web
You’re offline. This is a read only version of the page.
close

Online Help Center

  • Search
  • Support
    • For Home
    • For Business
  • English (US)
    • Bahasa Indonesia (Indonesian)
    • Dansk (Danish)
    • Deutsch (German)
    • English (Australia)
    • English (US)
    • Español (Spanish)
    • Français (French)
    • Français Canadien
      (Canadian French)
    • Italiano (Italian)
    • Nederlands (Dutch)
    • Norsk (Norwegian)
    • Polski (Polish)
    • Português - Brasil
      (Portuguese - Brazil)
    • Português - Portugal
      (Portuguese - Portugal)
    • Svenska (Swedish)
    • ภาษาไทย (Thai)
    • Tiếng Việt (Vietnamese)
    • Türkçe (Turkish)
    • Čeština (Czech)
    • Ελληνικά (Greek)
    • Български (Bulgarian)
    • Русский (Russian)
    • עברית (Hebrew)
    • اللغة العربية (Arabic)
    • 日本語 (Japanese)
    • 简体中文
      (Simplified Chinese)
    • 繁體中文
      (Traditional Chinese)
    • 繁體中文 HK
      (Traditional Chinese)
    • 한국어 (Korean)
This website uses cookies for website functionality and traffic analytics. Our Cookie Notice provides more information and explains how to amend your cookie settings.
Learn More Yes, I agree
  • Online Help Center
  • Security for Small Business
  • Cloud Edge
  • Cloud Edge
  • Analysis & Reports
Table of Contents
The page you're looking for can't be found or is under maintenance
Try again later or go to the home page
Go to home page
  • Privacy and Personal Data Collection Disclosure
  • Introduction to SydneyCloud Edge
    • Cloud Edge Overview
    • How Cloud Edge Works
    • Main Features
      • Hybrid Security
      • On–Premises Capabilities
      • In–the–Cloud Capabilities
    • New Features and Enhancements
    • Support for IPv6
    • Getting Started Screen
    • Cloud Edge Console Supported Browsers
  • Dashboard
    • Dashboard Overview
      • Using the Dashboard
    • Tabs
      • Adding a New Tab
      • Modifying Tab Settings
      • Deleting a Tab
    • Widgets
      • Security Status Widgets
      • Traffic Status Widgets
      • High Availability Widgets
      • Device Map and Security Widgets
      • Widget Options
      • Adding New Widgets
      • Customizing Widgets
      • Deleting Widgets
  • Gateways
    • Managing Gateways
      • Registration
      • Gateway Actions
      • Registering Gateways
      • Importing Multiple Gateways
      • Verifying the Registration
      • Viewing Information for All Gateways
      • Creating an HA Group
        • HA Groups
        • HA Group - WAN Topologies
        • HA Group – Failover Conditions
        • HA Group – Heartbeat Interfaces
        • HA Group – VRRP Groups
        • HA Group - Endpoint Network Access
        • HA Group – Monitor Interfaces and Takeover Triggers
        • HA Groups - Configuration Settings Matrix
        • HA Groups – Policy Settings Matrix
        • HA Group Limitations
        • HA Group - Actions
      • Replacing a Gateway
    • Gateway Information
      • Viewing General Gateway Information
      • Viewing Gateway System Status
      • Viewing Gateway Logs and Events
        • Event Categories and Sub-Categories
      • Using Tools to Troubleshoot Network Connectivity
        • Performing a Ping Test
        • Performing a Traceroute Test
        • Retrieving ARP Results
      • Enabling/Disabling Conservative Mode
    • Network
      • Interfaces
        • Managing Network Interfaces
        • Editing Network Interfaces
          • Routing Mode: Editing Network Interfaces
          • Routing Mode: Editing Wireless Network Interfaces
          • Bridge Mode: Editing Network Interfaces
        • Enabling or Disabling Interfaces
        • Configuring Switch Interface (sw0) Settings
          • List of Switch Interface (sw0) Settings
