Our documents are based on successfully executed projects which save you time and money.
networking , security

Sample VLAN Request Form

March 11, 2010

  Overview   Add or Remove Specify “add” to add new access, or “remove” to remove access that is no longer required. Note that to achieve the best protection for your application, you should request the removal or any access that is no required. Subnet / Mask The IP...

Img
compliances , security

Wireless Security Checklist

March 10, 2010

Data collection: via Kismet. (freeware): · Is the access point (AP) beaconing? (Is the AP configured to send beacon packets?) · Is the access link layer encryption enabled? (Wireless Encryption Protocol) · Is strong link layer encryption enabled? (128 bit WEP) · What channel is the traffic broadcast on? · Is the network...

Img
compliances , security

Sample MIL-STD-100 Objectives

March 10, 2010

The primary objective of the Standard Operating Environment was to develop the platform baseline for the Network Management Systems for Corporate campuses (Corporate NSM).   This standard methodology would then be applied to all campuses in the implementation of the Enterprise Network Management Platform. · Detail the NSM solution including...

Img
security , virtual-vmware

Citrix Security Checklist

March 9, 2010

· Does a unique account group for Citrix users exist? · Are default user accounts disabled on the server? · Does the server have the latest security patches installed? · Is the Administrator account name default? · Are one-time-passwords used?

Img
o-s , security

Windows XP Host Assessment Checklist

March 9, 2010

· Are Physical Security measures in place? · Is the BIOS password protected? · Does the computer Boot from a CD? · Is AutoRun for the CD-ROM enabled? · Is it possible to run Programs from the CD? · Are Operating System Restrictions in place? · Is NTFS enabled on all partitions? · Is File Sharing...

Img
projects

Sample Clarity Integraton Project Plan

March 8, 2010

Integration Set Up Technical Startup Perform Engagement Management Setup Activities Prepare for Engagement Review Implementation Information with Client Review Project Schedule with Client Architecture and Design Conduct Briefing with Client Project Sponsor Conduct Kick-Off Session Gather Service Desk Information Gather Clarity Information Gather Users and Role Information Gather Service...

Img
application , projects , web-services

Software Security and SDLC Considerations

March 8, 2010

Technical security architecture Application security architecture Application security architecture document Architecture control board Data model Data security architecture document Data security architecture Platform security architecture Platform security architecture document Enterprise architecture governance Security in the system development lifecycle Security requirements of information systems Security requirements analysis and specification Define...

Img
compliances

Information system Catalog service management Considerations

March 8, 2010

Configuration and asset management Release Management Development Integration  Service Desk / Help Desk    Capacity management Create and maintain a capacity plan Operational procedures and responsibilities Documented operating procedures Change control procedures Technical review of applications after operating system changes Restrictions on changes to software packages Change management Information...

Img
networking , security

Network Security Items to Consider

March 8, 2010

Hardware Security Hardware asset management Inventory of assets Inventory of IT assets Hardware maintenance and support Network Security Network security management Security of network services Network controls Security of network services Network access control Network routing control User authentication for external connections User authentication for external connections Equipment identification...

Img
business

Autocad 2006/7 File Path Settings

March 8, 2010

Suggested Autocad Settings for reliable and optimal performance. Support File Search Path C:Document and SettingsAdministratorapplication DataAutodeskAutodesk Land Desktop 2006/7R16.2enusupport C:Program FilesAutodesk Land Desktop 2006/7support C:Program FilesAutodesk Land Desktop 2006/7fonts C:Program FilesAutodesk Land Desktop 2006/7help C:Program FilesAutodesk Land Desktop 2006/7express C:Program FilesAutodesk Land Desktop 2006/7supportcolor C:Program FilesAutodesk Land Desktop 2006/7land...

Img
compliances , information-rights-management , security

Identifying Identity Management Needs

March 8, 2010

Author unknown  Is your network a collection of different systems and applications? Are there multiple directories and data systems? Are there users and other data objects stored in multiple places? How is the environment managed? How are new accounts created for users each time a new application is added?...

Img
compliances , information-rights-management , security

Solaris Role-Based Access Controls

March 7, 2010

UNIX administrators have wanted more fine-grained access control to administrative features almost since the first administrator accidentally destroyed his first system. As of Solaris 8, Sun has delivered a solution to that problem. But is the solution for you? The Current State The UNIX concept of a “superuser” who...

Img
information-rights-management , security

Manually Configuring Privileges

March 7, 2010

The manual process for provisioning poses a huge challenge for today’s businesses. Believe it or not, most companies still use manual processes to provision access rights to users. Step 1  First, when an employee is hired, a new user profile is created and stored in an HR database. Step...

Img
application , security , web-services

Application Threats and Vulnerabilities

March 7, 2010

  Application Threats and Vulnerabilities    Oracle MS SQL Server Sybase Lotus Domino Denial of Service SNMP DoS   Malformed RPC Absolute value of numeric DoS Unicode DoS Redirection DoS   Request DoS   Select All DoS  IIOP DoS ID/Password Control Issues Default passwords Default passwords Default passwords Default passwords Brute force...

Img
email

Sample Email Backup Procedures for Windows

March 7, 2010

No matter what you read in this, alway promote backups of your email and data files. It costs 10 times more time and money to recover lost information than it does to store it.   Purpose This document provides guidelines / instructions that enable Corporate users or the Technology Services Department...

Img
email

Suggested Exchange pre-requisites

March 7, 2010

  Exchange 2000 Pre-requisites Server OS Domain Version Domain mode Runs NT4 All Versions All Modes NO W2k NT4   NO W2k3 NT4   NO W2k W2k All Modes YES W2k W2k3 All Modes YES W2k3 All Versions All Modes NO Exchange 2k3 runs well in Windows 2000 Server...

