What point / Knowledge transfer to be take care, while job transfer from resigned IT manager to new pointed IT manager for future smooth running of IT work?[o:p][/o:p] As CAL, ISO docs, all network passwords etc.[o:p][/o:p] Should we need to scan network for any unknown remote access installed software & take backup / image of [...]
Answer Question | January 19, 2011 2:25 AM
IT managers, Network access, Network security, Remote access policies
This week’s free IT book is a little bit different than the ones we usually feature. Stealing the Network from Sygress contains fictional stories of real life possibilities meant to inspire security and technology pros alike to wonder and muse on the what ifs of security vulnerabilities. For a chance to win this thought-provoking series, [...]
Answer Question | February 3, 2011 2:43 PM
Active Directory, Auditing (compliance), Giveaways, IT Books, Network security, Network Security Management, Outlook 2010, Routers, USB drive, Windows Server 2008
I use Gmail, and have always been very happy with it. Moved to Win7, so had to change from OE, to WLM. Now all spam comes into my in-box, this never happened with OE – Gmail hid it. Help, please?
Answer Question | January 3, 2011 9:36 AM
Outlook Express, Spam Filter, Spam filtering services, Spam prevention, Windows 7
I need some advice from other security experts. I was recently hired to work for a small company where our data and infrastructure is at a managed hosting facility. The hosting service has a SAS 70 that is regularly audited. My company in the past relied – almost solely – on the managed service security [...]
Answer Question | January 5, 2011 3:49 AM
ISO 17799, Network security, Network Security Policies, SAS 70, SAS 70 Type II audit compliance, Security Program Management
how I can allow in my network under the firewalla single ip where other external net IPs can enter?
Answer Question | January 6, 2011 6:00 AM
Authentication, External IP Addresses, Firewalls, IP Subnetting, Subnets
We have a SQL 2005 Database. It is protected by Windows Authentication. Can we add another level of security – requiring a SQL username and password along with a valid user name and password on the domain?
Answer Question | January 12, 2011 4:17 PM
Network security, Network Security Management, SQL 2005 Database, SQL Security, SQL Server 2005, SQL Server security, Windows authentication
Have you used Cisco Iron Port or Sophos for e-mail security? What are your thoughts on the management and effectiveness? Would love to have some good thoughts on which is better for locking out threats.
Answer Question | December 30, 2010 4:10 PM
Cisco Iron Port C-Series, Iron Port, Sophos
Antivirus software and PC protection are comforts of the past. These days the biggest threats come from the Internet, and we’re wondering how you protect yourself and your hardware against Internet threats and the less knowledgeable users on your network. We’d love to hear about solutions you’ve tried and liked or disliked. As a thanks [...]
Answer Question | January 3, 2011 3:29 PM
Internet security, Internet Security Systems, Network security, Network Security Management, Open IT Forum
We have an external IT company auditing our security and policies. What kind of access should we give them? Should we be worried about auditing the auditors?
Answer Question | January 8, 2011 9:08 PM
Audit and compliance, Auditing, Network security, Network Security Management, Security Audit, Security Auditor, Security policies
Is it possible to scan our active directory and see if people have weak passwords? We have upped the password policy but what about for users that already have passwords and are not scheduled to changed them yet?
Answer Question | December 29, 2010 9:06 PM
Active Directory, Active Directory security, Network security, Network Security Management, Network Security Policies, Password Complexity, Password policies
Can we have a central windows server aggregate all windows security/audit logs? If not does anyone have a script to grab them from domain machines?
Answer Question | February 2, 2011 9:03 PM
Auditing software (security), Network security, Network Security Management, Windows Security, Windows Server, Windows Server Security, Windows Server Security Audits
A virus on Windows XP SP3 disabled the ability to access updates for Microsoft security essentials, Symantec or Norton. The infection has been cleaned but the problem persists. I check host file and dns. All good.
Answer Question | January 6, 2011 2:59 PM
Microsoft Security Essentials, Network security, Norton, Security updates, Symantec, Virus removal, Windows XP SP3
How can i create a trace from a computer on another computer both running windows XP. Ethereal is loaded on the second laptop. How can I see all traffic to and from the first computer?
Answer Question | December 28, 2010 2:54 PM
Ethereal, Network security, Traffic analyzer software, Traffic management, Windows XP
I’m trying to copy a very large file from one server to another. It occurs to me that download code from websites that download, say, ISO images for sw installs are very much like what I want to do. If things slow down , they stall and then start up again. They may even be [...]
Answer Question | December 29, 2010 1:23 PM
BitTorrent, ISO, Server migration
We have ACS 3.X server for tacacs + and radius authentication in our lan switches. right now i am able to login through tacacs+ only. I want to enable tacacs+ as well as local telnet login . This will help me to login in switches if the tacacs will fail.
Answer Question | January 7, 2011 7:58 AM
ACS, Authentication, Cisco Routers, Radius, Telnet
While starting server I am getting an error IP Sec service is not stsratint with event ID 4292 & Error code 10048
Answer Question | December 28, 2010 5:36 AM
IPsec, IPsec VPN, VPN Error Messages, Windows Server 2003, Windows Server 2003 error messages
HOW DO TAKE NUMBERS OUT OF A SWITCH THAT HAVE BEEN CDP’D TO THAT SWITCH AND REPLACE THEM WITH NEW NUMBERS. WE ARE ADDING BLOCKS OF 200 CONSECUTIVE NUMBERS TO REMOTE SWITCHES AND NEED TO CHANGE OUT THE EXISTING NUMBERS FOR THE NEW CONSECUTIVE NUMBERS.
Answer Question | February 7, 2011 9:08 PM
CDP, DSC, Nortel CS 1000, RLI, Switches, Switching
Where can I view errors on a Windows 7 desktop from a failed Microsoft office 2010 installation? What security group would i need to be in to view it?
Answer Question | December 28, 2010 5:29 PM
Network security, Network Security Management, office 2010, Remote access, Remote Access Privileges, Remote access security, Windows 7
How can I change who a service logs in on a Windows 2003 standard server? Is it the same for services on Windows XP?
Answer Question | February 4, 2011 5:19 PM
Login, Windows Login, Windows Server 2003, Windows Server 2003 Standard Edition, Windows XP
This week’s free IT giveaway is the CompTIA Security+ SYO-201 Video Mentor. Answer one of the unanswered questions and leave the link to your answer in the discussion area below. Voice and Data Network Setup WSUS Downstream Server Problem How much of your sensitive information can you trust to outside organizations? Application data security versus [...]
Answer Question | December 31, 2010 4:41 PM
CompTIA Security+, Giveaways, Network security, Network security appliances, Network Security Management, WSUS