On 9 Jun 00, at 12:27, Jesus Gonzalez wrote:

> Hi All,
> please excuse this message since it's a bit off topic, but I could use your
> expert opinions to give me some backup.
> 
> There is a programmer in our company who seems to think that he is above all
> of our policies and procedures.  Yes, he is a new guy but has endeared
> himself to his manager (as the Director of IT, I report to someone else
> entirely).  He's continusouly installing applications on his machine and the
> servers because he says he needs them, even though policy clearly states
> that only IT is allowed to install authorized applications on all
> workstations, and certainly the servers.  

It would be interesting to know specifically what applications you 
are talking about.  Did he ask for IT to install them and be refused?

For what it's worth, I think a developer should be in control of his 
own workstation(s).  And servers, too.  If the organization can afford 
it, he should have his own setup so that if something goes wrong 
during testing, it doesn't affect the production machines.  And if he 
also has to support the production machines in any way (such as 
track down bugs if/when they arise), he should have all the access 
he needs to those, too.

> He even changed the local admin
> password and refused to give it to us, and he's password protected his bios.
> That stunt earned him a fresh image and a CMOS clear and OUR password in the
> bios.

What caused him to change local admin password?  If he just did it 
for no good reason, that's one thing.  But maybe he didn't want 
someone else screwing up the way he had it set up.

> So we finally had no choice but to lock his system down (a Win2K box) and
> not give him the local admin password so he can't install anything.

Is your staff standing by to install what he needs when he needs it?

> Naturally we were well aware of programs like l0phtcrack and others to break
> the admin password, but never though he'd resort to it.  Sure enough, he's
> downloaded it, and while he's been out of town, he's yet to use it.  He's
> also downloaded the Win2K high encryption pack, my guess is that he intends
> to crack and change the local admin password, then install the HE pack in
> hopes of preventing us from doing what he just did (can you say REimage).
> It's stupid, I know.  And I can't believe I'm having this battle.  

When it gets to that point, it's time to find another job.

It's hard to tell from this post what's really going on.  It could be 
that the guy just wants to control everything or it could be that the 
guy wants control over his own environment.

But you haven't told us much at all.

Eric Johnson
--------------------
[EMAIL PROTECTED]
[EMAIL PROTECTED]
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to