Guided Workflow for WSA, ESA, and SMA
Zack Shaikh
Guided Workflow for WSA, ESA, and SMA
5:28
Steps To Configure Cognitive Threat Analytics (CTA) With Web Security Appliance (WSA)
Zack Shaikh
Steps To Configure Cognitive Threat Analytics (CTA) With Web Security Appliance (WSA)
19:42
Steps To Configure Cisco Hybrid Web Appliance & ScanCenter  -  AD Group Base Authentication
Zack Shaikh
Steps To Configure Cisco Hybrid Web Appliance & ScanCenter - AD Group Base Authentication
38:25
Steps to Deploy Cisco Hybrid Web Appliance (Physical - Virtual)
Zack Shaikh
Steps to Deploy Cisco Hybrid Web Appliance (Physical - Virtual)
30:12
Steps to Perform AsyncOS Upgrade on Cisco Hybrid Web Appliance (Physical - Virtual)
Zack Shaikh
Steps to Perform AsyncOS Upgrade on Cisco Hybrid Web Appliance (Physical - Virtual)
14:25
Steps to Deploy Virtual Web Security Appliance (vWSA)
Zack Shaikh
Steps to Deploy Virtual Web Security Appliance (vWSA)
24:11
Steps to Configure Cisco AMP - Threat Grid Integration with Web Security Appliance (WSA):
Zack Shaikh
Steps to Configure Cisco AMP - Threat Grid Integration with Web Security Appliance (WSA):
18:10
Steps to Configure WSA with Cisco Identity Service Engine (ISE):
Zack Shaikh
Steps to Configure WSA with Cisco Identity Service Engine (ISE):
45:13
Steps to Deploy vWSA, vESA, vSMA on Redhat KVM Hypervisor.
Zack Shaikh
Steps to Deploy vWSA, vESA, vSMA on Redhat KVM Hypervisor.
34:30
Steps to Configure (HA) VRRP (Virtual Router Redundancy Protocol) on Web Security Appliance (WSA):
Zack Shaikh
Steps to Configure (HA) VRRP (Virtual Router Redundancy Protocol) on Web Security Appliance (WSA):
18:01
Steps to Configure Machine ID Base Authentication on Web Security Appliance (WSA):
Zack Shaikh
Steps to Configure Machine ID Base Authentication on Web Security Appliance (WSA):
36:30
Steps to Configure LDAP External Authentication on Web Security Appliance (WSA):
Zack Shaikh
Steps to Configure LDAP External Authentication on Web Security Appliance (WSA):
18:56
Feature Enhancements Outline with Version 8.5.x on Web Security Appliance (WSA):
Zack Shaikh
Feature Enhancements Outline with Version 8.5.x on Web Security Appliance (WSA):
22:46
Steps to Configure Bandwidth and time Quotas on Web Security Appliance (WSA):
Zack Shaikh
Steps to Configure Bandwidth and time Quotas on Web Security Appliance (WSA):
17:39
Web Security Appliance Log Subscription and Custom Fields & Traces level.
Zack Shaikh
Web Security Appliance Log Subscription and Custom Fields & Traces level.
38:18
Steps to Deploy L4TM with Virtual Web Security Appliance:
Zack Shaikh
Steps to Deploy L4TM with Virtual Web Security Appliance:
27:08
Steps to Deploy and Configure Cisco Cloud Web Security (CWS) Appliance in Connector Mode:
Zack Shaikh
Steps to Deploy and Configure Cisco Cloud Web Security (CWS) Appliance in Connector Mode:
25:28
Steps to configure HTTPS Proxy and CSR Option on Web Security Appliance:
Zack Shaikh
Steps to configure HTTPS Proxy and CSR Option on Web Security Appliance:
19:18
Steps to configure Socks Proxy with Authentication:
Zack Shaikh
Steps to configure Socks Proxy with Authentication:
13:59
Splunk Install on Linux Platform:
Zack Shaikh
Splunk Install on Linux Platform:
11:31
CDA installation and configuration steps
Zack Shaikh
CDA installation and configuration steps
36:51
Deploy WSA as a Connector.mp4
Zack Shaikh
Deploy WSA as a Connector.mp4
8:13