Network Security

6K

Solutions

27

Articles & Videos

8K

Contributors

Network security consists of the policies adopted to prevent and monitor authorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, and covers a variety of computer networks; conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access.

Share tech news, updates, or what's on your mind.

Sign up to Post

We have blocked yahoo, Hotmail, gmail, dropbox :
our audit says there are some lesser known ones that were
not blocked by our Bluecoat proxy.

Anyone can help list out these browser based emails &
file sharing tools ?  Would like to cover more to be thorough
to prevent data loss/leakage
1
Microsoft Certification Exam 74-409
LVL 1
Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

We currently have a Dell Sonic Firewall that is our firewall as well as our company router.  This is our main router for all of our sites in the company.  We have 16.  We implemented through our EMR (Electronic Medical Records) software an upload to a billing company.  They in turn configure and print bills and send them out to our customers.  This has worked fine for over two years.  When this was implemented, we were not required to make any firewall changes at all.

A week ago, the user doing this procedure received an error that the file could not be uploaded.  She called the EMR company, who in their effort to troubleshoot the problem, changed the upload method from ftp to sftp.  She then tried to upload and she got an additional error that port 22 was unable to send.  Seeing that error, the EMR said that the problem has to do with our firewall.  I spoke with the billing company who tried to do a trace route to our external IP.  They were unsuccessful, but I was able to do a trace route to them.  The only caveat is that the user can do this procedure from home with no problem.

I am willing to make firewall changes if necessary, I just don't know what they would be or why it is necessary now, if no one has made any changes other than the upload method from ftp to sftp.

Please help.  I am desperate.
0
It happens I need to keep my laptop (Windows 10 Home) powered on during night to save time for a lot of opened websites and documents I don't want to open anew each morning. But often when I resume work in the morning, the laptop is very slow when switching between the website tabs in the browser, and probably I get virus or other problems during night.

Is there any way I can protect it during nighttime, for example by turning off all ports? Otherwise, I only put it in sleep mode as it is now, but still it seems to get infected during nighttime.
0
I am going to setup a new PFSense firewall. There are few pieces of equipment on the network that I don't want to have to pay for public facing static IP's for, but I would like to open ports up so they are publicly available to the maintenance people when they are offsite. How do I go about containing those IP's so they can only see out to the internet and not internal to the network in case those pieces of equipment were to be compromise?
0
I am setting up a linux server on a small network for people to access their files, each windows computer will have local login.
I will create logins on the linux server that will be for each individual on the network.
I will map each computer with the appropriate folders that belong to those users.
How can I handle it if someone else needs to use someone else's computer and would like to access their personal files?
Should I have 2 logins, one belonging to the user of that system and a guest of some sort but how can they get to their files easily without needing me to map the drive for them? I need simple because these are not very technical people.

thanks
0
Any simple and good reference to explain the difference between time-based one time password and traditional OTP?  

Besides,  what are the risks and concerns of using freeware token app, e.g. FreeOTP?
0
One PCI DSS assessor had suggested that our Data Domain (sort of VTL as we have
replaced tapes with disks which we backup to remotely to our DR site) ought to be
encrypted.

Internally storage team argued that shouldn't we
a) encrypt at source & only selective sensitive data ?   Then we have much less
    to encrypt
b) encrypting entire data domain will entails more load (tho I've seen EMC's
     solution for this)
c) our assessor's justification is there may be sensitive data (eg: PAN or
    credit card#) in the logs that get backup from our Prod to DR site thus
    the need to encrypt it at destination
d) I know encrypting tapes is highly recommended as tapes are transported
    offsite (for storage) during transit, tapes may get lost.  But if we are using
    point-to-point link between our Prod & DR sites, there's no risk of losing
    media in transit.  Is this argument valid?
e) Also, should a HDD in a SAN get faulty & is being returned to vendor, what
    are the chances anyone or even a determined hacker could read the faulty
    (or even if it's not faulty) HDD for sensitive data?  Data is spliced randomly
    in SAN's HDD, virtually making data in the HDD undecipherable?  
f) when data is being backup from our Prod datacentre to DR site using
    point-to-point leased line (assuming the line do not have encryption),
    what's the risk it could be tapped or subject to MITMA?  Any security
    guideline that says backup traffic that is not …
0
need your expert opinion.

