C h a p t e r 5 : A c c e s s i n g M a t r o x I r i s E - S e r i e s
• Limiting services (such as, folder browsing and anonymous FTP) to the minimum
• Restricting the list of users.
• Enabling logging whenever possible, and checking it often for unauthorized access.
• Reducing the maximum number of simultaneous connections.
• Reducing the number of shared folders.
• Using hard to guess user names and passwords containing both alphabetic and
Additional methods of securing your Matrox Iris E-Series include the following:
required.
numeric characters.