Whitelist PowerShell, cmd, remote desktop (some Windows apps) in the firewall [migrated]

I decided to use a whitelist approach to secure my environment (i.e blocking all inbound/outbound connections by default, unless otherwise stated).
I need to whitelist some Windows apps (not all of them) like Powershell, cmd, remote deskto… Continue reading Whitelist PowerShell, cmd, remote desktop (some Windows apps) in the firewall [migrated]

Query on best practice – using 2FA to self-authorise IP addresses in an allow-list

I want to know whether a solution I’m considering for a web app is particularly secure / in line with best practices etc.
Scenario – a web application, it’s a stock management app for small retailers. There is an element of sales/customer … Continue reading Query on best practice – using 2FA to self-authorise IP addresses in an allow-list

How to White Listing a legitimate site that looks deceptive/phishing to Google? [closed]

For one of our company’s clients, there is a custom portal implementation of our system on a subdomain, on our main product domain (something like client.product.company.com).
This client, happens to be a large Bank, that has provided logo… Continue reading How to White Listing a legitimate site that looks deceptive/phishing to Google? [closed]