The IT auditors have pointed some of my boxes (SUSE, Solaris 10 and AIX) have [strong]remote printer service[/strong] running and that is a potent security violation. I am confused what is remote printer service and how do I disable the same. I need the help. A prompt response is appreciable.
Answer Question | February 13, 2011 7:08 AM
AIX, Remote Printing, Security Audit, Solaris 10, SUSE Enterprise Linux
We need to do a security audit to see what users have access to what within our Active Directory 2008 network. Is there a free tool to help with this and possibly reassign permissions based on rules?
Answer Question | February 3, 2011 8:23 PM
Active Directory, Active Directory 2008, Active Directory security, Network security, Network Security Management, Security Audit
We have an external IT company auditing our security and policies. What kind of access should we give them? Should we be worried about auditing the auditors?
Answer Question | January 8, 2011 9:08 PM
Audit and compliance, Auditing, Network security, Network Security Management, Security Audit, Security Auditor, Security policies
We need to export the windows server 2003 SAM database to a standalone server for an external security audit. Where do I find this file or how can I export the data needed?
Answer Question | November 16, 2010 2:28 PM
SAM, Security Accounts Manager database, Security Audit, Windows Security, Windows Server 2003, Windows Server 2003 security
How do you perform a security audit for user access on the AS400?
Answer Question | July 15, 2010 1:50 PM
AS/400 security, AS/400 user administration, Security Audit
I’m looking for recommendations someone who has used similar services – a Security auditing vendor for SaaS applications and a SAS-70 vendor in DC/MD/VA area for a small company.
Answer Question | May 20, 2010 7:27 PM
SaaS, SAS 70, SAS 70 Type II audit vendor, Security Audit, Security Auditor
Is there any standard LINUX Audit checklist procedure for assessment?
Answer Question | September 24, 2009 3:56 PM
Linux, Linux security, Security Audit
In our compan IT department set some policies in able to control accessing porn sites and other illegal sites. As an auditor, are we exempt from their policies because even accessing yahoo mail is banned?There are times we need to research needed by the Top Management but we couldnt do it because they banned it…Is [...]
Answer Question | May 4, 2009 10:05 AM
Auditing, Auditors rights for IT policies, Internet restrictions, Internet security, Security Audit, Security policies, User restrictions
Where can I get the information on IT auditing from this site? Thank You.
Answer Question | May 9, 2008 8:48 AM
Audit and compliance, Auditing, Auditing (systems operations), IT audit, IT auditing, Security Audit