Search Results

Search results for "offline update"

USM Appliance Plugin for NXLog for Windows - AT&T

https://cybersecurity.att.com/documentation/usm-appliance/supported-plugins/...

Open the nxlog.conf file in a text editor. Update the root path of your NXLog installation. Locate the following lines: #define ROOT C:\Program Files\nxlog. #define ROOT C:\Program Files (x86)\nxlog. Uncomment the path that matches the NXLog installation on your Windows machine. Enter the USM Appliance Sensor IP address.

The AlienApp for DDI Frontline VM - AT&T

https://cybersecurity.att.com/documentation/usm-anywhere/alienapps-guide/ddi-frontline/...

The AlienApp for Digital Defense, Inc. (DDI) Frontline Vulnerability Manager (VM) features powerful vulnerability assessment capabilities that can be paired with USM Anywhere for extended security management. When you configure the app in USM Anywhere, you can allow DDI Frontline VM to create assets that are discovered in scans, and merge the asset information provided from the DDI Frontline ...

Vulnerability Assessment & Remediation | AT&T Cybersecurity

https://cybersecurity.att.com/solutions/vulnerability-assessment-remediation

Receive Regular Updates to Vulnerability-Related Threat Intelligence. Receive continuously updated vulnerability signatures from the Alien Labs Security Research Team; ... and so it’s easier to miss assets that are offline during monthly or quarterly vulnerability scans. If not regularly assessed for vulnerabilities, these assets can drive up ...

Requirements for VMware Sensor Deployment - AT&T

https://cybersecurity.att.com/documentation/usm-anywhere/deployment-guide/vmware/...

Minimum Requirements. These are the minimum requirements to set up and configure the USM Anywhere Sensor on VMware: Access to VMware ESXi 6.5 or later. Dedicated 4 CPUs and 12 GB of reserved memory. Dedicated 178 GB of disk space (128 GB data device and 50 GB root device).

Deploy the AWS Sensor - AT&T

https://cybersecurity.att.com/documentation/usm-anywhere/deployment-guide/aws/...

Under Find Services, enter a name, keyword, or acronym to launch the AWS CloudFormation service page. In the upper right corner, click Create stack, and then select With new resources (standard) . Go to the USM Anywhere Sensor Downloads page, click the icon of your specific sensor, and copy the URL. Use the copied URL in the Amazon Simple ...

Enterprise Traffic Protector | AT&T's Cybersecurity

https://cybersecurity.att.com/network-security/etp

Using daily external threat feeds and data from our global cloud security intelligence platform, ETP constantly updates threat categorization. External threat feeds and cloud security intelligence are analyzed to identify new risks and immediately added to our database, providing real-time protection against threats for organizations and their ...

Mastering PCI DSS Logging: Essential Tips for Compliance - AT&T

https://cybersecurity.att.com/blogs/security-essentials/pci-dss-logging-requirements

8 tips for PCI DSS requirements. Always keep PCI DSS Requirement 10 in mind-- track and monitor all access to network resources and cardholder data! This is the Golden Rule of PCI DSS logging compliance. Let this be your motto for all of the other details to be guided by. If you ever wonder whether or not a network vector or any component of ...

10 Steps to Creating a Secure IT Environment

https://cybersecurity.att.com/blogs/security-essentials/10-steps-to-creating-a-secure...

The same goes for static VPNs or site-to-site VPNs. The IPSec connection will create secure AES256bit or higher encryption for the SSL Tunnel as well as encrypting the payload with secure AES256 bit or higher encryption while in transit over the VPN connection. 6. Wireless Network Security.

Open Source IDS Tools: Comparing Suricata, Snort, Bro (Zeek), Linux

https://cybersecurity.att.com/blogs/security-essentials/open-source-intrusion...

Bro (renamed Zeek) Bro, which was renamed Zeek in late 2018 and is sometimes referred to as Bro-IDS or now Zeek-IDS, is a bit different than Snort and Suricata. In a way, Bro is both a signature and anomaly-based IDS. Its analysis engine will convert traffic captured into a series of events. An event could be a user login to FTP, a connection ...

AlienApps™ Orchestration - AT&T Cybersecurity

https://cybersecurity.att.com/documentation/usm-anywhere/alienapps-guide/alienapps...

Advanced AlienApps can do one or more of the following:. Log collection; Orchestration In USM Anywhere, you can create orchestration rules to filter events, suppress events, create alarms, send notifications, or execute response actions.; Notification Communication of an important event, typically through an email message or other desktop display. In USM Appliance, notifications are typically ...

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Get price Free trial