Company IT infrasture username/password best practise

Posted on 2014-04-22
Last Modified: 2014-05-12
what is the latest best practise on the above record keepting interms of international Std and audit purpose
Question by:cur
LVL 25

Assisted Solution

by:Tony Giangreco
Tony Giangreco earned 40 total points
ID: 40014575
Here are the guidelines we use which are directly from Microsoft:

Hope this helps!
LVL 16

Accepted Solution

Shaik M. Sajid earned 50 total points
ID: 40014584
LVL 53

Assisted Solution

McKnife earned 80 total points
ID: 40014756
Hi cur.

> in terms of international Std and audit purpose
These are empty phrases. Could you phrase what you need, in your own words?
Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

LVL 25

Assisted Solution

madunix earned 40 total points
ID: 40016836

Author Comment

ID: 40016875
I am more concern on the password store facilities . in  case of top iT people absence
LVL 53

Assisted Solution

McKnife earned 80 total points
ID: 40016890
So what would you like to know? Please ask some questions that one can answer. As we don't know your situation, we cannot answer "best practice"-questions.

Of course if the admin is absent, someone else will have access to a password database like keepass or to a printed document, usually kept in a safe.
LVL 25

Expert Comment

by:Tony Giangreco
ID: 40027955
Have we answered your question completely?

Featured Post

Superior storage. Superior surveillance.

WD Purple drives are built for 24/7, always-on, high-definition security systems. With support for up to 8 hard drives and 32 cameras, WD Purple drives are optimized for surveillance.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Ransome Ware Question 10 138
Server 2008-R2 lost password 19 97
optimal method deal ransomware in files folders 9 96
Trunk and Port Security 4 39
You cannot be 100% sure that you can protect your organization against crypto ransomware but you can lower down the risk and impact of the infection.
Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now