+ Post New Thread
Page 2 of 2 FirstFirst 12
Results 16 to 20 of 20
How do you do....it? Thread, Scanning Students USB's on Login in Technical; Thanks for that, Jonathan. That clears up that we can look at their pen drives although I'm still not sure ...
  1. #16
    enjay's Avatar
    Join Date
    Apr 2007
    Location
    Reading, Berkshire, UK
    Posts
    4,497
    Thank Post
    282
    Thanked 196 Times in 167 Posts
    Rep Power
    76
    Thanks for that, Jonathan. That clears up that we can look at their pen drives although I'm still not sure that we should look at them - beyond protecting our network security (and rare legal / child protection instances) - but that's a separate question.

  2. #17
    enjay's Avatar
    Join Date
    Apr 2007
    Location
    Reading, Berkshire, UK
    Posts
    4,497
    Thank Post
    282
    Thanked 196 Times in 167 Posts
    Rep Power
    76
    @ricki - why bother scanning the whole pen drive on insertion? Aside the fact that with 2+GB drives, it would take ages, a virus-infected file on a pen doesn't become an issue until someone attempts to open said file, so on-access scanning would suffice.

  3. #18
    ricki's Avatar
    Join Date
    Jul 2005
    Location
    uk
    Posts
    1,477
    Thank Post
    20
    Thanked 164 Times in 157 Posts
    Rep Power
    52
    I want to scan they beause sophos not only detects viruses but malicious software which might deter them bringing some things in lols.

    Richard

  4. #19
    Jona's Avatar
    Join Date
    May 2007
    Location
    Cranleigh
    Posts
    471
    Thank Post
    14
    Thanked 51 Times in 49 Posts
    Rep Power
    24
    Aside from the legal and moral issues what happens if someone plugs in a 32gb pen drive??

  5. #20
    Dragan_Glas's Avatar
    Join Date
    May 2008
    Location
    Buckinghamshire
    Posts
    1
    Thank Post
    0
    Thanked 0 Times in 0 Posts
    Rep Power
    0

    Wink

    Greetings,

    Given the above-mentioned ethical and legal issues, would it not be simplest to look at it this way...!?

    There are three scenarios which would be of concern to anyone responsible for a network:

    1) Removable media to the network;
    2) Network to removable media;
    3) Removable media to removable media.

    In all three cases, any files - whether programs or data - have to traverse the network.

    It is at this point - on entering the network - that one not only has the ethical and legal right, but also the practical capability to detect/prevent such activity.

    As has already been mentioned, combining judicial use of GPOs and suitable software (anti-virus/anti-malware/HIPS) will suffice.

    Once the pupils realise this, they'll be less inclined to take chances with getting into trouble.

    However, having such policies in place is your backup position.

    Making the pupils aware of the existence of such policies - and the consequences of breaking them(!) - is the real deterrent.

    Kindest regards,

    James



SHARE:
+ Post New Thread
Page 2 of 2 FirstFirst 12

Similar Threads

  1. login scripts
    By palmer_eldritch in forum Mac
    Replies: 1
    Last Post: 6th March 2008, 11:47 AM
  2. reconnect on login
    By brubakes in forum *nix
    Replies: 2
    Last Post: 17th January 2008, 09:10 AM
  3. scanning for porn
    By goodhead in forum Windows
    Replies: 4
    Last Post: 27th February 2007, 12:32 PM
  4. The gadget show +wireless scanning util.
    By Dos_Box in forum General Chat
    Replies: 4
    Last Post: 22nd February 2006, 05:02 PM
  5. Replies: 32
    Last Post: 25th July 2005, 08:17 AM

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •