Home page logo
/

basics logo Security Basics mailing list archives

RE: Laptop security
From: "Nick Duda" <nduda () VistaPrint com>
Date: Mon, 26 Feb 2007 10:40:14 -0500

Cached domain profiles. All our mobile users log into the laptops with
cached domain profiles.

-----Original Message-----
From: listbounce () securityfocus com [mailto:listbounce () securityfocus com]
On Behalf Of WALI
Sent: Saturday, February 24, 2007 1:24 AM
To: Anzaldo, Oscar
Cc: security-basics () securityfocus com
Subject: RE: Laptop security

Hi

An unrelated question on laptop security but would be glad if someone
could 
answer. What's the usual practise when it comes to assigning local 
usernames and passwords. Should the users be given local administrator 
accounts? If laptops are part of domain, how can the users continue to 
logon from their homes when there is no domain available and they do not

have local accounts on laptops?


At 05:09 PM 2/21/2007 -0600, Anzaldo, Oscar wrote:
Besides best practices suh as Keningston Cable security lock, disk
parity encryption, admin user renamed, a very effective way to prevent
robbery, is to assign the laptop with a legal document signed by the
user making them responsible for the asset, if the user get stole or
"lost" their laptop then they should pay for the value of the laptop.
Being aware does not make a user responsible but does when you charge
back them for the price.

Cheers

Oscar





On 19-Feb-07, at 10:39 PM, Badhrinath S wrote:

Hello all,

 Apart from data encryption, insurance and user awareness can anyone
let me know other risk mitigation policies against laptop theft ?

--
Thanks
Badhri




-----------------------------------------------------------------------
----
This list is sponsored by: BigFix

If your IT fails, you're out of business - or worse.  Arm your
enterprise with BigFix, the single converged IT security and operations
engine. BigFix enables continuous discovery, assessment, remediation,
and enforcement for complex and distributed IT environments in
real-time
from a single console.
Think what's next. Think BigFix.

http://ad.doubleclick.net/clk;82309979;15562032;o?http://www.bigfix.com
/ITNext/
-----------------------------------------------------------------------
----


------------------------------------------------------------------------
---
This list is sponsored by: BigFix

If your IT fails, you're out of business - or worse.  Arm your 
enterprise with BigFix, the single converged IT security and operations 
engine. BigFix enables continuous discovery, assessment, remediation, 
and enforcement for complex and distributed IT environments in real-time

from a single console.
Think what's next. Think BigFix. 

http://ad.doubleclick.net/clk;82309979;15562032;o?http://www.bigfix.com/
ITNext/
------------------------------------------------------------------------
---


---------------------------------------------------------------------------
This list is sponsored by: BigFix

If your IT fails, you're out of business - or worse.  Arm your
enterprise with BigFix, the single converged IT security and operations
engine. BigFix enables continuous discovery, assessment, remediation,
and enforcement for complex and distributed IT environments in real-time
from a single console.
Think what's next. Think BigFix.

http://ad.doubleclick.net/clk;82309979;15562032;o?http://www.bigfix.com/ITNext/
---------------------------------------------------------------------------


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]