reconfiguring a network Essay

Submitted By cmaxwell1212
Words: 1296
Pages: 6

New User Guide & Basic Troubleshooting Guide

Table of Contents

Network Login and Passwords
There are two separate networks on the campus, and they require separate logins. The admin network is only available in the Instructor area and admin offices.
Administration
To log into the admin network you will use your 1ITT email as your username. You will also be given a password to use for your initial login. Once you have successfully logged in with the initial password, you will be required to change that password.
Your new password must meet the following complexity requirements: Passwords must be at least 8 characters and a maximum of 16
Must contain at least three of the following
Lower-case characters: abcdefghijklmnopqrstuvqxyz
Upper-case characters: ABCDEFGHIJKLMNOPQRSTUVWXYZ
Numbers: 0123456789
Special Characters: !@#$%^*()-_=+;:,./?`~
Users are required to choose passwords that are difficult to guess. Password must not be easily deducible words or characters such as the user’s first or last name, spouse’s name, name of pet, a sequence of numerals or letters, or any word found in a standard English dictionary.
Passwords should never be written down
Users must not write down or otherwise record their passwords in readable form near the system to which the password pertains. For example, a user must not write his/her network password on a note and tape it to his/her computer.
Passwords must not be written down and left in a place where others might discover it. If a password must be written down, it must be secured and far away from the system to which it pertains.
In general, users must choose passwords that are challenging for others to guess but easy for them to remember, so users do not feel compelled to write down a password in order to remember it.
Display and printing of passwords
The display and printing of passwords must be masked, suppressed, or otherwise obscured so that unauthorized parties will not be able to observe or subsequently recover them.
Electronic storage of passwords in readable form
Passwords must not be stored in plain text or in other readable forms in places where unauthorized parties might recover them, including, but not limited to: batch files; login scripts; computers without access control; terminal function keys; or in software macros.
Use of same password prohibited
While the specific generation retention depends on the computer system, users on all systems are prohibited from re-using a password when prompted to change it by the system.
Suspected disclosure forces password changes
If a user suspects or knows that their password integrity has been compromised, it must be changed immediately.
Password sharing prohibition
Regardless of the circumstances, passwords must never be shared or revealed to anyone else besides the authorized user. To do so exposes the authorized user to responsibility for actions that the other party takes with the password. If users need to share computer resident data, they must use electronic mail, public directories on local area network servers and other authorized mechanisms as appropriate.
No user should ever use another person’s login for any reason
Limit on consecutive unsuccessful attempts to enter a password
To prevent password guessing attacks, the number of consecutive attempts to enter an incorrect password must be strictly limited. After three unsuccessful attempts to enter a password, the involved user ID must be suspended for thirty minutes or until reset by a system administrator.
Password Reset
If you have forgotten your network password or suspect that your account has been compromised, the SST can reset your password.
IRIS passwords require a Service request through the SST. IRIS password resets may take up to a day to be changed.
Pinnacle password resets are handled through the Dean.
Locking Unattended PC’s
All unattended PC’s must be locked to…