【POC Best Practice for IAM/NGAF/ES/CC】POC Best Practice Positioning and Index
  

sangfor_2267 Posted 19 May 2021 14:33

Dear Partners
          Maybe you have seen that we have added a new categories to the document category: You may be wondering why the classification is added, and the difference between best practices.

Here I will explain to you:

First of all, best practices are used in POC or Implement scenarios

1. Best Practices for Scenarios is mainly used in POC scenarios. The purpose is to let you quickly and efficiently show the effect of the function, which usually contains the following content:
1.1 Applicable to the most general scenarios.
1.2 Use real cases. Some documents need to use third-party tools to show the effect, such as the WAF function test of NGAF products.
1.3 Contains detailed configuration steps. Allows you to achieve better results after configuring according to the documentk for example, which options are enabled to have a security log.
1.4 Contains some precautions for the configuration of the scenario.


2. Best Practices for Configuration is mainly used in POC, Implement and other scenarios. The purpose is to provide you with more reference, how to choose the right configuration, how to configure to avoid potential mistakes, etc. It usually contains the following content:
2.1 How to collect important information
2.2 How to choose deployment mode and functional modules in different scenarios, suitable for some special scenarios
2.3 The idea of ​​configuration
2.4 Common limitations of functional modules
2.5 Common differences between functional modules in different versions
2.6 Usually does not contain too many configuration details and pictures, etc.; the detailed steps and pictures of the configuration will provide additional document links for you to refer to.

Best Practices Index
You can directly click on the document title to redirect to the document browsing and download page.
Some tools are needed for POC testing of some network security functions. The spread of these tools will bring potential network threats, so we did not upload it to the community. If you need it, please contact your local sangfor FAE to obtain these tools.

Best Practices for Configuration
NGAF


Cyber Command

Best Practices for Scenarios
NGAF

Endpoint Secure

Cyber Command

IAM

Like this topic? Like it or reward the author.

Creating a topic earns you 5 coins. A featured or excellent topic earns you more coins. What is Coin?

Enter your mobile phone number and company name for better service. Go

vesogi7900 Lv2Posted 09 Jul 2024 12:27
  
Thanks for sharing
Newbie269196 Lv1Posted 26 Mar 2024 11:57
  
Thanks a lot
RegiBoy Lv5Posted 13 Jan 2023 08:32
  
Nice and awesome guide
Zonger Lv5Posted 20 Oct 2022 03:07
  
useful share
regidorreyes Lv5Posted 01 Jul 2022 14:46
  
This is what I looking for.
Raja Azkar Lv2Posted 17 Jun 2022 12:33
  
Nice Sharing
waqar Posted 09 Jun 2022 12:51
  
how to access sangfor 5200-f-l on pc for first time.
Anyone help me plz
Fahad Islam Lv1Posted 27 Apr 2022 04:58
  
Thanks, alot
sekyu Lv2Posted 16 Nov 2021 17:29
  
excellent guide!!!
jsix Lv2Posted 16 Nov 2021 15:24
  
thank you. very informative.