Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Looking for a config questionaire i can give to clients to complete before configuring their XG units. Has anybody created such a document before.

Good day.

 

I am looking for create a short questionaire for clients to complete before we configure their XG units.

The idea behind this is to get input on what the client would like to block and not block, so that when we configure we don't run the risk of having to change something afterwards.

Also it's an extra measure for compliance as the client and service provider has a piece of paper of how the confi should look like.

 

Any help would be appreciated.

Thank you.



This thread was automatically locked due to age.
Parents
  • Stephan,

    this is always a whole cat-and-mouse thing. Let me try to spend some words on this because it is something I challenge every day. Every company should have developed Policies, Procedures, Standard and Guidelines for every asset.

    Dealing with what to block or what to allow should be written inside standard. Also take note that a physical network diagram should always be included. If you block something that should be allowed the first complaints will come from top managements because they need access to certain sites but Admins did not know.

    Most Organizations do not have this sort of "pyramid" but this is an essential pillar of Security Management.

    Regards

Reply
  • Stephan,

    this is always a whole cat-and-mouse thing. Let me try to spend some words on this because it is something I challenge every day. Every company should have developed Policies, Procedures, Standard and Guidelines for every asset.

    Dealing with what to block or what to allow should be written inside standard. Also take note that a physical network diagram should always be included. If you block something that should be allowed the first complaints will come from top managements because they need access to certain sites but Admins did not know.

    Most Organizations do not have this sort of "pyramid" but this is an essential pillar of Security Management.

    Regards

Children
No Data