After you have decided which of the
methods
to detect corporate credential submissions you want to use,
take the following steps to enable the firewall to detect when users
submit corporate credentials to web pages and either alert on this
action, block the credential submission, or require users to acknowledge the
dangers of phishing before continuing with the submission.