tnolen

About tnolen

This author has not yet filled in any details.
So far tnolen has created 312 blog entries.

Planned Maintenance

AT&T Network Engineers will be performing a planned maintenance on
Birmingham-Alabama Gigabit Access Router 1. The work will be performed on 7/1/2010,
during the maintenance window of 12:00AM-6:00AM, local time.
AT&T's goal is to successfully complete the task and restore service within the
stated time frame. 

We apologize for any inconvenience that you may experience.
We expect service to be impacted somewhat during the maintenance window.

AT&T Network Engineers will be performing an IOS upgrade.

Please Note: This maintenance is IN ADDITION TO the planned maintenance on 6/18/2010.
The work on 6/18/2010 will be done on Birmingham-Alabama
Gigabit Access Router 3, while this is being done on Router 1. The notice for that
maintenance can be found at https://www.netsolinc.com/planned-maintenance.

Update: The 7/1/2010 maintenance has been rescheduled to 7/6/2010.  The
maintenance window is the same as is the scope of work.

Update: The 7/1/2010 maintenance which was moved to 7/6/2010 has been moved again.
The new maintenance date is 7/9/2010.  The time window and the scope of work
remains the same.

Update: The maintenance was completed.  Service was affected in the expected manner
and we had some degradation of performance from 2:25AM to 3:05AM CDT.
2011-10-25T19:54:06-05:00June 17, 2010|News and Updates|Comments Off on Planned Maintenance

Intrusion Detection Policy

1.0 Overview
This policy provides policies to establish intrusion detection and security monitoring to protect resources and data on the organizational network. It provides guidelines about intrusion detection implementation of the organizational networks and hosts along with associated roles and responsibilities.

2.0 Purpose
This policy is designed both to establish procedures for notification of affected clients in the case of an intrusion event.

3.0 Scope
This policy covers every host on the organizational public network.

4.0 Objectives

  1. Increase the level of security by actively searching for signs of unauthorized intrusion.
  2. Prevent or detect the confidentiality of organizational and client data on the network.
  3. Preserve the integrity of organizational and client data on the network.
  4. Prevent unauthorized use of organizational and client systems.
  5. Keep hosts and network resources available to authorized users.
  6. Increase security by detecting weaknesses in systems and network design early.

5.0 Requirements

  1. All systems accessible from the internet must operate IT approved active intrusion detection software.
  2. All host based and network based intrusion detection systems must be checked on a daily basis at a minimum and their logs reviewed.
  3. All intrusion detection logs must be kept for a minimum or 30 days.

6.0 Notification

  1. Any suspicious or malicious activity reported by a third-party must be investigated and responded to immediately.
  2. Upon completion of investigation and resolution of the issue, the reporting party should be notified of said resolution.

7.0 Responsibilities

  1. The network administration team shall:
    1. Monitor intrusion detection systems both host based and network based.
    2. Check intrusion detection logs daily at a minimum.
    3. Determine approved intrusion detection systems and software.
    4. Act on reported incidents and take action to minimize damage, archive any hostile or unapproved software for investigation, and recommend changes to prevent future incidents..
    5. Notify affected clients as to the extent of intrusion, resolution, and plan for future preventative action.
2011-10-25T19:44:44-05:00June 11, 2010|FAQ|Comments Off on Intrusion Detection Policy
Go to Top