Network Security

Engage with peers and experts on network security topics such as FTD, FMC, FDM, CDO and ASA.
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Join

 
Labels

Forum Posts

How would you recommend a rule setup to lock down your SOE. For example I have an application class that has all our approved software listed, how could you then block/restrict anything that is not on this list???

cbigas by Level 1
  • 452 Views
  • 2 replies
  • 0 Helpful votes

Hi, I have a PIX525 that I am setting up (new to PIX) to allow web connectivity from the internet. I can get to the web server (from the inside and outside), however, we have the SQL database for the web content sitting on a server on our inside in...

cwincey by Level 1
  • 553 Views
  • 4 replies
  • 0 Helpful votes

Is there a limit of the event monitor stations to monitor one sensor (IDS 4.1, IDSM2). I wonder of the case where three or four stations with CW2000 Security Monitor software are gathering the alarms from one sensor. IDS 4.1 is a RDEP pull model for ...

k.lapczuk by Level 1
  • 556 Views
  • 3 replies
  • 0 Helpful votes

What utility can I use to verify if CSA agent is installed on users' computers remotely if I know the ip address of their computers?

Hello,has anyone made a policy for TrendMicro Virus Scanner? When I update the the Virus Scanner, always the Trojan Detection Rule triggers. Which process downloads and tries to execute the upgrade.exe? I guess the "tmlisten.exe". I made a exception ...

Review Cisco Networking for a $25 gift card