﻿<?xml version="1.0" encoding="utf-8"?><!--RSS Genrated: Fri, 03 Apr 2026 18:01:49 GMT--><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:ev="http://purl.org/rss/1.0/modules/event/"><channel><title>Epoch Online - Networking infrastructure</title><link>https://www.epochonline.com:443/Blog/ctl/RSS/mid/945/ev/1/CategoryID/17/CategoryName/Networking-infrastructure</link><atom:link href="https://www.epochonline.com:443/Blog/ctl/RSS/mid/945/ev/1/CategoryID/17/CategoryName/Networking-infrastructure" rel="self" type="application/rss+xml" /><description>RSS document</description><item><dc:creator><![CDATA[Eric Smith]]></dc:creator><title><![CDATA[Data Access Governance Best Practices - Part 2 of 2]]></title><link>https://www.epochonline.com/Blog/ArtMID/945/ArticleID/38/Data-Access-Governance-Best-Practices-Part-2-of-2</link><description><![CDATA[  Best Practices for File Server Permissions:  

 
  Have users log on using domain user accounts rather than local accounts. This approach centralizes the administration of share permissions. 
  ...]]></description><pubDate>Wed, 07 Jul 2021 14:38:00 GMT</pubDate><guid>https://www.epochonline.com/Blog/ArtMID/945/ArticleID/38/Data-Access-Governance-Best-Practices-Part-2-of-2</guid><dc:identifier><![CDATA[5120d9c9-d3e5-4845-8ff4-8fc65e4eb3dc-38]]></dc:identifier></item><item><dc:creator><![CDATA[Eric Smith]]></dc:creator><title><![CDATA[Data Access Governance Best Practices - Part 1 of 2]]></title><link>https://www.epochonline.com/Blog/ArtMID/945/ArticleID/37/Data-Access-Governance-Best-Practices-Part-1-of-2</link><description><![CDATA[  Best Practices for Data Access Management:  

 
  Create a complete inventory of your users and resources and keep it up to date. 
  Work with department managers and other business owners to ...]]></description><pubDate>Thu, 15 Apr 2021 14:00:00 GMT</pubDate><guid>https://www.epochonline.com/Blog/ArtMID/945/ArticleID/37/Data-Access-Governance-Best-Practices-Part-1-of-2</guid><dc:identifier><![CDATA[5120d9c9-d3e5-4845-8ff4-8fc65e4eb3dc-37]]></dc:identifier></item><item><dc:creator><![CDATA[Eric Smith]]></dc:creator><title><![CDATA[Best Practices for Windows File Server Auditing]]></title><link>https://www.epochonline.com/Blog/ArtMID/945/ArticleID/33/Best-Practices-for-Windows-File-Server-Auditing</link><description><![CDATA[  #1 Best Practice: Decide What Audit Policies You Need  

 Do you want to know when someone accesses or viewing a file? Do you want to know when someone is copying files from the server to their ...]]></description><pubDate>Fri, 18 Dec 2020 20:18:00 GMT</pubDate><guid>https://www.epochonline.com/Blog/ArtMID/945/ArticleID/33/Best-Practices-for-Windows-File-Server-Auditing</guid><dc:identifier><![CDATA[5120d9c9-d3e5-4845-8ff4-8fc65e4eb3dc-33]]></dc:identifier></item></channel></rss>