Advanced Threat Prevention Discussions
Welcome to the Advanced Threat Prevention discussion area. Here, we explore Precision AI-powered protection that stops zero-day malware, exploits, and command-and-control attacks in real time—ensuring proactive defense and resilience against today’s most sophisticated threats.
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Advanced Threat Prevention Discussions
Welcome to the Advanced Threat Prevention discussion area. Here, we explore Precision AI-powered protection that stops zero-day malware, exploits, and command-and-control attacks in real time—ensuring proactive defense and resilience against today’s most sophisticated threats.
About Advanced Threat Prevention Discussions
Welcome to the Advanced Threat Prevention discussion area. Here, we explore Precision AI-powered protection that stops zero-day malware, exploits, and command-and-control attacks in real time—ensuring proactive defense and resilience against today’s most sophisticated threats.

Discussions

High alert with signature

Hello,

 

I'm sending out a message in a bottle — I'm noticing a very high number of false positives on signatures with a high severity level, whether they are Anti-Spyware or Vulnerability Protection signatures. The issue is that the solution doesn't

...

Packet Buffer Protection (PBP)

We are receiving multiple alerts for Packet Buffer Protection (PBP) being triggered on internal-to-internal and internal-to-external traffic. My understanding is that PBP is primarily intended to protect against DoS attacks, which are typically exter

...

User_707 by L0 Member
  • 5817 Views
  • 1 replies
  • 0 Likes

Raspberry PI Custom Alert

How do I setup a Custom Alert is IoT Security to detect a Raspberry pi device.  I have the following vendor codes, and I want to setup a custom alert if a raspberry device connects to our network.  

 

Vendor Codes

28:cd:c1

2c:cf:67

B8:27:be

D8:3a:dd

...

critical control points

Hi everyone,

When it comes to securing firewall management systems—those critical control points in any network—what strategies, best practices, or tools have you found most effective?

Whether it’s role-based access controls, dedicated management net

...