Security Basics mailing list archives

Re: Help with guidlines


From: "Chris Barber" <cmbarber () gmail com>
Date: Fri, 8 Dec 2006 08:46:49 -0700

Sorry for the confusion,  I am looking for help with Best Practice
guides on how to handle PCs that come in for services where the status
in unknown.  Most often these are the "Road Warrior" Laptops.

New computers I am working on changing the methods they use.  I have
plenty of ideas and background to work with in house. The Outbreak
issue is not an issue either as I have management on my side.

Chris.

On 12/7/06, Justin Lintz <jlintz () gmail com> wrote:
Im sorry but maye I missed this in your email. But guidelines for
what?  Handling 50 infected machines?  Setting up 50 new laptops?
What are you looking for here?

On 12/6/06, Chris Barber <cmbarber () gmail com> wrote:
> Hi all,
>
> First I would like to apologize if this has been asked and answered on
> the list before.
>
> Here is my situation:  I work for a very large organization with
> several "IT Departments".  There is the Enterprise IT staff and they
> are in charge of all services and functions that are company wide,
> E-Mail, Internet Access, Network infrastructure, Network security,
> etc.  The other departments then have there own LAN Admin staff that
> handle the day to day network activities.  I am relatively new to the
> company and have recently learned that the LAN Admin staff for the
> different departments all handle things in their own way, not always
> following best practices.
>
> The latest disaster was just a few days ago when our sales dept. LAN
> admins were setting up 50 new laptops for the sales force.  All 50
> laptops were on the network while 3 LAN Admins rotated from unit to
> unit installing updates and new software.  Don't ask me why they were
> doing this the hard way, but they were.  Now, one of the LAN admins
> from Product development came to me with an issue he was having with a
> programmers Laptop.  The Programmer brought it in and said that it was
> "Acting funny".  When I asked him what he had done so far, his
> response was "After connecting it to the network, I looked at the DHCP
> settings, then started a defrag, and poked around in the control
> panel, Add/remove programs, etc.  I have been working on the PC for
> several hours now, and..."
>
> My jaw hit the floor.  Yeah, we now have 50 brand spanking new Laptops
> hot off the truck from Dell, all of them infected with... well as it
> turns out only 5 different virus/worms.
>
> Enough of my ramblings and to the point of my E-Mail to the group...
> Does anyone have a set of written guidelines or whathaveyou that they
> would be willing to share with me and/or the group or point me in the
> direction of a web site that has something to get me started it would
> be most appreciated.
>
> Thanks in advance
> (Professionally Frustrated)
> Chris.
>
> ---------------------------------------------------------------------------
> This list is sponsored by: ByteCrusher
>
> Detect Malicious Web Content and Exploits in Real-Time.
> Anti-Virus engines can't detect unknown or new threats.
> LinkScanner can. Web surfing just became a whole lot safer.
>
> http://www.explabs.com/staging/promotions/xern_lspro.asp?loc=sfmaildetect
> ---------------------------------------------------------------------------
>
>


--
- Justin Lintz


---------------------------------------------------------------------------
This list is sponsored by: ByteCrusher

Detect Malicious Web Content and Exploits in Real-Time.
Anti-Virus engines can't detect unknown or new threats.
LinkScanner can. Web surfing just became a whole lot safer.

http://www.explabs.com/staging/promotions/xern_lspro.asp?loc=sfmaildetect
---------------------------------------------------------------------------


Current thread: