“Rogue computers are systems that are not considered substantial risks because there is no way to determine whether they comply with established security policies. Rogue computers can be a problem for system administrators and security professionals. Noncompliant systems pose a number of risks, from being vulnerable to malware infection to being potential platforms for an attack. Traditionally, they have been difficult to manage and bring into compliance.
This document discusses some effective methods that can be used to help enforce compliance with security policies. This approach maximizes the benefits of risk management efforts and adds an extra layer of security to midsize business networks that will help reduce the risks associated with untrusted and unmanaged computers…”
Check out the details on how to secure your network against unmanaged clients over at:
http://technet.microsoft.com/en-us/library/cc875843.aspx
HTH,
Tom
Thomas W Shinder, M.D., MCSE
Sr. Consultant / Technical Writer
Prowess Consulting www.prowessconsulting.com
PROWESS CONSULTING | Microsoft Forefront Security Specialist
Email: [email protected]
MVP – Forefront Edge Security (ISA/TMG/IAG)