how to perform netwrok audit or assessment
Answer Question | March 11, 2009 9:09 AM
Auditing, IT audits, IT Compliance, Networking audit
I know that object auditing can be turned on in Server 2003. The Windows security resource kit says that about 30 events can be logged to the event log just for opening a file, writing a line to the file and then closing the file. This can obviously fill up an event log very quickly [...]
Answer Question | December 8, 2008 1:12 PM
Auditing, File Auditing, Windows Server 2003, Windows Server Object Auditing
what form or procedeure would you use for a final security Audit after the Avaya system is installed?
Answer Question | October 21, 2008 9:04 PM
Audit and compliance, Auditing, Avaya, IT audit, Security audits
Hi, SOme time back I had added myself so that I am able to access my users mailboxes as a admin. We are having email problems and convincing users that the mail has been received – even after showing them the message tracking was not convincing. Then users would assume they have not received the [...]
Answer Question | January 12, 2010 3:58 AM
Auditing, Ecora, Exchange 2003, Exchange permissions, IT audit
Is it possible in SQL Server 2000 for a stored procedure to spawn a second stored procedure which will not interfere or slow down the processing of the original? I need the original procedure to finish and return its output variables to the calling program before the second (whose function is to audit the activity [...]
Answer Question | June 30, 2008 6:31 PM
Auditing, SQL Server 2000, Stored Procedures
When benchmarking a SAS70 audit to determine if the necessary controls were audited, what standards do you use as guidance to determine the controls to be tested and the control objectives? Does IT rely on internal audit for guidance or do you have your IT processes documented?
Answer Question | June 25, 2008 5:13 AM
Auditing, Compliance, Risk analysis, SAS 70
I am an auditor and trying to create a script that will gather the service’s and there status and start up types for windows server 2003. Is there a way to gather this information without bogging the server down within a script?
Answer Question | May 29, 2008 5:54 PM
Auditing, Audits, Windows Server 2003
I activated auditing on the local security policy and then defined auditing on a file being accessed as part of our site through IIS. Even tons of people are accessing that script to view our site, no events are appearing in the event viewer about this activity.
Answer Question | May 29, 2008 8:17 AM
Auditing, IIS, Internet Information Services, Security audits, Windows Server 2003
Where can I get the information on IT auditing from this site? Thank You.
Answer Question | May 9, 2008 8:48 AM
Audit and compliance, Auditing, Auditing (systems operations), IT audit, IT auditing, Security Audit
Hello, I use the Microsoft Baseline Security Analyser 2.0 to retrive information about shares in some local servers. I can not understand the diference between the information give in the report, about authorizations in the column Share ACL and Directory ACL. If some one can help me, Thank you PPG
Answer Question | August 5, 2005 6:02 AM
Auditing, configuration, patching, PEN testing, Platform Security, Security, Security management, Security products, Vulnerability Assessment & Audit, vulnerability management
I wanted to check on a possible solution for a problem we have run into with our module moves. Cause of audit requirements we can’t have pgmr’s in the productions systems. So as a work around I have them creating their code in sourclib on the test partition then I have operations copying it into [...]
Answer Question | August 3, 2005 10:40 AM
Application security, Auditing, Compliance, CRM, Database, Development, Disaster Recovery, Encryption, Exchange, Instant Messaging, Networking, Policies, Risk management, Secure Coding, Security Program Management, Tech support
I have hired a new IT support person, and I wanted to give him access to restart services ex: Print services, in my absense which occasionally needs resetting. Is their a way to give someone strict access to only restart services?
Answer Question | July 14, 2005 2:52 PM
Auditing, Compliance, CRM, Database Management Systems, DataCenter, Disaster Recovery, Hardware, Help Desk, Information risk management, Networking, Policies, Risk management, Security management, Security Program Management, Tech support, Third-party services
one of my clients is asking about a daily report contains all files and directories accessed every day and who is accessing it (time and mode:delete ,read ,write.) on a spicific share. so i tried using a script to filter out all events regarding files access but that looks time consuming method . so please [...]
Answer Question | July 20, 2005 12:51 PM
Auditing, IT auditing software, Vulnerability Assessment & Audit
I have a Ntfs folder on windows2000 advanced server.I want to set rights like users can’t delete any files or folders from this folder.Same time they can able to save&changes in that folder. how can i do this.
Answer Question | July 15, 2005 9:43 AM
Auditing, Information risk management, Policies, Security management
i have a HP iPAQ hx4700 with Pocket PC 2003 on it that connect to the internet through my phone cellolar (with bluethooth connection), i want to sync all my contact and my calender on my ipaq to my exchange small buisness server 2003 through the internet,my server connect to the internet and are behind [...]
Answer Question | May 25, 2005 1:57 PM
802.11 networking equipment, Auditing, Biometrics, BlackBerry, Corporate Financial Applications, DataManagement, Digital certificates, ERP, Exchange, Firewalls, Forensics, Handheld devices, Help Desk, Identity & Access Management, Imanage, Implementation, Incident response, Intrusion management, IT architecture, Network applications management, Network management software, Network monitoring, Network security, Network testing, Networking, Outsourcing, Palm OS, Planning, Protocol analysis, provisioning, Remote management, RFID, Security, Security management, Security products, Security tokens, Single sign-on, Symbian, Tech support, Third-party services, Vendor support, VPN, Windows Mobile, Wireless, Wireless Access Points, Wireless PC cards, Wireless standards
I have two questions here if someone can help. I will appreciate anything you can give. First, I am trying to configure a network printer on the AS400. I did wrkcfgsts, work with description, and copied the printer devices description and modified the printer device with the new info. All I changed was the IP [...]
Answer Question | April 6, 2009 12:04 PM
Auditing, Availability, Backup & recovery, Capacity planning, DataCenter, Hardware, Help Desk, i5, IBM, Installation, Integration with other platforms, Integration/Connectivity, iSeries, Logical partitions, Mainframe, Microsoft Windows, Networking, Operating systems, OS/400, PC/Windows Connectivity, Performance/Tuning, Printing, PTFs, Remote access, Reporting, Security, Security management, Server consolidation, Servers, System monitoring, Tech support, Technical support, tips and tricks, Tools
For auditing purposes, I need to find out what workstation a password was changed on. When you dspusrprf it shows the date it was changed and the date and time last logged. I would assume the workstation information must be there somewhere. Does anyone know how I could find this?
Answer Question | October 24, 2010 12:25 PM
I want to restrict users from accessing control panel from their workstation. How can I do that?
Answer Question | April 19, 2013 8:03 AM
Active Directory, Auditing, DataCenter, Policies
Hi, We are currently on SAP 4.6C With SOX and other security settings we need to min. yearly prepare a user list per data owner, so that the data owner can review and sign-of on this. The data owner is determined per role. Now my question is, does anyone know a way of assigning a [...]
Answer Question | April 3, 2005 7:49 AM
Auditing, Biometrics, Digital certificates, Features/Functionality, Identity & Access Management, Information risk management, Installation, provisioning, Security, Security management, Security tokens, Single sign-on
According to articles in today’s Washington Post and Wall Street Journal, Congress is considering legislation to ban the sale of Social Security Numbers for commercial purposes, unless individuals give their permission. The Post article went on to opine that there appears to be a growing bipartisan consensus among key House and Senate members to enact [...]
Answer Question | March 23, 2005 3:14 PM
Auditing, Business/IT alignment, California Security Breach Information Act, Compliance, E-business, Information risk management, ISO 17799, Laws, Regulations, Sarbanes-Oxley Act, Security, Security management, standards