Sophos XG Firewall: How to create policy-based routes with firewall rules
The goal of the article This article will show you how to create a policy routes to route user traffic by user, user group, server, Read More
The goal of the article This article will show you how to create a policy routes to route user traffic by user, user group, server, Read More
Purpose of the article This article will introduce what High Availability is and how to configure this feature on Sophos XG firewall device with mode Read More
Purpose of the article This article will introduce what High Availability is and how to configure this feature on Sophos XG firewall device with mode Read More
The goal of the article Following the article in Part 2, Part 3 will proceed with Phish Threat configuration with the third Campaings type Attachment Read More
The goal of the article Following the article in Part 1, Part 2 will proceed with Phish Threat configuration with the second Campaings type Credential Read More
The goal of the article In part 1 of this article, what is Phish Threat? How to prevent Phish Threat attacks and introduce the Phish Read More
This article will show you how to decrypt the drive after the drive has been encrypted using Sophos Central on Windows 10 and Windows 7. Read More
This article will describe the step configure Full Disk Encryption on Windows 7 using Sophos Central Diagram and Implementation steps As the diagram we see Read More
This article guides the steps to login when the user forgets the password on Windows 7 using Recovery Key Diagram and implementation steps As the Read More
This article guides the steps to login when the user forgets the password on Windows 10 using Recovery Key Diagram and implementation steps As the Read More
Copyright © 2024 | WordPress Theme by MH Themes