Need help? We are here

  • +1 (304) 397-0675

Discuss the types of items that should be examined in a firewall log:
a. IP addresses that are being rejected and dropped
b. Probes to ports that have no application services running on them
c. Source-routed packets
d. Suspicious outbound connections
e. Unsuccessful logins