Tweaking Firewall Rules for Detection

Good firewall rules can filter out bad traffic and make an analyst's job easier. In this scenario-based lab, you will use a sample organizational firewall for monitoring, detecting and auditing traffic on a network. You will then configure log traffic of interest forwarded to a syslog server to strengthen the organization's security posture.

Time
3 hours
Difficulty
Intermediate
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Overview

Good firewall rules can filter out bad traffic and make an analyst's job easier. In this scenario-based lab, you will use a sample organizational firewall for monitoring, detecting and auditing traffic on a network. You will then configure log traffic of interest forwarded to a syslog server to strengthen the organization's security posture.