It seems like every day I see a few phishing emails coming through despite multiple layers of security controls and rules in place and in these cases your users are the final line of defense. Security training, newsletters, and visual banners are all part of user education that can prove …
Blog Posts
Yesterday I had to configure Fortinet ADC device for Microsoft Exchange loadbalancing and with very limited knowledge of this platform I got stuck on HTTP to HTTPs redirection setup. I used the following article to setup up Virtual Servers but there were no specific configuration on how to setup HTTP …
When someone is running malicious activity against your public facing services just a few high priority alerts is enough to know that source is not trusted and there is no need for them to keep wasting your IPS cycles. Ideally, it would be to have correlated remediation action automatically adding …
If you ever need to re-host ASA license due to a typo in the serial number (SN) or after migration from a failed device the process is simple but not very intuitive. Log in to Cisco License Registration Portal with your Cisco.com id. Select Licenses > Move Licenses > Share licenses… …
For some time I was puzzled why every time I had to add a new sensor to Platform Settings policy it would affect every other device in the same policy and after policy deployment, it would cause them to restart. This did not make any sense until recently I’ve discovered …