Network user management

While networking professionals protect their network perimeters, they must be just as careful to manage users on the inside. How can admins enforce network security policies and allocate user permissions? Take a look at these problem user profiles to guide you in network user management.

When it comes to enterprise network security, managers and administrators across all verticals agree that their very own users are a perpetual and un-changing threat. While networking professionals can do the utmost to protect their perimeters, they must be careful with how they enforce network security policies and allocate user permissions. How can managers and admins control the users on their networks? Take a look at these problem...

user profiles to guide you in network user management by either navigating the table of contents below or scrolling down.

MANAGING INTERNET NOVICE NETWORK PROBLEM USER

Having un-savvy Internet users on your network is often worse than having a hacker on your hands. Though Internet novices mean well, they can slow down the whole network by downloading spyware and other Internet dregs onto their computers, even exposing sensitive enterprise data to the outside world.

  • View the security risks, overall threat level and threat resolution for the Internet novice in the first article of this managing problem network user series: Protecting against Internet novices.

INTERNET NOVICE QUESTIONS ANSWERED BY EXPERTS

  • Restricting users from types of traffic  Do bandwidth hogs like video and streaming radio cause your network to crawl? There are ways to ban such usage if you've calculated the business case for preventing this type of traffic. Learn how to enforce network security policies to restrict users from streaming radio on your network in this expert answer.
  • Internet activity user permissions There are some instances where Web research is not part of business functions. In those cases, you may need to heavily block users Internet access. To block users from most websites view this expert response.
  • Secure authorized user wireless access How can you secure a wireless network connection but also make it easy for authorized users to have access? View wireless networking expert Lisa Phifer's answer in configuring wireless user access.

Blocking porn with firewalls

To learn how to block porn and instant messengers from your network, view this advice from security expert Puneet Mehta: Block porn with ISA firewalls.

MANAGING DOWNLOADING DISASTER NETWORK PROBLEM USERS

Enterprise networking professionals have been contending with intensive downloaders since the dawn of the Internet, but there's still no quick fix for dealing with the "downloading disaster." That's because blocking all downloads or file sharing sites isn't the answer, as many of these users are hogging bandwidth in order to download business- essential data. There are specific countermeasures you can enforce to deter users from downloading non-work related material.

To find out how, learn the security risks, threat level and threat resolution for downloading disaster problem users.

USB storage device threat

One of the biggest internal threats to network security is the use of USB storage devices. In these tips, learn two USB storage device use prevention methods. Then learn how to use Windows Vista group policy to prevent unauthorized USB device use.

DOWNLOADING DISASTER QUESTIONS ANSWERED BY EXPERTS

  • Which users download the most?  According to site expert Chris Partsenidis, you can determine which user downloads the most through any of the applications recommended on Tucows.com or CNET's download.com.
  • Bandwidth allocation for each user To manage network bandwidth, our administration expert, Lindi Horton, explains how to give a download limit for each user in this expert answer.
  • Limiting MBs each user downloads Are users downloading during peak hours causing your Internet speed to slow? Our network administration guru explains how to give a MB downloading limit to users, in this Ask the Expert response.

MANAGING NETWORK PROBLEM USER CEOS

With great power comes great responsibility. Unfortunately, that means CEOs with a god complex can cause great problems. These "make-it-so" CEOs want their networks not only to work but to work for them without hassle, without passwords and without understanding how and why -- even if those demands imperil network security. Quite often, hapless network admins have to leave the rest of the organization on hold while patiently explaining how to turn on a home router or why using the term "password" is not a secure password.

Learn how to deal with a toxic boss in managing network problem user CEOs.

PROBLEM CEO QUESTIONS ANSWERED BY OUR EXPERTS

  • Find users with weak passwords Security expert Puneet Mehta recommends using L0phtCrack to identify users with weak passwords.
  • Explaining user access permissions to your boss Does your boss not understand that your users shouldn't have admin access to their machines? Here are some resources you can cite as argument to turn the tide in favor of your network's security. Read these steps to persuade your boss from user admin access.

CAN YOU TRUST YOUR USERS? 

Believe it or not, trusting your users has its benefits. If you develop a dialogue with the users on your network, you will be able to create a policy that works for them and keeps them from wanting to compromise network security with hacks and workarounds.

NETWORK USER MANAGEMENT FURTHER READING

This was first published in October 2009

Dig deeper on Network Administration

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchSDN

SearchEnterpriseWAN

SearchUnifiedCommunications

SearchMobileComputing

SearchDataCenter

SearchITChannel

Close