[HOW] to configure Threat Protection in Cisco Meraki MX using the Cisco Meraki Dashboard

แชร์
ฝัง
  • เผยแพร่เมื่อ 5 ก.ย. 2024
  • - Do you want to protect your network against malicious hackers?
    - Do you want to secure your data and your clients against newly identified threats?
    - Would you be able to keep up with upcoming intrusion attempts to your resources?
    In this opportunity, we will configure the Threat Protection feature in the Security Appliance MX using the Meraki Dashboard. With this feature, the Security Appliance can integrate the database of AMP and Snort to provide a robust and up to date protection against any threat coming to your network.
    Requirements:
    - You need to add an Advanced Security license to your Security Appliance
    Cisco Meraki Documentation:
    - Threat Protection
    documentation....
    If you encounter any issues configuring the threat protection feature, feel free to post a comment with the information and I will help you to move forward.
    If you would to know more about similar topics, feel free to check the following videos:
    - Content Filtering
    • [HOW] to configure Con...
    - Layer 3 and 7 Firewall Rules
    • [HOW] to configure Lay...
    - Traffic shaping rules
    • [HOW] to configure Tra...
    - Cisco Umbrella Integration
    • [HOW] to integrate Cis...

ความคิดเห็น • 6

  • @precastdetailing
    @precastdetailing 15 วันที่ผ่านมา

    Awesome, thanks for the video.
    You made a reference to the "Umbrella" but I didn't know what it means. I found the link in the description - but I think you should put the link ON THE VIDEO itself.

  • @kizitojessy
    @kizitojessy ปีที่แล้ว +1

    Merci Beaucoup pour cette explication Claire.

  • @ArunKumar-bb8kq
    @ArunKumar-bb8kq 3 ปีที่แล้ว +1

    Great videos...Thank you

  • @jimmymancheron9595
    @jimmymancheron9595 3 ปีที่แล้ว +1

    Good Job :)

    • @TheITWay
      @TheITWay  3 ปีที่แล้ว

      Thanks 😁

  • @MrPimleemans
    @MrPimleemans 2 ปีที่แล้ว

    Sorry to intrude, but as far as I can tell, AMP on the Meraki MX does NOT stop malicious traffic file transfers when the traffic is encrypted as is the case with HTTPS, IMAPs, etc. So.. it's not as cool as it sounds.