Here's the recent articles submitted by yang ws
Articles By yang ws
Guidelines For Deciding Which Administrative Template To Use
Submitted as: unknownmem
Use administrative templates to apply restrictions selectively to users. A different policy can be designed for an OU or even, using filtering by groups, for members of specific Windows Groups whose accounts are in the OU.(read
entire article)
View : 266 Times
Category : Education
Administrative Template Settings That Manage Remote Access
Submitted as: unknownmem
This setting will prevent the use of this tool by users to share items on the desktop "with other users. Providing remoteusers access to resources on a client system in any manner is a security risk.(read
entire article)
View : 244 Times
Category : Computers
Practice: Analyzing Administrative Template Settings To Control Application Features
Submitted as: unknownmem
Enable this setting to prevent users with Citrix ICA clients from reconnecting to a session from a computer other than the computer that they started the session with.(read
entire article)
View : 266 Times
Category : System/Network Administration
Design Activity: Designing Technical Controls To Manage The Use Of Laptop Computers
Submitted as: unknownmem
Chief Security Officer "We have a very restrictive desktop lockdown program. If there is a way to configure an application so that you must be an administrator to configure it, we do it.(read
entire article)
View : 273 Times
Category : System/Network Administration
Designing Security For Wireless Networks
Submitted as: unknownmem
Change the SNMP community word. Some access points run an SNMP agent. This provides a network management tool for network administrators, and if the community word is left at the default, it is a tool that can be used by attackers to configure the access point(read
entire article)
View : 287 Times
Category : System/Network Administration
Guidelines For Providing Proper Wireless Access Point Configuration And A More Secure Network Topolo
Submitted as: unknownmem
Change the default Server Set ID (SSID). The SSID identifies the wireless access point and thus its wireless network. If the wireless access point is correctly configured, only clients that are configured with the same SSID can communicate with it.(read
entire article)
View : 285 Times
Category : System/Network Administration
Designing Security Using 802.1x For Wireless Networks
Submitted as: unknownmem
Microsoft Internet Authentication Services (IAS) can be used as the RADIUS server. Both computer and user authentication flexibility is added by the ability to use Exten-sible Authentication Protocol (EAP) types, including the following:(read
entire article)
View : 263 Times
Category : Computers
Practice: Securing A Rogue Access Point
Submitted as: unknownmem
You attend a meeting in the executive suite of Tailspin Toys. You find that a "wireless access point provides network access for the executive suite. By asking a few questions, you determine that the access point was given to the president of the company by his wife.(read
entire article)
View : 231 Times
Category : Education
Translating A Security Policy That Controls User Access To Operating System Features
Submitted as: unknownmem
Software restriction policies Tools in Group Policy that can be used to restrict or allow software to run on computers running Windows XP Professional and Windows Server 2003.(read
entire article)
View : 221 Times
Category : Computers
Securing A Network From A Free Wireless Access Site
Submitted as: unknownmem
The Baldwin Museum of Science has a community center and promotes the use of the center for public activities. It also organizes public events such as music concerts, poetry readings, and art displays.(read
entire article)
View : 253 Times
Category : Education