Try the opposite tact, think like a firewall.  List what is permitted.  If
it is not permitted, it's blocked.

Permitted -
company data/information
company purchased software/applications.

Boom, done.



On Wed, Dec 3, 2008 at 1:43 PM, Ziots, Edward <[EMAIL PROTECTED]> wrote:

>  Well I guess I finally got my wish and after much fire-fighting I am
> going to be able to write the Server  Disk Space usage policy for my
> organization.
>
>
>
> I am looking for some things that you all block from your servers or have
> in your disk space usage policies at your sites.
>
>
>
> Here are some of the items I already have in mind.
>
>
>
> 1)       Personal Photos ( Prohibitied)
>
> 2)       Music (Prohibited DCMA violation)
>
> 3)       Quota Management
>
> 4)       Unauthorized Software (Not purchased through the
> company/organization)
>
> 5)       Unauthorized Applications (Not Purchased through the
> company/organization)
>
>
>
> Anything else you can come up to mind that would definitely help.
>
>
>
> Z
>
>
>
> Edward E. Ziots
>
> Network Engineer
>
> Lifespan Organization
>
> Email: [EMAIL PROTECTED]
>
> Phone: 401-639-3505
>
> MCSE, MCP+I, ME, CCA, Security +, Network +
>
>
>
>
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to