          • Security Protections Provided by Each Intranet Security Mode
        • How VLANs Work
          • How to Deploy Cloud Edge With VLANs
            • Bridge Mode VLANs
            • Routing Mode VLANs
          • Adding/Editing VLAN Interfaces
      • Administrative Access
        • Enabling Administrative Access
      • DHCP
        • Viewing DHCP Services
        • Editing DHCP Settings
        • Deployment Mode Information for DHCP
        • Default DHCP IP Address Pools
      • Dynamic DNS
        • Supported DDNS Service Providers
        • Configuring Dynamic DNS Settings
        • Viewing DDNS Status
          • DDNS Status Messages
      • Routing Table
        • Viewing the Routing Table
        • Routing Table Indicators
      • Static Routes
        • Adding a Static Route
        • Enabling/Disabling Static Routes
        • Modifying a Static Route
        • Deleting a Static Route
      • Network Address Translation (NAT)
        • NAT Rules
          • Adding a Destination NAT Rule
          • Modifying NAT Rules
          • Changing NAT Rule Priorities
          • Adding a Source NAT Rule
          • Deleting NAT Rules
          • Adding NAT Rules to Support Hairpin NAT
    • SD-WAN
      • Enabling SD-WAN and Bandwidth Settings
      • Overview Widgets
      • SD-WAN Rules
        • Managing SD-WAN Rules
        • Adding/Editing SD-WAN Rules
        • Editing the Default SD-WAN Rule
        • Duplicating SD-WAN Rules
        • Moving SD-WAN Rules
        • Enabling/Disabling SD-WAN Rules
        • Deleting SD-WAN Rules
      • SLAs
        • Managing SLAs
        • Adding/Editing Health Check SLAs
        • Deleting SLAs
    • Wireless
      • Viewing Wireless Network Information
        • Viewing Wireless Network General Settings
        • Viewing Wireless Guest Network Settings
        • Viewing Wireless Troubleshooting Information
      • Wireless Network Access Control
        • How Wireless Network Access Control Rules Work
        • Configuring Access Control for the Wireless Networks
        • Viewing Wireless Connected Clients
        • Adding Connected Clients to Access Control Rules
        • Adding Wireless Network Access Control Rules
        • Deleting Wireless Network Access Control Rules
    • Bandwidth Control
      • Managing Bandwidth Control
      • Adding/Editing Bandwidth Control Rules
      • Duplicating Bandwidth Control Rules
      • Enabling/Disabling Bandwidth Control Rules
      • Deleting Bandwidth Control Rules
    • User VPN
      • Virtual Private Networks
        • Encryption Algorithms
        • Authentication Algorithms
        • Internet Key Exchange (IKE) Protocols
      • SSL VPN
        • Managing SSL VPN
        • Viewing SSL VPN Clients
        • Troubleshooting SSL VPN
          • Understanding SSL VPN Error Messages
      • L2TP VPN
        • Managing L2TP VPN
        • Viewing L2TP VPN Clients
        • Troubleshooting L2TP VPN
    • Site-to-Site VPN
      • IPsec Connections
      • Supported Configuration Information
      • Site-to-Site VPN Topologies
        • Example: Full-Mesh Site-to-Site VPN
        • Example: Star Site-to-Site VPN
      • Configuring Full-Mesh Site-to-Site VPNs
      • Configuring Star Site-to-Site VPNs
      • Configuring Peer-to-Peer Site-to-Site VPNs
      • Managing Site-to-Site VPNs
        • Managing IPsec VPN Connections
        • Adding an IPsec VPN Connection
        • Managing IPsec Policies
        • Adding an IPsec Policy
        • Configuring Advanced Site-to-Site VPN Settings
      • IPsec Status
      • IPsec Troubleshooting
        • Best Practice Configuration for IPsec Traffic Traversing Multiple Gateways
        • Viewing Troubleshooting Logs
