Is there a way to block a list of common passwords from our network even though they fit the complexity rules they are still weak like p@$$w0rd.
Answer Question | April 20, 2011 2:27 PM
Password management, Password policies, Password strength, Security management, Security protocols
Can you help me delete a system password that has been created? This password prompt appears prior to the system completing the booting up process. Does not have anything to do with user accounts on the pc.
Answer Question | May 2, 2011 10:04 AM
Boot password, Windows Security, Windows XP, Windows XP Security
Hi, I am planning to take CCNA certification and I am interested in securty side. So, After CCNA, what id the Cisco course I need to prefer. I have heard CCNP has a diversed group with Security as one of the domains. So if its CCNP Security, what would be after it? Is there anything [...]
Answer Question | May 2, 2011 8:42 AM
CCNA, CCNA Certification, CCNA Security Certifications, CCNP, Security careers
Hello all, Our users have recently began to receive a pop up box asking “Do you trust this printer?” with the options to either Install Driver or Cancel. It happens to all users randomly, not every day and not all users. For example, we have a 10 users that get Printer A mapped, 3 may [...]
Answer Question | May 30, 2011 8:28 PM
Symantec Endpoint Protection, Windows 7, Windows 7 Professional, Windows Server 2008, Windows Server 2008 R2
This week’s free IT book is Phil Simon’s insider’s guide to successful IT projects, Why New Systems Fail. From the back of the book, “Organizations often lack the necessary framework to minimize the chance of system failure before, during, and after beginning IT projects.” Get the know-how you need to start and successfully deploy your [...]
Answer Question | February 23, 2012 3:46 PM
AS/400, Business Intelligence, Channel, CIO, CRM, Database, DataCenter, Development, Exchange, Giveaways, IT Books, Linux, Lotus Domino, Microsoft Windows, Mobile, Networking, Oracle, SAP, Security, SQL Server, Storage, Virtualization, VoIP, Windows Server
When doing a Windows Server 2003 to Windows server 2003 vpn what type of encryption should we use being the most restrictive as possible?
Answer Question | April 15, 2011 7:13 PM
Encryption, Encryption Software, VPN, VPN security, Windows Server 2003, Windows Server 2003 security
Can we block wireshark or ethereal from being able to run on our Windows 2003 Active Directory network? We want to block sniffers from catching sip/VoIP traffic.
Answer Question | April 15, 2011 7:11 PM
Active Directory 2003, Active Directory security, Ethereal, SIP, VoIP, Windows Server 2003, Windows Server 2003 security, Wireshark
What kind of options are available for a workgroup environment? We have a Windows 7 PC “acting” as a file share server and other things but not being in a domain environment what would be the options for monitoring activity accross the workgroup, blocking access to websites and reporting? Is there a hardware switching device we [...]
Answer Question | May 2, 2011 8:49 PM
Proxy, Proxy Server Configuration, Proxy servers, ProxyClient software, Windows 7
Has anyone built a Mobile Command Trailer? We are trying to develop a Telecommunications Disaster Recovery Plan in the case of a natural disaster. Any idea’s would be greatly appreciated.
Answer Question | May 3, 2011 7:35 PM
CRM, DataCenter, Disaster Recovery, Disaster Recovery Plan, Disaster recovery planning, Mobile, Networking, Security, VoIP case studies
On TrendMicro, the list of “Threats stopped” in the past month sometimes goes down rather than up, sometimes by a huge amount in one day. Could this signify a threat that was previously thought to have been stopped but now isn’t? Why would it do this?
Answer Question | April 14, 2011 8:10 PM
Security, Security products, Threat management, TrendMicro
We have an office of computers, both XP and Windows 7, networked together as a workgroup. The boss is asking if there is a tool available that can monitor activity, website usage or what is going on within the workgroup to report activity. We have a Windows 7 PC “acting” as a file share server [...]
Answer Question | April 15, 2011 4:53 PM
Monitoring software, Network monitoring, Windows 7, Windows Workgroups and Networking, Windows XP, Workgroup Servers
Would migrating to Power Point Viewer 2007 change PCI DSS compliance in any way if all patches were applied to 2007? i.e., does the newer version bring anything like ActiveX into the picture?
Answer Question | April 18, 2011 4:48 PM
ActiveX, Compliance, PCI DSS, PowerPoint 2003, Windows Server 2003
How can I monitor the status of a Windows 2003 task manager over a period of time like for a month on my server?
Answer Question | April 12, 2011 4:30 PM
Monitoring software, Server monitoring, Task Manager, Windows Server 2003, Windows Server 2003 administration
What password policies are the best without going crazy? We want security but changing passwords 2 times a month is too much. What is a healthy middle ground between security and convenience?
Answer Question | April 12, 2011 4:28 PM
Password policies, Security, Security management, Security policies, Windows Security
Can I block specific websites on our domain via active directory?
Answer Question | April 18, 2011 3:52 PM
Active Directory, Active Directory Administration, Active Directory security, Blocking websites, Domain Administration
How can I bypass the web filters on iron port? I ask because the filters are set wrong and I am constantly blocked for the wrong reasons and it will lock up the web page. E.g., looking up a weather news article and the filter says I am entering a social networking category, wrong. it [...]
Answer Question | April 8, 2011 2:00 AM
Internet security, Iron Port, Security, Web filtering
Hi, I have done my bachelors in computer applications and PG diploma in cyber security back in INDIA. I am working for cognizant technologies but not in the profile of network admin or anything related to networks as i had to take a job whatever came my way to run family but i am very [...]
Answer Question | April 8, 2011 1:37 PM
Career in Information Security, Information security, Information security careers, Network administration, Network administrators
If i turn user auditing on for a Group profile, will it audit all the ids in that group profile?
Answer Question | April 6, 2011 7:08 PM
AS/400 user administration, AS/400 user authority, Auditing, V5R4
Requirement 1.4(b) asks if personal firewall software is not alterable by employee-owned computer users. If we allow employees to alter their personal firewall software settings, what other compensating controls could we implement in order to meet satisfy the objective of this requirement?
Answer Question | November 22, 2011 6:00 PM
Firewalls, PCI, PCI compliance, PCI Compliance and Acquisitions
On April 7 at 10am EDT, attend our Live Chat with Alcatel-Lucent to discuss real-world examples of service providers implementing transformation projects to become more innovative, competitive, simpler, faster and more efficient; while improving customer quality of experience and laying a solid foundation for the future. Learn more on the live chat page.
Answer Question | April 6, 2011 2:01 PM
Alcatel-Lucent, CRM, ITKE Community, Live Chat, Networking, Security, Telecom