Difference between revisions of "Active Directory/Security Policies"
Line 8: | Line 8: | ||
==WOLFTECH Group Policies== | ==WOLFTECH Group Policies== | ||
− | + | Details of these policies are restricted to authorized Systems Administrators - [mailto:ecehelp@ncsu.edu?subject=Access%20WolfTech%20AD%20Docs request access] | |
<php> | <php> |
Revision as of 17:26, 27 February 2006
Virtually every organization that uses computers has information it wants to protect. Public companies, financial institutions, and healthcare organizations are under particular regulatory pressure to harden their systems against attack.
Yet according to the CERT Coordination Center operated by Carnegie Mellon University, most network intrusions occur through known exploits where countermeasures were available, primarily software updates.
Our goal is to maximize our customers' security by following the most resilient and least vulnerable security policies wherever possible. We are dedicated to working with our customers to create systems with greater resistance to attack - even if updates have not been installed or are not available - while balancing their everyday computing uses and needs.
WOLFTECH Group Policies
Details of these policies are restricted to authorized Systems Administrators - request access
<php> require_once('main.inc'); list_ad_policies(); </php>