SlideShare a Scribd company logo
1 of 17
Download to read offline
NETWORK
POLICIES
NETWORK
POLICIES
Prepared by: Ms. Mildred DO. Rodriguez
Subject Teacher
NETWORK
POLICIES
Network policies are sets
of conditions,
constraints, and settings
that allow you to
designate who is
authorized to connect to
the network and the
circumstances under which
they can or cannot
connect.
WHY IS IT IMPORTANT FOR A
NETWORK TO FOLLOW POLICIES?
A network that follows well-defined
policies capably fills business needs
that it is designed to support. Think
of network policies as objectives or
goals. Without clear objectives, your
network can't be set up to deliver
optimally, and without goals, its
performance can't be measured.
BUSINESS INTENT AND AGILITY
Network policies reflect business
intent. Network controllers ingest
business intent and create policies
that help achieve the desired
business outcomes. Policies are
enforced and carried out by network
equipment such as switches,
routers, wireless access points,
and wireless LAN controllers.
Networks operated in an ad hoc
fashion, without guiding policies,
will likely fail to deliver
optimally.
CONSISTENCY OF EXPERIENCE
Well-executed policies in the
network provide consistency of
service throughout it,
regardless of locations, means
of connectivity, or devices in
use. This means users and
things can use the network from
anywhere and still have the
same access privileges and
quality of network experience.
NETWORK
AUTOMATION
NETWORK DEVICES AND THEIR
OPERATIONS CAN BE BETTER
AUTOMATED WHEN GUIDANCE
EXISTS. WITH POLICIES,
CONFIGURATIONS CAN BE
AUTOMATED AND
ORCHESTRATED SO THAT EACH
DEVICE DOES WHAT'S
REQUIRED TO ACHIEVE THE
LARGER OBJECTIVES.
Performance Monitoring
Once well-understood goals are defined, metrics
can be established to measure how the network is
delivering. Continuous analysis of performance
helps ensure that policies are being followed
and business objectives are being met.
NETWORK
SECURITY
WITH POLICIES IN PLACE,
ANY VIOLATIONS CAN BE
EASIER TO DETECT.
SECURITY IS MORE EASILY
ENFORCED, THREATS MORE
QUICKLY CONTAINED, AND
RISK RAPIDLY REDUCED WITH
SECURITY-RELATED
POLICIES.
IT IS IMPORTANT TO
UNDERSTAND THE TYPES
OF USER ACCOUNTS AND
THE INFORMATION
NECESSARY TO CREATE
THEM.
USER ACCOUNTS
A user account is a record that consists
of user name and password required for the
user to log on, the groups in which the
user account belongs and the rights and
permission the user has for using the
computer and network resources. Each end
user who regularly uses a computer or the
network should have a unique user account.
LOCAL USER
ACCOUNTS
DOMAIN USER
ACCOUNTS
BUILT-IN USER
ACCOUNTS
User Account Types
LOCAL USER
ACCOUNT
LOCAL USER
ACCOUNTS
WHEN THIS ACCOUNT IS CREATED, THE OS
CREATES THE ACCOUNT ONLY IN THAT
COMPUTERS SECURITY DATABASE. THE OS
DOES NOT REPLICATE LOCAL USER ACCOUNT
INFORMATION TO DOMAIN CONTROLLERS.
AFTER A LOCAL USER ACCOUNT IS CREATED,
THE COMPUTER USES ITS LOCAL SECURITY
DATABASE TO AUTHENTICATE THE LOCAL
USER ACCOUNT THAT ALLOWS THE USER TO
LOG ON TO THAT COMPUTER.
DOMAIN USER ACCOUNT
In this account, the user is
allowed to gain access to
resources anywhere on the
network. The user provides his
or her username and password
during the logon process.
BUILT-IN USER ACCOUNT
There are two commonly used built-in accounts namely
the Administrator and Guest. The „Administrator‟
account is used if the user will manage the overall
computer and domain configuration for such tasks as
creating and modifying user accounts and groups,
managing security policies, creating printers and
assigning permissions and rights to user accounts to
gain access to resources. This account cannot be
deleted. The “Guest” account is used to provide
users who do not have an account in the domain with
the ability to log on and gain access to resources.
It does not require a password and is disabled by
default.
PASSWORD
GUIDELINES
PASSWORD GUIDELINES
Each user who has access to the
domain or computer should have a
strong password. A strong password
is used as an effective defense
against unauthorized access to a
computer resource. Passwords can be
up to 127 characters long. A
minimum length of seven characters
is recommended. A strong password
has the following characteristics
PASSWORD
GUIDELINES
PASSWORD GUIDELINES
• At least seven characters long. Does
not contain a user name, real name or
company name.
• Does not contain a complete dictionary
word.
• Is significantly different from
previous passwords.
• Passwords that increment are not
strong.
UPPERCAS
E
LETTERS
A, B, C
....
NUMERALS
0,1, 2,
3,4,5,6,7,
8, 9
LOWERCASE
LETTERS
a, b, c
...
SYMBOLS FOUND
ON KEYBOARD
ALL KEYBOARD
CHARACTERS
NOT DEFINED
AS LETTERS OR
NUMERALS)
` ~ ! @ # $ %
^ & * ( ) _ +
- = { } | [ ]
 ; “ ; „ < >
? , . /
CONTAINS CHARACTERS FROM EACH OF THE
FOLLOWING FOUR GROUPS SHOWN BELOW

