Try the opposite tact, think like a firewall. List what is permitted. If it is not permitted, it's blocked.
Permitted - company data/information company purchased software/applications. Boom, done. On Wed, Dec 3, 2008 at 1:43 PM, Ziots, Edward <[EMAIL PROTECTED]> wrote: > Well I guess I finally got my wish and after much fire-fighting I am > going to be able to write the Server Disk Space usage policy for my > organization. > > > > I am looking for some things that you all block from your servers or have > in your disk space usage policies at your sites. > > > > Here are some of the items I already have in mind. > > > > 1) Personal Photos ( Prohibitied) > > 2) Music (Prohibited DCMA violation) > > 3) Quota Management > > 4) Unauthorized Software (Not purchased through the > company/organization) > > 5) Unauthorized Applications (Not Purchased through the > company/organization) > > > > Anything else you can come up to mind that would definitely help. > > > > Z > > > > Edward E. Ziots > > Network Engineer > > Lifespan Organization > > Email: [EMAIL PROTECTED] > > Phone: 401-639-3505 > > MCSE, MCP+I, ME, CCA, Security +, Network + > > > > > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~