Deploy and Configure Features and Subscriptions
17%
3.1 Configure App-ID
3.1.1
Create security rules with App-ID
3.1.2
Convert port and protocol rules to App-ID rules
Policy Optimizer
Policy Optimizer Video
3.1.3
Identify the impact of application override to the overall functionality of the firewall
3.1.4
Create custom apps and threats
3.1.5
Review App-ID dependencies
App-id Articles
3.2 Configure GlobalProtect
3.2.1
GlobalProtect licensing
3.2.2
Configure gateway and portal
3.2.3
GlobalProtect agent
Global Protect user authentication
3.2.4
Differentiate between login methods
3.2.5
Configure Clientless VPN
3.2.6
Host information profile (HIP)
3.2.7
Configure multiple gateway agent profiles
3.2.8
Split tunneling
Global protect in depth
Global Protect Get started
Global Protect User authentication
Global Protect Gateways
Global Protect Portal
Global Protect Clientless VPN
Global PRotect Host information HIP
Global Protect Articles
3.3 Configure decryption
3.3.1
Inbound decryption
3.3.2
SSL forward proxy
3.3.3
SSL decryption exclusions
Decryption logging
3.3.4
SSH proxy
Decryption Articles
3.4 Configure User-ID
3.4.1
User-ID agent and agentless
3.4.2
User-ID group mapping
3.4.3
Shared User-ID mapping across virtual systems
3.4.4
Data redistribution
3.4.5
User-ID methods
3.4.6
Benefits of using dynamic user groups in policy rules
Requirements to support dynamic user groups 2
3.4.8
How GlobalProtect internal and external gateways can be used
External Internal config
Prisma access redistribution
3.5 Configure WildFire
3.5.1
Submission profile
3.5.2
Action profile
3.5.3
Submissions and verdicts
3.5.4
Signature actions
3.5.5
File types and file sizes
3.5.6
Update schedule
3.5.7
Forwarding of decrypted traffic
Full Wildfire Documentation
Full Wildfire Documentation With Mermaid
Wildfire Test
3.6 Configure Web Proxy
Configure web proxy
3.6.1
Transparent proxy
3.6.2
Explicit proxy
Authentication with Explicit Proxy
Configure Exemptions for Explicit Proxy Authentication
Quiz