There’s a lot you need to think about when designing your Splunk environment. I’m hoping to keep adding to this...
Below are some good questions you should be asking when looking into SD-WAN....
WINDOWS EVENT IDs USED Windows Logs > Security: 4624 – Logon Success 4768 – Authentication Ticket Granted 4769 – Service...
Setting up a Virtual Private Network (VPN) can be tedious. There are multiple phases involved and numerous parameters to be...
This is a quick example on how to export a config from a working Firewall and import it into a...
“show connection” is a great troubelshooting command which displays the ACTIVE ASA connection table. All traffic that passes through the...
Use below to remove fields that aren’t needed or used. This could reduce the amount of logs by 25%....
URL http.host == “api.cordero.me” DNS dns.qry.name == “www.cordero.me” dns.qry.name matches “.cordero.me” dns.qry.name contains “cordero.me” TCP Flags tcp.flags.reset == 1 tcp.flags.push...