Home LookingPoint Blog

Blog

Aug 2

Platform requirements

The migration tool requires the following to run:

Continue reading

What is Zero Trust? Zero Trust is a framework and attitude towards IT security that centers on the idea that we in the IT field cannot trust anyone or any device on our network. Many systems administrators are well versed in this model. Every employee is assigned a domain joined laptop that is locked down via Group Policy. Those employees are tracked via a user identity using their AD profile...

Continue reading

It’s officially spring and for a lot of us that means spring cleaning – the attic, garage, basement, or just all those papers off the desk in the office. While you’re cleaning and reorganizing your personal life it’s also a good idea to take a look at your network and make sure that is cleaned up too. Below is a list of our top 8 best practices for cleaning up your network and devices.

Continue reading

Currently I am working on a project where I am going through and optimizing a large set of Access Control Lists (ACL) on a set of 5585 Firewalls. While going through each ACL I have noticed a few mistakes other engineers have made while configuring these rules. I have compiled a list of these common mistakes. The focus of this blog will be around ACLs on Cisco ASA’s; however these rules still...

Continue reading
1
  • There are no suggestions because the search field is empty.

Latest Tweets