Exchange 2000 Pre-requisites Server OS Domain Version Domain mode Runs NT4 All Versions All Modes NO W2k NT4 NO W2k3 NT4 NO W2k W2k All Modes YES W2k W2k3 All Modes YES W2k3 All Versions All Modes NO Exchange 2k3 runs well in Windows 2000 Server OS Domain Version Domain mode Runs… Continue reading Suggested Exchange pre-requisites
Tag: OS – Patch Management
Sample Server Configurations
Sample Server Configurations Server Type Reference Description Lab Implementation 1 Dual P3, with 2Gb of RAM, 2 18GB disks for OS 4 NIC ports, 1 Remote Mgmt Port HP DL360G2 (2 – PIII 1.266Ghz) with NC3134 dual port card, 2 10KRPM 18GB drives, iLO Mgmt Port 2 Dual P4, with 2Gb of RAM, 2 18GB… Continue reading Sample Server Configurations
Event Viewer Log Review
It is important to frequently check the XP / Vista and Server Event Viewer to review log files for possible security concerns. It is optimal to log a minimum of seven days of activity in the application, system, and security logs. In order to maintain the information for seven days, users need to increase the… Continue reading Event Viewer Log Review
Legacy – PC Various Hardware speeds
Service Value Units ECP/EPP PC to PC Connection (Parallel Port) 2 Mbps ATA Hard Drive PIO Mode 0 3.33 Mbps ATA Hard Drive PIO Mode 1 5.22 Mbps Asymmetric Digital Subscriber Line (ADSL) Downstream 6 Mbps ATA Hard Drive PIO Mode 2 8.33 Mbps ATA Hard Drive PIO Mode 3 11.11 Mbps Universal Serial… Continue reading Legacy – PC Various Hardware speeds
What is Single Sign-On
With Single Sign-On a user needs only one user ID and password this eliminates the security headaches and vulnerabilities associated with multiple IDs / passwords. This solution simplifies and frees security administrators from the mundane task of assigning passwords, enabling them to perform much more important tasks that directly impact the success of your. Single… Continue reading What is Single Sign-On
IAM Useful Glossary
Access Control An access control limits the use of a resource. Only those people, programs or devices that are specifically permitted to use the resource will have access. In addition, an access control will usually limit use to specific types of access; someone can read a file but not change it, for example. Access Management… Continue reading IAM Useful Glossary
Sample SSO Deployment
Process / Functional Requirements Functionality: Users should login only once to their PC. Then be able to access all applications without logging in again. If integration of Single Sign On solution is not possible with NT domain/AD, users should be able to log into one application and be automatically authenticated for others. Log Out: User… Continue reading Sample SSO Deployment
Sample Visio – IAM Deployment Process
The first step in implementing an identity management solution is identifying business objectives, policies and strategies both current and future. next, a complete evaluation of the identity repositories, current identity management implementations (i.e., synchronizing messaging and desktop Ids), political boundaries and current vendor capital investments and loyalty. This is needed to determine the type, value… Continue reading Sample Visio – IAM Deployment Process
Knowledge Management Key Points
Regulators have updated Contingency Planning guidance since 9-11. Financial institutions should ensure that Disaster Recovery and contingency include any new requirements. Financial institutions should compare federal and state regulatory requirements to ensure more stringent requirements are adequately addressed. Review existing plans to ensure natural area, building complex and terrorist events are considered. Make sure plans… Continue reading Knowledge Management Key Points
Download PC – MacIntosh Documentation
AppleTalk Reference: Protocol Suite Macintosh.zip https://www.bestitdocuments.com/Samples/
Monitors and best viewing distances
A general rule when deciding on monitor size is as follows: Audience size Monitor size Viewing distance 5 17” 2.1m (7.0ft) 10 21” 3.0m (9.0ft) 20 29” 3.5m (12.0ft) (Optimum viewing distance is usually calculated as 5 x the monitor screen size.) https://www.bestitdocuments.com/Samples
Sample – Nokia IPSO Alert Table
NICAlert-Nokia IPSO (4.2) Conn Table Full: Host.Unix: Field Results View Name Nokia IPSO Conn Table Full Date / Time NIC Domain NIC Site / Location Event Category System.Errors Current Severity Low (1/5) Peak Severity Low (1/5) Peak Time Trend No Change (0.00%) Count 0 Device Name Device IP Device Class Host.Unix Device Type Source IP… Continue reading Sample – Nokia IPSO Alert Table
UNIX sed Commands
Unix sed Commands sed ‘s/wizard/guru/g’ file1 replaces every occurrence of the string wizard with the string guru sed -n ‘s/wizard/guru/gp’ file1 replaces and prints only those lines where the substitution was made -n print only when command p is given sed ‘/Comment:/d’ file1 deletes all the lines that contain Comment: from the file. sed… Continue reading UNIX sed Commands