Client as wifi access point with WPA2 enabled also AES encryption with 40 character length password, in light of attacks and worms and wannacry, client wants to authenticate users on wifi using Radius ----what you think about this setup?

P.s Radius with iKev2
0
Hi All,

Is it possible to block a particular file, for eg a  malicious pdf, based on its Sha-256/Md5 hash value , from the firewall?

Regards,
T
0
hi,

anyone use Manage Engine Desktop Central to deploy MS security patchs ? can it rollback patch which is failed and how can it knows the patches is failed ?
0
Save the day with this special offer from ATEN!
Save the day with this special offer from ATEN!

Save 30% on the CV211 using promo code EXPERTS30 now through April 30th. The ATEN CV211 connects a laptop directly to any server allowing you instant access to perform data maintenance and local operations, for quick troubleshooting, updating, service and repair.

I ran a PCI test on our server and found two small issues, perhaps someone here knows how to resolve.

1. Windows specific file path was detected in the response.
WAS Result:  E:\web\favicon.ico
WAS Result:  C:\Web
Proposed solution:  The content should be reviewed to determine whether it could be masked or removed.   (I don't know how to do this)

2. The Web server can be triggered to reveal the absolute path for the Web root directory and/or other software installed on the host.
WAS Result: Some HTML code  (BlueDot Azure Server port 80/tcp)
Proposed solution: Contact the vendor of the Web server for a possible patch for this issue.  (Server is up to date)

3. SQL Error message: The scan observed an SQL-based error message while performing injection tests. However, the message only appears to indicate that a SQL statement in the web application may be corrupted; it may not be exploitable.

SQL injection enables an attacker to modify the syntax of a SQL query in order to retrieve, corrupt or delete data. This is accomplished by manipulating query criteria in a manner that affects the query's logic. The typical causes of this vulnerability are lack of input validation and insecure construction of the SQL query.

Queries created by concatenating strings with SQL syntax and user-supplied data are prone to this vulnerability. If any part of the string concatenation can be modified, then the meaning of the query can be changed.

0
Where can I setup a Linksys EA8500 to allow rdp (port 3389) to internal pc through port 8080 ?

Thx.
0
Dear Experts,

The nexus switch is asking me for some configuration questions and just want to know what does it mean.

Configure Copp system profile (strict/moderate/lenient/dense): ?

What to select and what is Copp profile?

Thanks
0
Is there such a list of IP or smtp domains (doesn't have to be up to the hour up-to-date) list so
that we can block at our smtp?

Blocking by firewalls is not good as the emails will still come in
0
Hi.

For more background information please see the following links to two previous questions of mine:

https://www.experts-exchange.com/questions/29021535/Strategy-for-developing-proprietary-project-information-on-a-secure-computer.html

https://www.experts-exchange.com/questions/29022388/Part-II-Strategy-for-developing-proprietary-project-information-on-a-secure-computer.html

I want to use application white listing via Applocker – GPO. So it seems I'll need Windows 10 Enterprise instead of Windows 10 Pro on a new laptop, which I will buy.

I will be the only user of the new laptop, but I want the good security and whitelisting discussed in my two previous questions (noted above).

My question today is:
What additional benefit beyond Applocker would be available to me as the only user of the new laptop by installing Windows 10 Enterprise instead of Windows 10 Pro?

I'm primarily interested in
a) my additional ability to control the implementation timing of Microsoft upgrades; and b) preventing Microsoft from changing various settings, defaults and options that I have chosen.

Thank you
0
I need to configure server to host my web site.
It's E-coomerce web site.
01. I need to know what is the upload /and download speed minimum. for example 1000 users access simulaniously.
02. do i need to buy Static IP address
03.i have search from Google typing ipaddress,then it will showing my Your public IP address IPaddress is xxx.xxx....
is it Static or Dynamic Address
04. I have domain name , how to connect IP address and Domain name
05.How to secure my server
0
Hi

I new for the concept of SSH and what is the concept for SSH.

Thanks
0
hi,

Right now as there are more and more zero day attack and security patch sometime is too slow to apply.

what is the way you guy used to deploy patch asap ? WSUS ? any robust way to do it ?

link/resource on how to setup the method is welcome .
0
Does anyone know where i can find the MS Patch for SBS2011 to patch against WananCry Ransomware?

