What criteria can Zscaler Client Connector consider during trusted network detection?
How can Zscaler client connector tell it's on a trusted network?
How can Zscaler client connector tell it's on a trusted network?
Sequential steps and thought process for deploying the Zscaler client connector app.
A quick recap of what things the client connector can look for to assess local security state of an endpoint.
Defining agility of change updates on ZCC.
Exploring features and functionality for the client connector
A quick explanation of this FAZ feature
CLI commands for troubleshooting comm issues in FAZ.
Clarifying some terminology for FAZ
What logs can actually be sent to FAZ?
Discussing the different methods for establishing trust in data sources for FAZ.
Unpacking the basics of HA on FAZ
Let's discuss how data is structured, organized, and enforced on FAZ, shall we?
cyber-101
Uh oh. What happens when space runs out?
An intro to some of the essential commands in FortiOS.
cyber-101
Differentiating the operating modes for FAZ.
cyber-101
Clarifying on some vague terminology
cyber-101
Examining how Zscaler processes data for improved efficiency.
cyber-101
A quick intro into the 3 logical layers of Zscaler architecture.
cyber-101
Similar terms. Important differences.
cyber-101
đź’ˇThis is part of an on-going series in cybersecurity foundations. Check the cyber 101 article tag index from time to time for more content. The FortiGate AV scanning engine relies on virus definitions for some of its traditional analysis. These signatures are stored in AV databases. Depending on what model
cyber-101
Comparing some similar terms in logging
cyber-101
Examining a nifty feature for separating management functions.
cyber-101
Clarifying some popular terms
cyber-101
Unraveling the differences between these two UI modes.