    • Updates
      • Updating the Cloud Edge Gateway
    • Managing Network Access Control
      • WFBSS Endpoint Protection
        • Managing WFBSS Endpoint Protection
        • Configuring WFBSS Endpoint Protection
        • Adding Endpoints to the Protection List
        • Adding Endpoints to the Exception List
        • Viewing the WFBSS Endpoint Protection Client List
        • Troubleshooting WFBSS Endpoint Protection
      • Suspicious Endpoints
        • Managing Suspicious Endpoints
        • Configuring Suspicious Endpoints
        • Viewing the Suspicious Endpoints Violation List
        • Troubleshooting Suspicious Endpoints
    • Device Recognition
      • Endpoint Devices
        • Viewing Endpoint Devices
          • Endpoint Device Details
            • Viewing an Endpoint Device
      • General Scan Settings
        • Configuring General Scan Settings
  • Policies
    • Policy Rules
      • Policy Rules and IPv4/IPv6 Support
      • Managing Policy Rules
      • Adding/Editing Policy Rules
        • Matrix: Policy Rules Settings by Gateway Model
      • Viewing Information About Configured Policy Rules
      • Usage Information for Policy Rules
      • Duplicating Policy Rules
      • Enabling/Disabling Policy Rules
      • Deleting Policy Rules
    • Interfaces and Interface Groups
      • Managing Interface Objects and Interface Groups
      • Adding/Editing Interface Group Objects
    • Identity Objects
      • IP Addresses/FQDNs
        • Managing IP Address/FQDN Objects
        • Adding/Editing IP Address/FQDN Objects
          • IP Address/FQDN Object Parameters
        • Deleting IP Address/FQDN Objects
        • Duplicating IP Address/FQDN Objects
      • MAC Addresses
        • Managing MAC Addresses
        • Adding/Editing MAC Address Objects
        • Deleting Address Objects
      • Geolocations
        • Viewing Predefined Geolocations
        • Managing Grouped Geolocation Objects
        • Adding/Editing Grouped Geolocation Objects
        • Deleting Grouped Geolocation Objects
    • Other Objects
      • Services
        • Managing Services
        • Viewing Predefined Services
        • Adding/Editing Service Objects
          • Service Object Parameters
        • Deleting Service Objects
        • Duplicating Service Objects
      • Schedules
        • Managing Schedules
        • Adding/Editing Schedule Objects
        • Deleting Schedule Objects
        • Duplicating Schedule Objects
    • Content Type Objects
      • Applications and Application Groups
        • Managing Application Groups
        • Adding/Editing Application Group Objects
        • Deleting Application Group Objects
        • Duplicating Application Group Objects
      • URL Category Groups
        • Predefined URL Category Groups
          • Managing URL Category Groups
          • Adding/Editing URL Category Group Objects
          • Deleting URL Category Group Objects
          • Duplicating URL Category Group Objects
        • URL Category Groups
        • URL Filtering Categories
    • Security Profiles
      • Managing Security Profiles
        • Security Profile Status Icons
      • IPS Profiles
        • Configuring IPS Profiles
        • IPS Severity Levels
        • IPS Monitor/Block Categories
        • Where to Find IPS BID/CVE Information
      • Anti-Malware Profiles
        • Configuring Anti-Malware Profiles
      • Email Security Profiles
        • Cloud Message Scan (CMS) and Local Scan
        • Phishing Detection
        • Email Reputation Technology
        • Predictive Machine Learning
        • Virtual Analyzer
        • Configuring Email Security Profiles
      • Web Reputation Profiles
        • Configuring Web Reputation Profiles
      • HTTPS Profiles
