psniech
New Contributor
‎12-12-2024
Last activity: Dec 12, 2024 5:05:13 PM
80 Profile 80% Complete
Most Liked Posts Recent Solutions
No Content Available

User Activity

How can we protect foritgate against a huge number of attempts to establish an IPsec tunnel, secured by a certificate with a bad certificate in request? That fact strongly imposes a huge load on one of the CPUs.
How do we prevent a scenario when the first email is sent to a particular recipient within the IBE system, being intercepted by a hacker? After this hackers can create accounts in IBE and read emails.
If sender alignment is used on Fortimail, it will block emails sent by some third-party applications for example from smartphones even if a domain of the sender (e.g. gmail.com) is legitimate. Would you happen to know how to avoid it?
why the formula that allows to get column's names from log: select * from $log .... doesn't work
Application control properly blocks access to Netflix when run via browser but not blocking when Netflix is installed from Microsoft Store as an application.
Kudos given to