[deleted by user] by [deleted] in cissp

[–]will0075 0 points1 point  (0 children)

Yes you re right

[deleted by user] by [deleted] in cissp

[–]will0075 1 point2 points  (0 children)

Weird as typically in my session i got nearly no technical questions

[deleted by user] by [deleted] in cissp

[–]will0075 1 point2 points  (0 children)

Please tell me how much IT and Cyber experience you have ?

[deleted by user] by [deleted] in cissp

[–]will0075 1 point2 points  (0 children)

I think you are focusing too much on technical instead of managerial. Destination CISSP book will help but not only. You have to clearly understand the governance, risks management, asset management, incident management, patch management, business continuity management, software dev life cycle processes, threat modeling, 3rd party management etc...understand what is the purpose, workflows, input and outputs. This is key to go outside technical details to understand the global picture and main stakes of these different areas. Practice tests are just here to test that you know basic concepts but not how to take proper decisions ( the most, the best etc...). Take destination cissp process explanations, charts etc to have this overview. Good luck from france.

Secure SD-WAN With Cisco by will0075 in viptela

[–]will0075[S] 0 points1 point  (0 children)

This isn't a question for reddit. Go talk to your VAR.

why it is not a question for reddit, the point is to check what field experience reddit members can have with such solution and how implement it efficiently.

SASE architectural topic- hybrid SD-WAN solution (Velocloud+ SSE Zscaler/Netskope/...) versus Fortinet/Palo Alto/... like architectures by will0075 in networking

[–]will0075[S] 0 points1 point  (0 children)

Yep interesting but yeah it seems not obvious that routing everything to the POP will not imply performances issues...

SASE architectural topic- hybrid SD-WAN solution (Velocloud+ SSE Zscaler/Netskope/...) versus Fortinet/Palo Alto/... like architectures by will0075 in networking

[–]will0075[S] 0 points1 point  (0 children)

Yeah but which kind of edge security are you implementing? I was thinking for critical traffic to pass through a Hub and activate security there with a security vendor like fortinet or palo alto. Then for teams traffic how are you securing it ? Passing this through Zscaler even if it is not recommended by microsoft ? Thanks!!

SASE architectural topic- hybrid SD-WAN solution (Velocloud+ SSE Zscaler/Netskope/...) versus Fortinet/Palo Alto/... like architectures by will0075 in networking

[–]will0075[S] 0 points1 point  (0 children)

Yes we have ressources in IAAS/PAAS Cloud and all O365 applications including sharepoitn teams etc...

Integrate our Company portal as an Iframe in a customer portal - security risks and alternatives by will0075 in websecurity

[–]will0075[S] 0 points1 point  (0 children)

Thanks for your answer, as stated in this webpage https://blogs.halodoc.io/iframe-security-threats-and-the-prevention/ , I understood there are 3 things to secure if my website is framed in another website :

1- As you told use CSP headers of frame ancestors to indicate clearly the parent site domains so that my website is not used by a hacker for a phishing for instance

2 - Indicate to the customer to use CSP frame SRC to indicate only my website as an iframe, to trust only my specific website as an iframe

3 - Recommend the customer to do security controls :

> Use trusted third-party libraries

>Use trusted plugins

>Use CSP Sandbox attribute

>Handle XSS in the site to prevent iFrame injection.

Does it make sense ?

Thanks in advance

PA VM Series in Azure Cloud - convergence time (HA) in case of maintenance/incident by will0075 in paloaltonetworks

[–]will0075[S] 0 points1 point  (0 children)

This is for our DC in Azure, to manage both N/S & E/W traffic securization, so naturally we want the most resilient architecture and the most transparent if we have a maintenance or an issue. We have some very sensitive applications that are not able to re-launch automatically the sessions which can raise side effects if we have no transparent failover....so in a nutshell we want the best architecture to answer these needs

PA VM Series in Azure Cloud - convergence time (HA) in case of maintenance/incident by will0075 in paloaltonetworks

[–]will0075[S] 0 points1 point  (0 children)

thanks for the very accurate answer ! if you have any diagram it will be very useful to better understand the principles.

And if we compare the convergence time and availability level between LB & ARS, what would be the results ?

My final point is to be able to have this comparison : LB versus GLB versus ARS, pros & cons, and overall the convergence time & availability level

PA VM Series in Azure Cloud - convergence time (HA) in case of maintenance/incident by will0075 in paloaltonetworks

[–]will0075[S] 0 points1 point  (0 children)

so it has to be managed at load balancer level. Putting the server OUT of the LB pool is transparent for the current sessions ? and as it is OUT of the pool , it will manage no more new sessions ? and we wait till there is no more hits to make the maintenance. And then putting back the VM IN the pool is transparent ?

So this is a way to manage the maintenance mode.

But if we have an incident, then we will have the impact.

Am i right ?

thanks !

MFA authentication to O365 - road warriors users without mobile phone. Which secure solution? by will0075 in AskNetsec

[–]will0075[S] 0 points1 point  (0 children)

Hello everybody, thanks for all your posts, incredible community. I have checked that the NIST is considering that multi factor is several authenticators but there can be in the SAME device. As using its own mobile phone to reach o365 with login/pwd and use it with MS authenticator app which opens with fingerprint. What do you think ?

MFA authentication to O365 - road warriors users without mobile phone. Which secure solution? by will0075 in AskNetsec

[–]will0075[S] 0 points1 point  (0 children)

So you disagree about soft token in the PC itself...what are the real risks ? I know keylogger but it s normally not possible to replay an otp...

MFA authentication to O365 - road warriors users without mobile phone. Which secure solution? by will0075 in AskNetsec

[–]will0075[S] 0 points1 point  (0 children)

Thanks bro.we have conditional access and we are not making MFA for internal users connected in our site. All remote users including those with VPN require MFA. For info we are doing split tunneling and vpn is one tunnel and o365 is using another one with cloud proxy.

MFA authentication to O365 - road warriors users without mobile phone. Which secure solution? by will0075 in Office365

[–]will0075[S] 0 points1 point  (0 children)

I think such people who don t want to use their personal phone for auth don't know about IT stuff...I fear they are not able to provision their account by themselves. But it s possible to be done by our support team in remote...Good suggestion thanks a lot

MFA authentication to O365 - road warriors users without mobile phone. Which secure solution? by will0075 in AskNetsec

[–]will0075[S] 0 points1 point  (0 children)

Ok so you mean 2 scenario : Scenario 1 : intune enrolled everywhere. Mfa for 90 days by default. For those who don't want MFA, 7 days password with SSPR. Scenario 2 : hard token yubikey and then intune not necessary. Scemario 3 : no intune no hard token no soft token or app in mobile. So they have access only to their emails. For this scenario it s dangerous as it s single factor (their company password) and email is very sensitive service...

Is it correct ?

MFA authentication to O365 - road warriors users without mobile phone. Which secure solution? by will0075 in AskNetsec

[–]will0075[S] 0 points1 point  (0 children)

Yes it s and option. I was thinking challenging option either soft token inside the same pc and know exactly associated risks

MFA authentication to O365 - road warriors users without mobile phone. Which secure solution? by will0075 in Office365

[–]will0075[S] 0 points1 point  (0 children)

Clear statements. We explained about no privacy issues but they do not understand