ROFL! Dude, bots and worms on infected laptops are one of the biggest infection vectors on company networks.
Those things are just *looking* for other machines to hammer on. And that's aside from the issue of moronic consultants and such who will surreptitiously scan your subnets - just looking around, ya know. Kurt On Mon, Dec 7, 2009 at 13:29, Dennis Krebs <dennis.kr...@advancedav.com> wrote: > Is there really a concern if the user never authenticates with a domain > controller and thus doesn’t have permissions to do anything? > > > > -- > > Dennis Krebs > > 610-696-7700 x193 > > > > From: David Lum [mailto:david....@nwea.org] > Sent: Monday, December 07, 2009 11:45 AM > To: NT System Admin Issues > Subject: Consultant PC on your network > > > > What process do you guys use for allowing a consultant to put their PC on > your “wire”? Surely there are some questions needing to be asked, like does > it have AV and is patched, probably need to make sure it’s not running some > DHCP or other service that might disrupt your network, right? > > David Lum // SYSTEMS ENGINEER > NORTHWEST EVALUATION ASSOCIATION > (Desk) 971.222.1025 // (Cell) 503.267.9764 > > > > > > > > > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~