Network Archives - ADSploit https://adsploit.com/tag/network/ Powered by CionSystems inc Tue, 07 Oct 2008 00:54:27 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.4 https://adsploit.com/wp-content/uploads/2022/08/icon-36x36.png Network Archives - ADSploit https://adsploit.com/tag/network/ 32 32 Server 2008 Backup https://adsploit.com/server-2008-backup/ https://adsploit.com/server-2008-backup/#respond Tue, 07 Oct 2008 00:54:27 +0000 http://www.cionsystems.com/blogNEW_version/?p=28 Recently, someone asked about that Windows Server 2008 Backup feature and I wanted to include a quick note about it on the blog as well. The Windows Server 2008 Backup feature can be installed separately, and has a couple of subsets- Windows Server Backup and Command-line Tools. Through the helpful interface you can run your […]

The post Server 2008 Backup appeared first on ADSploit.

]]>
Recently, someone asked about that Windows Server 2008 Backup feature and I wanted to include a quick note about it on the blog as well.
The Windows Server 2008 Backup feature can be installed separately, and has a couple of subsets- Windows Server Backup and Command-line Tools. Through the helpful interface you can run your scheduled backups, but there are some changes worth noting:
-only direct attached storage (disks) with NTFS formatted volumes can be backed up
-you can only select to do a backup for an entire disk volume (even if you choose the Custom backup type). Yeah, it’s an all-or-nothing type of deal
-you can’t pick individual files, folders or Windows system state for backup
-you need to have a different location for your target backup
-you can no longer perform a backup to tape
Windows Server 2008 Backup has many new features and Microsoft does a good job of outlining them in the on-line help- check it out for more on this topic.

The post Server 2008 Backup appeared first on ADSploit.

]]>
https://adsploit.com/server-2008-backup/feed/ 0
Identity and access management policies https://adsploit.com/identity-and-access-management-policies/ https://adsploit.com/identity-and-access-management-policies/#respond Tue, 07 Oct 2008 00:40:04 +0000 http://www.cionsystems.com/blogNEW_version/?p=15 In many cases, adding personnel accounts and application is tedious, and involves inputting information about a new hire by hand, which could take days in some instances. Even then, some users may not have access to the applications they need, and often will have to log in using a colleague’s name and password while access […]

The post Identity and access management policies appeared first on ADSploit.

]]>
In many cases, adding personnel accounts and application is tedious, and involves inputting information about a new hire by hand, which could take days in some instances. Even then, some users may not have access to the applications they need, and often will have to log in using a colleague’s name and password while access was requested, cleared and granted. This is a huge security black hole for the enterprise. Implementing identity and access management software is a security process improvement that is essential in today’s corporate environment.
Identity and access management can also play a role in compliance issues. Using the native tools, all the audits involve the manual process of finding out who had access to what? Who authorized that access? When was it authorized? When was the last time they reset their password? Using an identity and access management application like the Active Directory Manager or the Active Directory Reporter will vastly improve and automate your audit process.
You may think a departed employee is gone forever, but if your organization doesn’t have a comprehensive identity and access management plan, you may be in trouble. Disabling user accounts during the employee termination process is a gaping flaw in most companies. Weeks, months and even years after an employee has left you can still see their names and personal information floating around. Compounding this security breach is the fact that in some cases, former employees’ accounts are still active. This access crisis can also happen when an employee changes jobs within the same company, but retains access to applications and information that isn’t appropriate for their new job anymore. If an identity and access management policy is too lax, it can create data loss and security breaches, and if the policy is too strict, employees who need access will simply find a way around it and defy the set policy.
If you’d like to talk more about the identity and access management policies in place at your company, please contact us directly.

The post Identity and access management policies appeared first on ADSploit.

]]>
https://adsploit.com/identity-and-access-management-policies/feed/ 0