Questions tagged [administration]

65 questions
39
votes
4 answers

Microsoft email servers "require remote control of Android device security features"

Just tried to set up my student email address with the default email client on my Android device. The email servers used by the university are outlook.office365.com (incoming) and smtp.office365.com (outgoing). So I set it up like I always do with a…
voices
  • 1,649
  • 7
  • 22
  • 36
26
votes
7 answers

How to prevent admins to access logs from their own activity?

The idea would be to prevent an attacker who has stolen a root/admin account or escalated to clear his own activities or even read the traces of what he is doing. Let's assume we are under Linux, we log with auditd, have centralized logs, and we can…
lalebarde
  • 587
  • 1
  • 5
  • 13
11
votes
3 answers

Can admin see my password when I enter it?

If the admin is a super user, nothing can prevent them from installing anything on my host, including keystroke logger. Are there any security mechanisms that can protect my account against that?
Draif Kroneg
  • 263
  • 2
  • 5
8
votes
2 answers

Is it acceptable for security engineers to have admin access to production servers?

In my organization, our server infrastructure team has historically held all admin access to production servers. We're recently trying to strengthen our security posture, so we have hired several new security engineers. We are investing significant…
loneboat
  • 1,434
  • 1
  • 12
  • 16
6
votes
2 answers

Securely granting local administrative permissions

I’ve been researching the best method of securely granting local administrative permissions but I’m really struggling to reconcile the security, operational, and cost implications. I’ve devised a few options: Create a domain security group (PC…
mythofechelon
  • 217
  • 1
  • 11
5
votes
1 answer

How can I objectively evaluate trust in a person? (Systems Admin, or other)

When recruiting for positions that require a level of integrity and trust, I'm looking for objective ways of accessing that, either positively or negatively. Is there any any guidance one should use for accessing an individual's propensity for…
makerofthings7
  • 50,090
  • 54
  • 250
  • 536
5
votes
6 answers

What is a good data encryption strategy for a shared resource(text)?

I have a use case where I need to encrypt a piece of PII information in a database, which then can be decrypted and accessed by multiple user roles in an application (e.g the user it belongs to, customer service, engineering, etc.. ). What is an…
5
votes
2 answers

Isn't separating privileges less useful on a PC, as all my critical data is in my normal user account?

Separating privileges, i.e using a non-admin account and escalating only when needed, seems to be something everyone agrees on. I can roughly understand why it's important on every system : prevent an attacker from modifying the system and taking…
Hey
  • 1,905
  • 1
  • 16
  • 23
4
votes
1 answer

Securing administration network

We would like to secure our administration network from advanced persistant threats and also from rogue administrators. I have already read the best practices from SANS Institute, NSA or other guides. We have separate physical networks for…
r00t
  • 1,104
  • 8
  • 16
4
votes
1 answer

How does one typically monitor their privileged admins encrypted SSH & RDP sessions?

From a compliance (& perhaps just for pure due-diligence) standpoint, what do IT departments typically deploy to keep an eye on their privileged administrator's remote access sessions? Also what's the standard when it comes to security procedures…
user88092
  • 41
  • 1
3
votes
2 answers

What are the security risks to have admin rights for a user account on Windows 10?

I am considering the security risks to have a standard user added to the Administrators group on an enterprise Windows 10 machine that is dedicated to that user. This is related to security only, so breaking the OS of a wrong manipulation,…
WoJ
  • 8,957
  • 2
  • 32
  • 51
3
votes
2 answers

Applying "principle of least privilege" when it comes to execs and owners of the company - should they automatically get all permissions if requested?

As an administrator of certain systems in a company I understand and adhere to the "principle of least privilege" -- which I'm assuming I don't need to repeat its definition here, so let's just say people here get given access to systems only in…
c1864473
  • 31
  • 2
3
votes
2 answers

When is an email rejected?

Currently, I am working on a web application and wanted to let users send emails to others through a web form. So, they just should submit their email address and my web app would then send mails to others with their email in the FROM header. Well,…
Aliquis
  • 769
  • 1
  • 7
  • 12
3
votes
1 answer

How can I ensure higher levels of privacy when hosting others' emails?

I can set up my own email server, and quite happy with it, using standard open source components - postfix, roundcube, etc on top of HardenedBSD or OpenBSD. I'd like to offer the use of my email server to friends and family, as some of them have…
Stilez
  • 1,664
  • 8
  • 13
3
votes
1 answer

Central console antivirus for Linux computers in LAN or equivalent solution

In our company, we need by policy AVs on every developers' Linux (Mint) computers. Right now we have ClamAV running on them, daily scheduled scans and every developer manually sends the report log to the SecMan. Not ideal. I'd like to know if a…
jonayreyes
  • 131
  • 3
1
2 3 4 5