Suggested Exchange pre-requisites

  Exchange 2000 Pre-requisites Server OS Domain Version Domain mode Runs NT4 All Versions All Modes NO W2k NT4   NO W2k3 NT4   NO W2k W2k All Modes YES W2k W2k3 All Modes YES W2k3 All Versions All Modes NO Exchange 2k3 runs well in Windows 2000 Server OS Domain Version Domain mode Runs… Continue reading Suggested Exchange pre-requisites

Sample Server Configurations

Sample Server Configurations Server Type Reference Description Lab Implementation 1 Dual P3, with 2Gb of RAM, 2 18GB disks for OS 4 NIC ports, 1 Remote Mgmt Port HP DL360G2 (2 – PIII 1.266Ghz) with NC3134 dual port card, 2 10KRPM 18GB drives, iLO Mgmt Port 2 Dual P4, with 2Gb of RAM, 2 18GB… Continue reading Sample Server Configurations

Event Viewer Log Review

It is important to frequently check the XP / Vista and Server Event Viewer to review log files for possible security concerns. It is optimal to log a minimum of seven days of activity in the application, system, and security logs. In order to maintain the information for seven days, users need to increase the… Continue reading Event Viewer Log Review

Legacy – PC Various Hardware speeds

  Service Value Units ECP/EPP PC to PC Connection (Parallel Port) 2 Mbps ATA Hard Drive PIO Mode 0 3.33 Mbps ATA Hard Drive PIO Mode 1 5.22 Mbps Asymmetric Digital Subscriber Line (ADSL) Downstream 6 Mbps ATA Hard Drive PIO Mode 2 8.33 Mbps ATA Hard Drive PIO Mode 3 11.11 Mbps Universal Serial… Continue reading Legacy – PC Various Hardware speeds

What is Single Sign-On

With Single Sign-On a user needs only one user ID and password this eliminates the security headaches and vulnerabilities associated with multiple IDs / passwords. This solution simplifies and frees security administrators from the mundane task of assigning passwords, enabling them to perform much more important tasks that directly impact the success of your. Single… Continue reading What is Single Sign-On

IAM Useful Glossary

Access Control An access control limits the use of a resource. Only those people, programs or devices that are specifically permitted to use the resource will have access. In addition, an access control will usually limit use to specific types of access; someone can read a file but not change it, for example. Access Management… Continue reading IAM Useful Glossary

Sample SSO Deployment

Process / Functional Requirements Functionality: Users should login only once to their PC.  Then be able to access all applications without logging in again. If integration of Single Sign On solution is not possible with NT domain/AD, users should be able to log into one application and be automatically authenticated for others. Log Out: User… Continue reading Sample SSO Deployment

Sample Visio – IAM Deployment Process

The first step in implementing an identity management solution is identifying business objectives, policies and strategies both current and future.  next, a complete evaluation of the identity repositories, current identity management implementations (i.e., synchronizing messaging and desktop Ids), political boundaries and current vendor capital investments and loyalty.  This is needed to determine the type, value… Continue reading Sample Visio – IAM Deployment Process

Knowledge Management Key Points

Regulators have updated Contingency Planning guidance since 9-11.  Financial institutions should ensure that Disaster Recovery and contingency include any new requirements. Financial institutions should compare federal and state regulatory requirements to ensure more stringent requirements are adequately addressed. Review existing plans to ensure natural area, building complex and terrorist events are considered. Make sure plans… Continue reading Knowledge Management Key Points

Sample – Nokia IPSO Alert Table

NICAlert-Nokia IPSO (4.2) Conn Table Full: Host.Unix: Field Results View Name Nokia IPSO Conn Table Full Date / Time NIC Domain NIC Site / Location Event Category System.Errors Current Severity Low (1/5) Peak Severity Low (1/5) Peak Time Trend No Change (0.00%) Count 0 Device Name Device IP Device Class Host.Unix Device Type Source IP… Continue reading Sample – Nokia IPSO Alert Table

UNIX sed Commands

Unix sed Commands  sed ‘s/wizard/guru/g’ file1                   replaces every occurrence of the string wizard with the string guru sed -n ‘s/wizard/guru/gp’ file1              replaces and prints only those lines where the substitution was                                                              made  -n print only when command p is given sed ‘/Comment:/d’ file1                          deletes all the lines that contain Comment: from the file. sed… Continue reading UNIX sed Commands