Img
email

Sample Exchange 2000 Migration Plan

March 7, 2010

Prepare current Email system(s): Backup & restore the complete email system to alternate servers, this is to ensure internal & external (Internet) email can be processed with this standby system. 1. Install IIS if it isn’t already installed. Ensure IIS is installed. 2. Uninstall Outlook from the server. (Outlook...

Img
email

Common Spyware threats list

March 7, 2010

  http://www.spywareguide.com/product_list_full.php Common Spyware threats list Spyware and similar Keyloggers Dialers Usage tracks Hijackers AdBreak 2Spy! A.I.S. Ahead Nero Burning Rom AllCyberSearch AdvertBar AB System Spy Aconti HTMLedit Cool-XXX Alexa (6.0) Actions Monitor Action Liveshow Showtime Internet Explorer Duolaimi Attune Activity Logger All-In-One Telcom LogoManager IStartHere Aureate (3.15) Activity...

Img
email

Email Virus Outbreak Check List

March 7, 2010

Topic Questions to ask Description Identify the attack Virus, worm, or Trojan What kind of virus are you facing? E-mail viruses can take three forms. Knowing what kind of virus you’re dealing with will help you better figure out the severity. Don’t forget that some viruses are actually hoaxes....

Img
email

Sample Email Improvement Project Considerations

March 7, 2010

Summary of User, Technical and Institutional Requirements Reliable and resilient message delivery (<2 minutes for internal mail) Secure (including password, data encryption, enforcement of strong password) Open standards (i.e. IMAP, HTTP, HTTPS, SMTP) Integrates with current server, directory and workstation environment Interoperable with current systems (Exchange, Lotus Notes) Single-seat...

Img
application , web-services

Oracle Database Configuration & Performance Tips

March 7, 2010

Introduction This guide is aimed at those who wish to configure Oracle 10 – 11 databases to ensure that it can perform under large loads that may be placed upon it. SAP utilizes Oracle database technology to store SAP activity data, in form of transaction. It requires a transactional...

Img
compliances , security , web-services

What is an x.509 Digital Certificate Structure

March 7, 2010

X.509 certificates have the following fields. Version x.509 version:  0=v1, 1=v2, 2=v3 serialNumber Controlled by CA, assigned to each cert signature algorithm OID of the algorithm used for digital signature issuer name Ex “sha1WithRSAEncryption” or “dsa-with-sha1” validity period x.500 Distinguished Name (DN) of the CA subject name Expiration date...

Img
business , compliances , networking , o-s , security

IT administrators are not doing enough to patch vulnerabilities

March 7, 2010

Stringent patching and patch management is key to anti-virus security management 1. Protection from malware 2. Secure connectivity 3. Protection from Inappropriate Content 4. Maximization of Network Resources 5. Protection of Resources 6. Ease of IT administration 7. Maximization of performance 8. Budget Management How to Secure Malware Threat...

Img
email

Sample Vendor Virus Comparison Checklist

March 6, 2010

Vendor Virus Comparisons Virus detection   Platform   Malicious JavaScript detection   Malicious VBScript detection   Malicious applet detection   Applet filter                   Certificate                   Signature                   Trusted source                   All applets                   Detects unknown malicious applets   E-mail content filter   E-mail content...

Img
email

Companies That Should Consider Managed Messaging

March 6, 2010

Messaging is not the core competency of most companies, yet it is a fundamental business requirement that demands tremendous time and resources to manage. Outsourcing removes the headache of email administration from the internal IT staff, freeing up those resources to focus on IT initiatives that directly relate to...

Img
email

Spam Costs

March 6, 2010

Cost is perceived as a major driver in the desire to move towards a managed messaging solution and/or hosting of an email system. The reality is that in most organizations it is so difficult to ascertain the true cost of providing an email system that it is possible to...

Img
email

Fighting Spam

March 6, 2010

Spam is unsolicited email. It can range from a supplier’s newsletter to pornographic images to offers of products or services. On the face of it, this does not constitute a major problem as the user can “just delete it”. Many pundits predict that spam will die out from “natural...

Img
email

Virus Detection Considerations

March 6, 2010

What to look for in a virus product. Detailed descriptions of these technical attributes follow this bulleted list. 1. Battle-Tested Engine 2. Versatile Virus “Language” Detection Base 3. Advanced Heuristic Analysis 4. Expanded Scanning Capabilities 5. Auto Immune Virus Capture Battle-Tested Engine Technology Only through real-world testing across multiple...

Img
o-s

Sample Server Configurations

March 5, 2010

Sample Server Configurations Server Type Reference Description Lab Implementation 1 Dual P3, with 2Gb of RAM, 2 18GB disks for OS 4 NIC ports, 1 Remote Mgmt Port HP DL360G2 (2 – PIII 1.266Ghz) with NC3134 dual port card, 2 10KRPM 18GB drives, iLO Mgmt Port 2 Dual P4,...

Img
compliances , o-s , security

Event Viewer Log Review

March 5, 2010

It is important to frequently check the XP / Vista and Server Event Viewer to review log files for possible security concerns. It is optimal to log a minimum of seven days of activity in the application, system, and security logs. In order to maintain the information for seven...

Img
application , web-services

Quick overview of HTTP Request messages

March 5, 2010

OPTIONS         Request information about available options GET                Retrieve document identified in URL HEAD              Retrieve meta information about document identified in URL POST              Give information (e.g., annotation) to server PUT                Store document under specified URL DELETE           Delete specified URL TRACE            Loopback request message CONNECT        For use by proxies HTTP response codes 1xx                Informational   Request...

Img