22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

12.3.5 Protection against malicious code<br />

554 Lotus Security Handbook<br />

In Notes client, the Execution Control List (ECL) is used to protect data on a<br />

user’s workstation. With the ECL it is possible to limit what can be done by<br />

formulas and scripts on a user’s workstation. For example, with a correctly set<br />

ECL, it is possible to prevent unauthorized code from accessing the file system,<br />

other Domino databases, and external code. For more information on ECLs,<br />

consult the Lotus Domino Administrator 6 Help.<br />

It is possible to write code which could do damage on a user’s workstation and to<br />

attach that code to a mail message. Due to the nature of the Web client, there is<br />

no ECL available to protect the user’s machine against malicious code. Instead<br />

there is an iNotes Web Access active content filter whose purpose is to remove<br />

potentially malicious active content from the mail message before the message<br />

is delivered to the user. This filter will protect against the most common attacks. It<br />

is not designed, however, to protect against viruses, trojans, or other similar<br />

hostile code contained within attachments.<br />

Tip: If the organization’s security policy requires it and it is possible to do from<br />

a security architecture point of view, providing the user’s machine with a<br />

personal firewall could be a useful additional step to improve security. At a<br />

minimum, an anti-viral program should be used to trap anything the execution<br />

control list cannot (resulting generally from a user overriding the warnings of<br />

the ECL).<br />

12.3.6 Client-side security<br />

This section describes some client-side (browser) security considerations when<br />

using iNotes Web Access.<br />

Cookies<br />

A cookie, as we mentioned previously, is a method which is used to send<br />

session-based information from browser to server. Cookies normally contain<br />

information about the user or the user’s session, or both.<br />

To have iNotes Web Access work properly, the browser has to allow cookies.<br />

iNotes Web Access uses one cookie with the name “Shimmer,” where all<br />

application settings are stored. This cookie is only retained in memory and never<br />

written to the user's workstation.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!