Eric Dinh

  • Total activity 47
  • Last activity
  • Member since
  • Following 0 users
  • Followed by 0 users
  • Votes 0
  • Subscriptions 27

Activity overview

Latest activity by Eric Dinh
  • Eric Dinh created an article,

    Threat Lists Overview

    Introduction Threat Lists are provided by our partners in Webroot and Proofpoint*. These lists are comprised of 3 pieces of information: IP address, category, and score. IP Address: where a threat...

  • Eric Dinh created an article,

    Do you support two factor authentication (ie, 2FA, MFA, etc)?

    Yes. Our GMC supports 2FA. You enable it from your Company Profile (click the user icon top right, select Company Porfile), and move the “Require Two-Factor Authentication” slider to the right. For...

  • Eric Dinh created an article,

    How does the Proxy/VPN Category work?

    Question We often receive questions related to the Proxy/VPN category seen in Threat Lists and Policy Risk Thresholds. For example: "I am looking for some clarification on how the Proxy/VPN cat...

  • Eric Dinh created an article,

    Assets Overview

    Introduction The Assets page shows all ThreatBlockr appliances connected to your GMC account. From here, you are able to rename appliances or set appliance locations to identify each individually. ...

  • Eric Dinh created an article,

    Command Logs Overview

    Introduction Command logs show a running history of actions taken by users of the system. This can be useful for auditing and troubleshooting any issues that arise.

  • Eric Dinh created an article,

    Managing Users

    Introduction User Management Creating Users To create a user in your account: Navigate to Users in the left hand menu: https://gmc.banduracyber.com/users Click the '+' button in the top right corn...

  • Eric Dinh created an article,

    Configuring Denied Lists

    Introduction Denied Lists can be used to ensure that untrusted IPs and Domains are blocked by the ThreatBlockr appliance. When a denied list is enabled from Denied Lists > IPv4, the list is enabled...

  • Eric Dinh created an article,

    Dashboard Overview

    Introduction Dashboards give you a quick, graphical look at your system summaries. Dashboards contain only roll-up data summarized from the detailed logs stored in the ThreatBlockr appliance(s). A...

  • Eric Dinh created an article,

    Configuring Policies

    Introduction Policies allow users to determine what is or is not allowed through specific networks or network segments. As there are no limits to the number of policies that can be created, users c...

  • Eric Dinh created an article,

    Configuring Allowed Lists

    Introduction Allowed Lists can be used to ensure that trusted IPs and Domains are always allowed through the ThreatBlockr appliance and through the network regardless of if they should be blocked b...