Security Basics mailing list archives
RE: Windows Server 2003
From: "Davitt J. Potter" <djpotter () rushmore com>
Date: Thu, 11 Sep 2003 22:26:43 -0600
I would agree wholeheartedly. In a large environment with multiple servers and administrators, you'll begin to see patterns and trends if you have reboots without your knowledge. If you can take out your "planned" downtime events, your real uptime numbers will begin to show. When you're talking 50+ (or more!) servers, this type of information is invaluable. Maybe a small network doesn't need that kind of detail, but you're absolutely right in an enterprise environment. Have a great Friday, Davitt -----Original Message----- From: Joey Peloquin [mailto:jpelo1 () jcpenney com] Sent: Thursday, September 11, 2003 7:39 AM To: 'Chris Wanstrath'; security-basics () securityfocus com Subject: RE: Windows Server 2003 For those who may not know, the applications Chris W. has installed are not present _by default_, but as he said, he's using it as a test platform. On the subject of shut-down hell; I consider the new shutdown feature ALL about security. IMHO, Microsoft isn't saying, "2k3 is so secure you won't ever have to shut it down", they're saying, "this is who shutdown or bounced your box and why". In a large enterprise environment like mine, I value this feature. Best regards, Joey -----Original Message----- From: Chris Wanstrath [mailto:chrisw () cinci rr com] Sent: Wednesday, September 10, 2003 1:28 PM To: security-basics () securityfocus com Subject: RE: Windows Server 2003 I've been using it since June and my very first impression (and the first impression of everyone I've talked to who has used it) is hate for the new shutdown feature. You are forced to select a reason you are shutting down your computer and if there is an unexpected shutdown, you are forced to explain why the computer turned off. Sure, this doesn't seem security-related but I think it has everything do with security. Microsoft is saying that their system is so secure you won't have to almost ever shut it down, and when you do you'd better have a damn good reason. I found myself shutting down my server quite frequently in the first few weeks, installing software and SQL and such. As far as secure by default, I am running the server behind a firewall so I don't have the Microsoft firewall or any third party firewall setup. I am running an FTP server (IIS), HTTP server (IIS), SMTP server, POP3 server, and SQL. I haven't touched any of the default security settings because I'm using the 6-month Microsoft evaluation to test software on it. It's by no means a primary server, but here is what NMap turns up on a portscan with the default security settings... Port State Service 21/tcp open ftp 25/tcp open smtp 80/tcp open http 110/tcp open pop-3 135/tcp open loc-srv 139/tcp open netbios-ssn 445/tcp open microsoft-ds 1025/tcp open NFS-or-IIS 1026/tcp open LSA-or-nterm 1027/tcp open IIS 1030/tcp open iad1 1433/tcp open ms-sql-s 2105/tcp open eklogin 3052/tcp open PowerChute 3389/tcp open ms-term-serv Doesn't look like the most secure box in my network, that's for sure. -- Chris Wanstrath : chrisw () cinci rr com LW Consulting : www.lw-consulting.com
-----Original Message----- From: Chris Halverson [mailto:chris.halverson () encana com] Sent: Wednesday, September 10, 2003 7:38 AM To: security-basics () securityfocus com Subject: Windows Server 2003 What does everyone think of the hype around Windows Server 2003 being secure by default? Has anyone implemented one in your environment? Chris
------------------------------------------------------------------------ --
- Captus Networks Are you prepared for the next Sobig & Blaster? - Instantly Stop DoS/DDoS Attacks, Worms & Port Scans - Precisely Define and Implement Network Security - Automatically Control P2P, IM and Spam Traffic FIND OUT NOW - FREE Vulnerability Assessment Toolkit http://www.captusnetworks.com/ads/42.htm
------------------------------------------------------------------------ --
--
------------------------------------------------------------------------ --- Captus Networks Are you prepared for the next Sobig & Blaster? - Instantly Stop DoS/DDoS Attacks, Worms & Port Scans - Precisely Define and Implement Network Security - Automatically Control P2P, IM and Spam Traffic FIND OUT NOW - FREE Vulnerability Assessment Toolkit http://www.captusnetworks.com/ads/42.htm ------------------------------------------------------------------------ ---- --------------------------------------------------------------------------- Captus Networks Are you prepared for the next Sobig & Blaster? - Instantly Stop DoS/DDoS Attacks, Worms & Port Scans - Precisely Define and Implement Network Security - Automatically Control P2P, IM and Spam Traffic FIND OUT NOW - FREE Vulnerability Assessment Toolkit http://www.captusnetworks.com/ads/42.htm ----------------------------------------------------------------------------
Current thread:
- RE: Windows Server 2003, (continued)
- RE: Windows Server 2003 Krill T (Sep 11)
- RE: Windows Server 2003 Andrew Ruef (Sep 11)
- Re: Windows Server 2003 Steve (Sep 11)
- Re: Windows Server 2003 Ansgar Wiechers (Sep 11)
- Re: Windows Server 2003 Hendra Santosa (Sep 12)
- Re: Windows Server 2003 Ansgar Wiechers (Sep 15)
- Re: Windows Server 2003 Jimi Thompson (Sep 15)
- RE: Windows Server 2003 Krill T (Sep 11)
- Re: Windows Server 2003 Kevin L Keathley (Sep 11)
- RE: Windows Server 2003 Joey Peloquin (Sep 11)
- RE: Windows Server 2003 Davitt J. Potter (Sep 12)
- Re: Windows Server 2003 Tim Syratt (Sep 11)
- Re: FW: Windows Server 2003 Tim Syratt (Sep 11)
- RE: Windows Server 2003 Larry Seltzer (Sep 11)