Security setup advice

Discussion in 'other anti-malware software' started by curious george, Aug 10, 2009.

Thread Status:
Not open for further replies.
  1. curious george

    curious george Registered Member

    Joined:
    Jun 24, 2007
    Posts:
    218
    Well, the family is thinking of setting up a business, and im in charge of their security.
    First off, its not going to be a HUGE business, probably will have anyway from 2-3 computers.


    The security setup i have in mind is as follows:

    Defensewall
    Sandboxie
    Shadow Defender
    Router+Hardware Firewall
    Truecrypt (important files)
    Random on demand scanners
    True Image



    What do you think?
    I plan on using shadow defender's commit to disk feature to only save the "important" files needed to true crypt, and that, will be in a separate external hardrive
     
  2. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    i think Defensewall plus Prevx3 will be close to bulletproof:thumb: :thumb:
     
  3. curious george

    curious george Registered Member

    Joined:
    Jun 24, 2007
    Posts:
    218
    Then, i might get that, as the on demand scanner...

    So now, its


    Defensewall
    Sandboxie
    Shadow Defender
    Router+Hardware Firewall
    Truecrypt (important files)
    Random on demand scanners
    True Image
    Prevx
     
  4. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    remenber to scan your files for any posible infections for just in case there is a doubt
     
  5. HKEY1952

    HKEY1952 Registered Member

    Joined:
    Jul 22, 2009
    Posts:
    657
    Location:
    HKEY/SECURITY/ (value not set)
    For starters, only one of the computers will contain most of the business files and information, therefore that one computer must be isolated from the rest of the Network.
    Two Firewall Routers will be needed, one for the main business computer and the second for the remaining computers in the Network.
    The topology will be as follows:

    01)- Internet connection

    02)- Modem

    03)- Out of the Modem into the WAN Port of Firewall Router one with DHCP enabled, obtain an IP automatically, Router IP 192.168.1.1, DHCP Range 192.168.1.111 to 192.168.1.113, and
    static IP addresses between 192.168.1.2 to 192.168.1.110, the main business computer plugged into Port one, allowing two more devices to use DHCP if needed and an static range for backup device/printer
    Computers behind Firewall Router one (192.168.1.1) will belong to Workgroup 1

    04)- Out of Firewall Router one, Port two, into the WAN Port of Firewall Router two with DHCP enabled, obtain an IP automatically, Router IP 192.168.2.1, DHCP Range 192.168.2.111 to 192.168.2.115, and
    static IP addresses between 192.168.2.2 to 192.168.2.110, the other computers plugged into Ports one through four, allowing five devices to use DHCP if needed and an static range for backup device/printer
    Computers behind Firewall Router two (192.168.2.1) will belong to Workgroup 2

    05)- All computers have access to the Internet, all computers can use DHCP or have static IP, computers behind Firewall Router one can not see computers behind Firewall Router two and visa versa

    06)- Keep the security software on the main business computer as light as possible and maintenance free as possible with good imaging and off site backup


    HKEY1952
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.