Forum Discussion
Terrence
Nimbostratus
Jun 05, 2013Out of Continent Access Control
We have recently migrated to an exchange environment, from a not so widely popular email server. Since we migrated to this new environment we have had 10+ users comprimised by very simple spear phis...
Terrence
Nimbostratus
Jun 24, 2013Yes we used geoip for most of the rules mentioned in the article, less crazybrowser which is blocked everywhere. We also added a 2 hour blacklist to any ips/users that trigger any of the aformentioned rules, and subsequent ips/users are also blocked. We allow the attacker to log in prior to blocking so that we may harvest the users that he managed to exploit.
two factor authentication will probably not fly in our environment(higher education).
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects