article thumbnail

How to Perform a Firewall Audit in 11 Steps (+Free Checklist)

eSecurity Planet

A firewall audit is a procedure for reviewing and reconfiguring firewalls as needed so they still suit your organization’s security goals. Auditing your firewall is one of the most important steps to ensuring it’s still equipped to protect the perimeter of your business’ network.

Firewall 111
article thumbnail

What Is a Host-Based Firewall? Definition & When to Use

eSecurity Planet

A host-based firewall is installed directly on individual networked devices to filter network traffic on a single device by inspecting both incoming and outgoing data. How Host-Based Firewalls Work Organizations often adopt host-based firewalls for device-specific security control.

Firewall 107
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What Is a Firewall Policy? Steps, Examples & Free Template

eSecurity Planet

A firewall policy is a set of rules and standards designed to control network traffic between an organization’s internal network and the internet. Featured Partners: Next-Gen Firewall (NGFW) Software Learn more Table of Contents Toggle Free Firewall Policy Template What Are the Components of Firewall Policies?

Firewall 106
article thumbnail

What Are Firewall Rules? Ultimate Guide & Best Practices

eSecurity Planet

Firewall rules are preconfigured, logical computing controls that give a firewall instructions for permitting and blocking network traffic. Network admins must configure firewall rules that protect their data and applications from threat actors. It manages inbound web server traffic, the connection requests from remote sources.

Firewall 107
article thumbnail

Leaked Documents Reveal China's State-Sponsored Hacking Operations

SecureWorld News

Recently leaked documents from Chinese cybersecurity firm i-SOON provide an unprecedented look at China's extensive state-sponsored hacking operations. Targets listed in the documents span Central and Southeast Asia, Hong Kong, and Taiwan. The specifics of the leaked capabilities that directly relate to these or other U.S. government."

Hacking 86
article thumbnail

Cisco warns of password-spraying attacks targeting Secure Firewall devices

Security Affairs

Cisco warns customers of password-spraying attacks that have been targeting Remote Access VPN (RAVPN) services of Cisco Secure Firewall devices. Cisco is warning customers of password-spraying attacks that have been targeting Remote Access VPN (RAVPN) services configured on Cisco Secure Firewall devices.

Firewall 114
article thumbnail

Top 12 Firewall Best Practices to Optimize Network Security

eSecurity Planet

Firewalls monitor and control incoming and outgoing traffic while also preventing unauthorized access. Configurations, network diagrams, and security rules should be documented for future reference and auditing. Overlapping rules may impair firewall efficiency or expose flaws that allow attackers to circumvent regulations.

Firewall 117