Saturday, 29 December 2012

Where Do You Get Information?


If you are documenting a network that taken care of, then you probably know more about the network than others. Although the information that needs to be documented does not exist in your mind, you certainly know how to look for it.

However, if you are required to document another network, either as a new supervisor or a consultant, you can not rely on your own knowledge. To gather the necessary details, you have to ask all administrators.

Obtaining the necessary information from the administrator may not be easy. For one thing, political factors can hinder your efforts. Maybe the administrators get annoyed with you, see you as an "outsider". Maybe the administrators feel threatened by the making of such documentation or felt it was not necessary. In this case, you need all the skills as diplomats to obtain the necessary information. You have to find a way to overcome these obstacles. Maybe you will be able to make the administrators to see that they are an important part of the manufacturing documentation.

While the administrators want to participate, you may have difficulty communicating with them. Often people will ignore things they can see clearly, but not for others. Or they are very capable of doing their job, but are less able to describe to others. You must be patient and persistent in talking with other administrators, approach from a different direction to get the necessary information. And you may still have to do their own investigation.

If you are accepted as a senior network administrator, and the administrator had not left any information (there are no other employees who know) you have to find the necessary information from the network itself. Follow the cables, see the server configuration and configuration router / switch, and so on


read more reviews later on label create network documentation

Friday, 28 December 2012

Physical access


You also have to make policy for the physical security of the device. Here are examples of questions that must be answered :

  • Who allowed get into the room?
  • What are the key type, which is used on the door?
  • Is access limited to the day or a certain time?
  • Did you record the serial number of the device?
  • Is there a record of the visit?
  • Who reads these notes and when?
  • Are you going to use a video camera? if so, who and how many times to change the cassette tape replaced?

read more reviews later on label create network documentation


infiltration Security


One aspect of the security policy that you may hope will never be used is the security breaches. Though it may be short, but this part is very important. Since there are many types of security breaches, this section takes some thought. Employees who enter the room the other computer can be regarded as an intruder security, as hacker who breaks into the server.

You should consider different types of security breaches and how to handle them. For example, if there are employees elsewhere in the computer room, which you do may ask for the security escorted out. If a hacker breaks into the server, you may reformat the hard drive and restore from back-up servers made ​​before the burglary or breaches.





read more reviews later on label create network documentation


E-mail


Policy e-mail could have been the biggest part of your security guide. Here are some questions you can use to create e-mail policy:


  • Do you allow attachments from inside?
  • If the attachment is allowed, if it applies to all or only certain people?
  • What is the maximum size of user mailboxes?
  • What if there are users who use e-mail to commit an illegal act?
  • What if there are users who use e-mail to take action threatening?
  • What if there are users who use e-mail to take action disturbing others?
  • What if there are users who use e-mail to perform the act of sending / receiving pornography, jokes, or other brutal material?
  • What if an employee is sending bulk e-mail through the company's server?
  • Does the company monitor the use of e-mail? if so, who did it, who they monitor, and how many times?
  • Are employees informed about such monitoring, or monitoring carried out secretly?




read more reviews later on label create network documentation


Antivirus Software


Surely you would want every machine running the same type of antivirus software. Policy should mention what software you used and what actions dillakukan to deal with the virus. The following questions may help you in making policy virus.


Following questions may help you in making policy virus.


  • What antivirus software running on the workstation?
  • What antivirus software running on your server?
  • What antivirus software running on your e-mail server?
  • When the time to download and install the update antivirus?, If so, this is done automatically or manually?
  • If done manually, who is responsible for doing it?
  • If there is a virus, whether they are quarantined or deleted?
  • Does your policy to the user, who often receives an attachment containing a virus?

read more reviews later on label create network documentation


flag counter

Flag Counter