Hi
Do you folk exercise a particular policy for intrusion attempts, port
scanning and the like? Do you ignore it, report it to an ISP, some other
group etc?
I am the firewall admin where I work and am working off a policy meshed
from the IT Security Cookbook and some of the publications at Sans.
Comments would be very welcome.
Regards
declan
================================================================================
To unsubscribe from this mailing list, please see the instructions at
http://www.checkpoint.com/services/mailing.html
================================================================================