Does anyone have any real world examples on how they utilize the "Network Communication Protection" rule.
I have been trying to figure out if we can use this rule to block data that was to leave from a secure vlan. It states that you must use content fingerprinting which is confusing me. Trying to utilize this rule but keep it from generating too many events.
Don't forget, when your helpful posts earn a kudos or get accepted as a solution you can unlock perks and badges. Those aren't the only badges, either. How many can you collect? Click here to learn more.
Community Help Hub
New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.