0% found this document useful (0 votes)
13 views4 pages

Job Aid: Creating Virus-Clean Policies and Procedures: Define Roles and Responsibilities

Uploaded by

borade.vijay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views4 pages

Job Aid: Creating Virus-Clean Policies and Procedures: Define Roles and Responsibilities

Uploaded by

borade.vijay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Job Aid: Creating Virus-Clean Policies

and Procedures

Policies and procedures are essential to successfully maintain a computer


environment that is free of viruses. Policies and procedures specify who is
responsible for responding when a virus is detected and what type of action,
both proactive and reactive, a company will take to eliminate the virus. By
providing documented responses and responsibilities, a company is able to
ensure that all appropriate users are prepared to deal with security issues, such
as virus attacks, when an actual attack occurs.
The following series of questions will guide you in creating policies and
procedures for maintaining a virus-clean environment.
Define roles and Use the following questions to define the roles and responsibilities of users who
responsibilities will be involved in responding to a virus attack:
! Who are the users, what are their roles, and how are the users within those
roles responsible for responding to a virus attack?
! Will the following responses to the virus attack require management
authorization to implement?
• Updating signatures.
• Shutting down a single server.
• Shutting down all e-mail services.
! Who are the users who are responsible for authorizing responses to a virus
attack?

Define a communication After a virus attack occurs, a means of communicating what is going on needs
plan to be in place. Use the following questions to define how different users will be
notified:
! Is a notification process in place?
! How will management be notified?
! How will Help desk be notified?
! How will your end users be notified?
2 Job Aid: Creating Virus-Clean Policies and Procedures

Create a risk Depending on whether the virus impacts a few users or all users, your response
assessment may vary. Use the following questions to help identify the impact on your
company, based on how many users are impacted:
! Determine the levels of impact that a virus can reach in your computing
environment:
• Impacts a few users.
• Impacts many users.
• Impacts all users.
• Impacts a single server.
• Impacts all servers.
! Determine the impact on your company, based on the levels that you
defined:
• What level does the virus impact need to reach before the financial cost
to your company is too great to continue providing e-mail services to
users?
• Is the financial cost to your company greater if servers continue to
communicate with and service client computers while the virus is dealt
with, or if services are suspended while the incident is being dealt with?

Create a mitigation plan Use the following questions to define how you will deal with the virus attack:
! Can the incident be resolved by updating virus signatures and running a
manual scan? If so:
• Where can you get virus signature updates for your server software?
• Where can you get virus signature updates for your client software?
! Is an interim solution, such as a security update, available? If so:
• Where can you get updates from your antivirus vendor?
• To get updates from Microsoft, go to http://www.microsoft.com/
exchange/downloads and http://support.microsoft.com.
! To contain the impact of the virus incident, does the response require:
• Inbound e-mail to be shut down?
• All e-mail to be shut down?
• The information stores to be restored?
• The entire server to be restored?
! Are there procedures for removing the virus:
• From the servers?
• From the mail gateways?
• From the client workstations?
Job Aid: Creating Virus-Clean Policies and Procedures 3

! Has a toolkit been assembled and does it contain the following items?
• Boot disks.
• Operating system disks.
• Application disks.
• Service packs.
• Security patches.
! Are the current backups adequate to perform:
• A Microsoft® Exchange server restore?
• An entire server restore?
! Are current backups available, or do the backups need to be returned from
offsite storage?
! Is a contingency plan in place in case backups are not available?
! Have you conducted a review of your policies and procedures after the virus
incident is resolved? If so, do you need to:
• Update the policies and procedures?
• Update user training?

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy