ROFL!

Dude, bots and worms on infected laptops are one of the biggest
infection vectors on company networks.

Those things are just *looking* for other machines to hammer on.

And that's aside from the issue of moronic consultants and such who
will surreptitiously scan your subnets - just looking around, ya know.

Kurt

On Mon, Dec 7, 2009 at 13:29, Dennis Krebs <dennis.kr...@advancedav.com> wrote:
> Is there really a concern if the user never authenticates with a domain
> controller and thus doesn’t have permissions to do anything?
>
>
>
> --
>
> Dennis Krebs
>
> 610-696-7700 x193
>
>
>
> From: David Lum [mailto:david....@nwea.org]
> Sent: Monday, December 07, 2009 11:45 AM
> To: NT System Admin Issues
> Subject: Consultant PC on your network
>
>
>
> What process do you guys use for allowing a consultant to put their PC on
> your “wire”? Surely there are some questions needing to be asked, like does
> it have AV and is patched, probably need to make sure it’s not running some
> DHCP or other service that might disrupt your network, right?
>
> David Lum // SYSTEMS ENGINEER
> NORTHWEST EVALUATION ASSOCIATION
> (Desk) 971.222.1025 // (Cell) 503.267.9764
>
>
>
>
>
>
>
>
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to