AntiVirus Update Procedures and Internet Use Policies - PowerPoint PPT Presentation

1 / 10
About This Presentation
Title:

AntiVirus Update Procedures and Internet Use Policies

Description:

Updates will be followed by a daily system scan for each. workstation and server ... Updates and scanning will be performed before the start of business ... – PowerPoint PPT presentation

Number of Views:51
Avg rating:3.0/5.0
Slides: 11
Provided by: Exp107
Category:

less

Transcript and Presenter's Notes

Title: AntiVirus Update Procedures and Internet Use Policies


1
Anti-Virus Update Proceduresand Internet Use
Policies
Eric L Graves CS654
2
Anti-Virus Program Overview
  • The company anti-virus of choice is AVG
    anti-virus as well
  • as a second layer of protection called
    ThreatFire and finally
  • a third layer of protection called SpyWare
    Blaster
  • Daily updates will be automatically installed on
    workstations
  • and company servers
  • Updates will be followed by a daily system scan
    for each
  • workstation and server
  • Upon failure of web based downloads, the security
    staff will
  • maintain manual downloads of updates on a
    centralized
  • server

3
Anti-Virus Program Overview
  • Workstations and Servers are to be left powered
    on at all times for routine maintenance and
    updating procedures
  • Updates and scanning will be performed before the
    start of business
  • to minimize impact on productivity
  • If any layer of security fails to update
    properly, immediately report
  • the problem to Internet Security personnel

4
Internet Use Policy
  • EMPLOYEES WILL ONLY USE WORKSTATIONS FOR COMPANY
  • BUSINESS
  • Upon employment, each individual will receive a
    copy of the company internet policy to be signed
    before accessing their assigned work station.
    Your signature indicates that you have read and
    understand the internet use policy
  • To ensure proper internet use, each workstation
    will be monitored for
  • improper use of internet resources
  • Each workstation and server will contain a
    blacklist of unacceptable
  • websites and a whitelist for trusted and
    acceptable websites

5
Internet Use Policy
  • Only trained and qualified users will be able to
    access the internet for company purposes
  • Trained and qualified users will be given a user
    ID and password for internet access
  • Use of the internet for personal business,
    e-mail, web surfing, and development of personal
    websites is strictly forbidden
  • The use of offensive material in any way shape or
    form will result in a first time loss of internet
    and email priveleges, and termination of
    employment for a second offense

6
Internet Use Policy
  • Internet kiosks will be provided in a centralized
    break area for all personnel to use during breaks
  • These computers are provided as a courtesy to our
    employees but still fall under company guidelines
    for internet use
  • Anyone violating company guidelines will first
    lose personal internet priveledges and upon a
    second violation will permanently lose access to
    the company provided Internet kiosks. Any
    attempt to circumvent these policies and
    procedures will result in termination of
    employment

7
Internet Use Policy
  • This is only an overview of acceptable internet
    use and is by no means an exhaustive list of
    company policy. All policies and procedures are
    outlined in the company internet use policy which
    will be provided for each employee upon hiring.
    Please direct any further questions or concerns
    to the
  • Information Security Officer

8
Tools
  • AVG Anti-Virus
  • http//www.grisoft.com/
  • Support
  • http//www.grisoft.com/doc/59/us/crp/0
  • ThreatFire
  • http//www.threatfire.com
  • FAQs
  • http//www.threatfire.com/faqs/
  • SpywareBlaster
  • http//www.javacoolsoftware.com/spywareblaster.htm
    l
  • Knowledgebase
  • http//www.javacoolsoftware.info/kb/

9
Resources
  • Policy Examples and Ideas
  • http//www.nlrg.com/lawlet/iup.htm
  • http//www.monroe.lib.in.us/general_info/computer_
    policies.html
  • http//www.microsoft.com/smallbusiness/support/che
    cklist/step3.mspx
  • http//www.njstatelib.org/LDB/E-Rate/ufiliup.php
  • Guides and Knowledge
  • http//www.microsoft.com/technet/security/guidance
    /serversecurity/avdind_2.mspx
  • A sample defintion of Heuristic
  • This is a technique for assessing the probability
    that a file contains a computer virus.

10
Questions or Concerns?
Write a Comment
User Comments (0)
About PowerShow.com