142 KB | 3 files | DOC, ODF
Internet e-mail can be a burden in both lost productivity and spam hammering your already overtasked servers. These guidelines wil help you reign in this problem on your Exchange messaging system
E-mail can take up a lot of employees' time during the work day, particularly personal e-mail. In addition, spam e-mail can add just as much frustration for employees trying to focus on their jobs. The attached document provides a guide to restricting Internet e-mail.
The attached Zip file includes:
This excerpt focuses on the conceptual aspects of defect management, including the basic concepts of a defect, how to manage defects, and an analysis of the root causes of defects. ... More >>
This document makes recommendations for how users and developers should select checklists from the NIST National Checklist Repository, evaluate and test checklists, and apply them to IT products. ... More >>
This publication is intended to assist organizations in understanding the basics of application whitelisting. It also explains planning and implementation for whitelisting technologies throughout the security deployment lifecycle. ... More >>