Sunday, 23 December 2012

Security Template


At the time talking about policy and security measures, we tend to think about things like minimum password length and the length of time the log on. Two it is certainly an aspect of security policy and unquestionably should be included in your security guide.

However, try to stay away from questions like "password must be at least eight character". We certainly do not want to use the same security policy between IT staff and other users. IT staff have access to a higher than another user and thus require more stringent security. Similarly, some of the servers storing the information is more important than the other servers and require a more stringent level of security. Because of these differences, it should use the security template.

Security Template is a file containing predefined settings that can applied to a group. One in the security guide, you could have mentioned

  • Administrators use template A.
  • Manager uses templates B.
  • User using templates C.

Next, you can specify the settings within each template. This includes the password length, password expiration, and all other security settings.

You also need to specify the template to be applied to the device. At the very least, you will need one template for workstations, one for members of the server, and one for the domain controller. If you have a server application then you may want to create a template for them. Keep in mind that the template workstation should not allow users to install unauthorized software or deleting system files. Template domain controller must protect Active Directory.

One more step that needs to be done. You should periodically check the contents of the template, and having integrity proven template, use the template to audit the existing setting. Free security you should mention how many times it was done, who did it, to whom the results are given, and what to do if there is any inconsistency.



read more reviews later on label create network documentation


Saturday, 22 December 2012

administrative security guide


User security administration is a little more difficult than your user security. most people tend to think security is to prevent hackers and viruses. Although it is true, another aspect of security is to protect users from themselves and protect the network from users who do not know what they are do.

You have to design a strict security system. Therefore, administrative documentation should be more lengthy and detailed. There is no right way or wrong way to make your administrative security. each organization has different needs. One company may require policy and procedureThe 200-page security, while smaller companies may suffice to five pages.

What is contained in it is entirely up to you.



read more reviews later on label create network documentation


Free Security End User


Free flow of explaining what to do user-related security. However, if it is small and many foreign terms, and even then it is not hard to read a lot of users who want to take the time to read and try to understand the guidelines.

Guidelines for the end user could be just one page that describes the basic security policy. Documents can contain for example:

  •  change passwords every 30 days,
  •  Do not write passwords carelessly or tell anyone else,
  •  Do not install software onto company computers,
  •  Do not connect the device to the network restricted,
  •  All submissions must be approved by the computer supervisor prior to submission to the purchasing department,
  •  Do not use company computers than affairs of the company,
  •  etc.

read more reviews later on label create network documentation


documentation should include your network security


Most network documentation contains hardware inventory, map connections, IP address, and so on. However, your security is as important as the hardware documentation. User security is very important in maintaining the smooth running of your network.

Simply put, your security is a document which clearly states the policy related to network security. In a real situation, the company may have had two panuan security. One is intended for people who are responsible for security arrangements and another for the end user.


read more reviews later on label create network documentation

what is documented?

if you take over the network for the first time, what information you want to know?
that must be included in your network documentation. Enter the information is clear and useful, and it will be available at the time the person concerned does not exist. That is the core documentation.

You should also prioritize documentation. Specify the information that must be recorded and the information you which ones can wait later. You can not do everything at once. Although each network has its own features, many common elements that can be documented.

  • Network topology
This is usually done in the form of a diagram showing the 'node' major network, such as routers, switches, firewalls, and servers, and how they are all connected. Typically, printers and workstation are not included.

  • Server
This is all the information on the server you will need to set up or take care of them, such as the name, function, IP address, disk configuration, OS and service pack, date and place of purchase, warranty and so on.

  • Division of routers and switches port
This includes details of WAN configuration, VLAN, or port to the node distribution network through a patch panel.

  • Configure the service network
Network services, such as DNS, WINS, DHCP, and RAS, is essential for network operations .. You should describe the complete structure. Although you can get this information by checking the server, the intention is to save time by documenting in a format that is easily broken.

  • Domain policy and profiles
You can restrict the ability of a network user with Police Editor or Group Policies. You can also make roamingprofile that can be stored on the server rather than on your local computer. This configuration, if used, must be documented.

  • Critical Applications
You must document how they are maintained, including what usually happens to them and how to solve the problem.

  • Procedure
The procedure is basically the way we run the policy, and it can be quite long. For example, the policy "network must be secure from foreign users." However, it took a great effort to implement that policy. There is a procedure for firewalls, network protocols, passwords, physical security, and so on. You may also need procedures to handle network problems reported by users and for routine maintenance of the server.


read more reviews later on label create network documentation

flag counter

Flag Counter