of an endpoint.
cyber-101
Defining agility of change updates on ZCC.
cyber-101
Exploring features and functionality for the client connector
cyber-101
A quick explanation of this FAZ feature
cyber-101
CLI commands for troubleshooting comm issues in FAZ.
cyber-101
Clarifying some terminology for FAZ
cyber-101
What logs can actually be sent to FAZ?
cyber-101
Discussing the different methods for establishing trust in data sources for FAZ.
Cybersecurity and devops questions. Â Answered.
Unpacking the basics of HA on FAZ
Let's discuss how data is structured, organized, and enforced on FAZ, shall we?
Uh oh. What happens when space runs out?
An intro to some of the essential commands in FortiOS.
Differentiating the operating modes for FAZ.
Clarifying on some vague terminology
Examining how Zscaler processes data for improved efficiency.
A quick intro into the 3 logical layers of Zscaler architecture.
Similar terms. Important differences.
💡This is part of an on-going series in cybersecurity foundations. Check the cyber 101 article tag index from time to time for more content. The FortiGate AV scanning engine relies on virus definitions for some of its traditional analysis. These signatures are stored in AV databases. Depending on what model
Comparing some similar terms in logging
Examining a nifty feature for separating management functions.