what are the daily routine of a network security engineer in a compney, form morning to evening?
Answer Question | May 10, 2010 5:47 AM
Network security, Network Security Management
I wanted to block Google charting and Google talk without interruption gmail site. could you please help me. I have domain controller installed 2003 server and using routing and remote access for internet sharing for client PC. Thanks for help
Answer Question | May 11, 2010 6:57 AM
Google chat block, Group Policy, Network Security Management, Remote access, Windows Server 2003 Domain Controller
Do you have an official policy on unauthorized wireless networks in your environment? How do you go about detecting and disabling unauthorized devices, and what are the consequences? How often do you encounter this problem in your business?
Answer Question | February 23, 2010 8:51 PM
Network performance, Network permissions, Network security, Network Security Management, Wireless LAN, Wireless networks, Wireless routers, Wireless security
What measures do you/your organization take to educate employees on network security policies? Do you include this information in new hire training? Do you hold special training? Does your include any unique or particular provisions?
Answer Question | November 25, 2009 7:37 PM
Network security, Network Security Management, Network Security Policies, Open IT Forum, Security policies, Security training
If you have users who work remotely or outsource certain parts of your organization where network security might not be as highly regulated, is network security a particular point of concern for you? What are some of the measures you and your partners have in place to secure your network at all points?
Answer Question | October 14, 2009 4:45 PM
Network security, Network Security Management, Open IT Forum, Outsourcing, Outsourcing services, Remote Network Management, Remote users
Every network admin seems to have their favorite “network user” horror stories — what are the most frequent types of problems you seem to encounter with your network users? What steps have you taken with “problem users” that were successful?
Answer Question | January 7, 2010 4:01 PM
Network administration, Network administrators, Network management, Network Security Management, Open IT Forum
What is the most unexpected risk we can have on a network?
Answer Question | September 22, 2009 9:39 PM
Network security, Network Security Management
Hi All, I have port security enabled in my environment. While swapping the systems i used to remove the MAC entry in both the ports. Is there any alternative options like removing the MAC address from the switches database.
Answer Question | September 8, 2009 10:31 AM
MAC address, Network security, Network Security Management, Port Security
One of our bloggers, Tony Bradley, recently discussed in his blog and on SearchUnifiedCommunications’ “Reality Check” podcast the implications of IM and social networking on network security. What do you have in place at your workplace to address these issues? What combination of security and policy have you incorporated or plan to incorporate?
Answer Question | September 24, 2009 8:36 PM
Instant Messaging, Network security, Network Security Management, Open IT Forum, Social networking
what is athe differrence between domain security policy and domain controller security policy?
Answer Question | June 22, 2009 6:46 AM
Domain Controller, Network Security Management, Security policies
Hi I have just share my internet connection only for one computer the client which i give the internet it is computer have two network card and he share the connection two more computer so I want to prevent the person from sharing the internet connection from it’s computer it means that he has a [...]
Answer Question | February 9, 2009 9:26 PM
Internet Sharing, Network Security Management, Shared Internet Connection
Hello there This is Faisal Rafiq, I have a problem after Dos attack. I got an error “ISA Server detected routes through the network adapter live that do not correlate with the network to which this network adapter belongs”. Thanks & Regards,
Answer Question | February 10, 2009 10:49 AM
DOS Attack, Hacking tools and techniques, ISA Server, Network security, Network Security Management
What is the best way for me to ensure Active Directory is being backed up? Another question is some people have dos programs that require modify access on c: I would like to know if there is a better way to assign that permission. Some people need local admin rights to run their programs. Obviously [...]
Answer Question | October 24, 2008 6:56 PM
Active Directory, Active Directory Backup and Restore, Backup, Network security, Network Security Management, Security, Windows