Home arrow Howto's arrow Howto - Security
Howto - Security
Building an inexpensive but powerful intrusion-detection system. PDF Print E-mail
Written by David Noel-Davies   
Network-based intrusion-detection systems (IDS) are an integral component of a layered IT security strategy. As October is National Cyber Awareness Month, if your overall security system doesn't include network-based intrusion detection, now is an excellent time to consider implementing an IDS package.
Read more...
 
Developing a plan for network security PDF Print E-mail
Written by David Noel-Davies   
My company is revamping its network security plan. What tools should I use to develop up-to-date policies, and are there any tools that make this easier?

Security is an ever moving target that must be continually managed and refined to ensure appropriate confidentiality, integrity, and availability of the services and systems that are critical to your business, as well as the valuable information that is often at the heart of the organisations we defend.

The stream of news stories highlighting loss of customer information and proprietary data (among other drivers) are prompting many of us to take a step back and re-evaluate the infrastructure at large, and our security tools within that infrastructure.

In this case, you're wondering how network tools can help in creating up-to-date security policies.


Read more...
 
Howto - Intro to Network Security 5 PDF Print E-mail
Written by David Noel-Davies   

In the previous article in this series, I showed you how to configure a system health validator so that Windows will check to see if clients requesting access to the network have the Windows firewall enabled. I then showed you how to create system health validator templates that define what it means to be in and out of compliance with the network health policy.

Read more...
 
Howto - Intro to Network Security 4 PDF Print E-mail
Written by David Noel-Davies   

In the previous article in this series, I showed you how to configure the VPN component that will be used to allow external users to gain access to our network. In this article, I will continue the discussion by showing you how to configure the Network Policy Server component.

Read more...
 
Howto - Intro to Network Security 3 PDF Print E-mail
Written by David Noel-Davies   

In Part 2 of this article series, I walked you through the process of installing an Enterprise Certificate Authority that was to be used by a VPN Server. In this article, I will continue the discussion by showing you how to configure the necessary VPN Server. For the purposes of this article series, I will be installing the Network Policy Server onto the same physical computer as will be used for the VPN Server. In a real world deployment, you would usually want to use two separate computers to host these roles. Hosting both roles on the same computer should only be done in a lab environment.

Read more...
 
Powered by IT CONTRACTORS and designed by EZPrinting web hosting