Julia Fishman

  • Total activity 46
  • Last activity
  • Member since
  • Following 0 users
  • Followed by 0 users
  • Votes 0
  • Subscriptions 25

Articles

Recent activity by Julia Fishman Recent activity Votes
  • Accessing Marketplace Intelligence Feeds

    The Marketplace provides Threater customers with even greater access to high-value, multi-source cyber intelligence data and services from leading intelligence providers.    Purchase Intelligence M...

  • Threater Portal Build 164

    New Marketplace Products - Services Services are now available in our Threater Marketplace! These services can help manage and resolve threats in your network. The following services are available:...

  • Enforcers - Manage and Update Software

    The Enforcers tab displays all Enforcers that have been activated to your Threater account. Navigate to Enforce > Enforcers in the left-hand navigation menu to view your organization's Enforce inst...

  • Users

    Creating Users Only users with Master Admin role type will be able to create a user. Log into the Threater Portal (portal.threater.com) to access the user creation tab. Navigate to Administration >...

  • Creating Domain Lists

    Creating Manual Domain Allow Lists Navigate to Collect > Lists in the left-hand navigation menu to create a manual Domain list. Select the Create button in the top-right corner.     Allow List Det...

  • Subscriptions

      Subscriptions under Enforce Enforcers log traffic, filter traffic, and receive updated threat intelligence with a supported subscription. Without a valid attached subscription, the Enforce softwa...

  • Policies

    Policies allow users to determine what is allowed through specific networks or network segments. Users can create as many policies as they need to protect each of their networks as there isn't a li...

  • Ports

    Ports define the protocols for a given Port and can be used across multiple Protected Networks for allowing or blocking defined Ports.   Adding Ports Navigate to Enforcers > Ports in the left-hand ...

  • Networks

    Enforce inspects Network traffic to determine which packets to block and allow. Policies attached to Networks determine the internet services allowed into your network, as well as those services yo...

  • Unexpected Blocks

    Threater's Unexpected Blocks feature allows you to retrieve outbound Port 80 and 443 traffic logs from your Enforcer. The logs retrieved include the pertinent data to identify the problematic IP an...