1Chapter 1: Introduction to Cisco Secure Web Appliance (SWA)
55.Data Loss Prevention Overview
22.Identity Policies and User Identification
66.Logging Architecture and Options (Syslog, FTP, etc.)
33.Purpose and Operation of HTTPS Inspection
77.Integration with Cisco Threat Response (CTR)
44.File Reputation and Analysis
88.Centralized Management with Cisco Security Management Appliance (SMA)