I have created several custom vulnerability signatures so I am familiar with the general process. I want to create a custom vuln signature based on a string but I also want to add a time signature to time attribute to that signature since it will tr
...
We are a school district with a growing number of Chromebooks. We are having problems identifying what student is on the Chromebook. We have a work around right now (Captive Portal), but it relies on the student shutting down the Chromebook when th
...
Hi,
i use a syslog collector to receive ip-user-mappings from an Juniper Secure Access Gateway.
It works quite fine, i created a custom syslog filter on my paloalto and created the correspondig Server Monitor entry for my Juniper Systems.
a simple "show
...
Hello.
We are using XML API to create or delete address and address-group.
When I deleted address-group member using XML API, address-group member was deleted even if there is another member. (It had just one address member)
As you know, we can't delete
...Subject | Likes |
---|---|
1 Like | |
1 Like | |
1 Like |