Before buying any security product, you should configure the OS properly and by doing this, most of the security concerns are handled.
Configuring the OS would include the following:
Configuring the OS would include the following:
- Complex passwords
- Disabling default accounts
- Closing inbound ports
- Sacrificing management for the sake of security. use agents instead of poll. That will allow you to close the
- Consider outbound firewall
- Making users run their day-to-day programs using user privilege and limiting admin privilege use to minimum
- Disabling unused services
- Limiting the installed software
- Control on browser capabilities and tightening its policy
- Good audit policy
- Encrypting media and drives
No comments:
Post a Comment