Windows XP Admin Tips ~ network ~34. You may also want to add users to Administrator or other groups for shared folderaccess. Under Computer Management, scroll to Local Users and Groups. To add user toAdministrator group, select the group name and choose Add from Action menu. This canalso be used to add domain users as local admins.Sharing files on computers directly connected to Internet is not recommended. However,restrict access to specific users using above procedure mitigates security risks.
4. Map Your Network For Better Protection and Incident Response
Mar 07, 2005
Last Modified on
Apr 01, 2005
Last Modified by
.It is difficult to protect devices that you don't even know exist. In larger enterprises it isvery easy to lose track of the asset inventory which leads to complacency about roguedevices. In order to effectively protect the network and to respond to incidents efficiently,an updated asset inventory and network map should always be handy.In an enterprise network with thousands or even tens of thousands of devices, it seemslike assets are constantly coming and going. When a site or department administrator seesa new device they are likely to be complacent and simply assume that it belongs tosomeone else in the enterprise rather than being suspicious of the rogue device.Rogue or unknown devices that are added to the network are often missed in patch andsecurity update deployments and they can be a constant source of headaches when itcomes to trying to proactively protect and defend a large enterprise network.If a security incident does occur, an updated and logically organized asset inventory,combined with a current and accurate network map will make response and forensicinvestigation that much simpler. If a 3rd-party or law enforcement agencies are involvedthey will need an overview of the network architecture and environment in order toconduct an investigation.Policies should be written to define how new assets are added to the inventory and thesteps that must be taken to include them on the asset inventory and network map prior to joining the network. But, no matter how foolproof that policy may be, it is virtuallyinevitable that new, rogue devices will eventually appear on the network.To detect the rogue devices and fight to enforce the policy and ward off complacency,you can run periodic scans of the network using any of a wide variety of tools that canscan and report back information regarding the network and the devices attached. Manyof the tools will report the IP address, MAC address, type of device or operating systemand more. Below are a few tools you can consider for network mapping:Today is the best day to learn new things, try hard as much as u can.