The most recent content from our members.
Hi guys, We are looking to use LEM to implement USB blocking. I understand how to create a whitelist, uploading the PID's of the stick etc. My question is this: Lets just say we have a whitelist with a tonne of PID's in it. A user needs to have a new device whitelisted and I upload a text file containing only the PID of…
Hello, Are there any parameters or correlations that can be used to created a LEM rule to alert for any and all logs for a specific IP coming in and out? I have a file server I need to monitor, but I cannot create any rule that is generic enough to cache different types of data. Is there anything that can be recommended?…
The federal technology landscape has moved from secure desktops and desk phones to the more sprawling environment of smartphones, tablets, personal computers, USB drives and more. The resulting “device creep” can often make it easier for employees to get work done – but it can also increase the potential for security…
It looks like you're new here. Sign in or register to get started.