More Related Content

Similar to 3_Network Policies_MDR.pdf

Principles for Secure Design and Software Security
Principles for Secure Design and Software Security Principles for Secure Design and Software Security
Principles for Secure Design and Software Security Mona Rajput
 
Get your Enterprise Ready for GDPR
Get your Enterprise Ready for GDPRGet your Enterprise Ready for GDPR
Get your Enterprise Ready for GDPRAbhishek Sood
 
Best Practices to Protect Customer Data Effectively
Best Practices to Protect Customer Data EffectivelyBest Practices to Protect Customer Data Effectively
Best Practices to Protect Customer Data EffectivelyTentacle Cloud
 
Network administration and support
Network administration and supportNetwork administration and support
Network administration and supportManas Rai
 
Modern Data Security for the Enterprises – SQL Server & Azure SQL Database
Modern Data Security for the Enterprises – SQL Server & Azure SQL DatabaseModern Data Security for the Enterprises – SQL Server & Azure SQL Database
Modern Data Security for the Enterprises – SQL Server & Azure SQL DatabaseWinWire Technologies Inc
 
SailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfSailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfVishnuGone
 
Free_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdfFree_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdfklodianelezi1
 
6 ways to manage IT Security
6 ways to manage IT Security6 ways to manage IT Security
6 ways to manage IT SecurityMonami Saluja
 
secure and authentication using personal device ppt
secure and authentication using personal device pptsecure and authentication using personal device ppt
secure and authentication using personal device pptShiva Shiva
 
Securing Your Remote Access Desktop Connection
Securing Your Remote Access Desktop ConnectionSecuring Your Remote Access Desktop Connection
Securing Your Remote Access Desktop ConnectionSecurityMetrics
 
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital WorldEmpired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital WorldEmpired
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure AuthenticationIRJET Journal
 
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docxWorksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docxgriffinruthie22
 
Medical facility network design
Medical facility network designMedical facility network design
Medical facility network designnephtalie
 

Similar to 3_Network Policies_MDR.pdf (20)

Principles for Secure Design and Software Security
Principles for Secure Design and Software Security Principles for Secure Design and Software Security
Principles for Secure Design and Software Security
 
Case study
Case studyCase study
Case study
 
Get your Enterprise Ready for GDPR
Get your Enterprise Ready for GDPRGet your Enterprise Ready for GDPR
Get your Enterprise Ready for GDPR
 
More
MoreMore
More
 
Biznet Gio Presentation - Database Security
Biznet Gio Presentation - Database SecurityBiznet Gio Presentation - Database Security
Biznet Gio Presentation - Database Security
 
Best Practices to Protect Customer Data Effectively
Best Practices to Protect Customer Data EffectivelyBest Practices to Protect Customer Data Effectively
Best Practices to Protect Customer Data Effectively
 
Network administration and support
Network administration and supportNetwork administration and support
Network administration and support
 
encryption ppt
encryption pptencryption ppt
encryption ppt
 
Modern Data Security for the Enterprises – SQL Server & Azure SQL Database
Modern Data Security for the Enterprises – SQL Server & Azure SQL DatabaseModern Data Security for the Enterprises – SQL Server & Azure SQL Database
Modern Data Security for the Enterprises – SQL Server & Azure SQL Database
 
SailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfSailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdf
 
CyberArk
CyberArkCyberArk
CyberArk
 
Free_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdfFree_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdf
 
6 ways to manage IT Security
6 ways to manage IT Security6 ways to manage IT Security
6 ways to manage IT Security
 
secure and authentication using personal device ppt
secure and authentication using personal device pptsecure and authentication using personal device ppt
secure and authentication using personal device ppt
 
Securing Your Remote Access Desktop Connection
Securing Your Remote Access Desktop ConnectionSecuring Your Remote Access Desktop Connection
Securing Your Remote Access Desktop Connection
 
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital WorldEmpired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
 
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docxWorksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
Medical facility network design
Medical facility network designMedical facility network design
Medical facility network design
 

Recently uploaded

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 

Recently uploaded (20)

