Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Use of laptops by students within college on a w2k network

Posted on 2003-03-03
8
Medium Priority
?
335 Views
Last Modified: 2013-12-04
Anyone have any suggestions on how to tighten down the security for students bringing in their laptops into the college. I am worried about students being able to run any application they like on their own machines which could adversely effect the network, or deliberate hacks. It's fine when we can control what the student can see and what apps they run, but when they've got an open playing field they could run riot! I wondered whether we could look at running with user profiles and maybe have a particular profile for network use, with a student start menu and locked out control panels etc (all the regular stuff we have on desktops). All desktops are currently W98. We use poledit to regulate what the users can see. Of course, we can't necessarily guarantee what OS the student may be running on his/her laptop - it could be anything from w95 to Linux!

Is there any out-of-the-box software that could do this job for us?
0
Comment
Question by:ashounsome
6 Comments
 
LVL 9

Assisted Solution

by:MSGeek
MSGeek earned 100 total points
ID: 8059082
It depends on what NOS you are using.  You can accomplish a lot with ZenWorks which does not have to be in a Novell Netware environment to run.  You can also use group policies to accomplish a lot.  The biggest problem you will have with Newtork usage is bandwidth from music downloads and IM, port blocking is the next step.

You need a total solution, not one aplication.  Your solution will have to be Network Equipment based (Port blocking, access lists, statefull firewall.), Network Operating System based and workstation based.  There is no single tool to implement to accomplish this, it is a group of tools.

You have not provided enough information to describe your situation, but I would recommend enlisting a consultant in your area.
0
 
LVL 63

Accepted Solution

by:
SysExpert earned 100 total points
ID: 8059617
Your problems and a solution could well be the size a few books.

As MSGek mentioned, you need professional help if you really intend to try to do this.

Some hints.

1) Lock down all your servers so that only specific ones can even be seen on the network.

2) Use routers to block ports that you do not want used.

3) Encrypt important data

4) If possible set required minimums for OS's connecting to your network, and use domain security.

There are no easy solutions, so make sure that your backup infrastructure and disaster recovery procedures are in place and tested !!

I hope this helps !
0
 

Expert Comment

by:Runamuck
ID: 8077639
Not the best way but you could give all the computers you manage static Ip's and turn off DHCP. There's another way involving mac addresses but thats more work than anyone would want to even think about doing.

Combination of the 2 is probably the best way DHCP with IP reservations. Depends how hard you want to work or how serious the issue is.

I would just confiscate there laptops!!
0
Who's Defending Your Organization from Threats?

Protecting against advanced threats requires an IT dream team – a well-oiled machine of people and solutions working together to defend your organization. Download our resource kit today to learn more about the tools you need to build you IT Dream Team!

 

Expert Comment

by:mobhistory
ID: 8247893
A login script that checks computer name (if your institution owned machines follow a naming standard) and takes appropriate action. I would be happy to help with, and may already have, a solution if you would like to pursue that type of approach.  I would paste it here, but its lengthy, and code never comes out right in these windows.
0
 

Expert Comment

by:CleanupPing
ID: 9070813
ashounsome:
This old question needs to be finalized -- accept an answer, split points, or get a refund.  For information on your options, please click here-> http:/help/closing.jsp#1 
EXPERTS:
Post your closing recommendations!  No comment means you don't care.
0
 
LVL 9

Expert Comment

by:MSGeek
ID: 9083695
ashounsome... what's with the grade of C?? you did not provide any more feedback or get more specific with your question... a aquestion I might add that one could easily write a book about!  Respectfully, MSGeek.
0

Featured Post

Who's Defending Your Organization from Threats?

Protecting against advanced threats requires an IT dream team – a well-oiled machine of people and solutions working together to defend your organization. Download our resource kit today to learn more about the tools you need to build you IT Dream Team!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
OfficeMate Freezes on login or does not load after login credentials are input.
this video summaries big data hadoop online training demo (http://onlineitguru.com/big-data-hadoop-online-training-placement.html) , and covers basics in big data hadoop .
This lesson discusses how to use a Mainform + Subforms in Microsoft Access to find and enter data for payments on orders. The sample data comes from a custom shop that builds and sells movable storage structures that are delivered to your property. …
Suggested Courses

564 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question