May 14, 2025
Trending News

A practical guide to network and firewall configuration: don’t miss the free e-book

  • October 11, 2023
  • 0

In this a practical guide introduced today, you’ll be able to review and improve your company’s perimeter to fend off most cyberattacks. This white paper was prepared by

A practical guide to network and firewall configuration: don’t miss the free e-book

In this a practical guide introduced today, you’ll be able to review and improve your company’s perimeter to fend off most cyberattacks. This white paper was prepared by specialists from Sophoswho found that many companies operate with a flat network topology: all their endpoints connect to a common switching matrix.

This topology violates protection, because it allows attacks to easily move or spread laterally within the local network because the firewall has no visibility or control over the traffic flowing through the switch.

MS recommends

Study about cyber security in Spanish companies. Take our survey and win!

Study “Virtualization in Spanish companies” Download the report!

Manage your company’s devices intelligently Read

What can you do to improve this security?

The Good configuration of corporate networks and firewalls is the key to strengthening protection. In this white paper, you will have a practical guide so that you don’t skip any steps. Here’s a summary of the main ideas you’ll find:

  • Make sure you have the best protection modern high-performance firewall of the new generation

    with IPS, TLS inspection, zero-day quarantines, and machine learning ransomware protection.

  • Block RDP and other services with a firewall.
    Minimize your attack surface as much as possible by checking everything thoroughly
    port forwarding rules that eliminate all non-essential open ports.
  • Definitely yes properly protect all open ports, applying adequate IPS protection to the rules that govern traffic.
  • Enables TLS inspection with support for the latest TLS 1.3 web traffic standards to prevent threats from penetrating your network through unencrypted traffic streams.
  • Minimize the risk of lateral spread within the network by segmenting the LAN into smaller isolated zones or VLANs protected and interconnected by a firewall.


Source: Muy Computer

Leave a Reply

Your email address will not be published. Required fields are marked *