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 

3_Network Policies_MDR.pdf

  • 1. NETWORK POLICIES NETWORK POLICIES Prepared by: Ms. Mildred DO. Rodriguez Subject Teacher
  • 2. NETWORK POLICIES Network policies are sets of conditions, constraints, and settings that allow you to designate who is authorized to connect to the network and the circumstances under which they can or cannot connect.
  • 3. WHY IS IT IMPORTANT FOR A NETWORK TO FOLLOW POLICIES? A network that follows well-defined policies capably fills business needs that it is designed to support. Think of network policies as objectives or goals. Without clear objectives, your network can't be set up to deliver optimally, and without goals, its performance can't be measured.
  • 4. BUSINESS INTENT AND AGILITY Network policies reflect business intent. Network controllers ingest business intent and create policies that help achieve the desired business outcomes. Policies are enforced and carried out by network equipment such as switches, routers, wireless access points, and wireless LAN controllers. Networks operated in an ad hoc fashion, without guiding policies, will likely fail to deliver optimally.
  • 5. CONSISTENCY OF EXPERIENCE Well-executed policies in the network provide consistency of service throughout it, regardless of locations, means of connectivity, or devices in use. This means users and things can use the network from anywhere and still have the same access privileges and quality of network experience.
  • 6. NETWORK AUTOMATION NETWORK DEVICES AND THEIR OPERATIONS CAN BE BETTER AUTOMATED WHEN GUIDANCE EXISTS. WITH POLICIES, CONFIGURATIONS CAN BE AUTOMATED AND ORCHESTRATED SO THAT EACH DEVICE DOES WHAT'S REQUIRED TO ACHIEVE THE LARGER OBJECTIVES.
  • 7. Performance Monitoring Once well-understood goals are defined, metrics can be established to measure how the network is delivering. Continuous analysis of performance helps ensure that policies are being followed and business objectives are being met.
  • 8. NETWORK SECURITY WITH POLICIES IN PLACE, ANY VIOLATIONS CAN BE EASIER TO DETECT. SECURITY IS MORE EASILY ENFORCED, THREATS MORE QUICKLY CONTAINED, AND RISK RAPIDLY REDUCED WITH SECURITY-RELATED POLICIES.
  • 9. IT IS IMPORTANT TO UNDERSTAND THE TYPES OF USER ACCOUNTS AND THE INFORMATION NECESSARY TO CREATE THEM.
  • 10. USER ACCOUNTS A user account is a record that consists of user name and password required for the user to log on, the groups in which the user account belongs and the rights and permission the user has for using the computer and network resources. Each end user who regularly uses a computer or the network should have a unique user account.
  • 11. LOCAL USER ACCOUNTS DOMAIN USER ACCOUNTS BUILT-IN USER ACCOUNTS User Account Types
  • 12. LOCAL USER ACCOUNT LOCAL USER ACCOUNTS WHEN THIS ACCOUNT IS CREATED, THE OS CREATES THE ACCOUNT ONLY IN THAT COMPUTERS SECURITY DATABASE. THE OS DOES NOT REPLICATE LOCAL USER ACCOUNT INFORMATION TO DOMAIN CONTROLLERS. AFTER A LOCAL USER ACCOUNT IS CREATED, THE COMPUTER USES ITS LOCAL SECURITY DATABASE TO AUTHENTICATE THE LOCAL USER ACCOUNT THAT ALLOWS THE USER TO LOG ON TO THAT COMPUTER.
  • 13. DOMAIN USER ACCOUNT In this account, the user is allowed to gain access to resources anywhere on the network. The user provides his or her username and password during the logon process.
  • 14. BUILT-IN USER ACCOUNT There are two commonly used built-in accounts namely the Administrator and Guest. The „Administrator‟ account is used if the user will manage the overall computer and domain configuration for such tasks as creating and modifying user accounts and groups, managing security policies, creating printers and assigning permissions and rights to user accounts to gain access to resources. This account cannot be deleted. The “Guest” account is used to provide users who do not have an account in the domain with the ability to log on and gain access to resources. It does not require a password and is disabled by default.
  • 15. PASSWORD GUIDELINES PASSWORD GUIDELINES Each user who has access to the domain or computer should have a strong password. A strong password is used as an effective defense against unauthorized access to a computer resource. Passwords can be up to 127 characters long. A minimum length of seven characters is recommended. A strong password has the following characteristics
  • 16. PASSWORD GUIDELINES PASSWORD GUIDELINES • At least seven characters long. Does not contain a user name, real name or company name. • Does not contain a complete dictionary word. • Is significantly different from previous passwords. • Passwords that increment are not strong.
  • 17. UPPERCAS E LETTERS A, B, C .... NUMERALS 0,1, 2, 3,4,5,6,7, 8, 9 LOWERCASE LETTERS a, b, c ... SYMBOLS FOUND ON KEYBOARD ALL KEYBOARD CHARACTERS NOT DEFINED AS LETTERS OR NUMERALS) ` ~ ! @ # $ % ^ & * ( ) _ + - = { } | [ ] ; “ ; „ < > ? , . / CONTAINS CHARACTERS FROM EACH OF THE FOLLOWING FOUR GROUPS SHOWN BELOW