Domino Health Audit 11_17

Domino Database Security & Database Design Element Security

Securing Notes Databases Diving through the layers of securing Domino, we are now at database security. For any Notes database be it a mail file or an application the front door for getting in the database is the database’s Access Control List. Hence, it is imperative that you develop ACL standards and enforce them to control not only data access Read More

Domino Health Audit 11_17

Notes IDs – The Backbone of the Domino Security Model

The Domino and Notes security model is rooted in its ID files, formidable keys that are unique to each Domino installation. The loss or compromise of any Notes ID results in a recovery process, especially time consuming if that ID happens to be an Organization or Organizational Unit certificate. Properly storing and maintaining your Notes certifier, user and server IDs Read More

peaking blinds

The Stuff Outside of IBM Domino That Keeps Me Up at Night

The security of the Domino system is influenced by the physical location of the Domino server, Operating System configuration and network access points. It is important to understand how these can impact Domino. Physical Security Common security sense says that the servers of any application should be stored in a data center that has some type of controlled access. While Read More

ibmsecurity

Domino Server Security – There are 10 Things You Need to Know

In the past I have rolled my eyes at top 10 lists. Then, about a year ago I became enthralled with the “Hamilton” soundtrack. Composer Lin Manual Miranda conveys the concept of duels in “Ten Duel Commandments”, listing the 10 rules of engagement. Towards the end of the musical, the 10 list is reprised in The “World Was Wide Enough,” Read More

Petya-Ransomware

Petya Cyberattacks: How to Avoid and Defeat Ransomware

Petya Cyberattacks: How to Avoid and Defeat Ransomware Don’t let your guard down just yet. While the threat of last month’s WannaCry ransomware has just about disappeared, a new threat is already on the rise. The cyberattack is believed to have hit its first targets in Ukraine. Going after the central bank, main airport as well as the Chernobyl nuclear Read More

Domino Health Audit 11_17

Essential Tools – Patrolling IBM Domino Environments for Over a Decade

Essential Tools (ET) is an robust, Beacon award-winning server-based IBM Domino Administration tool designed to assist Domino administrators perform their tasks significantly more efficiently and also allow them to fulfill certain tasks that the infrastructure did not allow them to do so before. The robustness of ET stems from the basic architectural fact that the Domino Infrastructure information (Database, ACL, Read More

internet-security

Managing Access Control Lists to Improve Domino Security

An Access Control List is the front door of a Domino database.  It controls whether access to the database is allowed or denied.  After a user or server is able to access the database the Access Control List further dictates what actions may be taken, i.e. the ability to read particular documents, create documents, modify documents, tweak the database design and Read More

Domino Health Audit 11_17

Domino Security Enhancement

Secure your Domino Environment with these quick and easy tips! With the New Year many of us are creating both professional and personal goals. Consider making a goal to fortify your Domino servers. There are some steps you can take to quickly and easily increase the security of your infrastructure. One setting that has baffled me over the years is Read More