threatER

  • Total activity 8
  • Last activity
  • Member since
  • Following 0 users
  • Followed by 0 users
  • Votes 0
  • Subscriptions 0

Activity overview

Latest activity by threatER
  • threatER created an article,

    Connection to Website is Being Blocked Unexpectedly

    From time to time, you may experience websites being blocked unexpectedly. What is the difference between an unexpected block and a false positive? This is a very important question, and is importa...

  • threatER created an article,

    High Availability Best Practices

      27-October-2023   This document provides our best-practice suggestions for a robust high availability architecture when incorporating a threatER Enforcer into a layered security architecture, eit...

  • threatER created an article,

    threatER Enforce Syslog Export Configuration and Formats (prior to build 247)

    27 October 2023 Introduction This document describes the capabilities and formatting of the syslog export features built into our threatER Enforce software. This document applies to software builds...

  • threatER created an article,

    Multi-factor authentication (MFA)

    MFA can be enabled for your individual account, even if it is not required for your company by default.  To enable MFA for your account: Download and install one of the following apps on your phon...

  • threatER created an article,

    IPs and Domains to Allow through Firewall

    UPDATED ON AUGUST 26, 2024 Below is a list of IPs and Domains used by our platform in order to connect threatER Enforce to the Threater Portal. These need to be allowed for your Enforcer's assigned...

  • threatER created an article,

    Enforce Policy Enforcement

    Updated, 10 July 2023 This document provides a simple diagram describing the policy enforcement flow for packet evaluation scenarios as handled by threatER Enforce (as of build 214). For further de...

  • threatER created an article,

    Threat Intelligence Categories

      Category Description Examples Command and Control Command and Control Servers CnC servers for botnets such as Conficker, Kelihos, etc. Botnets Known infected bots Hosts be...

  • threatER created an article,

    How Does Domain Blocking Work with Allow and Block Lists?

    Introduction threatER Enforce's use of Domain Lists is to intercept DNS requests to look up a domain name. This does not block IPs or stop IP connections from going through. It is important to note...