By Adesh Rampat
There maybe times when a network administrator needs to grant a partner, such as a company to which the organization has outsourced some IT function, access to the organization's network. You might have to do this to allow the partner to perform an application fix to some malfunctioning program, for example. You can grant the partner company access to your organization's network via a Remote Access Service. Then you can join the partner company's workstation to the organization's domain. But when you do that, you have to remember that you have just let an entity onto your network about whom you know very little. And when joining a Windows workstation to a domain, remember that you have created a special trust relationship between the domain and the workstation. Consequently, there are some very important points to keep in mind when granting an outsource or other partner company access to your network: 1. The User Account
Make sure that you restrict access to files for this user account. This account doesn't need access to everything on the servers. It only needs access to those files/folders that bear on the work the account will be doing. Failure to restrict access will widen the security hole that you have by allowing this workstation on your network at all. 3. Finally...
Ensure that the partner company's workstation runs the latest antivirus software. You don't need to get some broken piece of software repaired, or other maintenance function performed, only to introduce some virus into your network. About the author:
Adesh Rampat has 10 years of experience with network and IT administration. He is a member of the Association of Internet Professionals, the Institute for Network Professionals and the International Webmasters Association. He has also lectured extensively on a variety of topics.
Related book Hacking Exposed Windows 2000: Network Security Secrets and Solutions
By Joel Scambray and Stuart McClure
Online Price: $49.99
Publisher Name: Osborne
Published: Sept. 2001
This book will teach you, step-by-step, how to defend against the latest attacks by understanding how intruders enter and pilfer compromised networks. Renowned security experts and best-selling authors Joel Scambray and Stuart McClure provide examples of real-world hacks, from the mundane to the sophisticated, and detailed countermeasures to protect against them.