Aegistime Solutions Pvt Ltd
Aegistime Solutions Pvt Ltd
  • 46
  • 32 845
FortiGate DLP Configuration: How to Block Sensitive Content Using Keyword Filtering
In this video, we demonstrate how to configure Data Loss Prevention (DLP) on FortiGate using keyword-based filtering. Learn how to create DLP sensors, set up keyword rules, and apply them effectively to prevent sensitive data leakage.
To enforce a Data Loss Prevention (DLP) rule on HTTPS traffic, you need to enable full SSL inspection and install the firewall's SSL certificate on client devices. This ensures encrypted traffic can be inspected for potential data leaks.
Watch the full tutorial for a step-by-step guide on securing your network using FortiGate's powerful DLP features!
Переглядів: 607

Відео

How to Configure DNS Forwarding and Filtering on FortiGate | Step-by-Step Tutorial
Переглядів 256Місяць тому
"Learn how to set up DNS forwarding and enable DNS filtering on FortiGate to enhance network security. In this tutorial, we’ll walk you through configuring the DNS database, setting up a forwarder, and applying a DNS filter to block harmful requests. You’ll understand how to forward DNS requests to system DNS, create security profiles, and enable filtering for botnet protection. Perfect for IT ...
Understanding Router, Modem & Hub: Malayalam Explanation - Part-4
Переглядів 762 місяці тому
In this video, we break down the differences between a router, modem, and hub in simple Malayalam! If you've ever wondered how these devices work or why each one is important, this video is for you. We’ll cover: What each device does: router, modem, and hub The differences between them How they help in setting up networks at home or office Topics Covered: Router: Purpose, how it works, and comm...
"SASE എന്താണ്? | Secure Access Service Edge Explained in Malayalam"
Переглядів 1782 місяці тому
"In this video, we explore SASE (Secure Access Service Edge) and explain its key components and how it delivers secure access services. Learn about the cloud-based security solutions provided by SASE and how it enhances network security, explained in Malayalam. In this video, you'll learn: What is SASE? Key components of SASE Why SASE is a game changer for businesses and organizations How SASE ...
How to Configure FortiSandbox Cloud with FortiGate: Step-by-Step Guide
Переглядів 1992 місяці тому
"In this video, we explore the integration of FortiSandbox Cloud with FortiGate to enhance network security through advanced threat detection and automated sandboxing. Watch as we guide you step-by-step through the configuration process, demonstrating how to leverage sandboxing to detect and mitigate zero-day threats in real-time. This tutorial is perfect for network admins and security profess...
Networking Switches Explained in Malayalam - Part 3 | Types of switches by Jithin Sam John
Переглядів 1492 місяці тому
In this video, we continue exploring the world of network switches in Malayalam! This is Part 3 of the series, where Jithin Sam John dives into the different types of switches, their features, and their practical applications in networking. We cover: 📌 Managed vs. Unmanaged Switches 📌 Layer 2 and Layer 3 Switches 📌 PoE (Power over Ethernet) Switches 📌 Modular and Fixed-Configuration Switches 📌 ...
Kali Linux Penetration Testing Part-4 :Unveiling Recon with SpiderFoot
Переглядів 1552 місяці тому
in this fourth installment of our Pentest Video Series, we delve into SpiderFoot, an open-source reconnaissance tool designed to automate the collection of intelligence from various sources. Configure SpiderFoot: Step-by-step instructions to get started with SpiderFoot on Kali Linux. Perform Reconnaissance: Explore how to use SpiderFoot to gather data on domains, IPs, and more, providing critic...
Networking Types Explained in Malayalam - Part 2 | Introduction Types of Network by Jithin Sam John
Переглядів 2632 місяці тому
🌐 Networking Types Explained in Malayalam - Part 2 | Types of Network Welcome to Part 2 of our series on Networking! In this video, I, Jithin, will guide you through the various types of networks, explaining their characteristics, applications, and differences. Whether you’re a beginner looking to understand networking basics or a tech enthusiast wanting to refresh your knowledge, this video is...
Kali Linux Nmap Script Level Scanning Penetration Testing Part-3 - Deep Dive into NSE
Переглядів 1092 місяці тому
🔍 Pentest Part 3: Nmap Script-Level Scanning (NSE) 🔍 Welcome to Part 3 of my Pentest series! In this video, we dive deep into Nmap's Scripting Engine (NSE) and how it can be used to automate vulnerability detection, service enumeration, and much more. ⚙️ What You’ll Learn: How to use NSE scripts for advanced scanning Key scripts for vulnerability detection and information gathering Real-world e...
Ransomware | Protect Your Files | Easily Add Protected Folders in Windows Defender
Переглядів 652 місяці тому
In this video, we’ll guide you through the process of securing your important files with Windows Defender’s ransomware protection. Learn how to easily add protected folders to shield your data from potential ransomware attacks. We'll walk you through each step, from accessing the settings to managing your protected folders, ensuring that your valuable information remains safe. Whether you're a ...
