sangfor_2267 Posted 19 May 2021 14:33

【POC Best Practice for ES/NGAF/IAM/CC】POC Best Practice Positioning and Index

Dear Partners          Maybe you have seen that we have added a new categories to the document category: You may be wondering why the classification is added, and the difference between best practices.
Here I will explain to you:
First of all, best practices are used in POC or Implement scenarios

1. Best Practices for Scenarios is mainly used in POC scenarios. The purpose is to let you quickly and efficiently show the effect of the function, which usually contains the following content:
1.1 Applicable to the most general scenarios.
1.2 Use real cases. Some documents need to use third-party tools to show the effect, such as the WAF function test of NGAF products.
1.3 Contains detailed configuration steps. Allows you to achieve better results after configuring according to the documentk for example, which options are enabled to have a security log.
1.4 Contains some precautions for the configuration of the scenario.


2. Best Practices for Configuration is mainly used in POC, Implement and other scenarios. The purpose is to provide you with more reference, how to choose the right configuration, how to configure to avoid potential mistakes, etc. It usually contains the following content:
2.1 How to collect important information
2.2 How to choose deployment mode and functional modules in different scenarios, suitable for some special scenarios
2.3 The idea of ​​configuration
2.4 Common limitations of functional modules
2.5 Common differences between functional modules in different versions
2.6 Usually does not contain too many configuration details and pictures, etc.; the detailed steps and pictures of the configuration will provide additional document links for you to refer to.


Best Practices IndexYou can directly click on the document title to redirect to the document browsing and download page.Some tools are needed for POC testing of some network security functions. The spread of these tools will bring potential network threats, so we did not upload it to the community. If you need it, please contact your local sangfor FAE to obtain these tools.

Best Practices for ConfigurationNGAFSANGFOR_NGAF_v8.0.35_Best Practices for Configuration_Botnet Prevention.pdfSANGFOR_NGAF_v8.0.35_Best Practices for Configuration_Establish IPsecVPN.pdfSANGFOR_NGAF_v8.0.35_Best Practices for Configuration_Establish SangforVPN.pdfSANGFOR_NGAF_v8.0.35_Best Practices for Configuration_Integrated Coorelation & Response with Endpoint Secure.pdf

Cyber CommandSANGFOR_CCOM_Best Practices for Configuration_How to Correlate with Endpoint Secure to Simply the Operation.pdfSANGFOR_CCOM_Best Practices for Configuration_How to Correlate with IAM to Simply the Operation.pdfSANGFOR_CCOM_Best Practices for Configuration_How to Correlate with NGAF to Simply the Operation.pdf
Best Practices for ScenariosNGAFSANGFOR NGAF_v8.0.17_Best Practices for Scenarios_Access Control.pdfSANGFOR_NGAF_v8.0.17_Best Practices for Scenarios_Bandwidth Management.pdfSANGFOR_NGAF_v8.0.17_Best Practices for Scenarios_Botnet Prevention.pdfSANGFOR_NGAF_v8.0.17_Best Practices for Scenarios_Country Blocking.pdfSANGFOR_NGAF_v8.0.17_Best Practices for Scenarios_Dos Attack Prevention.pdfSANGFOR_NGAF_v8.0.17_Best Practices for Scenarios_Establish IPsecVPN.pdfSANGFOR_NGAF_v8.0.17_Best Practices for Scenarios_Establish SangforVPN.pdfSANGFOR_NGAF_v8.0.17_Best Practices for Scenarios_Integrated Coorelation & Response with Endpoint Secure.pdfSANGFOR_NGAF_v8.0.17_Best Practices for Scenarios_NGAF Correlate to Cyber Command Guide.pdfSANGFOR_NGAF_v8.0.17_Best Practices for Scenarios_Security Policy Availability Check.pdfSANGFOR_NGAF_v8.0.17_Best Practices for Scenarios_Unknown Threat Prevention By Engine Zero & Neural-X.pdfSANGFOR_NGAF_v8.0.17_Best Practices for Scenarios_WAF Function Test By DVWA.pdfSANGFOR_NGAF_v8.0.17_Best Practices for Scenarios_WAF Function Test By OWASP ZAP.pdfSANGFOR_NGAF_v8.0.26_Best Practices for Scenarios_Use Endpoint Secure on NGAF to Prevent Network Threat.pdf
Endpoint SecureSANGFOR_ES_Best Practices for Scenarios_Correlate with IAM to Prevent Network Threat.pdfSANGFOR_ES_Best Practices for Scenarios_Endpoint Secure Security Policy Implement Guide for Host.pdfSANGFOR_ES_Best Practices for Scenarios_Endpoint Secure Security Policy Implement Guide for Server.pdfSANGFOR_ES_Best Practices for Scenarios_One Click Kill the Virus.pdfSANGFOR_ES_Best Practices for Scenarios_Prevent Brute Force Attack to Anti Ransomware.pdfSANGFOR_ES_Best Practices for Scenarios_Update Virus Database in Public Network Isolation Environment.pdfSANGFOR_ES_Best Practices for Scenarios_Use Honeypot to Anti Ransomware.pdfSANGFOR_ES_Best Practices for Scenarios_Use Micro Segmentation to Anti Ransomware.pdf
Cyber CommandSANGFOR_CCOM_Best Practices for Scenarios_How to Correlate with Endpoint Secure to Simply the Operation.pdfSANGFOR_CCOM_Best Practices for Scenarios_How to Correlate with IAM to Simply the Operation.pdfSANGFOR_CCOM_Best Practices for Scenarios_How to Correlate with NGAF to Simply the Operation.pdfSANGFOR_CCOM_Best Practices for Scenarios_How to use Cyber Command to Manage Assets.pdf
IAMSANGFOR_IAM_v12.0.42_Best Practices for Scenarios_Access Control Policy.pdfSANGFOR_IAM_v12.0.42_Best Practices for Scenarios_Activity Domain ADSSO.pdfSANGFOR_IAM_v12.0.42_Best Practices for Scenarios_Activity Domain IWA SSO.pdfSANGFOR_IAM_v12.0.42_Best Practices for Scenarios_Activity Domain Script SSO.pdfSANGFOR_IAM_v12.0.42_Best Practices for Scenarios_Audit Policy .pdfSANGFOR_IAM_v12.0.42_Best Practices for Scenarios_Bandwidth Management.pdfSANGFOR_IAM_v12.0.42_Best Practices for Scenarios_Radius SSO.pdfSANGFOR_IAM_v12.0.42_Best Practices for Scenarios_SSL Content Decryption.pdfSANGFOR_IAM_v12.0.42_Best Practices for Scenarios_Sync Log to Report Center .pdfSANGFOR_IAM_v12.0.42_Best Practices for Scenarios_Use IAM as a Proxy Server to Access the Internet.pdf
page: [1]
查看完整版本: 【POC Best Practice for ES/NGAF/IAM/CC】POC Best Practice Positioning and Index