?
Solved

Firewall -- detecting ex-owner activity ?

Posted on 2016-09-01
1
Medium Priority
?
75 Views
Last Modified: 2016-09-03
I am looking to upgrade my firewall, stay current
with all OS, database, etc patches, and keep lots of backups

What firewall / software / etc do you recommend so I can try to monitor below step #4 ?
------------------------------------------------------------------------------------------------------------------------------------------------------
1. owner installed remote software (i.e. LogMeIn, TeamViewer, etc) onto server and several machines

2. owner quits

3. We disabled CFO’s VPN & Windows account, changing the password of all other VPN users since CFO might have known, uninstalling LogMeIn, TeamViewer, etc from whatever machines we find it on

4. owner might still access via some type of backdoor into the system
0
Comment
Question by:finance_teacher
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 79

Accepted Solution

by:
arnold earned 2000 total points
ID: 41780952
Logmein, teamviewr initiate outgoing connections, firewall rules on outgoing traffic would be necessary .....

Changing all the passwords internal and external resources is the first thing.
If tge organization had a paid service from logmein, teamviewr, gotomypc, etc. securing those accounts by managing the users who can access it and changing those passwords.

Audit all the installed application. ..
0

Featured Post

Bringing Advanced Authentication to the SMB Market

WatchGuard announces the acquisition of advanced authentication provider, Datablink, with one mission – to bring secure authentication to SMB, mid-market, and distributed enterprises with a cloud-based solution, ideal for resale via their established channel & MSSP community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
Getting to know the threat landscape in which DDoS has evolved, and making the right choice to get ourselves geared up to defend against  DDoS attacks effectively. Get the necessary preparation works done and focus on Doing the First Things Right.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Suggested Courses

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question