        • Configuring HTTPS Profiles
      • Anti-DoS Profiles
        • Configuring Anti-DoS Profiles
      • Endpoint Identification Profiles
        • Configuring Endpoint Identification Profiles
    • Approved and Blocked Lists
      • Managing Approved and Blocked Lists
      • Adding/Editing Approved or Blocked URLs
      • Adding/Editing Approved or Blocked FQDNs or IP addresses
      • Deleting Approved or Blocked List
      • Exporting URLs, FQDNs or IP Addresses from Approved List or Blocked List
      • Importing URLs, FQDNs or IP Addresses to Approved List or Blocked List
    • User Notifications
      • Managing User Notifications
      • Editing User Notifications
    • Suspicious Objects
      • Configuring Settings for Suspicious Objects
  • Analysis & Reports
    • Log Analysis
      • Time Measurements
      • Analyzing Logs
      • Application Bandwidth
        • Managing Application Bandwidth
      • Policy Enforcement
        • Managing Policy Enforcement
        • Policy Enforcement Raw Log Display Columns
      • Internet Access
        • Managing Internet Access
      • Internet Security Test
        • Managing Internet Security
    • Log Favorites
      • Managing Log Favorites
    • Reports
      • Managing Report Templates
      • Adding/Editing Report Templates
      • Deleting Report Templates
      • Duplicating Report Templates
      • Report Content
      • Summary Reports
        • Adding/Editing Summary Report Templates
        • Deleting Summary Report Templates
        • Duplicating Summary Report Templates
        • Summary Report Content
  • Administration
    • Managing Your License
      • Creating a Service Plan
      • Creating a Company and Assigning the Service Plan
      • License Expiration Warnings
    • Users and Accounts
      • Accounts Management
        • Managing Users and Accounts
        • Adding/Editing Accounts
        • Deleting Accounts
      • Changing User Profiles
        • Changing User Profiles
    • User Authentication
      • UserID Sync
        • Managing UserID Sync
      • Authentication Settings
        • Configuring Authentication Settings
      • Hosted Users and Groups
        • Managing Hosted Users
        • Adding/Editing a Hosted User
        • Managing Hosted Groups
        • Adding/Editing a Hosted Group
        • Importing/Exporting Hosted Users and Groups
          • Preparing the Import File
      • LDAP Settings
        • LDAP Authentication
        • Configuring LDAP Settings
          • Basic LDAP Authentication
          • Advanced LDAP Authentication
      • RADIUS Settings
        • RADIUS Authentication
        • Configuring RADIUS Settings
        • Managing RADIUS Users/Groups
          • RADIUS Users and Groups
      • Captive Portal
        • Managing Captive Portal
    • Audit Logs
      • Configuring Audit Logs
      • Viewing Policy Change Log Details
    • Administrator Alerts
      • Configuring Informational Alerts
      • Configuring Gateway Offline Alerts
    • Updates
      • Updateable Components
        • Anti-Spam Pattern and Engine
        • IntelliTrap Pattern and Exceptions
        • IPS Pattern
        • Spyware Pattern
        • Virus Scan Engines and Pattern
        • Smart Scan Agent Pattern
      • Scheduling Updates
    • Maintenance
      • Configuration Backups
      • Backing Up or Restoring Configuration
    • Certificate Management
      • Importing a Third-Party CA Certificate
      • Installing a Cloud Edge CA Certificate to Your Browser
  • Glossary
Analysis & Reports
Related information
  • Log Analysis
  • Log Favorites
  • Reports
Online Help Center

Support
For Home For Business


Privacy Notice
© 2025 Trend Micro Incorporated. All rights reserved.
