Solved

Company IT infrasture username/password best practise

Posted on 2014-04-22
7
269 Views
Last Modified: 2014-05-12
what is the latest best practise on the above record keepting interms of international Std and audit purpose
0
Comment
Question by:cur
7 Comments
 
LVL 25

Assisted Solution

by:Tony Giangreco
Tony Giangreco earned 40 total points
ID: 40014575
Here are the guidelines we use which are directly from Microsoft:

http://windows.microsoft.com/en-us/windows-vista/tips-for-creating-a-strong-password

Hope this helps!
0
 
LVL 16

Accepted Solution

by:
Shaik M. Sajid earned 50 total points
ID: 40014584
0
 
LVL 54

Assisted Solution

by:McKnife
McKnife earned 80 total points
ID: 40014756
Hi cur.

> in terms of international Std and audit purpose
These are empty phrases. Could you phrase what you need, in your own words?
0
Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

 
LVL 25

Assisted Solution

by:madunix
madunix earned 40 total points
ID: 40016836
0
 

Author Comment

by:cur
ID: 40016875
I am more concern on the password store facilities . in  case of top iT people absence
0
 
LVL 54

Assisted Solution

by:McKnife
McKnife earned 80 total points
ID: 40016890
So what would you like to know? Please ask some questions that one can answer. As we don't know your situation, we cannot answer "best practice"-questions.

Of course if the admin is absent, someone else will have access to a password database like keepass or to a printed document, usually kept in a safe.
0
 
LVL 25

Expert Comment

by:Tony Giangreco
ID: 40027955
Have we answered your question completely?
0

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question