• Using SNMP traps for network monitoring

    What are SNMP traps and how can they be used for network monitoring in our new data center?

    Troubleshooter24755 pointsBadges:
  • Free IT Book: Stealing the Network

    This week's free IT book is a little bit different than the ones we usually feature. Stealing the Network from Sygress contains fictional stories of real life possibilities meant to inspire security and technology pros alike to wonder and muse on the what ifs of security vulnerabilities. For a...

    MelanieYarbrough6,345 pointsBadges:
  • Application data security versus network security

    What are the pros and cons of application data security versus network security? Which do you recommend devoting more budget funds to?

    NewnanIT1,110 pointsBadges:
  • Checking networks for flaws and defects

    Is there security testing equipment that will check my wireless and wired network for flaws or defects that would allow it to be taken over or infiltrated?

    NewnanIT1,110 pointsBadges:
  • Active Directory and Network security management

    What is the best way for me to ensure Active Directory is being backed up? Another question is some people have dos programs that require modify access on c: I would like to know if there is a better way to assign that permission. Some people need local admin rights to run their programs. Obviously...

    EnterpriseDesktopATE2,525 pointsBadges:
  • Encrypting or locking bat file with passwords in it

    Can we encrypt or lock a bat file from being read as it has passwords in it?

    TeachMeIT975 pointsBadges:
  • DOS Attack

    Hello there, This is Faisal Rafiq, I have a problem after Dos attack. I got an error "ISA Server detected routes through the network adapter live that do not correlate with the network to which this network adapter belongs." Thanks & Regards,

    239069370 pointsBadges:
  • Central security server for WiFI based on mac address?

    Is there a central security server for wifi that will only allow corporate clients or employees on the network automatically based on mac address?

    NewnanIT1,110 pointsBadges:
  • Disabling Network Threat module in Symantec Endpoint protection

    How can I permanently disable the Network Threat module from a Symantec Endpoint protection 11 installation. I installed it by accident and do not want to do a full uninstall/reinstall.

    TeachMeIT975 pointsBadges:
  • Do you worry about your network’s security with remote users or outsourcing?

    If you have users who work remotely or outsource certain parts of your organization where network security might not be as highly regulated, is network security a particular point of concern for you? What are some of the measures you and your partners have in place to secure your network at all...

    JennyMack4,280 pointsBadges:
  • Domain security policy and domain controller security policy

    What is the difference between domain security policy and domain controller security policy?

    Sonu1235 pointsBadges:
  • Can I push out Microsoft Security Essentials to an entire network?

    Can I push out Microsoft Security Essentials to an entire network? How can this be achieved easily and quickly?

    TeachMeIT975 pointsBadges:
  • Top security issues with Windows 7

    What are some of the security issues people have run into with Windows 7? Do you have any advice for prevention or preparation when migrating?

    NewnanIT1,110 pointsBadges:
  • Vendor Security Questions

    Hello, I am a student in the Network Security program at the University of Advancing Technology and just read "Plan, Do, Check, Act". The URL is below. https://buildsecurityin.us-cert.gov/bsi/articles/best-practices/deployment/574-BSI.html Years ago everything was stored in the data center and...

    Ad285 pointsBadges:
  • Security audit of access within Active Directory 2008 network

    We need to do a security audit to see what users have access to what within our Active Directory 2008 network. Is there a free tool to help with this and possibly reassign permissions based on rules?

    Troubleshooter24755 pointsBadges:
  • Network and security

    I need a book about network and security... can you recommend a good book where I can read about the network and security ... And much like another book too, which I can use as ITSupport. It may very well be a new book (year) ...

    BookReader5 pointsBadges:
  • Preventing command prompt access except by domain admin

    Can we prevent command prompt access on all servers except for when run by a domain administrator?

    NewnanIT1,110 pointsBadges:
  • Scanning Active Directory for weak passwords

    Is it possible to scan our active directory and see if people have weak passwords? We have upped the password policy but what about for users that already have passwords and are not scheduled to changed them yet?

    Troubleshooter24755 pointsBadges:
  • Adding remote branches to our network

    We use Active Directory, DHCP, network printers, software and file servers. We want to add two more branches to our network, so users get IP addresses by DHCP and assigned to AD server. How can we create them like remote branches without giving same subnet to remote users? We want VPN connection on...

    TeachMeIT975 pointsBadges:
  • Corporate laptop security/encryption

    Please can anyone offer any guidance or know what are the best products in the market place for encrypting/securing corporate laptops, preferably the solution should include hard disk wiping.

    Troubleshooter24755 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following