Difference between revisions of "Active Directory/Security Policies"

From WolfTech
Jump to navigation Jump to search
 
Line 1: Line 1:
 
{{Active_Directory_toc}}
 
{{Active_Directory_toc}}
 +
Virtually every organization that uses computers has information it wants to protect. Public companies, financial institutions, and healthcare organizations are under particular regulatory pressure to harden their systems against attack.
 +
 +
Yet according to the CERT Coordination Center operated by Carnegie Mellon University, most network intrusions occur through known exploits where countermeasures were available, primarily software updates.
 +
 +
Our goal is to maximize our customers' security by following the most resilient and least vulnerable security policies wherever possible. We are dedicated to working with our customers to create systems with greater resistance to attack - even if updates have not been installed or are not available - while balancing their everyday computing uses and needs.
 +
 +
<php>
 +
list_ad_policies();
 +
</php>

Revision as of 18:23, 27 February 2006

Virtually every organization that uses computers has information it wants to protect. Public companies, financial institutions, and healthcare organizations are under particular regulatory pressure to harden their systems against attack.

Yet according to the CERT Coordination Center operated by Carnegie Mellon University, most network intrusions occur through known exploits where countermeasures were available, primarily software updates.

Our goal is to maximize our customers' security by following the most resilient and least vulnerable security policies wherever possible. We are dedicated to working with our customers to create systems with greater resistance to attack - even if updates have not been installed or are not available - while balancing their everyday computing uses and needs.

<php> list_ad_policies(); </php>