Okay, I think I've got a handle on this. Creating an app permission policy and assigning it to the users should do the trick. That should effectively block the private chat feature for those temporary employees.
I'm a bit confused by all the different security controls mentioned in the question. I'll need to review my notes on the CIS Controls to make sure I understand which one encompasses all of those specific activities. Gotta be careful on this one.
From what I recall, the "Security Over Connectivity" policy sounds like it would block a lot of traffic, which isn't what they want right now. Maybe "Balanced Security and Connectivity" is safer?
I'm a bit confused by the different security domains and requirements for traffic segmentation. I'll need to carefully review the details to determine the best Aviatrix solution.
Option D) Unplug the network cable? That's like putting a bandage on a gunshot wound. But hey, at least you'll have a nice coaster for your coffee mug.
B) Enable strong encryption on all files on the hard disk. That'll keep the attacker from accessing the data, even if they've gained control of the system.
D) Unplug the computer network cable and/or disable the computer's wireless NIC. That's the best way to isolate the system and prevent further compromise.
Berry
5 months agoFrancene
5 months agoJoni
5 months agoRenea
5 months agoLyla
6 months agoLisha
6 months agoCarman
6 months agoYong
6 months agoSharika
6 months agoLeslie
6 months agoTheola
6 months agoLashawnda
6 months agoViola
6 months agoTy
6 months agoTarra
7 months agoGladys
7 months agoGlory
7 months agoKasandra
7 months agoLauran
11 months agoKris
11 months agoSueann
10 months agoZack
10 months agoStaci
11 months agoTamesha
11 months agoBarney
10 months agoChaya
10 months agoArthur
11 months agoVerona
12 months agoDesire
11 months agoLashaunda
11 months agoShelba
11 months agoLashawnda
1 year agoRozella
1 year agoPatria
11 months agoUla
11 months agoRima
1 year agoSharika
1 year ago