Questions tagged [administration]
65 questions
39
votes
4 answers
Microsoft email servers "require remote control of Android device security features"
Just tried to set up my student email address with the default email client on my Android device. The email servers used by the university are outlook.office365.com (incoming) and smtp.office365.com (outgoing). So I set it up like I always do with a…
voices
- 1,649
- 7
- 22
- 36
26
votes
7 answers
How to prevent admins to access logs from their own activity?
The idea would be to prevent an attacker who has stolen a root/admin account or escalated to clear his own activities or even read the traces of what he is doing. Let's assume we are under Linux, we log with auditd, have centralized logs, and we can…
lalebarde
- 587
- 1
- 5
- 13
11
votes
3 answers
Can admin see my password when I enter it?
If the admin is a super user, nothing can prevent them from installing anything on my host, including keystroke logger. Are there any security mechanisms that can protect my account against that?
Draif Kroneg
- 263
- 2
- 5
8
votes
2 answers
Is it acceptable for security engineers to have admin access to production servers?
In my organization, our server infrastructure team has historically held all admin access to production servers. We're recently trying to strengthen our security posture, so we have hired several new security engineers. We are investing significant…
loneboat
- 1,434
- 1
- 12
- 16
6
votes
2 answers
Securely granting local administrative permissions
I’ve been researching the best method of securely granting local administrative permissions but I’m really struggling to reconcile the security, operational, and cost implications.
I’ve devised a few options:
Create a domain security group (PC…
mythofechelon
- 217
- 1
- 11
5
votes
1 answer
How can I objectively evaluate trust in a person? (Systems Admin, or other)
When recruiting for positions that require a level of integrity and trust, I'm looking for objective ways of accessing that, either positively or negatively.
Is there any any guidance one should use for accessing an individual's propensity for…
makerofthings7
- 50,090
- 54
- 250
- 536
5
votes
6 answers
What is a good data encryption strategy for a shared resource(text)?
I have a use case where I need to encrypt a piece of PII information in a database, which then can be decrypted and accessed by multiple user roles in an application (e.g the user it belongs to, customer service, engineering, etc.. ).
What is an…
dwkd
- 221
- 1
- 8
5
votes
2 answers
Isn't separating privileges less useful on a PC, as all my critical data is in my normal user account?
Separating privileges, i.e using a non-admin account and escalating only when needed, seems to be something everyone agrees on. I can roughly understand why it's important on every system : prevent an attacker from modifying the system and taking…
Hey
- 1,905
- 1
- 16
- 23
4
votes
1 answer
Securing administration network
We would like to secure our administration network from advanced persistant threats and also from rogue administrators. I have already read the best practices from SANS Institute, NSA or other guides.
We have separate physical networks for…
r00t
- 1,104
- 8
- 16
4
votes
1 answer
How does one typically monitor their privileged admins encrypted SSH & RDP sessions?
From a compliance (& perhaps just for pure due-diligence) standpoint, what do IT departments typically deploy to keep an eye on their privileged administrator's remote access sessions? Also what's the standard when it comes to security procedures…
user88092
- 41
- 1
3
votes
2 answers
What are the security risks to have admin rights for a user account on Windows 10?
I am considering the security risks to have a standard user added to the Administrators group on an enterprise Windows 10 machine that is dedicated to that user. This is related to security only, so breaking the OS of a wrong manipulation,…
WoJ
- 8,957
- 2
- 32
- 51
3
votes
2 answers
Applying "principle of least privilege" when it comes to execs and owners of the company - should they automatically get all permissions if requested?
As an administrator of certain systems in a company I understand and adhere to the "principle of least privilege" -- which I'm assuming I don't need to repeat its definition here, so let's just say people here get given access to systems only in…
c1864473
- 31
- 2
3
votes
2 answers
When is an email rejected?
Currently, I am working on a web application and wanted to let users send emails to others through a web form. So, they just should submit their email address and my web app would then send mails to others with their email in the FROM header.
Well,…
Aliquis
- 769
- 1
- 7
- 12
3
votes
1 answer
How can I ensure higher levels of privacy when hosting others' emails?
I can set up my own email server, and quite happy with it, using standard open source components - postfix, roundcube, etc on top of HardenedBSD or OpenBSD.
I'd like to offer the use of my email server to friends and family, as some of them have…
Stilez
- 1,664
- 8
- 13
3
votes
1 answer
Central console antivirus for Linux computers in LAN or equivalent solution
In our company, we need by policy AVs on every developers' Linux (Mint) computers.
Right now we have ClamAV running on them, daily scheduled scans and every developer manually sends the report log to the SecMan. Not ideal.
I'd like to know if a…
jonayreyes
- 131
- 3