Weekly Tech Tidbit – Cisco Firepower IPS Intrusion Event refresher   

This tidbit is a refresher on looking at Cisco Firepower Intrusion Event logs and daily reports. 具体地说, I wanted to review for all of you again the meaning of two key columns, the Impact and Inline Result columns The Firepower Impact scale is designed to help the recipient understand where to focus scarce resources first.

阅读更多

Weekly Tech Tidbit – Vendor 支持 Contracts

这是简短和甜蜜的. Once in a while we encounter equipment or software that you have purchased elsewhere, but you want CSI to actively support you with it moving forward.   The reality with some of these vendors is that we are not allowed to call for technical assistance or even to place a […]

阅读更多

Weekly Tech Tidbit – 4 Hour On-Site?

Often we all don’t get true clarity on the importance of certain issues until you are living them.  That is why for instance Dutchess County BOCES attempts to do a yearly, live, full DR test.  It is amazing what you find out when you actually force yourself to go production on plan B.  文档是[…]

阅读更多

Weekly Tech Tidbit – Secure your DNS

Keeping up with my theme on DNS related posts, this week I will again reprise a post from over a year ago on the importance of implementing proper control of DNS as part of your malware protection program.   It remains as valuable part of your overall all network and security management policies.

阅读更多

CSI og体育app官网讨论 网络inar – Troubleshooting SCCM Configuration Manager Part II – Introducing 支持 Center – Recording Available

In the February og体育app官网讨论 网络inar entitled,  “SCCM Troubleshooting Part II” Scott introduced the new  支持 Center for client troubleshooting which became available in 1810.  It provides real-time log viewing, or capturing the state of a Configuration Manager client computer for later analysis.

阅读更多

CSI og体育app官网讨论 网络inar – China Hacking Update – Recording Availabile

The US-CERT (Computer Emergency Response Team) recently gave a presentation on what China has been doing to hack anything they can hack with the goal of stealing intellectual property, money and personally identifiable information. While most public sector schools and government agencies are generally not vast repositories of intellectual property, 他们确实管理和调动[……]

阅读更多