Friday, 28 December 2012

E-mail


Policy e-mail could have been the biggest part of your security guide. Here are some questions you can use to create e-mail policy:


  • Do you allow attachments from inside?
  • If the attachment is allowed, if it applies to all or only certain people?
  • What is the maximum size of user mailboxes?
  • What if there are users who use e-mail to commit an illegal act?
  • What if there are users who use e-mail to take action threatening?
  • What if there are users who use e-mail to take action disturbing others?
  • What if there are users who use e-mail to perform the act of sending / receiving pornography, jokes, or other brutal material?
  • What if an employee is sending bulk e-mail through the company's server?
  • Does the company monitor the use of e-mail? if so, who did it, who they monitor, and how many times?
  • Are employees informed about such monitoring, or monitoring carried out secretly?




read more reviews later on label create network documentation


Antivirus Software


Surely you would want every machine running the same type of antivirus software. Policy should mention what software you used and what actions dillakukan to deal with the virus. The following questions may help you in making policy virus.


Following questions may help you in making policy virus.


  • What antivirus software running on the workstation?
  • What antivirus software running on your server?
  • What antivirus software running on your e-mail server?
  • When the time to download and install the update antivirus?, If so, this is done automatically or manually?
  • If done manually, who is responsible for doing it?
  • If there is a virus, whether they are quarantined or deleted?
  • Does your policy to the user, who often receives an attachment containing a virus?

read more reviews later on label create network documentation


Tuesday, 25 December 2012

Service Pack and Hot Fix


That security is also important is the service packs and hot fixes. If for example you are using windows, then you should check the Microsoft website. You must have a policy that explains how it is done. Because there is no one specific way to deal with service packs and hot fixes, you have to determine for themselves what is best for your organization.

Here are some questions that need to be answered at the time you make a policy:

  • Who is checking service packs and hot fixes new?
  • How many times has it done?
  • At the time the patch is installed, whichever comes first machine installed (if the process is automated o)?
  • Who installed the patch?
  • Is the patch installed dapa during the day, evening, or weekend?




read more reviews later on label create network documentation

user rights


Another important aspect of computer security is access control. Usually, the right of access to a given resource tends to shut rather than individual users. Therefore, enter a list of all the groups in your security guide. List must contain a description of the group and what permissions are required so that the user can be a member of the group.

make the list is not an lightly and should be maintained continuously. You will benefit with the document. First, by having the data group permissions in writing. You can see that everything is consistent. This is a surefire way to ensure that no one is to change the group permissions. Should do checks at specified intervals.

Another advantage could be a weapon in the face of a stubborn manager. Suppose the marketing manager asked that people put in all groups. At the time answered not, he can just say that you have no basis for rejecting his request.

One way to overcome these managers face is to take your security. and shows a black and white counts where there the phrase "to be a member of the Administrators group, the user must ...".


read more reviews later on label create network documentation


Sunday, 23 December 2012

Security Template


At the time talking about policy and security measures, we tend to think about things like minimum password length and the length of time the log on. Two it is certainly an aspect of security policy and unquestionably should be included in your security guide.

However, try to stay away from questions like "password must be at least eight character". We certainly do not want to use the same security policy between IT staff and other users. IT staff have access to a higher than another user and thus require more stringent security. Similarly, some of the servers storing the information is more important than the other servers and require a more stringent level of security. Because of these differences, it should use the security template.

Security Template is a file containing predefined settings that can applied to a group. One in the security guide, you could have mentioned

  • Administrators use template A.
  • Manager uses templates B.
  • User using templates C.

Next, you can specify the settings within each template. This includes the password length, password expiration, and all other security settings.

You also need to specify the template to be applied to the device. At the very least, you will need one template for workstations, one for members of the server, and one for the domain controller. If you have a server application then you may want to create a template for them. Keep in mind that the template workstation should not allow users to install unauthorized software or deleting system files. Template domain controller must protect Active Directory.

One more step that needs to be done. You should periodically check the contents of the template, and having integrity proven template, use the template to audit the existing setting. Free security you should mention how many times it was done, who did it, to whom the results are given, and what to do if there is any inconsistency.



read more reviews later on label create network documentation


flag counter

Flag Counter