You make a good point. I guess it depends on the specific threat level and security requirements of the office. Maybe we need to select the desired threat level protection as well?
I'm not so sure about that. What about enabling DNS blocking and advanced malware prevention? Wouldn't those also be important steps to secure the office?
Okay, let's see here. I think the key steps are: enable intrusion prevention, enable URL filtering, and add the Meraki Security Appliance to the dashboard. Those seem like the most logical choices to secure an office quickly.
Hmm, this question seems a bit tricky. Securing an office in minutes using Meraki MX? That's quite a bold claim. I wonder if they're testing our knowledge of Meraki's security features or our ability to think outside the box.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Elvera
8 months agoDonte
8 months agoEvangelina
8 months agoDaniela
8 months agoLuke
8 months agoParis
8 months agoSommer
8 months ago