A customer ask me if the PAN could automatically block an IP address if it triggers a threat log. At first I started to think that I could do it through an EDL and use Elastic Stack, but then I remembered the built-in actions on a log forwarding profile – that’s way easier. I decided […]
Steve Borba
My notes, I hope they help you, feel free to comment/add to them
Category: Security
I needed to update a password for an account I was not interactively logged in as and I do not have administrative access to force change the password, but I do know the old password. There has to be a way to change the password like the ctrl+alt+del and click way! Here is what I […]
I have been told how insecure WEP is and that it should not be used, but I didn’t know how bad it was till I did this. First one I did fell within a day, the next fell within an hour and the third four hours – so it wasn’t just luck. But now for […]