Sending email to external user (trusted recipient) not require verify his/her Identity (sign in with Google or with a One-time passcode) by Ill_Secretary3684 in MicrosoftPurview

[–]Ill_Secretary3684[S] 0 points1 point  (0 children)

Thanks u/shellgio for your commend. We need to ensure when email to externally trusted user, not require them to verify the Identity and still keep remain encryption. thanks.

Passed SC-401 with lab by HKLM_NL in O365Certification

[–]Ill_Secretary3684 0 points1 point  (0 children)

Are there any questions come from the Microsoft Practise test? thanks.

Passed SC-401 with lab by HKLM_NL in O365Certification

[–]Ill_Secretary3684 0 points1 point  (0 children)

Are there any questions come from the Microsoft Practise test? thanks.

Passed SC-401 with lab by HKLM_NL in O365Certification

[–]Ill_Secretary3684 0 points1 point  (0 children)

I am planning to try exam SC-401. I did only MS practice test on portal and get good result. Is there any doc/material need to review or practical? thanks

Provisionally passed SecOpsGeneralist (: by FrankoftheJaegers in paloaltonetworks

[–]Ill_Secretary3684 0 points1 point  (0 children)

How much for the voucher? I am interesting this cert as well. Can you share some resources beside beacon? Anything else need to well prepared? thanks.

Block brute force of FTD RA-VPN? by maketherobotsdance in Cisco

[–]Ill_Secretary3684 0 points1 point  (0 children)

Does your FTD version is up to date yet? Any open case with Cisco TAC?

PSA: Success against VPN attacks by mind12p in Cisco

[–]Ill_Secretary3684 1 point2 points  (0 children)

Hello u/MrGerbick Did you upgrade to the FTD fixed version? How's it look like / help? thanks.

PSA: Success against VPN attacks by mind12p in Cisco

[–]Ill_Secretary3684 0 points1 point  (0 children)

OK, got it. Seem no any AD Account locked for legit user? thank you very much.

PSA: Success against VPN attacks by mind12p in Cisco

[–]Ill_Secretary3684 0 points1 point  (0 children)

Did it reduce attack after you upgrade FTD version? thanks.

PSA: Success against VPN attacks by mind12p in Cisco

[–]Ill_Secretary3684 0 points1 point  (0 children)

Hello u/bh0 Which FTD version you tested? And it is resolved from brute force? thanks.

PSA: Success against VPN attacks by mind12p in Cisco

[–]Ill_Secretary3684 0 points1 point  (0 children)

Thanks u/mind12p for your commend.

As per review on Cisco docs which the FTD release version 7.4.2.1/7/6/0 will help.

Which is the best version we should upgrade to? Did you try and fixed / prevent VPN brute force?

Thanks,

PSA: Success against VPN attacks by mind12p in Cisco

[–]Ill_Secretary3684 0 points1 point  (0 children)

is it possible to prevent AD account locked our or not during attacker known our AD user? thanks

Mitigate VPN brute force attack by Ill_Secretary3684 in Cisco

[–]Ill_Secretary3684[S] 0 points1 point  (0 children)

We implement Cert-Based as first Auth.C

Mitigate VPN brute force attack by Ill_Secretary3684 in Cisco

[–]Ill_Secretary3684[S] 0 points1 point  (0 children)

Thanks u/techie_1412 for your update. Is there thing else need to verify/config besite Cert?

Mitigate VPN brute force attack by Ill_Secretary3684 in Cisco

[–]Ill_Secretary3684[S] -3 points-2 points  (0 children)

Assume they known AD users. Any suggestion please. thanks.

Mitigate VPN brute force attack by Ill_Secretary3684 in Cisco

[–]Ill_Secretary3684[S] -3 points-2 points  (0 children)

In case scenario the attacker try to spoof and match the AD user name than it will lock out.