Hi

Do you folk exercise a particular policy for intrusion attempts, port
scanning and the like? Do you ignore it, report it to an ISP, some other

group etc?

I am the firewall admin where I work and am working off a policy meshed
from the IT Security Cookbook and some of the publications at Sans.

Comments would be very welcome.

Regards

declan



================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================

Reply via email to