Page 22 IT Administrators Guide
3.4.1 Password security
Skype never requests a user’s account name or password by email. Skype passwords are
stored as a non-reversible hash. The only areas where passwords are needed are when:
˚
Signing in to Skype
˚
Signing in to Skype Manager
˚
Managing Skype accounts at secure.skype.com/account/login
˚
Signing in to other known-to-be-valid Skype accounts, such as developer.skype.
com
Skype keeps two references to each user’s email address, one in the prole on their
computer and the other in My Account on our website (for password recovery). If their
email address changes, it should be updated in both places.
You should also educate users on smart online practices, including:
˚
Effective passwords and password management
˚
User identities
˚
The signicance of potential phishing attacks
˚
The risks of receiving and opening executables
3.4.2 Viruses and Trojans
Skype simplies le transfers by allowing direct le transfer between Skype clients.
However P2P le transfer is a security challenge for corporate networks, as it bypasses
your business' network security infrastructure. For this reason, you can disable le
transfer throughout your organization via the GPO Editor or by changes to the XML les, if
required. By default, le transfers are enabled.
Some basic guidelines will protect your corporate network and still allow users to use le
transfer. Receiving users must:
˚
Have shared contact details.
˚
Have not blocked the sender.
˚
Be online when the sender initiates the le transfer.
˚
Be willing and able to accept the le transfer from the sender.
Note:
Files to be transferred must be smaller than 2GB.
The best practice for any le transfer is that all les should be scanned for viruses and
malware. You should enable real-time scanning on your anti-virus software, which will
automatically scan before sending or receiving a le.
Note:
Skype has no support for centralized anti-virus scanning.
Kommentare zu diesen Handbüchern