So,
I have installed my first linux 6.1 box, Got Ipchains running. set up sendmail as a 
relay to my post office behind the firewall. It runs like a top and has not crashed.
(the video card messes with Xwindows a little but how much do I really need that?)

I am creating a Procedure manual for our in house security efforts. 
Maybe you security professionals can help me with my chore list.

1.  Create a list of log files that need to be monitored. 
2.  Create a guide for what to look for in the above logs
3.  Programs to be removed or reconfigured to "harden" computer
         (lets not start an entire thread about perl now, ok? I can summarize the  
debate over the hotly contested stuff and present a reasoning for my individual 
choices)
4.  list of most important files to back up
         (like that damned IPCHAINS ruleset I slaved over)
5. ??

If any one has suggestions send them to me off-list.  I have been saving posts from 
this list as a starting point. But I could use some help with the questions above.

Since I am a newbie on this list I cannot offer much tech help to pull my weight 
around here.  What I CAN do is consolidate the above info and Post it back. Then 
perhaps it can be a reference tool for the next lucky person  that gets handed the 
"Security Issue" at their place of business.

It would be nice if every firm could have a profesional to do such detail oriented 
work but, the truth is,  the task gets handed to the most technical person on staff.  
Personally,  I am more comfortable with sequencers and audio/visual programs than this 
stuff but it has got to get done.

Thanks,
Scott


-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to