<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: The 43 Things Administrators Should Never Do</title>
	<atom:link href="http://www.gfi.com/blog/administrators-should-never-do/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/administrators-should-never-do/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=administrators-should-never-do</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 13:27:20 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Bill</title>
		<link>http://www.gfi.com/blog/administrators-should-never-do/comment-page-1/#comment-30082</link>
		<dc:creator>Bill</dc:creator>
		<pubDate>Wed, 09 Nov 2011 13:42:05 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3480#comment-30082</guid>
		<description><![CDATA[You left out an obvious one: Never take food or drink into the server room. Otherwise, a very useful list!]]></description>
		<content:encoded><![CDATA[<p>You left out an obvious one: Never take food or drink into the server room. Otherwise, a very useful list!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Bogart</title>
		<link>http://www.gfi.com/blog/administrators-should-never-do/comment-page-1/#comment-29933</link>
		<dc:creator>Bogart</dc:creator>
		<pubDate>Thu, 13 Oct 2011 18:46:06 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3480#comment-29933</guid>
		<description><![CDATA[&gt; 11. Apply a patch without testing

Closely related would be &quot;Deploy new untested hardware in a production system&quot;.  An incident involving a new hard drive comes to mind here.

Always, always perform a full sector-by-sector write/compare test of new hard drives before placing them in service.

The same level of testing should really apply to any new piece of hardware.]]></description>
		<content:encoded><![CDATA[<p>&gt; 11. Apply a patch without testing</p>
<p>Closely related would be &#8220;Deploy new untested hardware in a production system&#8221;.  An incident involving a new hard drive comes to mind here.</p>
<p>Always, always perform a full sector-by-sector write/compare test of new hard drives before placing them in service.</p>
<p>The same level of testing should really apply to any new piece of hardware.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Perry B.</title>
		<link>http://www.gfi.com/blog/administrators-should-never-do/comment-page-1/#comment-29877</link>
		<dc:creator>Perry B.</dc:creator>
		<pubDate>Thu, 06 Oct 2011 11:35:08 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3480#comment-29877</guid>
		<description><![CDATA[42. Abuse their privileges

Only the newbie administrators fall for this type of mentality. Honestly speaking, I&#039;ve been there and done some sort of happy-go-lucky decisions as an admin. But I&#039;ve learned my lesson well. I was suspended from my work for a month - without pay.

Trust is not only the issue here. You should also impart respect and right of privacy to your fellow workers. Abusing your privileges as an IT admin or tech manager can damage both your career and reputation. So beware.]]></description>
		<content:encoded><![CDATA[<p>42. Abuse their privileges</p>
<p>Only the newbie administrators fall for this type of mentality. Honestly speaking, I&#8217;ve been there and done some sort of happy-go-lucky decisions as an admin. But I&#8217;ve learned my lesson well. I was suspended from my work for a month &#8211; without pay.</p>
<p>Trust is not only the issue here. You should also impart respect and right of privacy to your fellow workers. Abusing your privileges as an IT admin or tech manager can damage both your career and reputation. So beware.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: David Levine</title>
		<link>http://www.gfi.com/blog/administrators-should-never-do/comment-page-1/#comment-29835</link>
		<dc:creator>David Levine</dc:creator>
		<pubDate>Fri, 30 Sep 2011 19:44:48 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3480#comment-29835</guid>
		<description><![CDATA[@Ross - 

Surfing the internet while logged on as an admin leaves you wide open for all sorts of potential risks that you might encounter out there. Sure, you&#039;re smart enough to not go to any sites that would hit you with malware as the admin, but what about breached and/or hacked sites, driveby downloads, etc.? There have been plenty of well-known and reputable websites that have been hijacked to do &quot;bad things&quot; to the computers of anyone who visits - if you&#039;ve got admin rights, one of those sites can do considerably more damage to your PC than if you&#039;re &quot;just another user&quot;. If you&#039;ve got *domain admin* rights, well... you may as well hand over the keys to your office and ask them to be gentle.

Not saying that anything bad will definitely happen - there&#039;s a good chance that it won&#039;t. But is that a chance you&#039;re willing to take? It&#039;s a lot easier to clean up and/or reimage a desktop than rebuild your whole network because it got a brand-new piece of malware that none of your AV detects yet. It&#039;s also a lot better career-wise to tell the higher-ups that &quot;a new virus infected Bob&#039;s PC, but I took care of it&quot; than it is to say &quot;our network is down because *I* clicked a link on (insert reputable search engine here), got sent to a hijacked website that installed some malware, it spread faster than I could contain it, I don&#039;t know what -if any- confidential data has been leaked or stolen, and have no idea how long it&#039;s going to take me to get everything back up and running.&quot;

