Security Basics mailing list archives
RE: Windows Server 2003
From: Joey Peloquin <jpelo1 () jcpenney com>
Date: Thu, 11 Sep 2003 08:38:58 -0500
For those who may not know, the applications Chris W. has installed are not present _by default_, but as he said, he's using it as a test platform. On the subject of shut-down hell; I consider the new shutdown feature ALL about security. IMHO, Microsoft isn't saying, "2k3 is so secure you won't ever have to shut it down", they're saying, "this is who shutdown or bounced your box and why". In a large enterprise environment like mine, I value this feature. Best regards, Joey -----Original Message----- From: Chris Wanstrath [mailto:chrisw () cinci rr com] Sent: Wednesday, September 10, 2003 1:28 PM To: security-basics () securityfocus com Subject: RE: Windows Server 2003 I've been using it since June and my very first impression (and the first impression of everyone I've talked to who has used it) is hate for the new shutdown feature. You are forced to select a reason you are shutting down your computer and if there is an unexpected shutdown, you are forced to explain why the computer turned off. Sure, this doesn't seem security-related but I think it has everything do with security. Microsoft is saying that their system is so secure you won't have to almost ever shut it down, and when you do you'd better have a damn good reason. I found myself shutting down my server quite frequently in the first few weeks, installing software and SQL and such. As far as secure by default, I am running the server behind a firewall so I don't have the Microsoft firewall or any third party firewall setup. I am running an FTP server (IIS), HTTP server (IIS), SMTP server, POP3 server, and SQL. I haven't touched any of the default security settings because I'm using the 6-month Microsoft evaluation to test software on it. It's by no means a primary server, but here is what NMap turns up on a portscan with the default security settings... Port State Service 21/tcp open ftp 25/tcp open smtp 80/tcp open http 110/tcp open pop-3 135/tcp open loc-srv 139/tcp open netbios-ssn 445/tcp open microsoft-ds 1025/tcp open NFS-or-IIS 1026/tcp open LSA-or-nterm 1027/tcp open IIS 1030/tcp open iad1 1433/tcp open ms-sql-s 2105/tcp open eklogin 3052/tcp open PowerChute 3389/tcp open ms-term-serv Doesn't look like the most secure box in my network, that's for sure. -- Chris Wanstrath : chrisw () cinci rr com LW Consulting : www.lw-consulting.com
-----Original Message----- From: Chris Halverson [mailto:chris.halverson () encana com] Sent: Wednesday, September 10, 2003 7:38 AM To: security-basics () securityfocus com Subject: Windows Server 2003 What does everyone think of the hype around Windows Server 2003 being secure by default? Has anyone implemented one in your environment? Chris
------------------------------------------------------------------------ --
- Captus Networks Are you prepared for the next Sobig & Blaster? - Instantly Stop DoS/DDoS Attacks, Worms & Port Scans - Precisely Define and Implement Network Security - Automatically Control P2P, IM and Spam Traffic FIND OUT NOW - FREE Vulnerability Assessment Toolkit http://www.captusnetworks.com/ads/42.htm
------------------------------------------------------------------------ --
--
------------------------------------------------------------------------ --- Captus Networks Are you prepared for the next Sobig & Blaster? - Instantly Stop DoS/DDoS Attacks, Worms & Port Scans - Precisely Define and Implement Network Security - Automatically Control P2P, IM and Spam Traffic FIND OUT NOW - FREE Vulnerability Assessment Toolkit http://www.captusnetworks.com/ads/42.htm ------------------------------------------------------------------------ ----
The information transmitted is intended only for the person or entity to which it is addressed and may contain confidential and/or privileged material. If the reader of this message is not the intended recipient, you are hereby notified that your access is unauthorized, and any review, dissemination, distribution or copying of this message including any attachments is strictly prohibited. If you are not the intended recipient, please contact the sender and delete the material from any computer.
--------------------------------------------------------------------------- Captus Networks Are you prepared for the next Sobig & Blaster? - Instantly Stop DoS/DDoS Attacks, Worms & Port Scans - Precisely Define and Implement Network Security - Automatically Control P2P, IM and Spam Traffic FIND OUT NOW - FREE Vulnerability Assessment Toolkit http://www.captusnetworks.com/ads/42.htm ----------------------------------------------------------------------------
Current thread:
- RE: Windows Server 2003, (continued)
- RE: Windows Server 2003 dave kleiman (Sep 11)
- RE: Windows Server 2003 Krill T (Sep 11)
- RE: Windows Server 2003 Andrew Ruef (Sep 11)
- Re: Windows Server 2003 Steve (Sep 11)
- Re: Windows Server 2003 Ansgar Wiechers (Sep 11)
- Re: Windows Server 2003 Hendra Santosa (Sep 12)
- Re: Windows Server 2003 Ansgar Wiechers (Sep 15)
- Re: Windows Server 2003 Jimi Thompson (Sep 15)
- Re: Windows Server 2003 Kevin L Keathley (Sep 11)
- RE: Windows Server 2003 Joey Peloquin (Sep 11)
- RE: Windows Server 2003 Davitt J. Potter (Sep 12)
- Re: Windows Server 2003 Tim Syratt (Sep 11)
- Re: FW: Windows Server 2003 Tim Syratt (Sep 11)