This is a dedicated watch page for a single video.
A company has configured its firewall to prevent certain internal IP addresses from accessing external internet resources. To validate this configuration's effectiveness, what should the information security manager focus on primarily?