<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: RMM Security in Welcome</title>
    <link>https://community.isc2.org/t5/Welcome/RMM-Security/m-p/63299#M2410</link>
    <description>&lt;P&gt;You can implement intrusion detection and prevention systems (IDPS) to monitor network traffic and identify any suspicious or unauthorized activities. IDPS can provide valuable insights into potential security breaches.&amp;nbsp;&lt;A href="https://www.myenvoyair.net/" target="_self"&gt;&lt;FONT size="1 2 3 4 5 6 7" color="#FFFFFF"&gt;&lt;SPAN&gt;My Envoy Air&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 04 Oct 2023 05:20:48 GMT</pubDate>
    <dc:creator>Danieldale</dc:creator>
    <dc:date>2023-10-04T05:20:48Z</dc:date>
    <item>
      <title>RMM Security</title>
      <link>https://community.isc2.org/t5/Welcome/RMM-Security/m-p/63279#M2409</link>
      <description>&lt;P&gt;I seek advice on securing and monitoring Remote Monitoring and Management (RMM) services like Kaseya. I had a n experience with an account take over, and the actors used RMM to deploy malware to target systems. The logs only show connection details and no tracking of downlods, patches or updates. Any ideas how to track and log this activity?&lt;/P&gt;</description>
      <pubDate>Mon, 02 Oct 2023 14:44:24 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Welcome/RMM-Security/m-p/63279#M2409</guid>
      <dc:creator>mbsangster</dc:creator>
      <dc:date>2023-10-02T14:44:24Z</dc:date>
    </item>
    <item>
      <title>Re: RMM Security</title>
      <link>https://community.isc2.org/t5/Welcome/RMM-Security/m-p/63299#M2410</link>
      <description>&lt;P&gt;You can implement intrusion detection and prevention systems (IDPS) to monitor network traffic and identify any suspicious or unauthorized activities. IDPS can provide valuable insights into potential security breaches.&amp;nbsp;&lt;A href="https://www.myenvoyair.net/" target="_self"&gt;&lt;FONT size="1 2 3 4 5 6 7" color="#FFFFFF"&gt;&lt;SPAN&gt;My Envoy Air&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Oct 2023 05:20:48 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Welcome/RMM-Security/m-p/63299#M2410</guid>
      <dc:creator>Danieldale</dc:creator>
      <dc:date>2023-10-04T05:20:48Z</dc:date>
    </item>
    <item>
      <title>Re: RMM Security</title>
      <link>https://community.isc2.org/t5/Welcome/RMM-Security/m-p/63304#M2411</link>
      <description>&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 03 Oct 2023 12:23:47 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Welcome/RMM-Security/m-p/63304#M2411</guid>
      <dc:creator>mbsangster</dc:creator>
      <dc:date>2023-10-03T12:23:47Z</dc:date>
    </item>
  </channel>
</rss>