Table of Contents
  • Privacy and Personal Data Collection Disclosure
  • Introduction to SydneyCloud Edge
    • Cloud Edge Overview
    • How Cloud Edge Works
    • Main Features
      • Hybrid Security
      • On–Premises Capabilities
      • In–the–Cloud Capabilities
    • New Features and Enhancements
    • Support for IPv6
    • Getting Started Screen
    • Cloud Edge Console Supported Browsers
  • Dashboard
    • Dashboard Overview
      • Using the Dashboard
    • Tabs
      • Adding a New Tab
      • Modifying Tab Settings
      • Deleting a Tab
    • Widgets
      • Security Status Widgets
      • Traffic Status Widgets
      • High Availability Widgets
      • Device Map and Security Widgets
      • Widget Options
      • Adding New Widgets
      • Customizing Widgets
      • Deleting Widgets
  • Gateways
    • Managing Gateways
      • Registration
      • Gateway Actions
      • Registering Gateways
      • Importing Multiple Gateways
      • Verifying the Registration
      • Viewing Information for All Gateways
      • Creating an HA Group
        • HA Groups
        • HA Group - WAN Topologies
        • HA Group – Failover Conditions
        • HA Group – Heartbeat Interfaces
        • HA Group – VRRP Groups
        • HA Group - Endpoint Network Access
        • HA Group – Monitor Interfaces and Takeover Triggers
        • HA Groups - Configuration Settings Matrix
        • HA Groups – Policy Settings Matrix
        • HA Group Limitations
        • HA Group - Actions
      • Replacing a Gateway
    • Gateway Information
      • Viewing General Gateway Information
      • Viewing Gateway System Status
      • Viewing Gateway Logs and Events
        • Event Categories and Sub-Categories
      • Using Tools to Troubleshoot Network Connectivity
        • Performing a Ping Test
        • Performing a Traceroute Test
        • Retrieving ARP Results
      • Enabling/Disabling Conservative Mode
    • Network
      • Interfaces
        • Managing Network Interfaces
        • Editing Network Interfaces
          • Routing Mode: Editing Network Interfaces
          • Routing Mode: Editing Wireless Network Interfaces
          • Bridge Mode: Editing Network Interfaces
        • Enabling or Disabling Interfaces
        • Configuring Switch Interface (sw0) Settings
          • List of Switch Interface (sw0) Settings
          • Security Protections Provided by Each Intranet Security Mode
        • How VLANs Work
          • How to Deploy Cloud Edge With VLANs
            • Bridge Mode VLANs
            • Routing Mode VLANs
          • Adding/Editing VLAN Interfaces
      • Administrative Access
        • Enabling Administrative Access
      • DHCP
        • Viewing DHCP Services
        • Editing DHCP Settings
        • Deployment Mode Information for DHCP
        • Default DHCP IP Address Pools
      • Dynamic DNS
        • Supported DDNS Service Providers
        • Configuring Dynamic DNS Settings
        • Viewing DDNS Status
          • DDNS Status Messages
      • Routing Table
        • Viewing the Routing Table
        • Routing Table Indicators
      • Static Routes
        • Adding a Static Route
        • Enabling/Disabling Static Routes
        • Modifying a Static Route
        • Deleting a Static Route
      • Network Address Translation (NAT)
        • NAT Rules
          • Adding a Destination NAT Rule
          • Modifying NAT Rules
          • Changing NAT Rule Priorities
          • Adding a Source NAT Rule
          • Deleting NAT Rules
          • Adding NAT Rules to Support Hairpin NAT
    • SD-WAN
      • Enabling SD-WAN and Bandwidth Settings
      • Overview Widgets
      • SD-WAN Rules
        • Managing SD-WAN Rules
        • Adding/Editing SD-WAN Rules
        • Editing the Default SD-WAN Rule
        • Duplicating SD-WAN Rules
        • Moving SD-WAN Rules
        • Enabling/Disabling SD-WAN Rules
        • Deleting SD-WAN Rules
      • SLAs
        • Managing SLAs
        • Adding/Editing Health Check SLAs
        • Deleting SLAs
    • Wireless
      • Viewing Wireless Network Information
        • Viewing Wireless Network General Settings
        • Viewing Wireless Guest Network Settings
        • Viewing Wireless Troubleshooting Information
      • Wireless Network Access Control
        • How Wireless Network Access Control Rules Work
        • Configuring Access Control for the Wireless Networks
        • Viewing Wireless Connected Clients
