We have hundreds of public facing web pages : do we protect all of them or only those
a) that when defaced will cause our corporate image to be affected?
b) or web pages that have injection & cert…
I'm trying to find the usage of a particular DOMAIN\Service-Account usage in my whole AD domain.
Can anyone here please share which Security Event ID should I be looking / monitor or …
My company have Ruckus zonedirector1200 and would like to enable wireless client isolation by vlan/subnet. a whitelist was previously created with both IP and MAC address of gateway and DHCP and appli…
I am looking for a RADIUS server, but I have some quite specific requirements.
1. Ideally Windows based, we only have Windows Servers / Skills, and don;t really have the time to learn Linux.
I'm getting bombarded with the below same System Event ID:
This is from the System Event log in the past 2 days.
What does that means ?
The server getting bombarded is j…
I am tasked to secure the site for one company and to prove that I did a good job.
I feel I need a small push to get started with ZAP.
Getting started with ZAP seems very obscure.…
Any security risks comments on the abov…
Customer has an internal request to configure a new DMZ segment to support some hosting/training initiatives. The Internet edge is a pair of Cisco ASA firewalls running IPS and web content filtering s…
Is it possible to connect an ip cams directly to cloud service such as google. mega, box, etc? If so, can EE provide a pathway on the how and considerations for proper install?
Hi, on 2 occasions one of the users in our west coast office has tried restarting the Remote Desktop server in east coast office but accidentally selects option to shut it down instead of restarting s…
I'm preparing a company for PCI audit.
Is there any template document which can be used to analyse company's network suggest changes so I can calculate the impact ?
Can anyone confirm that a user must have "take ownership" permission on a network share in order for ransomware to encrypt the files?
How can I bypass this? It's driving me nuts. I was able to get to by pass this and login to VPN on one of the machines but I can't on the other.
Also, now I am unable to authenticate the passwo…
When configuring ASA failover on a live network, will the ASA's at any point in time drop their connection/restart or on anyway stop operation?
Part of my domain's WHOIS info shows the following:
Tech Name: Hostmaster, TABNet
Tech Street: 5 Financial Plaza
Tech City: Napa
Tech State/Province: CA
Tech Postal Code: 9…
We have Windows 7 PCs on our network and DCs are windows 2012.
Also we have Linux debian proxy servers for students and we use BLOXX, which is our internet filtering system. Currently YouTube ac…
Hello All, today I wanted to block traffic from a couple of untrusted IPs on my ASA firewall, which I did by creating an inbound ACL applied to my external interface. The ACL specifies to block any in…
Whats Tor browser and will it cause any indues on my Mac ~ El Capitan?
Where can I get it and what should I know before using it?
Our organization currently is on MS Exchange 2010 (with Outlook clients) without encryption.
We are contemplating to embark on encryption using Voltage.
a)Voltage allows users to choose to encry…
Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to get better.
Can anyone here please share some steps or process to create secure access for the 3rd party support team ?
I have created the support account called DOMAIN\AS-Support in m…
I'd like to know if there is any Powershell script or software that can be used to test what my DOMAIN\Test-Account can do given certain privilege in my AD domain ?
For example: The AD a…
Our security recently setup a palo alto and it also was configured as DMZ connecting to a Catalyst 2960S. I was asked to configure SPAN on a port to monitor a port channel.
interface port-channel …
We have a mobile application that we'd like to security test.... The app runs on iOS and android
I understand there are static tests, dynamics tests, manual tests and so on. Does anyone ha…