33%
30.05.2021
.
Figure 2: In the Policy Manager, you define which apps the Untangle firewall applies for a rule.
In the settings, the Policy Manager shows the existing policies on the left and the applications
33%
28.11.2021
, it allows for in-depth querying and timely evaluation through a proprietary query language called PromQL [1]. Such queries can be used to create alerts rules that notify you whenever your target behavior
33%
21.08.2014
changes. On recent systems, you can use polkit to do this. As of version 0.112, you even have a separate engine, which you can feed with JavaScript-based rules. You can really do some interesting things
33%
30.01.2024
. The requests must originate from the 192.168.2.0/24 subnet and are only allowed to use GET and POST methods.
Listing 1
Access Rules
§§number
access_control:
rules:
- domain: wiki
33%
06.10.2022
Efficient collaboration while maintaining security standards is often difficult, especially when it comes to the end-user experience. Business-to-business (B2B) transactions are made in the cloud
33%
02.06.2020
is still in transition, so you'll see both product names mentioned throughout this article. Adding to the confusion, Palo Alto Networks offers two similarly named products [2]: the software-as-a-service (Saa
33%
25.09.2023
traffic as of interest, desirable, or undesirable.
The example in Figure 5 shows a custom bidirectional rule that assigns TCP and UDP traffic on port 873 between IP addresses 10.1.2.10 and 192
33%
28.11.2022
to the five levels of CMMC 1.0.
CMMC 2.0
In March 2021, the DoD initiated an internal review of CMMC's implementation, informed by more than 850 public comments in response to the interim DFARS rule
33%
02.02.2021
, such as a self-service portal for resetting user passwords or for additional authorization requests. A single sign-on based on modern protocols such as OpenID Connect or Security Assertion Markup Language 2
33%
11.02.2016
, you can use Microsoft Forefront Identity Manager (FIM) 2012 R2 or, even better, Microsoft Azure Active Directory Connector [2]. The data must be synchronized before you configure the hybrid deployment