User manual

Table Of Contents
Chapter 8
Security measures
Be sure that your database files, host computers, workstations, and the
networks that access them are safe from theft and corruption. This chapter
covers the following five important security measures that you can implement
to protect your data and equipment. You should:
1 Enhance physical security
1 Enhance operating system security
1 Establish network security
1 Back up databases and other important files
1 Install, run, and upgrade anti-virus software
For more information about securing FileMaker Pro files, see
www.filemaker.com/support/security.
Enhancing physical security
Evaluate your computers to make sure they are physically secure:
1 The host computer should be a dedicated machine, anchored to a desk or
immovable object with a lock. Secure the computer so that its hard drive
cannot be removed. Restrict access to the computer by storing it in a locked
room.
1 Secure the client workstations that access a database. Lock the computers
down and restrict access by using a screensaver that requires a password.
1 Ensure the physical security of backup copies of files stored on portable
media, such as tapes and CDs.
φμπ10_υσερσ_γυιδε.βοοκ Παγε 197 Μονδαψ, Αυγυστ 25, 2008 3:59 ΠΜ