Tech Support Forum banner
Status
Not open for further replies.
1 - 6 of 6 Posts

·
Super Moderator, Editor, Articles Team
Joined
·
12,667 Posts
Discussion Starter · #1 ·
Just done a wipe and reinstall of my nephews laptop and was thinking i had done a pretty good job but after checking it with Belarc Advisor, the benchmark looks quite dismal.

I was going to ask if someone could take a look but can't figure how to post the report or even if thats possible. The first bit is ok till you get to the security, audit and account policies etc.

Went through Glasweigans very good security, what do i need post but the machine has the same problem as mine, not enough memory, so can't cope with all the protection as advised without draining too many resources.

Should i assume that because Belarc only comes up with a score of 3.13 out of 10, the machine still needs a lot of work?

Just tried to post screenshot and for some reason its telling me that its already been posted in another one of my threads????? :4-dontkno
 

·
Super Moderator, Editor, Articles Team
Joined
·
12,667 Posts
Discussion Starter · #3 ·
Thanks Dai, that laptop has gone back now but just had a look and my pc shows similar. I have another laptop to work on now so will try to figure how to post details of this one when i have finished.

If anyone else has any comments about Belarc results please, feel free. :grin:
 

·
Premium Member
Joined
·
39,538 Posts
Dave, I would take the Belarc results only so far. I've seen some reports about v7 where similar scores of 3.13 turned out to be for an enterprise environment. In other words, multiple users and not a single user. Common sense is one of your best defences.
 

·
Super Moderator, Editor, Articles Team
Joined
·
12,667 Posts
Discussion Starter · #6 ·
@Dai, Yeah willl do mate though i thought this was a more general security question.

Thanks Iain, i suspected as much. I clicked on one of the failures and it came up with this;
File and Registry Auditing

A valuable tool that is available to NTFS volumes, in addition to NTFS Permissions, is the ability to audit what exactly happens to files on a file system. You can audit - user by user, when a file is accessed, modified, or created. The benefit of security auditing after a system has been compromised can be incredible - if auditing was actually turned on before the compromise, you can get a play-by-play description of exactly what happened, and what files were viewed or modified by each user. If auditing is not enabled before the compromise, there is no information to audit.

This feature of NTFS file systems is not normally used because there is a level of performance overhead involved, and because the security audit log will tend to be flooded with events. We've already dealt with the event log by significantly increasing its size. The performance overhead is something that users are likely to notice; especially during computer start-up and shut-down.
Maybe its a bit deeper than we need to go.
 
1 - 6 of 6 Posts
Status
Not open for further replies.
Top