The administrator often acts as the security officer of the network. It is your responsibility to investigate and...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
resolve unsuccessful login attempts, intruder detection lockouts, compromised passwords, viruses, spam and security policies.
This checklist was created by Doug Chick.
You have firewalls and antivirus software. You implement security patches regularly, and
A well-designed security policy is a powerful tool in your network security arsenal. Using built-in tools found in Windows XP, you can create and enforce your own custom security policy for all of the systems in your network. In this tip Chris Cox shows you how to create and enforce your own custom security policy.
More resources for creating and enforcing security policies:
Network security tools
- Network security toolbox
Check out these 12 free tools to prevent attackers from crippling your network.