• Exporting Active Directory server security log

    How can I export the data from a Windows Active Directory server's security log to create a graph of who logged in and out at what times?

    TeachMeIT975 pointsBadges:
  • Configuration problem on 2950 port security sticky behavior

    Hi, I am trying to put port security on a port, I want it to shutdown if another computer gets plugged into that port. I followed the following steps: I set these options: switchport mode access switchport port-security switchport port-security maximum 1 switchport port-security violation shutdown...

    Patelmanojk50 pointsBadges:
  • Modify environment for port security

    Hi All, We have enabled port security in our environment using the below command switchport port-security mac-address sticky the above command reserves the mac address of the connected PC to that particular port and in order to remove this we have to give no  switchport port-security mac-address...

    Vptechie70 pointsBadges:
  • Is Forefront client security server compatible with Server 2008 R2?

    Is Forefront client security server compatible with Server 2008R2? This question is from the Microsoft Live Chat which took place on July 13th.

    ITKE342,215 pointsBadges:
  • Critical Error in Security Log

    All, I manage a Windows 2003 Small Business Server Network with 9 clients. The server provides all network services. We use Logon/logoff, shared storage, and print server functions. We do not use exchange except for the server reporting tool. We do use about 4 instances of SQL. All clients are...

    FlyNavy0 pointsBadges:
  • Free IT Book: CompTIA Security+ Certification Passport

    This week's free IT book is Mike Meyers' CompTIA Security+ Certification Passport: Revised for the new CompTIA Security+ exam (SY0-301). The new edition provides a condensed and concise review of CompTIA’s well-established security credential. For a chance to win this quick review, cram-style...

    MelanieYarbrough6,345 pointsBadges:
  • Bypassing Cisco Iron Port

    How do I bypass Cisco iron port web filtering using proxy setting and port numbers?

    Mubs110 pointsBadges:
  • Road to become a Security Auditor?

    Hi, I am really confused about way to follow to become a Security Auditor... and the opportunities it has in future.. esp. in India? Currently I am working as a Security Consultant but dealing only with Security Related products including Firewalls, NMS, IPS etc and not Standards like BS7799,...

    Ind5 pointsBadges:
  • Exporting Windows server 2003 SAM database for external security audit

    We need to export the windows server 2003 SAM database to a standalone server for an external security audit. Where do I find this file or how can I export the data needed?

    NewnanIT1,110 pointsBadges:
  • Security/ Audit Check list for DB2

    Hi, I'm in the process of hardening the DB2 in Linux and I'm looking for a checklist to help me make sure I don't miss anypoint. Since I'm not an expert on DB2 I would like to have a starting point. I'm looking to make sure I don't leave open doors and also I want ot make sure I don't get an Audit...

    Josec990 pointsBadges:
  • Application data security versus network security

    What are the pros and cons of application data security versus network security? Which do you recommend devoting more budget funds to?

    NewnanIT1,110 pointsBadges:
  • Free IT Book: The Accidental Administrator: Cisco ASA Security Appliance

    This week's free IT book comes with a bonus interview with the author, Don Crawley! Check out what he has to say about the book, the process, and the joys of being an IT-type personality. Then answer one of the questions below and post the link to your answer in the discussion section for your...

    MelanieYarbrough6,345 pointsBadges:
  • Checklists for Router, Firewall and Switch security

    I have recently been shifted to Information security audit department. I need some checklists to check the security compliance for Router, Switch, and Firewall. Please provide me some checklists to audit the same.

    ISMS130 pointsBadges:
  • Cannot Ping Public IP from ISA server 2006

    Dear I am unable to Ping the Public IP over the Internet, My, Client is Behind ISA, ISA disallow to PING the Public IP on internet I want to enable but cannot done in ISA server 2006 E.E. I already add the ICMP and PING protocol in my Array

    Quakerquakest110 pointsBadges:
  • Are password-protected Zip files really safe?

    I have some worry about password-protected Zip files. From what I understand, even though a Zip file is password protected, you can still access it to look at the files on it and their types. This being the case, how secure is such a file, really? It's not a stretch to think that someone could...

    ITKE342,215 pointsBadges:
  • Are BYOD programs a security risk?

    According to a recent study by Ovum, 80% of corporate BYOD programs are 'inadequately managed by IT departments.' As more companies allow their staff to use their own computing devices to do work, they're struggling to address the programs that enable corporate control and guidance. How is your...

    Michael Tidmarsh28,605 pointsBadges:
  • Wanted to configure PGP on Oracle applications R12

    Hi, We are currently on Oracle Applications R12 based on Unix Platform.  We have a requirement to encrypt the files using the PGP key and FTP to another server. The other server will require to decrypt these files. Can you please let me know from where I have to start? Do we need any...

    khushbub5 pointsBadges:
  • Creating a user in navigator

    When i try to create a user in Navigator it does not allow me to set the DEFAULT OWNER opion from *usrprf to *grpprf. Does anyone know how to do this in Navigator?

    jjsuthe125 pointsBadges:
  • Analyzing Security Audit Journal

    Hello, could you please tell me where can I find a book, guide or course about Tracking and Analizing Security Audit Journal on iSeries?  I have tried Appendix F on Security Guide but there are not all entries and it does not explain how to analize records in journal.  Thanks a lot

    Fabypaumc15 pointsBadges:
  • How to implement secure file sharing between systems of different security levels

    Typical file sharing can create pathways between the systems of different security levels. I want to provide files (containing no sensitive data) from a secure system so that they can be read from low security systems, without having to ftp through firewalls which have more important duties. What...

    Columgrant15 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following