Network Security

6K

Solutions

26

Articles & Videos

6K

Contributors

Network security consists of the policies adopted to prevent and monitor authorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, and covers a variety of computer networks; conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access.

Related Topics

  1. Security
  2. Networking
  3. Network Management
  4. Hardware Firewalls
  5. Networking Hardware-Other
  6. Windows Networking
  7. OS Security
  8. Routers
  9. Cisco
  10. Software Firewalls
Refine results

Hello All;

OK, as the subject states. We are wanting/needing to block IP addresses.
I do not currently have a professional industry standard hardware firewall at the moment.
So, we are going to …

1640 views
Visualize your virtual and backup environments
Visualize your virtual and backup environments

Create well-organized and polished visualizations of your virtual and backup environments when planning VMware vSphere, Microsoft Hyper-V or Veeam deployments. It helps you to gain better visibility and valuable business insights.

Hi

Looking for recommendations on web content/filtering/security solution, either hardware or in the cloud with minimal management required on it

Thanks in advance

621 views

https://www.experts-exchange.com/questions/29013908/Verifying-if-VA-scan's-vulnerabilities-are-false-positives.html

Refer to above earlier post: we can't install MBSA yet & our VA scanner still …

433 views

Hello all, I was wondering if anyone knew of any developer forums or communities of any kind for Barracuda WAF technologies? I've looked into courserra, cybrary and the like and can't find much. I'm a…

226 views

So, our bank identified, among others, a security vulnerability known as httpoxy. Looking at a few sites, I tried following the instructions in the websites below:

432 views

Greetings EE'ers!

How long does it take to set up 802.1X auth for both wired and wired clients?  Including the NPS setup and Certificate Authority?  Also, what is the best way to get all clients on…

335 views

We have API comms with our vendor.

In what way(s) do an API firewall help?

1043 views

I have setup my username and password on a Cisco 2950 switch for security. My computer is connected to the switch with a console cable.
When I restart my switch I get prompted for the enable password…

428 views

Hi,
I have been researching 2-Factor authentication VPN for staff and partners. I have spoken with lots of different suppliers but I can't find a suitable product. Does anyone have any experience in …

647 views

Any concise links/sites & books that can quick start the staff on Windows sysinternals
for forensics?  Thanks

541 views
Microsoft Certification Exam 74-409
Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Since I noticed my ethernet connection performance as being saturated on my Windows 2012 R2 server,  I ran the netstat command & noticed alot of ip addresses having established connections to 3389. …

554 views

https://www.symantec.com/connect/blogs/message-our-ca-customers

I can't be sure if what Google or Symantec say is more true but let's assume
Google is right.  

Q1:
What's the short term …

234 views

https://docs.oracle.com/cd/E37710_01/install.41/e18475/ch3_asr_assets.htm#ASRUD138
Above is the link explaining & below are the background

I'm looking for ways to best secure the connections from …

229 views

We run our McAfee Vulnerability Mgr scan against a Windows 2012 R2 & the report
indicated it's a Win 2016 (which I don't know why the wrong OS is given) & it gives 3
vulnerabilities below (which my …

349 views

There has been patches that were missed & lapses in patching timely for non-Windows
platforms.   I noticed, Wintel was quite up to the mark on patching & I reckon this is
due patch management …

1163 views

I have a 3rd party device that's assigned a static IP address 10.10.10.10 which requires these firewall rules - which I simply quote:
Ports to be opened bi-directional:
5003
80
443
So, I've …

347 views

Usually, I'm using simple commodity routers for connecting networks: ISP, MPLS, etc. and as firewalls for hosted "3rd party" services like a Guest Wireless, 3rd party VPN terminators, etc.

In some …

767 views

Hi All,

Can anyone here please share and suggest what TCP/UDP ports to be opened in the firewall to allow Remote Desktop Connection to the Windows Server in different AD domain & DMZ network ?

561 views

hi
we have 100s of static  nat on asa , we need to clear the old ones,
what would be the best and efficient way to identify if these nat are not in use ?

224 views
Register Today - IoT Current and Future Threats
Register Today - IoT Current and Future Threats

Are you prepared to protect your organization from current and future IoT Threats?  Join our Wi-Fi expert in episode three of our webinar series for a look at the current state of Wi-Fi IoT and what may lie ahead. Register for our live webinar on April 20th at 9 am PDT!

It is some type of Linux honey pot program. I was given a fife, honeymine.py, that is supposed to set the program up to to end to a SIEM to gather information on my internal network. Supposed to be …

360 views

Hi guys,

I have a Cisco 3750x switch. I basically need to set up a trunk port on one of the ports. It is a stacked switch and it is port number 35 on switch 2, which reads as Gi2/0/35 when I type …

2057 views

Hello everyone,

We recently deployed 802.1x authentication on our campus network. However there's a peculiar issue we are facing when RDP'ing into a machine. Basically the behavior is, RDP session …

674 views

What is the best way to protect an office (1-server ,7 computers)

from getting hit with rensome and other malware?

a device (firewall) that scans all incoming packets?

I'm looking for an …

969 views

Can anyone recommend the best honey pots esp those that are effective against
APTs & ransomwares?

We are looking at https://canary.tools  : any reviews on this company's honeypot?

753 views

I'm comparing & evaluation between using sftp & SendThisFile  to transfer files containing
sensitive data between our organization & a trusted vendor.

Any comments & comparisons and queries on how…

948 views
Show more content
201506-LO-Top-001

Network Security

6K

Solutions

26

Articles & Videos

6K

Contributors

Network security consists of the policies adopted to prevent and monitor authorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, and covers a variety of computer networks; conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access.

Related Topics

  1. Security
  2. Networking
  3. Network Management
  4. Hardware Firewalls
  5. Networking Hardware-Other
  6. Windows Networking