POODLE BITES (and other Informational Vulnerabilities )

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements

POODLE BITES (and other Informational Vulnerabilities )

L3 Networker

Just wanted to gauge what others are doing with regards to this particular vulnerability if anything.

 

Historically this has been set to reset-both on this vulnerability. Which, by and large doesn't seem to cause that much of a problem on most sites, but I suppose the question I was asking is, is this something I should be blocking/resetting, or just logging instances for this and it is something I can allow through?

 

And I suppose the same goes for other "informational" vulnerabilities. How are others dealing with these?

 

4 REPLIES 4

L2 Linker

I am also think that it is informational.

Yes. They are both "informational" threats. Just wanting to see how others treat these? Do you not bother with them at all and allow them all through? Or do you reset them? Or only in high risk (finance) pcs?

Any suggestions from the table? 

 

Or do I take it from the silence that others don't have a hard and fast rule for dealing with informational threats?

Informational vulnerabilities are usually either low threat to benign and very uncommon in the wild. It's good to have logging up so you can monitor in case it does pop up

 

tom

Tom Piens
PANgurus - Strata specialist; config reviews, policy optimization
  • 3037 Views
  • 4 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!