As mentioned in my last post regarding end point security , i

As mentioned in my last post regarding end point security , in this blog we will be explaining about the good practices for end point security to be followed by a security architect :

Following are the good practices which can be followed and will keep your machine or system away from cyberattacks:

  • DNS configuration
  • Hased enabled password
  • SNMP protocol to SMNPv3
  • Certificate signed by CA
  • SSH connections
  • Logging
  • Configure Backup
  • Configure Software Rules
  • Device Policy
  • Script Control
  • Zones
  • Application Control
  • Device Management

We will be explaining the above recommendations in depth in our future blogs so keep yourself updated with our site by following us on our website or WordPress or other social network sites or contact us below:

We make Technology eazy via docs

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | WordPress: www.doctoolss.wordpress.com | Website: www.doctoolss.com| Tumblr: https://www.tumblr.com/blog/doctoolss | Medium: https://medium.com/@doctoolss| Facebook: https://www.facebook.com/DTdoctoolss/

Leave a Reply

Your email address will not be published. Required fields are marked *