Jump to content

Recommended Posts

Posted

We have one-place branch office and we'd like to create security analysis of

our services, checking procedures and make new procedures and rules.

 

As first step we'll run Microsoft Best Practices Analyzers (for Exchange,

GPO, SharePoint, SystemStateAnalyzer, ...) and follow Microsoft

Instrastructure Optimization to identify our currently position in IT

software and hardware world.

 

Can you please advice any other SW / procedure to follow formal

procedure...?

 

p.s. sorry for crosspoting

 

Thnx.

  • Replies 4
  • Created
  • Last Reply
Guest Ed Crowley [MVP]
Posted

Re: Security analysis

 

You might also run NETDIAG and DCDIAG.

--

Ed Crowley MVP

"There are seldom good technological solutions to behavioral problems."

..

 

"Nedd" <Nedd@cj.com> wrote in message

news:%2312ZHaSAJHA.3804@TK2MSFTNGP05.phx.gbl...

> We have one-place branch office and we'd like to create security analysis

> of our services, checking procedures and make new procedures and rules.

>

> As first step we'll run Microsoft Best Practices Analyzers (for Exchange,

> GPO, SharePoint, SystemStateAnalyzer, ...) and follow Microsoft

> Instrastructure Optimization to identify our currently position in IT

> software and hardware world.

>

> Can you please advice any other SW / procedure to follow formal

> procedure...?

>

> p.s. sorry for crosspoting

>

> Thnx.

>

>

Posted

Re: Security analysis

 

OK, that's fine, what else....?

Any security auditing software?

 

 

 

"Ed Crowley [MVP]" <curspice@nospam.net> wrote in message

news:eBlI5FWAJHA.2056@TK2MSFTNGP05.phx.gbl...

> You might also run NETDIAG and DCDIAG.

> --

> Ed Crowley MVP

> "There are seldom good technological solutions to behavioral problems."

> .

>

> "Nedd" <Nedd@cj.com> wrote in message

> news:%2312ZHaSAJHA.3804@TK2MSFTNGP05.phx.gbl...

>> We have one-place branch office and we'd like to create security analysis

>> of our services, checking procedures and make new procedures and rules.

>>

>> As first step we'll run Microsoft Best Practices Analyzers (for Exchange,

>> GPO, SharePoint, SystemStateAnalyzer, ...) and follow Microsoft

>> Instrastructure Optimization to identify our currently position in IT

>> software and hardware world.

>>

>> Can you please advice any other SW / procedure to follow formal

>> procedure...?

>>

>> p.s. sorry for crosspoting

>>

>> Thnx.

>>

>>

>

>

Guest Ed Crowley [MVP]
Posted

Re: Security analysis

 

Perhaps a security auditing newsgroup might know.

--

Ed Crowley MVP

"There are seldom good technological solutions to behavioral problems."

..

 

"Nedd" <Nedd@cj.com> wrote in message

news:eK$7utWAJHA.524@TK2MSFTNGP06.phx.gbl...

> OK, that's fine, what else....?

> Any security auditing software?

>

>

>

> "Ed Crowley [MVP]" <curspice@nospam.net> wrote in message

> news:eBlI5FWAJHA.2056@TK2MSFTNGP05.phx.gbl...

>> You might also run NETDIAG and DCDIAG.

>> --

>> Ed Crowley MVP

>> "There are seldom good technological solutions to behavioral problems."

>> .

>>

>> "Nedd" <Nedd@cj.com> wrote in message

>> news:%2312ZHaSAJHA.3804@TK2MSFTNGP05.phx.gbl...

>>> We have one-place branch office and we'd like to create security

>>> analysis of our services, checking procedures and make new procedures

>>> and rules.

>>>

>>> As first step we'll run Microsoft Best Practices Analyzers (for

>>> Exchange, GPO, SharePoint, SystemStateAnalyzer, ...) and follow

>>> Microsoft Instrastructure Optimization to identify our currently

>>> position in IT software and hardware world.

>>>

>>> Can you please advice any other SW / procedure to follow formal

>>> procedure...?

>>>

>>> p.s. sorry for crosspoting

>>>

>>> Thnx.

>>>

>>>

>>

>>

>

>

Posted

Re: Security analysis

 

Microsoft.public.security or....?

 

 

"Ed Crowley [MVP]" <curspice@nospam.net> wrote in message

news:uptQiFYAJHA.5900@TK2MSFTNGP04.phx.gbl...

> Perhaps a security auditing newsgroup might know.

> --

> Ed Crowley MVP

> "There are seldom good technological solutions to behavioral problems."

> .

>

> "Nedd" <Nedd@cj.com> wrote in message

> news:eK$7utWAJHA.524@TK2MSFTNGP06.phx.gbl...

>> OK, that's fine, what else....?

>> Any security auditing software?

>>

>>

>>

>> "Ed Crowley [MVP]" <curspice@nospam.net> wrote in message

>> news:eBlI5FWAJHA.2056@TK2MSFTNGP05.phx.gbl...

>>> You might also run NETDIAG and DCDIAG.

>>> --

>>> Ed Crowley MVP

>>> "There are seldom good technological solutions to behavioral problems."

>>> .

>>>

>>> "Nedd" <Nedd@cj.com> wrote in message

>>> news:%2312ZHaSAJHA.3804@TK2MSFTNGP05.phx.gbl...

>>>> We have one-place branch office and we'd like to create security

>>>> analysis of our services, checking procedures and make new procedures

>>>> and rules.

>>>>

>>>> As first step we'll run Microsoft Best Practices Analyzers (for

>>>> Exchange, GPO, SharePoint, SystemStateAnalyzer, ...) and follow

>>>> Microsoft Instrastructure Optimization to identify our currently

>>>> position in IT software and hardware world.

>>>>

>>>> Can you please advice any other SW / procedure to follow formal

>>>> procedure...?

>>>>

>>>> p.s. sorry for crosspoting

>>>>

>>>> Thnx.

>>>>

>>>>

>>>

>>>

>>

>>

>

>


×
×
  • Create New...