cyber-101
What are the various ways Fortinet devices can be registered to FortiAnalyzer?
Discussing the different methods for establishing trust in data sources for FAZ.
cyber-101
Discussing the different methods for establishing trust in data sources for FAZ.
cyber-101
Unpacking the basics of HA on FAZ
cyber-101
Let's discuss how data is structured, organized, and enforced on FAZ, shall we?
cyber-101
Uh oh. What happens when space runs out?
An intro to some of the essential commands in FortiOS.
cyber-101
Differentiating the operating modes for FAZ.
cyber-101
Clarifying on some vague terminology
cyber-101
Examining how Zscaler processes data for improved efficiency.
cyber-101
A quick intro into the 3 logical layers of Zscaler architecture.
cyber-101
Similar terms. Important differences.
cyber-101
đź’ˇThis is part of an on-going series in cybersecurity foundations. Check the cyber 101 article tag index from time to time for more content. The FortiGate AV scanning engine relies on virus definitions for some of its traditional analysis. These signatures are stored in AV databases. Depending on what model
cyber-101
Comparing some similar terms in logging