Jason Harper

Jason
Harper

Jason Harper is a senior security engineer for a global company. He works on the policies and procedures that support network security technology.

Articles
Deploy Your Network IDS Effectively 2
Where you place your network Intrusion Detection System (IDS) sensors and how you manage the information they provide are crucial factors in how well the IDS protects your network.
Placing Your Controls
When you create ACLs or filters, you must tell the router when to apply them. You’ll want to place them so that your system uses router processing cycles efficiently.
Protect Your Network from Intrusion
A properly placed network IDS, such as Snort, is an important component of your defense-in-depth approach to network security.
IDS Signature Analysis
In signature analysis, the sensor looks not only at the header information, flags set, and packet shape, but also at the contents of the datagram-typically referred to as the packet payload.
NEW: John Savill's Microsoft Stack Master Class

Get 30 hours of detailed instruction covering the complete Microsoft solution stack. Invest a few hours each week and become THE Microsoft expert in your organization.

Thursdays, October 2nd to December 11th

John Savill will cover topics including:

* Deploying, Managing, and Maintaining Windows
* Key Features of Active Directory from Windows 2000 to Windows Server 2012
* Key elements of System Center 2012 and System Center 2012 R2
* Deploying, Migrating to and Managing Hyper-V in Your Organization
* Implementing a Private Cloud
* Using PowerShell to Automate Common Tasks

Enroll by September 25th and SAVE $245!
 

Windows Forums

The Windows IT Pro forums are moving to myITforum.com! Get answers to questions, share tips, and engage with the IT professional community.

Sponsored Introduction Continue on to (or wait seconds) ×