Quantcast
Channel: IT Security Auditing Blog by SVT for System Center Operations Manager (SCOM ACS)
Browsing latest articles
Browse All 27 View Live

ACS Sizing - Revisited

Given the large amount of data collected by ACS, predicting the size of the ACS database is crucial.  Secure Vantage has had the ACS Database Planning Calculator on the resources page of our website...

View Article



10 Steps to Passing Your Next PCI Audit - Step Six

View Article

10 Steps to Passing Your Next PCI Audit - Step Seven

Document, Document, Document As an auditor I like to use the axiom “If it is not documented it does not exist. Meaning it can’t be proven. It is always better to have a published policy or procedure...

View Article

Use What You Own

It's actually a quite simple concept. But, for the purposes of illustrating my point, let's say you have the latest and greatest mobile phone. It makes phone calls, surfs the web, takes pictures, you...

View Article

Visit us at TechEd North America 2011

SVT will be attending TechEd North America 2011 in Atlanta, GA.  We will be there all week so come and check us out under the System Center Partner Pavillion in the Expo Hall. Don't forget to enter our...

View Article


10 Steps to Passing Your Next PCI Audit - Step Eight

Find the Weaknesses Before the Bad Guy Does Depending on your type of organization and your transaction volume PCI DSS requires periodic third-party scanning. Not everyone can do these third-party...

View Article

5 Audit Requirements System Administrators Should Care About | June 2011...

Background I was reading an eMagazine article the other day about the 10 biggest security breaches of 2011 - so far. And it occurred to me how often incidents end up on a list like this because the...

View Article

ACS Time Settings - UTC vs. Local

ACS has two time configurations: UTC and Local.  Normally, these are set at installation time.  Understanding the differences between the times will help in choosing the correct format.  For the most...

View Article


Windows 2008 Read Only DC – Need to monitor with ACS?

Windows 2008 introduced a new form of domain controller, the Read Only Domain Controller (RODC).  The RODC allows authentication and controls rights, but it does not allow modification of the Active...

View Article


Management and Monitoring Tips for Security Event Logs

Background Monitoring even logs is a tricky business. It doesn't matter what vendor we are talking about, event logs can be confusing and even misleading. Event logging is a tradeoff between...

View Article

Customizing the Reporting Logo

 Many organizations prefer their corporate logo on the reports we provide.  The process is very simple to perform and available when the next report run occurs. Logo Specifications When creating the...

View Article

Windows 2008 Read Only DC - Need to Monitor with ACS?

Windows 2008 Read Only DC – Need to monitor with ACS? Not Published Wednesday, May 04, 2011 3:59:45 AM by Chance Folmar posted in ACS Windows 2008 introduced a new form of domain controller, the Read...

View Article

ACS Test Environment Requirements

Before installing any system into production it is necessary to first run the system through acceptance testing.  However, hardware expenses make it unreasonable to develop a full blown test system...

View Article


New! Protect Confidential Information with Ease via SVT's New Partner: Bystorm

SVT recently entered into a marketing partnership with ByStorm Software. The ByStorm FileSure product provides low-footprint file access auditing, access control, and compliance. Previously, SVT...

View Article

Establishing Controls to Protect Confidential Data | November 2011 Newsletter

Summary In business or accounting, IT controls are generally defined as “specific activities performed by persons or systems designed to ensure that business objectives are met.” In the IT world, that...

View Article


Computer Forensics and Internal Investigations | December 2011 Newsletter

Businesses today are constantly being made aware of the challenges of computer fraud, computer security gaps, and cybercrime. Hacker groups have been prevalent in the news lately, showing companies...

View Article

SCOM 2012

The release of System Center Operations Manager 2012 is upon us, and the question on everyone’s mind is "Will SVT support it?" The answer is ‘Yes, we will support it." As of now the schedule release...

View Article


Holiday Office Hours

The SVT offices will be closed Monday, December 26th, 2011. During this time support will be unavailable. Our office will reopen on Tuesday, December 27th, 2011 at 9:00 A.M. CST. Should you need...

View Article

Compliance: One Size Doesn't Fit All | January 2012 Newsletter

Compliance has become an incredibly important part of daily operations for many organizations today. Being able to show the organization is in compliance with requirements like HIPAA, SOX, NERC, or...

View Article

Achieving Audit Nirvana Through Control Automation and Visibility | April...

The Problem You have probably seen it in the news recently – the latest big security breach.  Both Visa and MasterCard announced that a “third-party processor” experienced a data breach exposing...

View Article

Enter The Age Of The Auditor

Background Blame it on the WorldCom or Enron scandals, the rise of electronic payment transactions or the advent of cyber crime/espionage/maliciousness but in any case we have seen the increase of...

View Article


Next Change To PCI DSS

June is here and the next change to the Payment Card Industry Security Standards Council (PCI SSC) requirements is about here. On June 30, 2012 Level 1 and Level 2 merchants are required to have...

View Article


The Importance of Security Controls: A Reminder

You know hackers are not always sneaky outsiders with poor hygiene that pose security threat.  Between April 2010 and March 2011, 513 United Kingdom civil servants were found to have made "unauthorised...

View Article

The Cost of Ineffective Security

Background In early June LinkedIn – the giant professional networking site - confirmed that more than 6 million of its users’ passwords were compromised. The site boasts more than 160 million users and...

View Article

Image may be NSFW.
Clik here to view.

New SVT Partner - Squadra Technologies

In a perfect world, you would want the computers in your environment to be protected from malicious Removable Media incidents while still allowing proper use of them as productivity aids. This is where...

View Article

Browsing latest articles
Browse All 27 View Live




Latest Images