Guest Nedd Posted August 18, 2008 Posted August 18, 2008 We have one-place branch office and we'd like to create security analysis of our services, checking procedures and make new procedures and rules. As first step we'll run Microsoft Best Practices Analyzers (for Exchange, GPO, SharePoint, SystemStateAnalyzer, ...) and follow Microsoft Instrastructure Optimization to identify our currently position in IT software and hardware world. Can you please advice any other SW / procedure to follow formal procedure...? p.s. sorry for crosspoting Thnx.
Guest Ed Crowley [MVP] Posted August 18, 2008 Posted August 18, 2008 Re: Security analysis You might also run NETDIAG and DCDIAG. -- Ed Crowley MVP "There are seldom good technological solutions to behavioral problems." .. "Nedd" <Nedd@cj.com> wrote in message news:%2312ZHaSAJHA.3804@TK2MSFTNGP05.phx.gbl... > We have one-place branch office and we'd like to create security analysis > of our services, checking procedures and make new procedures and rules. > > As first step we'll run Microsoft Best Practices Analyzers (for Exchange, > GPO, SharePoint, SystemStateAnalyzer, ...) and follow Microsoft > Instrastructure Optimization to identify our currently position in IT > software and hardware world. > > Can you please advice any other SW / procedure to follow formal > procedure...? > > p.s. sorry for crosspoting > > Thnx. > >
Guest Nedd Posted August 18, 2008 Posted August 18, 2008 Re: Security analysis OK, that's fine, what else....? Any security auditing software? "Ed Crowley [MVP]" <curspice@nospam.net> wrote in message news:eBlI5FWAJHA.2056@TK2MSFTNGP05.phx.gbl... > You might also run NETDIAG and DCDIAG. > -- > Ed Crowley MVP > "There are seldom good technological solutions to behavioral problems." > . > > "Nedd" <Nedd@cj.com> wrote in message > news:%2312ZHaSAJHA.3804@TK2MSFTNGP05.phx.gbl... >> We have one-place branch office and we'd like to create security analysis >> of our services, checking procedures and make new procedures and rules. >> >> As first step we'll run Microsoft Best Practices Analyzers (for Exchange, >> GPO, SharePoint, SystemStateAnalyzer, ...) and follow Microsoft >> Instrastructure Optimization to identify our currently position in IT >> software and hardware world. >> >> Can you please advice any other SW / procedure to follow formal >> procedure...? >> >> p.s. sorry for crosspoting >> >> Thnx. >> >> > >
Guest Ed Crowley [MVP] Posted August 18, 2008 Posted August 18, 2008 Re: Security analysis Perhaps a security auditing newsgroup might know. -- Ed Crowley MVP "There are seldom good technological solutions to behavioral problems." .. "Nedd" <Nedd@cj.com> wrote in message news:eK$7utWAJHA.524@TK2MSFTNGP06.phx.gbl... > OK, that's fine, what else....? > Any security auditing software? > > > > "Ed Crowley [MVP]" <curspice@nospam.net> wrote in message > news:eBlI5FWAJHA.2056@TK2MSFTNGP05.phx.gbl... >> You might also run NETDIAG and DCDIAG. >> -- >> Ed Crowley MVP >> "There are seldom good technological solutions to behavioral problems." >> . >> >> "Nedd" <Nedd@cj.com> wrote in message >> news:%2312ZHaSAJHA.3804@TK2MSFTNGP05.phx.gbl... >>> We have one-place branch office and we'd like to create security >>> analysis of our services, checking procedures and make new procedures >>> and rules. >>> >>> As first step we'll run Microsoft Best Practices Analyzers (for >>> Exchange, GPO, SharePoint, SystemStateAnalyzer, ...) and follow >>> Microsoft Instrastructure Optimization to identify our currently >>> position in IT software and hardware world. >>> >>> Can you please advice any other SW / procedure to follow formal >>> procedure...? >>> >>> p.s. sorry for crosspoting >>> >>> Thnx. >>> >>> >> >> > >
Guest Nedd Posted August 19, 2008 Posted August 19, 2008 Re: Security analysis Microsoft.public.security or....? "Ed Crowley [MVP]" <curspice@nospam.net> wrote in message news:uptQiFYAJHA.5900@TK2MSFTNGP04.phx.gbl... > Perhaps a security auditing newsgroup might know. > -- > Ed Crowley MVP > "There are seldom good technological solutions to behavioral problems." > . > > "Nedd" <Nedd@cj.com> wrote in message > news:eK$7utWAJHA.524@TK2MSFTNGP06.phx.gbl... >> OK, that's fine, what else....? >> Any security auditing software? >> >> >> >> "Ed Crowley [MVP]" <curspice@nospam.net> wrote in message >> news:eBlI5FWAJHA.2056@TK2MSFTNGP05.phx.gbl... >>> You might also run NETDIAG and DCDIAG. >>> -- >>> Ed Crowley MVP >>> "There are seldom good technological solutions to behavioral problems." >>> . >>> >>> "Nedd" <Nedd@cj.com> wrote in message >>> news:%2312ZHaSAJHA.3804@TK2MSFTNGP05.phx.gbl... >>>> We have one-place branch office and we'd like to create security >>>> analysis of our services, checking procedures and make new procedures >>>> and rules. >>>> >>>> As first step we'll run Microsoft Best Practices Analyzers (for >>>> Exchange, GPO, SharePoint, SystemStateAnalyzer, ...) and follow >>>> Microsoft Instrastructure Optimization to identify our currently >>>> position in IT software and hardware world. >>>> >>>> Can you please advice any other SW / procedure to follow formal >>>> procedure...? >>>> >>>> p.s. sorry for crosspoting >>>> >>>> Thnx. >>>> >>>> >>> >>> >> >> > >
Recommended Posts