• Total activity 7
  • Last activity
  • Member since
  • Following 0 users
  • Followed by 0 users
  • Votes 0
  • Subscriptions 0

Activity overview

Latest activity by Threater
  • Threater created an article,

    Connection to Website is Being Blocked Unexpectedly

    The following steps are best practices for handling a situation when a connection to a website is being blocked unexpectedly:   Add Blocked IPs to Allow List The first option should always be to ad...

  • Threater created an article,

    High Availability Best Practices

      27-October-2023   This document provides our best-practice suggestions for a robust high availability architecture when incorporating a Threater Enforcer into a layered security architecture, eit...

  • Threater created an article,

    Threater Enforce Syslog Export Configuration and Formats

    27 October 2023 Introduction This document describes the capabilities and formatting of the syslog export features built into our Threater Enforce software. This document applies to software builds...

  • Threater created an article,

    IPs and Domains to Allow through Firewall

    Below is a list of IPs and Domains used by our platform in order to connect Threater Enforce to the Threater Portal.  The Threater support and admin IPs are static, however, the IPs for Ubuntu Secu...

  • Threater created an article,

    Enforce Policy Enforcement

    Updated, 10 July 2023 This document provides a simple diagram describing the policy enforcement flow for packet evaluation scenarios as handled by Threater Enforce (as of build 214). For further de...

  • Threater created an article,

    Threat Intelligence Categories

      Category Description Examples Command and Control Command and Control Servers CnC servers for botnets such as Conficker, Kelihos, etc. Botnets Known infected bots Hosts be...

  • Threater created an article,

    How Does Domain Blocking Work with Allow and Block Lists?

    Introduction Threater Enforce's use of Domain Lists is to intercept DNS requests to look up a domain name. This does not block IPs or stop IP connections from going through. It is important to note...