The most recent content from our members.
Had a wonderful time at Black Hat last week. Next up for me is VMworld in two weeks. If you're reading this and attending VMworld, stop by the booth and say hello. As always, here are some links I hope you find interesting. Enjoy! Hospital checklists are meant to save lives — so why do they often fail? Good article for…
Hi, Can you help me configure Alert Trigger Action to block a MAC or Shutdown a switch port when a new Rogue device is detected by using VB scripting and passing the MAC address variable? I found the below Twack article and would like to do something similar but in my case block rogue devices.…
I need someone to explain how UDT and Rogue Endpoint detection should work. It seems miserably flawed to me and support is giving me the run around saying it's doing what it should be doing. If that is the case the product is severely crippled for our intended use case. Our plan was to use UDT to monitor rogue endpoints…
It looks like you're new here. Sign in or register to get started.