Cisco HSRP for Gateway Redundancy | Hot Standby Router Protocol | Step-by-Step Guide
Переглядів 1812 місяці тому
In this video, we walk through the configuration of Hot Standby Router Protocol (HSRP) on Cisco switches to ensure network gateway redundancy. Learn how to set up HSRP on Cisco 3650 switches, configure priority levels, and enable preemption to provide seamless failover in case of network device failure. By the end of this tutorial, you'll have a solid understanding of how to configure HSRP to k...
Kali Linux Metasploit Framework Penetration Testing Part-2
Переглядів 1312 місяці тому
In this video, we dive into penetration testing with Kali Linux and Metasploit, focusing on exploiting vulnerabilities in FTP and MySQL services. Learn how to identify open ports, leverage known exploits, and test for weak credentials to understand how attackers target insecure systems. This tutorial is for educational purposes only, aimed at helping you enhance your ethical hacking and cyberse...
Networking Concepts Explained in Malayalam - Part 1 | Introduction to Networking by Jithin Sam John
Переглядів 1692 місяці тому
In this video, Jithin Sam John introduces the fundamental concepts of networking, providing an easy-to-understand explanation for beginners. Learn about key topics such as networking basics, network topologies, and essential components used in networking. This is Part 1 of a series designed to help you build a strong foundation in networking. Stay tuned for more in-depth videos in the series!
Kali Linux Penetration Testing Part-1 : Nmap, Dirb, Enum4Linux & Metasploitable
Переглядів 3592 місяці тому
In this video, we dive deep into the world of ethical hacking using Kali Linux, focusing on powerful tools like Nmap, Dirb, Enum4Linux, and Metasploitable. Whether you're a beginner or looking to sharpen your skills, this comprehensive tutorial will guide you through the essential steps of network scanning, web application enumeration, and vulnerability assessment. What You'll Learn: Nmap: Disc...
Cisco Switch LACP Configuration Step-by-Step | Link Aggregation Protocol Guide
Переглядів 5853 місяці тому
"In this video, we'll walk you through the complete process of configuring LACP (Link Aggregation Control Protocol) on a Cisco switch. LACP allows you to combine multiple physical links into a single logical link for increased bandwidth and redundancy. Whether you're a network admin or learning Cisco, this guide will help you configure LACP efficiently.
Fortigate Secure SD-WAN Application Steering | Microsoft 365 Traffic
Переглядів 2103 місяці тому
Fortigate Secure SD-WAN Application Steering | Microsoft 365 Traffic
Kali Linux : How Easily Weak Passwords Can Be Hacked | Hydra Password Attack Demo on Kali Linux"
Переглядів 5833 місяці тому
Kali Linux : How Easily Weak Passwords Can Be Hacked | Hydra Password Attack Demo on Kali Linux"
"FortiGate User Authentication Setup | Secure Your Network in 5 Easy Steps!"
Переглядів 2903 місяці тому
"FortiGate User Authentication Setup | Secure Your Network in 5 Easy Steps!"
FortiGate botnet blocking tutorial 🔒 - protect your network from attacks now! 🚫🛡️
Переглядів 5613 місяці тому
FortiGate botnet blocking tutorial 🔒 - protect your network from attacks now! 🚫🛡️
"Kali Linux & FortiGate Firewall | Protecting a Web Server with FortiGate IPS"
Переглядів 9533 місяці тому
"Kali Linux & FortiGate Firewall | Protecting a Web Server with FortiGate IPS"
How to enable file filtering in FortiGate: step-by-step guide 👀
Переглядів 3603 місяці тому
How to enable file filtering in FortiGate: step-by-step guide 👀
🚨 FortiGate Admin Fail Login Alerts: Setup Email Notifications in Minutes! 📧
Переглядів 4694 місяці тому
🚨 FortiGate Admin Fail Login Alerts: Setup Email Notifications in Minutes! 📧
🔒 How to Set Up Check Point Content Filtering: Block Social Media, Games, & More 🚫
Переглядів 754 місяці тому
🔒 How to Set Up Check Point Content Filtering: Block Social Media, Games, & More 🚫
"FortiGate Traffic Shaping Mastery: Limit Update Traffic to 1 Mbps and Optimize Your Bandwidth!"
Переглядів 2984 місяці тому
"FortiGate Traffic Shaping Mastery: Limit Update Traffic to 1 Mbps and Optimize Your Bandwidth!"
"Real-Time Internet Bandwidth Monitoring in FortiGate | Setup in 1 Minute! ⏱️📊"
Переглядів 1,2 тис.4 місяці тому
"Real-Time Internet Bandwidth Monitoring in FortiGate | Setup in 1 Minute! ⏱️📊"
"Stay Safe from Spam Phishing Emails: Awareness & Protection Tips"
Переглядів 1584 місяці тому
"Stay Safe from Spam Phishing Emails: Awareness & Protection Tips"
"FortiGate Tutorial: Configuring External Threat Feeds to Block Malicious IPs"
Переглядів 9034 місяці тому
"FortiGate Tutorial: Configuring External Threat Feeds to Block Malicious IPs"
Discover Aegistime Solutions: Expert IT & Network Services for Every Need
Переглядів 2445 місяців тому
Discover Aegistime Solutions: Expert IT & Network Services for Every Need
"cyber threats are everywhere"
Переглядів 266 місяців тому
"cyber threats are everywhere"
"Secure Your Network with Our Cyber Security Solutions | Aegistime"
Переглядів 316 місяців тому
"Secure Your Network with Our Cyber Security Solutions | Aegistime"

КОМЕНТАРІ