I know SBS2011 is based on Server 2008R2, tried those but it tells me its not for this system

Many Thanks
1
Free NetCrunch network monitor licenses!
LVL 4
Free NetCrunch network monitor licenses!

Only on Experts-Exchange: Sign-up for a free-trial and we'll send you your permanent license!

Here is what you get: 30 Nodes | Unlimited Sensors | No Time Restrictions | Absolutely FREE!

Act now. This offer ends July 14, 2017.

I heard that the ransomware that screwed up the british health system and many others.... that was because they were running win xp machines?

or is it more than that?

Any tips on protection?

I saw this page:

https://pbs.twimg.com/media/C_w_rWlUAAAtWs

that talks of turning off smb 1 protocol for file sharing.

What's the downside / what problems would that cause if we do that on each machine?

Those powershell commands are for win 8 and above.

running those commands on win 7 gets error messages about that command not found.

are there comparable commands to run on win 7?   it's not safe by default / nothing to worry about?

thanks!
1
Hi guys

Could you help me with few settings please? how to setup it etc

-      Only computers with the latest updates can login into our network ? via remote access and vpn  ?
-      Should we disable SMB v1? on all computers?  
-      How to block 139, 445 port on the sonicwall
-      how can I block  HTA extension file from downloading ?

thank you
0
Hi Everybody,

I am looking for a  virtual cyber security range solution for the  university which I work for so that the students can do their labs. The requirements are the following :- Accessible, secure and seamless access must be provided to the remote virtual lab.The remote virtual server must reliably serve a significant number of concurrent users with limited resources.The virtual machine (VM) must be configured with the appropriate operating system(s) and include the required security tools for each lab exercise.Students must have privileged access rights on the virtual machines to execute security or network tools.

I am wondering if it is a good idea to  use VMware vCloud Automation Center for such solution. If somebody has got an architectural design for such type of solution I would appreciate if you could send me a copy.
Regards

Soobash
0
Hi, the client has Windows Server 2003 running on one server, it's the only server left on this old version. Everything else is 2012 R2. I am unable to do anything about it because the garbage ADP payroll software HandPunch will not run on anything newer.

Given the WannaCry malware issue this weekend, any way to disable SMBv1 on Server 2003? Can't find any guidance on this. It is not a DC, it's a virtualized server that exists solely for running the ADP software, so I'm hoping I can just disable SMBv1 and then go back to the client to talk about how crappy ADP software is.
0
Hi.

For background information, the initial requirements and my selected solution, you will need to refer to my previous question at:
https://www.experts-exchange.com/questions/29021535/Strategy-for-developing-proprietary-project-information-on-a-secure-computer.html

From what I've understood so far, and from my further investigation, I will need to then upgrade to Windows 10 Pro for encryption and better control of whitelisting and blacklisting.

My additional requirements are:

Windows Pro upgrade.
Microsoft Office 365 subscription and a limited set of application software (TBD).
I want to eliminate all unnecessary pre-loaded application software and bloatware (when should I do this).
(I will avoid using admin account as default user account.)
I want easy control of whitelisting and blacklisting, hopefully, without needing a lot of additional technical knowledge.

With those additional requirements, today's question is:
Suggest the necessary implementation strategy with sequence of steps, and any other utility software that might be required.

Thank you,
WaterStreet
0
Hi.

I'm proposing a consulting engagement for a client with a proprietary project, which requires that I keep the project's work away from the Internet, due to confidentiality requirements.

I have two windows 10 computers (always updated) that I use on the Internet, and do not want to use any of them for this purpose. I'm thinking of buying a new laptop computer to be used exclusively for the new project.  I use McAfee Total Protection, Malwarebytes, Hitman Pro, and Epic Privacy Browser (proxy mode) on the two computers connected to the Internet.  

I'd prefer to use Microsoft Word and Excel, though I'm not attached to Microsoft products. I'll also need some specialty software (such as 3-D illustration software, and flowchart software), all of which I hope to load via CD/DVD, or transfer the downloaded installation files via flash drive from one of my online computers.

I will create, update, encrypt and store all the proprietary information files on flash drives that will never be inserted, if or when the new computer needs to connect to the Internet.

What what do you think of this strategy for keeping the proprietary project information secure?

Thanks
0

Network Security

6K

Solutions

27

Articles & Videos

8K

Contributors

Network security consists of the policies adopted to prevent and monitor authorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, and covers a variety of computer networks; conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access.