Implementing Exit Point Manager

Once Exit Point Manager has been installed and activated, you may be asking “what’s next? How do I use this product to meet and enforce my company’s compliance requirements?”

These instructions offer a method for how to proceed using the four essential components of discovery, analysis, securing servers, and ongoing review. The first three are performed in recursive iterations, first by taking a general, high-level look at server activity, and then again at a deeper level for each pass, with increasing granularity, until compliance is met. The fourth component is performed to respond to ongoing changes in server activity.

While the following recommendations are based on years of experience by Powertech experts, final security procedures are ultimately the decision of the administrators, your company auditor, or as outlined in your security policy.

NOTE: The following steps offer a typical approach to securing your servers by user profile. Other approaches are available (both general and highly specific), designed to accommodate diverse security needs. Contact Support for more information on the various forms if you feel they could be better suited to your needs.

In addition to user profiles, rules can apply to:

Group Profiles
Locations (IP Addresses)
IP Address Ranges
Server Functions
Transactions
Objects
Server Pre-filters