Implementing Exit Point Manager
Once Exit Point Manager has been installed and activated, you may be asking “what’s next? How do I use this product to meet and enforce my company’s compliance requirements?”
These instructions offer a method for how to proceed using the four essential components of discovery, analysis, securing servers, and ongoing review. The first three are performed in recursive iterations, first by taking a general, high-level look at server activity, and then again at a deeper level for each pass, with increasing granularity, until compliance is met. The fourth component is performed to respond to ongoing changes in server activity.
While the following recommendations are based on years of experience by Powertech experts, final security procedures are ultimately the decision of the administrators, your company auditor, or as outlined in your security policy.
In addition to user profiles, rules can apply to:
• Group Profiles
• Locations (IP Addresses)
• IP Address Ranges
• Server Functions
• Transactions
• Objects
• Server Pre-filters