I feel like "technique" doesn’t fit here at all. It’s definitely between "exploit" and "vulnerability," but I think "exploit" is the term we used in our last review.
I'm leaning towards Performance Analytics as the answer here. That feature should give you the data and insights to track trends in incident resolution times and compare to industry peers. But I'm not 100% sure, so I'll have to double-check my understanding.
Personal access tokens in Azure DevOps could also work, but I'm not sure if that fully meets the "minimizes the need to provide credentials" requirement.
I think the pinning max-link option might be the way to go. The documentation suggests that setting it to 2 will ensure both links are used. I'll need to double-check that, though.
This seems like a pretty straightforward troubleshooting question. I'd start by using the packet capture tool to see where the traffic is being blocked and then adjust the policies as needed.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Leonida
4 months agoAgustin
4 months agoMiriam
4 months agoLeota
4 months agoLatricia
4 months agoAnnamaria
5 months agoCandra
5 months agoShalon
5 months agoKarima
5 months agoFrancis
5 months agoDenae
5 months agoVanesa
5 months agoSherman
5 months agoNathan
5 months agoWinfred
5 months agoAlyce
5 months agoFatima
5 months ago