Security Basics mailing list archives

RE: Windows Server 2003


From: Joey Peloquin <jpelo1 () jcpenney com>
Date: Thu, 11 Sep 2003 08:38:58 -0500

For those who may not know, the applications Chris W. has installed are
not present _by default_, but as he said, he's using it as a test
platform.

On the subject of shut-down hell; I consider the new shutdown feature
ALL about security.  IMHO, Microsoft isn't saying, "2k3 is so secure you
won't ever have to shut it down", they're saying, "this is who shutdown
or bounced your box and why".  In a large enterprise environment like
mine, I value this feature.

Best regards,

Joey

-----Original Message-----
From: Chris Wanstrath [mailto:chrisw () cinci rr com] 
Sent: Wednesday, September 10, 2003 1:28 PM
To: security-basics () securityfocus com
Subject: RE: Windows Server 2003


I've been using it since June and my very first impression (and the
first impression of everyone I've talked to who has used it) is hate for
the new shutdown feature.  You are forced to select a reason you are
shutting down your computer and if there is an unexpected shutdown, you
are forced to explain why the computer turned off.  Sure, this doesn't
seem security-related but I think it has everything do with security.
Microsoft is saying that their system is so secure you won't have to
almost ever shut it down, and when you do you'd better have a damn good
reason.  I found myself shutting down my server quite frequently in the
first few weeks, installing software and SQL and such.

As far as secure by default, I am running the server behind a firewall
so I don't have the Microsoft firewall or any third party firewall
setup.  I am running an FTP server (IIS), HTTP server (IIS), SMTP
server, POP3 server, and SQL.  I haven't touched any of the default
security settings because I'm using the 6-month Microsoft evaluation to
test software on it.  It's by no means a primary server, but here is
what NMap turns up on a portscan with the default security settings...

Port       State       Service
21/tcp     open        ftp                     
25/tcp     open        smtp                    
80/tcp     open        http                    
110/tcp    open        pop-3                   
135/tcp    open        loc-srv                 
139/tcp    open        netbios-ssn             
445/tcp    open        microsoft-ds            
1025/tcp   open        NFS-or-IIS              
1026/tcp   open        LSA-or-nterm            
1027/tcp   open        IIS                     
1030/tcp   open        iad1                    
1433/tcp   open        ms-sql-s                
2105/tcp   open        eklogin                 
3052/tcp   open        PowerChute              
3389/tcp   open        ms-term-serv

Doesn't look like the most secure box in my network, that's for sure. 

--
Chris Wanstrath : chrisw () cinci rr com
LW Consulting   : www.lw-consulting.com

 

-----Original Message-----
From: Chris Halverson [mailto:chris.halverson () encana com]
Sent: Wednesday, September 10, 2003 7:38 AM
To: security-basics () securityfocus com
Subject: Windows Server 2003



What does everyone think of the hype around Windows Server 2003 being

secure by default?   Has anyone implemented one in your environment?





Chris



------------------------------------------------------------------------
--
-
Captus Networks
Are you prepared for the next Sobig & Blaster?
 - Instantly Stop DoS/DDoS Attacks, Worms & Port Scans
 - Precisely Define and Implement Network Security
 - Automatically Control P2P, IM and Spam Traffic
FIND OUT NOW -  FREE Vulnerability Assessment Toolkit 
http://www.captusnetworks.com/ads/42.htm

------------------------------------------------------------------------
--
--


------------------------------------------------------------------------
---
Captus Networks 
Are you prepared for the next Sobig & Blaster? 
 - Instantly Stop DoS/DDoS Attacks, Worms & Port Scans 
 - Precisely Define and Implement Network Security 
 - Automatically Control P2P, IM and Spam Traffic 
FIND OUT NOW -  FREE Vulnerability Assessment Toolkit 
http://www.captusnetworks.com/ads/42.htm
------------------------------------------------------------------------
----

The information transmitted is intended only for the person or entity to
which it is addressed and may contain confidential and/or privileged
material.  If the reader of this message is not the intended recipient,
you are hereby notified that your access is unauthorized, and any review,
dissemination, distribution or copying of this message including any
attachments is strictly prohibited.   If you are not the intended
recipient, please contact the sender and delete the material from any
computer.

---------------------------------------------------------------------------
Captus Networks 
Are you prepared for the next Sobig & Blaster? 
 - Instantly Stop DoS/DDoS Attacks, Worms & Port Scans 
 - Precisely Define and Implement Network Security 
 - Automatically Control P2P, IM and Spam Traffic 
FIND OUT NOW -  FREE Vulnerability Assessment Toolkit 
http://www.captusnetworks.com/ads/42.htm
----------------------------------------------------------------------------

Current thread: