What's the difference between Signals, Transactions, and Indicators?
Clarifying on some vague terminology
Clarifying on some vague terminology
Examining how Zscaler processes data for improved efficiency.
A quick intro into the 3 logical layers of Zscaler architecture.
Similar terms. Important differences.
đź’ˇThis is part of an on-going series in cybersecurity foundations. Check the cyber 101 article tag index from time to time for more content. The FortiGate AV scanning engine relies on virus definitions for some of its traditional analysis. These signatures are stored in AV databases. Depending on what model
Comparing some similar terms in logging
Examining a nifty feature for separating management functions.
Clarifying some popular terms
Unraveling the differences between these two UI modes.
Because in order for logs to be useful, they need to exist...
RFCs, lions, and bears. Oh my!
Sounds interesting, right? Let's explore.
cyber-101
A quick tip about interfaces on policies.
cyber-101
Interesting choices...
cyber-101
1... 2... and then 3...
cyber-101
Examples of failover types
cyber-101
A quick reminder on some important IPs.
fortinet
Walking through the election process for HA units
cyber-101
Comparing policy based routing with SD-WAN on FortiGates.
cyber-101
Exploring a couple popular topics in for FortiGate link state monitoring.
cyber-101
A quick refresher on this critical part of ipsec.
cyber-101
Describing the various components of the FortiGate IPS and signatures.
cyber-101
Reviewing the various ways a FortiGate can scan files for viruses.
cyber-101
Explaining the various user auth timeout choices that are available on FortiGate.