        • Adding Connected Clients to Access Control Rules
        • Adding Wireless Network Access Control Rules
        • Deleting Wireless Network Access Control Rules
    • Bandwidth Control
      • Managing Bandwidth Control
      • Adding/Editing Bandwidth Control Rules
      • Duplicating Bandwidth Control Rules
      • Enabling/Disabling Bandwidth Control Rules
      • Deleting Bandwidth Control Rules
    • User VPN
      • Virtual Private Networks
        • Encryption Algorithms
        • Authentication Algorithms
        • Internet Key Exchange (IKE) Protocols
      • SSL VPN
        • Managing SSL VPN
        • Viewing SSL VPN Clients
        • Troubleshooting SSL VPN
          • Understanding SSL VPN Error Messages
      • L2TP VPN
        • Managing L2TP VPN
        • Viewing L2TP VPN Clients
        • Troubleshooting L2TP VPN
    • Site-to-Site VPN
      • IPsec Connections
      • Supported Configuration Information
      • Site-to-Site VPN Topologies
        • Example: Full-Mesh Site-to-Site VPN
        • Example: Star Site-to-Site VPN
      • Configuring Full-Mesh Site-to-Site VPNs
      • Configuring Star Site-to-Site VPNs
      • Configuring Peer-to-Peer Site-to-Site VPNs
      • Managing Site-to-Site VPNs
        • Managing IPsec VPN Connections
        • Adding an IPsec VPN Connection
        • Managing IPsec Policies
        • Adding an IPsec Policy
        • Configuring Advanced Site-to-Site VPN Settings
      • IPsec Status
      • IPsec Troubleshooting
        • Best Practice Configuration for IPsec Traffic Traversing Multiple Gateways
        • Viewing Troubleshooting Logs
    • Updates
      • Updating the Cloud Edge Gateway
    • Managing Network Access Control
      • WFBSS Endpoint Protection
        • Managing WFBSS Endpoint Protection
        • Configuring WFBSS Endpoint Protection
        • Adding Endpoints to the Protection List
        • Adding Endpoints to the Exception List
        • Viewing the WFBSS Endpoint Protection Client List
        • Troubleshooting WFBSS Endpoint Protection
      • Suspicious Endpoints
        • Managing Suspicious Endpoints
        • Configuring Suspicious Endpoints
        • Viewing the Suspicious Endpoints Violation List
        • Troubleshooting Suspicious Endpoints
    • Device Recognition
      • Endpoint Devices
        • Viewing Endpoint Devices
          • Endpoint Device Details
            • Viewing an Endpoint Device
      • General Scan Settings
        • Configuring General Scan Settings
  • Policies
    • Policy Rules
      • Policy Rules and IPv4/IPv6 Support
      • Managing Policy Rules
      • Adding/Editing Policy Rules
        • Matrix: Policy Rules Settings by Gateway Model
      • Viewing Information About Configured Policy Rules
      • Usage Information for Policy Rules
      • Duplicating Policy Rules
      • Enabling/Disabling Policy Rules
      • Deleting Policy Rules
    • Interfaces and Interface Groups
      • Managing Interface Objects and Interface Groups
      • Adding/Editing Interface Group Objects
    • Identity Objects
      • IP Addresses/FQDNs
        • Managing IP Address/FQDN Objects
        • Adding/Editing IP Address/FQDN Objects
          • IP Address/FQDN Object Parameters
        • Deleting IP Address/FQDN Objects
        • Duplicating IP Address/FQDN Objects
      • MAC Addresses
        • Managing MAC Addresses
        • Adding/Editing MAC Address Objects
        • Deleting Address Objects
      • Geolocations
        • Viewing Predefined Geolocations
        • Managing Grouped Geolocation Objects
        • Adding/Editing Grouped Geolocation Objects
        • Deleting Grouped Geolocation Objects
    • Other Objects
      • Services
        • Managing Services
        • Viewing Predefined Services
        • Adding/Editing Service Objects
          • Service Object Parameters
        • Deleting Service Objects
        • Duplicating Service Objects
      • Schedules
        • Managing Schedules
        • Adding/Editing Schedule Objects
        • Deleting Schedule Objects
        • Duplicating Schedule Objects
    • Content Type Objects
      • Applications and Application Groups
        • Managing Application Groups
        • Adding/Editing Application Group Objects
        • Deleting Application Group Objects
        • Duplicating Application Group Objects
      • URL Category Groups
        • Predefined URL Category Groups
          • Managing URL Category Groups
