Since networks typically have less stringent security rules inside their networks than out, it is important to have strong host-based security. The FBI reports that over 62% of attacks occur from insiders. Since copies of Cisco configuration files are typically stored on internal systems, make sure those systems are as strong as possible. Microsoft's C2 Configuration Manager is a tool that can be used to strengthen the security of NT nodes. Through point and click methods, this manager helps lock down NT host based security. |