?
Solved

Best cost benifit ratio for AV software

Posted on 2003-11-16
2
Medium Priority
?
336 Views
Last Modified: 2013-11-16
Hi, a little subjective but I will try.
I am runing 3 XP clients protected with Norton. I have recently installed a W2K server to contol everything.
What do you recommend to protect the server? We have an always on broardband connection.

Thanks
Dave
0
Comment
Question by:Muskett
2 Comments
 
LVL 18

Accepted Solution

by:
chicagoan earned 500 total points
ID: 9758494
A: A hardware firewall, broadband router at least.
B: All operating system and application patches.
c: Turn off all services that are not needed, disable unneeded shares.
D: rename Administrator, have good passwords  and disable GUEST (at least)
    Do not routinely connect as administrator. A misbehaving application, virus or trojan on the workstation you connect from won't be contained on the server.
E: Develop a backup and retention policy and backup
F: backup
G: did I mention backup?
H: Now you can start to examine AV products:

http://www.icsalabs.com/html/communities/antivirus/certification/certprod.shtml
Is a list of products ICS labs has certified. Some of the smaller players should be considered. Running a different product on the server has pro's and cons. The vendors react to different threats with different approaches and at different times, using more than one product may mean one will detect the virus sooner than another, and one may be able to clean a file another cannot. The upside to a homogenous platform is familiarity with the product and it's quirks, although often the server product is rather different.

I'd look at:

Avast $399
Kaspersky $370
Grisoft $70


I: Backup
0
 

Author Comment

by:Muskett
ID: 9758634
Thanks, better than I expected,
I have HW firewall router (am using SIP VoIP)
All patches up to date
Good point and often overlooked re Administrator and Guest, They are now gone!
back up is half daily to a second HDD weekly to DVD
Like the idea of different vendors for Server and W. Stations

Cheers
0

Featured Post

Keep up with what's happening at Experts Exchange!

Sign up to receive Decoded, a new monthly digest with product updates, feature release info, continuing education opportunities, and more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

What monsters are hiding in your child's room? In this article I will share with you a tech horror story that could happen to anyone, along with some tips on how you can prevent it from happening to you.
It’s time for spooky stories and consuming way too much sugar, including the many treats we’ve whipped for you in the world of tech. Check it out!
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses

864 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question