          • Adding/Editing URL Category Group Objects
          • Deleting URL Category Group Objects
          • Duplicating URL Category Group Objects
        • URL Category Groups
        • URL Filtering Categories
    • Security Profiles
      • Managing Security Profiles
        • Security Profile Status Icons
      • IPS Profiles
        • Configuring IPS Profiles
        • IPS Severity Levels
        • IPS Monitor/Block Categories
        • Where to Find IPS BID/CVE Information
      • Anti-Malware Profiles
        • Configuring Anti-Malware Profiles
      • Email Security Profiles
        • Cloud Message Scan (CMS) and Local Scan
        • Phishing Detection
        • Email Reputation Technology
        • Predictive Machine Learning
        • Virtual Analyzer
        • Configuring Email Security Profiles
      • Web Reputation Profiles
        • Configuring Web Reputation Profiles
      • HTTPS Profiles
        • Configuring HTTPS Profiles
      • Anti-DoS Profiles
        • Configuring Anti-DoS Profiles
      • Endpoint Identification Profiles
        • Configuring Endpoint Identification Profiles
    • Approved and Blocked Lists
      • Managing Approved and Blocked Lists
      • Adding/Editing Approved or Blocked URLs
      • Adding/Editing Approved or Blocked FQDNs or IP addresses
      • Deleting Approved or Blocked List
      • Exporting URLs, FQDNs or IP Addresses from Approved List or Blocked List
      • Importing URLs, FQDNs or IP Addresses to Approved List or Blocked List
    • User Notifications
      • Managing User Notifications
      • Editing User Notifications
    • Suspicious Objects
      • Configuring Settings for Suspicious Objects
  • Analysis & Reports
    • Log Analysis
      • Time Measurements
      • Analyzing Logs
      • Application Bandwidth
        • Managing Application Bandwidth
      • Policy Enforcement
        • Managing Policy Enforcement
        • Policy Enforcement Raw Log Display Columns
      • Internet Access
        • Managing Internet Access
      • Internet Security Test
        • Managing Internet Security
    • Log Favorites
      • Managing Log Favorites
    • Reports
      • Managing Report Templates
      • Adding/Editing Report Templates
      • Deleting Report Templates
      • Duplicating Report Templates
      • Report Content
      • Summary Reports
        • Adding/Editing Summary Report Templates
        • Deleting Summary Report Templates
        • Duplicating Summary Report Templates
        • Summary Report Content
  • Administration
    • Managing Your License
      • Creating a Service Plan
      • Creating a Company and Assigning the Service Plan
      • License Expiration Warnings
    • Users and Accounts
      • Accounts Management
        • Managing Users and Accounts
        • Adding/Editing Accounts
        • Deleting Accounts
      • Changing User Profiles
        • Changing User Profiles
    • User Authentication
      • UserID Sync
        • Managing UserID Sync
      • Authentication Settings
        • Configuring Authentication Settings
      • Hosted Users and Groups
        • Managing Hosted Users
        • Adding/Editing a Hosted User
        • Managing Hosted Groups
        • Adding/Editing a Hosted Group
        • Importing/Exporting Hosted Users and Groups
          • Preparing the Import File
      • LDAP Settings
        • LDAP Authentication
        • Configuring LDAP Settings
          • Basic LDAP Authentication
          • Advanced LDAP Authentication
      • RADIUS Settings
        • RADIUS Authentication
        • Configuring RADIUS Settings
        • Managing RADIUS Users/Groups
          • RADIUS Users and Groups
      • Captive Portal
        • Managing Captive Portal
    • Audit Logs
      • Configuring Audit Logs
      • Viewing Policy Change Log Details
    • Administrator Alerts
      • Configuring Informational Alerts
      • Configuring Gateway Offline Alerts
    • Updates
      • Updateable Components
        • Anti-Spam Pattern and Engine
        • IntelliTrap Pattern and Exceptions
        • IPS Pattern
        • Spyware Pattern
        • Virus Scan Engines and Pattern
        • Smart Scan Agent Pattern
      • Scheduling Updates
    • Maintenance
      • Configuration Backups
      • Backing Up or Restoring Configuration
    • Certificate Management
      • Importing a Third-Party CA Certificate
      • Installing a Cloud Edge CA Certificate to Your Browser
  • Glossary
Close