Our documents are based on successfully executed projects which save you time and money.
Img (719) 315-0404
information-rights-management , networking , security , web-services

Identity Compliance Described

May 17, 2008

Supports enterprise level monitoring of access for segregation of duty (SoD) and security policy conflicts Ability to define rules across any platform / database / application or user’s attributes Support for inter and intra application security policy enforcement Monitoring of SoD, role vs actual exceptions, and terminated users with...

Img
compliances , sample-it-spreadsheets , security , web-services

What is an Application Audit

May 7, 2008

What is an Application Audit Usually required to assess • Business risk• Internal control• Strong linkage to corporate governance and compliances such as SOX, PCI, HIPAA and GLBA It is an audit of a single application • Example: audit of an Excel spreadsheet with embedded macros It could also be an...

Img
o-s , security

Simple Shutdown script for an Exchange Server

May 2, 2008

@echo off net stop MSExchangeES net stop IMAP4Svc net stop POP3Svc net stop RESvc net stop MSExchangeSRS net stop MSExchangeMGMT net stop MSExchangeMTA net stop MSExchangeIS /Y net stop MSExchangeSA /Y ! ! net stop “Computer Browser”” net stop “Messenger” net stop “Net Logon” net stop “NT LM Security...

Img