How to Stop Reconnaissance Attempts | Palo Alto Firewall Training

แชร์
ฝัง
  • เผยแพร่เมื่อ 5 ต.ค. 2024

ความคิดเห็น • 8

  • @benedictagyemang3862
    @benedictagyemang3862 11 วันที่ผ่านมา

    This is great, I just got a job on a PaloAlto migration and your youtube videos are going to help me a lot. I will donate to your channel.

    • @mode4480
      @mode4480  11 วันที่ผ่านมา +1

      Hi
      Wow, thank you! I am glad it helped so much, thank you as always for watching!

    • @benedictagyemang3862
      @benedictagyemang3862 11 วันที่ผ่านมา

      you are very welcome!

  • @lifequestions5546
    @lifequestions5546 4 หลายเดือนก่อน

    Another great video. Thanks.

    • @mode4480
      @mode4480  4 หลายเดือนก่อน

      Thank you very much!

  • @unetlan4220
    @unetlan4220 4 หลายเดือนก่อน

    good work mate. keep it going.... how come you transition from Mode44 to fashion44 :) whats story behind?
    and other question. PA with DNS proxy in cooperation with X-forward-for? any practical info? as dns proxy, there will be no log from the real IP. any efficient way to find out who is the original requestor. im getting alot of logs hitting sinkhole and would like to know the real originator.
    thanks in advance

    • @mode4480
      @mode4480  4 หลายเดือนก่อน

      Fashion44 :) is there something I have missed? lol

    • @mode4480
      @mode4480  4 หลายเดือนก่อน

      For the DNS question what I would do is ensure that the sinkhole address is in a zone that means the traffic has to pass through the firewall to get to it, create a rule and log on that or simply run a report for hosts using the sinkhole address for normal traffic say SSL for example, the initial DNS query and DNS security logs will show the proxy as it is the proxy making the DNS lookup but there will also be the hosts that have been given the sinkhole address trying to use it to get out.
      Hope that is helpful!