22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

532 Lotus Security Handbook<br />

If the home server is unavailable when a Notes client is installed – for example,<br />

when a user is disconnected – the workstation ECL is created with default<br />

settings, rather than being created from the administration ECL.<br />

Note: Technically, when a server is initially installed, there is no Admin ECL.<br />

When a client attempts to edit the workstation ECL, or refresh it from an admin<br />

ECL that does not exist, the client creates an ECL with default settings that<br />

are coded into the client. The Admin ECL exists on disk, once an administrator<br />

modifies and saves it. Once the modified administration ECL is saved to disk,<br />

then that is the ECL that is copied to user workstations.<br />

You use the administration ECL to define and deploy customized ECLs for your<br />

users. You can control ECL changes or allow users to modify their own ECLs.<br />

Furthermore, you can update your users' workstation ECLs as security<br />

requirements change – automatically, through the use of a security settings<br />

document deployed through a policy; or manually, by asking users to refresh<br />

their workstation ECLs.<br />

To create customized ECLs that can be deployed for specific groups of users,<br />

you must use a security settings document that is deployed through a server<br />

policy. For example, you can create one ECL exclusively for contract employees<br />

and another ECL for full-time employees.<br />

For more information on configuring and deploying ECLs, see “Protecting User<br />

Workstations with Execution Control Lists” in the Domino 6 Administration Guide.<br />

For more information on configuring a security settings document for deploying<br />

ECLs, see “Using Policies” in the Domino 6 Administration Guide.<br />

Guidelines for effective ECLs<br />

Your goal as an administrator is to limit the number of trusted signers for active<br />

content, and the access that active content has to user workstations. To<br />

accomplish this goal, limit the number of trustworthy signers in your organization<br />

and ensure that workstation ECLs trust only those signers.<br />

Use these guidelines to create secure ECLs:<br />

► Create an administration ECL, or several administration ECLs, as necessary,<br />

to deploy in your organization.<br />

► Do not grant access to unsigned content. This creates a security hole that<br />

allows potentially harmful code, malicious or otherwise, to access user<br />

workstations. Keep the default access options for unsigned content.<br />

► Do not let your users trust unsigned content. To prevent users from changing<br />

their ECLs –for example, by giving access to unsigned content, or to content

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!