• Maintain History of Folder/File Accessing

    Dear all, is there any tool for windows network that tell you the creator of the Folder and File and maintian all history of the active directory users. The problem is that i have shared three folder on the window server2003. Different user access these folder and place their data in it. i want to...

    Muhammad usman125 pointsBadges:
  • Limiting users to one concurrent login in Active Directory

    We wish our users to login once only to one PC. Microsoft say we can only do this by limiting them to one designated machine, this is not possible for us. We need to know that if a particular user did something we can rely on the audit trail. We understand this may get tricky with Citrix use....

    Stanslad0 pointsBadges:
  • Cookies

    How the information in the cookies are encrypted and by which encryption method?

    Sangay635 pointsBadges:
  • Link state down for Exchange 2003 RGC

    Exchange 2003 RGC shows link state down for time to time to Bridgehead server and no mails flow even we are able to ping and telnet to the destination bridgehead server. We normally restart the SMTP to resolve this issue. Kindly let me know why this happens and any resolution.

    Shiv120 pointsBadges:
  • Denying Windows network access

    I run a computer lab in a high school. We have a multi-platform environment with 12 XP Pro machines, six Windows 2000 machines and eight Vista Home machines. We are experiencing problems with students accessing class folders and deleting files. All students log in as student. I need a strategy to...

    Windows Security ATE160 pointsBadges:
  • Can I use a GPO to stop users from changing information in Windows folders?

    Our company has a share called "ClientStore" where we store all client information. Within the "ClientStore" folder we have a letter for each letter in the alphabet. Then we have another folder with the client's company name within the folder that the client's company name starts with. Then we have...

    Windows Security ATE160 pointsBadges:
  • How can I allow access to shared folders with Active Directory?

    How can I allow a user to access a shared folder by using Active Directory? I want only this user to be able to save data in this folder and to do so from any computer.

    Windows Security ATE160 pointsBadges:
  • How do I deny delete permissions?

    I am on a Windows Server 2003 environment and I am currently working on folder permissions. Here is a small diagram of folders: Folder A / B C / / D E F G I am trying to deny deleting folders A, B and C but still allow users below that level to delete and perform permission changes. The problem is...

    Windows Security ATE160 pointsBadges:
  • Determining RTO and RPO

    What questions can be posed or analysis can be done to determine RTO? What questions can be posed or analysis can be done to determine RPO?

    Carollarsen5 pointsBadges:
  • How do I know if my patches have actually been implemented?

    When I patch my Windows servers, how do I ensure that the patches have actually been implemented?

    Windows Security ATE160 pointsBadges:
  • Do old certificates pose a security threat?

    From our Windows Server 2003 Web server, we are using Windows certification services for issuing certificates for our clients. After issuing the certificate to the client, the certificates are stored in the server. Is there any way to delete the issued certificates from the server? Do they pose a...

    Windows Security ATE160 pointsBadges:
  • MAC Addresses

    How can I locate a stolen desk top being used on the internet if I have got the MAC Address for the onboard network adaptor card

    Mozie10 pointsBadges:
  • Cisco pix501 VPN at home.

    A question submitted on SearchNetworking.com I just got IPSEC passthru working. IPSEC passthru is the most important feature because from home I have to VPN back to ASA at work. I would also like when I'm at work to VPN back to my home (VPN the other way that terminates on my pix 501) This should...

    ITKE376,060 pointsBadges:
  • Unauthorised access to Email and internet banking

    Is it possible that someone could hack into an email account (without changing your passwords), send and recieve emails from your hotmail account while making it look like it came from your IP address, set up fake dating site profiles in your name (with all of your details, photographs etc) , and...

    Lucy15 pointsBadges:
  • Limiting Accounts

    I want to configure an account limiting its abilities to: 1)It cant install any application 2)restrictions on web 3)Accessing my local drives (eg D:) not the Windows Partition

    Sangay635 pointsBadges:
  • Can I encrypt BlackBerry email with the certificate used in Outlook?

    We are trying to implement an email encryption solution for our users. Our environment is Exchange Server and Microsoft Outlook 2003. Top management at our company use BlackBerry. We chose the VeriSign Digital IDs certificate to encrypt and sign email with S/MIME in Outlook 2003. We would like to...

    Exchange Ask the Experts580 pointsBadges:
  • How to NAT a VPN pool address

    I have a PIX 506e IOS 6.3(5) and I want to make a VPN pool address available to inbound traffic. The scenario is that I have a wireless device which is behind a firewall from my provider. I have a VPN set up to allow the device to connect and it is assigned an address from a VPN pool. I would like...

    TomWahl85 pointsBadges:
  • Change copier FTP anonymous access

    Retina network security scanner shows FTP anonymous write access as a vulnerability. I only need FTP anonymous for a networked KonicaMinolta Di551 copier used for scanning documents to PDF file format into a folder on the server. Does anyone have any idea if a copier can scan to a network folder...

    Gekko115 pointsBadges:
  • Unsuccesfully securing an automated secure transmittal of data through FTPS protocol

    We have been unsuccesful in securing a data connection with our vendor's FTP server. The failure is always during establishment of the data connection when SSL is enabled. On our end, we've tried sending test files through two different server sources, and still were unable to connect with our...

    KMW5 pointsBadges:
  • computer based and user based policy implemented together?

    computer based and user based policy implemented together? I am setting up a squid proxy server. To deploy it I want to setup computers such that I can have any user log into a particular workstation and have limited access but when he connects to another workstation(that does not have any group...

    Sheldon.sc140 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.