Press "Enter" to skip to content

Posts published in “Security”

CyberArk Notes

johnyan 0

CyberArk is a publicly traded information security company offering Privileged Account Security. High Level Design

Cyber Security TRA (Threat and Risk Assessment) Resources Research

johnyan 0

What is Risk: Risk = Threat x Vulnerability x Asset The enterprise risk assessment and enterprise risk management processes comprise the heart of the information security framework. These are the processes that establish the rules and guidelines of the security policy while transforming the objectives of an information security framework into specific plans for the implementation of key controls and…

Deploy Symantec EndPoint Encryption 11.2.1 and Configure SEE to Encrypt Client Machines

johnyan 0

Symantec Endpoint Encryption protects sensitive information and ensures regulatory compliance. It encrypts all files on the hard drive, sector-by-sector, for maximum security. It supports Windows, Mac, tablets, self-encrypting drives, and removable media (USB drives, external hard drives, and DVDs). I had a chance to install it in my lab environment for a testing. This post is kind of recording all…

Basic Steps to Deploy and Config Symantec DLP 15.5 with Installation Videos

johnyan 0

I were working on Symantec DLP project and had some experience with it. This post is going to review what I have been done and how I managed to install it in my home lab environment. It will not be alike a step by step installation tutorial since Symantec documents have explained details enough. It mostly high level lists all…

PFsense Configuration with Topology and Screenshots

johnyan 0

pfSense is an open source routing and firewall software that is based on the FreeBSD distribution. The basic features including: pfSense Home Topology Static/default/dynamic routing Stateful firewall Network Address Translation (NAT) Virtual Private Networks (VPN) Dynamic Host Configuration Protocol (DHCP) Domain Name System (DNS) Load balancing and so on.  With many supported add-on packages, other advanced features including: Snort (for…

Qualys Scanner Appliance and Qualys Guard Service Tips and Tricks

johnyan 0

The Qualys Cloud Platform and its integrated apps can simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Qualys Scanner Appliance is an option with the Qualys Cloud Platform. With the Qualys Scanner Appliance, you can easily…

Proofpoint Wombat Security Education Platform Usage – Create Training Assignment

johnyan 0

Gartner has named Proofpoint (Wombat Security) a Leader in Security Awareness Computer-Based Training for a couple of years as far as I could find. There are many functions and features I like, but one thing I specially liked is how easy you can setup a training just with a couple of clicks and some basic information entered. The templates from…

Threat Hunting Tools

johnyan 0

Here are some collections from Internet about Threat Hunting tools, information and resources. 1. Kansa GitHub – Davehull/Kansa http://trustedsignal.blogspot.com/search/label/Kansa http://www.powershellmagazine.com/2014/07/18/kansa-a-powershell-based-incident-response-framework/ Kansa: A PowerShell-based incident response framework