top of page
Blog: Blog2
Search
Reaper
Feb 22, 20221 min read
Script to automate (offline) firewall upgrades
The following script was created by o5e and since it addresses an issue encountered by many I thought I'd share it here (with permission...
652 views0 comments

Reaper
Jun 21, 20214 min read
Injecting MFA into any application
Some legacy applications may have weak security, or the adoption of the Zero Trust model may require security to be buttoned up on...
893 views0 comments

Reaper
Nov 14, 20203 min read
Make life easier with Application Filters
One of the harder tasks while maintaining a structured security rulebase, is determining which applications should or should not be...
1,724 views0 comments

Reaper
Oct 1, 20201 min read
What does "Require Tag/Description on policies" do to existing rules?
What does "Require Tag/Description on policies" do to existing rules?
205 views2 comments
bottom of page