Start Time: Wednesday, June 08, 2005 7:15 AM (GMT-08:00) Pacific Time (US & Canada)
End Time: Wednesday, June 08, 2005 8:30 AM (GMT-08:00) Pacific Time (US & Canada)
Recommended Audience: IT Professional
Start | Programs | Firewall | Rules | Add rule | Permit all hosts destination port 4695/tcp. Um, why did you just do that? Was there a business justification for creating that hole, and was the decision backed up by your security policy? You do have an up-to-date, regularly reviewed policy, right? Surprisingly (or not), security policies in many organizations are hidden, reflect the thinking of ten years ago, or simply don’t exist. All security decisions should be based on business needs and guided by relevant, timely, and flexible policies. To learn more, attend this webcast presented from Tech·Ed 2005 in Orlando, Florida, where Steve Riley helps you understand why it’s important to have a security policy, how to encourage end-user participation, and provides suggestions on what makes up a good policy.
Presenter: Steve Riley, Senior Program Manager, Security Business and Technology Unit, Microsoft Corporation