[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Central Technology Demanding Vendor Testing Data On Letterhead Before Implementing Macafee Exceptions - Is This Standard

Posted on 2012-09-21
4
Medium Priority
?
379 Views
Last Modified: 2013-11-22
Hello friends -

We've got a couple of servers that we 'own' (mostly) that are hosted by a central technology office.  Anyway, Macafee consistently sucks up 50%+ of the CPU on one of these machines, nearly every minute of the day.  We've been talking to our central technology gurus who set the rules about getting some directories excluded; they have responded that:

(we will) "... allow exclusions to be entered into the McAfee antivirus if the vendor will provide documentation that show proper testing has been performed stating reasoning behind the require exclusion of executable\driver\files\folders\etc .."

My initial reaction is, this is crazy.  We paid 10K plus for the software being throttled to death, near twice as much for the server to run it on (don't ask), and now I'm being told I need some letterhead based showing 'proper testing'; whatever that means.  I think it is fair to say that there have been disagreements between our area and central IT over a variety of issues.  So, maybe I'm not crazy; maybe this is something that happens all the time.  

So, that all being said, is this type of a request / mandate normal, unusual, or completely unheard of out there in expert land?  I don't know if there is a right answer or not; I'm just looking for opinions.  

Thanks!

brian
0
Comment
Question by:passionlessDrone
2 Comments
 
LVL 3

Accepted Solution

by:
doublestick earned 2000 total points
ID: 38424218
It sounds like a bit of a language breakdown, but I think what they are wanting is proof that the proposed directories are causing the slowdown and a basis for the request.  I have not seen that required on letterhead and am not sure who's letterhead they are wanting it on (yours or McAfee's) but my guess is they are just wanted some documented justification for the request...and that is NOT uncommon, because when a guy leaves a directory vulnerable and something slips in and destroys company files, he is the one responsible.
0
 

Author Comment

by:passionlessDrone
ID: 38577182
Sorry for leaving this open.  Accepted doublestick.
0

Featured Post

Concerto Cloud for Software Providers & ISVs

Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes!

Learn how Concerto can help you.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

By the time you finish reading this article, you may have already lost all your money because you don't know the simple steps to securing your BitCoin wallet. BitCoin is an incredible invention. It is a decentralized currency system, which is the…
An introduction to the wonderful sport of Scam Baiting.  Learn how to help fight scammers by beating them at their own game. This great pass time helps the world, while providing an endless source of entertainment. Enjoy!
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses

834 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question