Configure and verify web and email security deployment methods to protect on-premises, hybrid, and remote users

📘CompTIA Security+ (SY0-701)


1. What This Topic Is About (Exam Perspective)

This topic focuses on how organizations deploy, configure, and verify web and email security solutions to protect users in different environments:

  • On-premises users (inside the corporate network)
  • Hybrid users (some on-premises, some cloud-based)
  • Remote users (working from home or anywhere)

The exam expects you to understand:

  • Different deployment methods
  • How traffic is redirected to security devices
  • How policies are applied
  • How to verify that protection is working

2. Why Web and Email Security Is Important

Web and email are the most common entry points for attacks, such as:

  • Malicious websites
  • Phishing emails
  • Malware attachments
  • Data loss through uploads
  • Command-and-control communication

Cisco web and email security solutions are deployed to:

  • Inspect traffic
  • Enforce security policies
  • Block threats
  • Protect users no matter where they are located

3. User Deployment Scenarios

A. On-Premises Users

Users are inside the corporate network and access the internet through internal infrastructure.

B. Hybrid Users

Some users are inside the office, while others use cloud services or work remotely.

C. Remote Users

Users are outside the corporate network and connect directly to the internet.

Each scenario requires different deployment methods.


4. Web Security Deployment Methods

Web security solutions inspect HTTP and HTTPS traffic to block threats and enforce policies.


4.1 Explicit Proxy Deployment

What It Is

  • User devices are manually configured to send web traffic to a proxy server.
  • The proxy inspects traffic before allowing it to the internet.

How It Works

  • Browser proxy settings are configured
  • Traffic flows:
    User → Proxy → Internet

Where Used

  • On-premises users
  • Controlled enterprise environments

Exam Key Points

  • Requires manual or centralized configuration
  • Easy to verify
  • High visibility and control

4.2 Transparent Proxy Deployment

What It Is

  • Users do not configure anything
  • Network devices redirect traffic automatically

How It Works

  • Traffic is intercepted using:
    • WCCP
    • Policy-Based Routing (PBR)

Where Used

  • On-premises environments
  • When user configuration is not possible

Exam Key Points

  • Invisible to users
  • Requires network-level configuration
  • SSL decryption may be required

4.3 Cloud-Based Web Security (DNS or Proxy Based)

What It Is

  • Web traffic is redirected to a cloud security service

How It Works

  • DNS requests or proxy settings send traffic to cloud inspection points
  • Policies are enforced centrally

Where Used

  • Hybrid users
  • Remote users

Exam Key Points

  • No on-prem hardware required
  • Scales easily
  • Ideal for remote workforce

4.4 Agent-Based Web Security

What It Is

  • A security agent is installed on user devices

How It Works

  • All traffic is routed securely to the cloud security platform
  • Policies follow the user

Where Used

  • Remote users
  • BYOD environments

Exam Key Points

  • User-based policy enforcement
  • Protection everywhere
  • Works outside corporate network

5. Email Security Deployment Methods

Email security protects against spam, phishing, malware, and data loss.


5.1 On-Premises Email Security Gateway

What It Is

  • A physical or virtual appliance deployed inside the network

How It Works

  • Mail flow:
    • Internet → Email Security Gateway → Mail Server

Exam Key Points

  • Full control
  • Requires maintenance
  • Suitable for on-prem email servers

5.2 Cloud-Based Email Security Gateway

What It Is

  • Email is inspected in the cloud before delivery

How It Works

  • MX records point to cloud security service
  • Threats are blocked before reaching users

Exam Key Points

  • No hardware required
  • High availability
  • Easy integration with cloud email services

5.3 Hybrid Email Security Deployment

What It Is

  • Combination of cloud and on-prem email security

How It Works

  • Inbound mail filtered in the cloud
  • Internal policies enforced on-prem

Exam Key Points

  • Layered protection
  • Common in migration scenarios

6. Policy Configuration Concepts

Policies define what is allowed and what is blocked.

Web Security Policies

  • URL filtering
  • Application control
  • Malware inspection
  • File type control
  • Data loss prevention (DLP)

Email Security Policies

  • Anti-spam rules
  • Anti-phishing detection
  • Attachment scanning
  • Domain reputation
  • DLP for email content

7. SSL/TLS Decryption (Very Important for Exam)

Why It Is Needed

Most web traffic is encrypted (HTTPS).

How It Works

  • Security device decrypts traffic
  • Inspects content
  • Re-encrypts traffic

Exam Key Points

  • Required for deep inspection
  • Needs trusted certificates
  • Privacy and performance considerations

8. Identity-Based Policy Enforcement

Security policies can be based on:

  • User identity
  • Group membership
  • Device type
  • Location

How Identity Is Obtained

  • Active Directory
  • LDAP
  • Cloud identity providers

Exam Tip

User-based policies provide better security than IP-based policies.


9. Verification and Monitoring (Critical for Exam)

After deployment, you must verify that security is working.


9.1 Web Security Verification

  • Check access logs
  • Test allowed and blocked websites
  • Confirm SSL inspection status
  • Verify user identity mapping
  • Review malware detection events

9.2 Email Security Verification

  • Monitor message tracking
  • Verify spam and phishing detection
  • Check quarantine
  • Review email security reports
  • Validate policy hits

9.3 Common Tools for Verification

  • Dashboards
  • Logs
  • Alerts
  • Reports
  • Real-time monitoring

10. Protecting Remote Users

Remote users are protected using:

  • Cloud-based web security
  • Endpoint agents
  • Secure email gateways
  • Identity-based access control

Exam Key Idea

Security must follow the user, not the location.


11. Common Exam Comparison Points

AreaOn-PremCloudHybrid
Hardware RequiredYesNoPartial
ScalabilityLimitedHighMedium
Remote User SupportWeakStrongStrong
MaintenanceHighLowMedium

12. Key Exam Takeaways

✔ Know deployment methods
✔ Understand traffic redirection techniques
✔ Be clear on web vs email security roles
✔ Understand cloud vs on-prem differences
✔ Know how to verify security effectiveness
✔ Remember remote user protection methods


13. Simple Summary (For Non-IT Learners)

  • Web and email are the main attack paths
  • Security tools inspect traffic before it reaches users
  • Deployment depends on where users are located
  • Cloud security protects users anywhere
  • Policies control what is allowed or blocked
  • Verification ensures security is working properly
Buy Me a Coffee