&quot;Best Practices&quot; are just really, really, really, really good suggestions - ultimately, it&#039;s our decision as IT to weigh risks versus benefits - both for the firms we support and for our careers overall - they&#039;re often more closely related than we might think.]]></description>
		<content:encoded><![CDATA[<p>@Ross &#8211; </p>
<p>Surfing the internet while logged on as an admin leaves you wide open for all sorts of potential risks that you might encounter out there. Sure, you&#8217;re smart enough to not go to any sites that would hit you with malware as the admin, but what about breached and/or hacked sites, driveby downloads, etc.? There have been plenty of well-known and reputable websites that have been hijacked to do &#8220;bad things&#8221; to the computers of anyone who visits &#8211; if you&#8217;ve got admin rights, one of those sites can do considerably more damage to your PC than if you&#8217;re &#8220;just another user&#8221;. If you&#8217;ve got *domain admin* rights, well&#8230; you may as well hand over the keys to your office and ask them to be gentle.</p>
<p>Not saying that anything bad will definitely happen &#8211; there&#8217;s a good chance that it won&#8217;t. But is that a chance you&#8217;re willing to take? It&#8217;s a lot easier to clean up and/or reimage a desktop than rebuild your whole network because it got a brand-new piece of malware that none of your AV detects yet. It&#8217;s also a lot better career-wise to tell the higher-ups that &#8220;a new virus infected Bob&#8217;s PC, but I took care of it&#8221; than it is to say &#8220;our network is down because *I* clicked a link on (insert reputable search engine here), got sent to a hijacked website that installed some malware, it spread faster than I could contain it, I don&#8217;t know what -if any- confidential data has been leaked or stolen, and have no idea how long it&#8217;s going to take me to get everything back up and running.&#8221;</p>
<p>&#8220;Best Practices&#8221; are just really, really, really, really good suggestions &#8211; ultimately, it&#8217;s our decision as IT to weigh risks versus benefits &#8211; both for the firms we support and for our careers overall &#8211; they&#8217;re often more closely related than we might think.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: PBanks</title>
		<link>http://www.gfi.com/blog/administrators-should-never-do/comment-page-1/#comment-29833</link>
		<dc:creator>PBanks</dc:creator>
		<pubDate>Fri, 30 Sep 2011 18:23:39 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3480#comment-29833</guid>
		<description><![CDATA[The concept behind it, on which I agree, is that if you are surfing the web under an admin account there is a possibility something like malware and or a virus could be downloaded w/u you knowing. It would then start executing commands under the logged in account, which in this case would be the Administrator.]]></description>
		<content:encoded><![CDATA[<p>The concept behind it, on which I agree, is that if you are surfing the web under an admin account there is a possibility something like malware and or a virus could be downloaded w/u you knowing. It would then start executing commands under the logged in account, which in this case would be the Administrator.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Ross Diamond</title>
		<link>http://www.gfi.com/blog/administrators-should-never-do/comment-page-1/#comment-29825</link>
		<dc:creator>Ross Diamond</dc:creator>
		<pubDate>Fri, 30 Sep 2011 09:14:18 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3480#comment-29825</guid>
		<description><![CDATA[I don&#039;t get the point of &quot;surfing the Internet while logged on as an administrator&quot; is a bad practice. I think it&#039;s the complete opposite. Admins have more rights - they can install, uninstall, copy, delete, and do anything they want on a computer. They can even change the system settings. Meaning, they have the complete power and authority. They can completely monitor what&#039;s going on to their machine - in real time.

If you&#039;re logged on as a regular user, chances are, you&#039;ll not know what&#039;s happening to your computer. And if something happens (such as complete break down and software crashes due to malware attack), you can&#039;t do anything to correct it.]]></description>
		<content:encoded><![CDATA[<p>I don&#8217;t get the point of &#8220;surfing the Internet while logged on as an administrator&#8221; is a bad practice. I think it&#8217;s the complete opposite. Admins have more rights &#8211; they can install, uninstall, copy, delete, and do anything they want on a computer. They can even change the system settings. Meaning, they have the complete power and authority. They can completely monitor what&#8217;s going on to their machine &#8211; in real time.</p>
<p>If you&#8217;re logged on as a regular user, chances are, you&#8217;ll not know what&#8217;s happening to your computer. And if something happens (such as complete break down and software crashes due to malware attack), you can&#8217;t do anything to correct it.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Sarah Martin</title>
		<link>http://www.gfi.com/blog/administrators-should-never-do/comment-page-1/#comment-29808</link>
		<dc:creator>Sarah Martin</dc:creator>
		<pubDate>Thu, 29 Sep 2011 10:57:31 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3480#comment-29808</guid>
		<description><![CDATA[Another great list! Thanks, Emmanuel! So much useful stuff here - I myself learned really a lot. It is even more useful because it contains soft-skill tips - i.e. how to communicate with your users. I admit, I have made some of the mistakes here, like hiding information and using the &quot;Don&#039;t look at what I am doing but listen to what I am saying!&quot; approach and you are right that these doesn&#039;t work.]]></description>
		<content:encoded><![CDATA[<p>Another great list! Thanks, Emmanuel! So much useful stuff here &#8211; I myself learned really a lot. It is even more useful because it contains soft-skill tips &#8211; i.e. how to communicate with your users. I admit, I have made some of the mistakes here, like hiding information and using the &#8220;Don&#8217;t look at what I am doing but listen to what I am saying!&#8221; approach and you are right that these doesn&#8217;t work.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Steve Mclellan</title>
		<link>http://www.gfi.com/blog/administrators-should-never-do/comment-page-1/#comment-29762</link>
		<dc:creator>Steve Mclellan</dc:creator>
		<pubDate>Fri, 23 Sep 2011 17:20:38 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3480#comment-29762</guid>
		<description><![CDATA[Sometimes, you have to bypass firewalls in order to input and encode some data and enter a very restricted system you would not and could not typically access.

For instance, some anti-malware, anti-virus, and anti-phishing programs require Windows-based operating system&#039;s firewalls to be temporarily disabled. Also, some fixtools can&#039;t perform their job well if firewalls are enabled. 

But these are on a case-to-case basis. You don&#039;t have to bypass your firewalls everytime you run repair-based apps.]]></description>
		<content:encoded><![CDATA[<p>Sometimes, you have to bypass firewalls in order to input and encode some data and enter a very restricted system you would not and could not typically access.</p>
<p>For instance, some anti-malware, anti-virus, and anti-phishing programs require Windows-based operating system&#8217;s firewalls to be temporarily disabled. Also, some fixtools can&#8217;t perform their job well if firewalls are enabled. </p>
<p>But these are on a case-to-case basis. You don&#8217;t have to bypass your firewalls everytime you run repair-based apps.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-14 22:10:40 by W3 Total Cache --