pfSense: IDS/IPS traffic pattern analysis can often detect or block attacks such as a denial-of-service attack or a network scan. However, in some cases this is legitimate traffic (such as using cloud infrastructure for load testing or security testing). Does the cloud provider have a documented exception process for allowing legitimate traffic that the IDS/IPS flags as an attack pattern?

Save time, empower your teams and effectively upgrade your processes with access to this practical pfSense Toolkit and guide. Address common challenges with best-practice templates, step-by-step work plans and maturity diagnostics for any pfSense related project. Download the Toolkit and in Three Steps you will be guided from idea to Read more…

pfSense: IDS/IPS traffic pattern analysis can often detect or block attacks such as a denial-of-service attack or a network scan. However, in some cases this is legitimate traffic (such as using cloud infrastructure for load testing or security testing). Does the cloud provider have a documented exception process for allowing legitimate traffic that the IDS/IPS flags as an attack pattern?

Save time, empower your teams and effectively upgrade your processes with access to this practical pfSense Toolkit and guide. Address common challenges with best-practice templates, step-by-step work plans and maturity diagnostics for any pfSense related project. Download the Toolkit and in Three Steps you will be guided from idea to Read more…

pfSense: Can people access the computing equipment used by your department or organizational unit through the internet, through dial-up access, or from network devices outside your department?

Save time, empower your teams and effectively upgrade your processes with access to this practical pfSense Toolkit and guide. Address common challenges with best-practice templates, step-by-step work plans and maturity diagnostics for any pfSense related project. Download the Toolkit and in Three Steps you will be guided from idea to Read more…

pfSense: Can people access the computing equipment used by your department or organizational unit through the internet, through dial-up access, or from network devices outside your department?

Save time, empower your teams and effectively upgrade your processes with access to this practical pfSense Toolkit and guide. Address common challenges with best-practice templates, step-by-step work plans and maturity diagnostics for any pfSense related project. Download the Toolkit and in Three Steps you will be guided from idea to Read more…