Ensure that all scheduled programs are legitimate.
The server provides several methods for scheduling jobs to run at a later time, including the job scheduler. Normally, these methods do not represent a security exposure because the user who schedules the job must have the same authority that is required to submit the job to batch. However, you should periodically check for jobs scheduled in the future. A disgruntled user who is no longer in the organization might use this method to schedule a disaster.