You may run across a time when Window’s service accounts come across your Palo Alto FW taking over the logged...
When talking about the key differences between ECDH and RS, your approach to troubleshooting TLS issues is generally the same....
Akamai recently announced an important update regarding the alerting behavior for their Prolexic Routed 3.0 DDoS protection service. Beginning December...
These are great to know no matter what, especially with what’s going on with what LAPSUS is showing us with...
Using CLI Commands “test security-policy-match” & “test decryption-policy-match” test security-policy-match command allows you to determine which security policy rule would...
When monitoring GlobalProtect VPN user logins on a Palo Alto firewall, you can find the following details in the authentication...
There are several repositories and websites where you can find free PCAP files for learning purposes: Wireshark Sample Captures: The...
There’s a lot you need to think about when designing your Splunk environment. I’m hoping to keep adding to this...
Below is a good template to use when creating a Site-to-Site VPN Form but the settings are something you want...
Business Continuity Planning (BCP) for IT Networking is a crucial aspect of ensuring the availability and resilience of network infrastructure...