Skip to content

VPN credentials or pre-shared key leaked, how to rotate quickly.

A leaked PSK or password is not a panic event if you had MFA, but it is a trigger to rotate everything. Order: first the compromised, then the shared, then the root.

Try this first

  1. 1Disable the compromised user account immediately, terminate all active sessions on the concentrator.
  2. 2If the PSK was shared among several people (bad practice but it happens): generate a new PSK, revoke the old one, push to all clients.
  3. 3Pull logs on the user and the PSK for the last 30 days, look for unexpected countries, odd hours, unusual volumes.
  4. 4Move to per-user certificate auth instead of shared secret to prevent a repeat.

When to bring us in

Leak from a third party or phishing campaign, and you cannot prove what was viewed: consider a data-breach notification to the AP within 72 hours. Rather notify and clear it than be late.

See also

None of the above fits?

Describe your situation below. We pass your input plus the steps you already saw to our AI and return tailored next-step advice. If it's too risky to DIY, we'll say so.

Who are you?

For the AI question we need your email and company, so we can follow up if the AI gets stuck, and to prevent abuse.

Limited to 2 questions per hour and 5 per day, kept lean so the AI stays useful. For more, contacting us directly works better for you and us.

Or skip the DIY entirely

Our Managed IT clients do not look these things up. One point of contact, a fixed monthly price, resolved within working hours.