The most recent content from our members.
Welcome to 2018! Just three days into the new year, Spectre and Meltdown made the news. These flaws affect both system security and performance since they degrade CPU performance significantly. Previously, we saw prominent companies use software to manipulate older generation devices. And everyone seemed to be launching…
If you didn’t have a chance to join some 350+ of your fellow IT and Security Pros at our Shields Up Panel: Network Security Fundamentals, Fight! THWACKcamp session – you’re in luck, we took some notes. Our panel was comprised of Eric Hodeen, Byron Anderson, our moderator Patrick Hubbard, and me, c1ph3r_qu33n. Compliance v…
Hello Everyone, I am running into an issue where NCM compliance does not appear to be able to correctly anaylze the stored configuration files. I am doing a simple test for port-security. I have it setup as follows. Alert on the rule below if: string is found Advanced Config Search: must contain RegEx expression…
I would like to know if it is possible to create a wizard in the Compliance section to identify the various parameters needed when creating rules. The ability to build these different variables when creating rules instead of using regular expressions would be helpful in specifying set data for the average user. This…
I would like to see if it is possible to select an interface on a device and apply a policy to that interface.
compliance report do not change after taking remediation action to fix a critical compliance.
Hi, I was hoping if I can get a NCM device command template for Checkpoint UTM -1 Edge ( Sofaware Technologies ) device. I tried using one mentioned in another thread: (http://thwack.solarwinds.com/docs/DOC-129647) !--SolarWinds Network Management Tools--> <!--Copyright 2010 SolarWinds.Net All rights reserved-->…
It looks like you're new here. Sign in or register to get started.