Okay for you Susan, I will modify my statement... Add IPsec filter that only 
allows http traffic to update.microsoft.com.  Also, in the future MS will 
probably bake in the spyware service into the product, so it will be there 
anyway.  I think I helped flush out the KB article on AV way back.
 
Todd

________________________________

From: Susan Bradley, CPA aka Ebitz - SBS Rocks [MVP] [mailto:[EMAIL PROTECTED]
Sent: Mon 3/6/2006 2:27 PM
To: [email protected]
Subject: Re: [ActiveDir] How Secure is a Domain Controller?



Question?

On a DC ...why do you need anti spyware?

If spyware enters via web browsing and email...and IE should never be
used/launched on a DC... why do you need it? If the enhanced IE lockdown
is still in place that shuts off scripting and what not.....

Is it on my TS box and all workstations? Yup. On my DC. No. the only
site that that box surfs to is Microsoft Update (I mean I don't even go
to Joewear on that DC)

Why introduce another "thing" that might introduce new code and new
false positives?

(see Spybot that flagged Microsoft's remote desktop control for RWW as
spyware, see Microsoft's Antispyware that flagged Symantec as a trojan)

And if you do a/v ensure that the needed folders and files are excluded
(see prior posts in this forum about the KB articles regarding how to
set up a/v on a domain controller and Exchange servers)

Myrick, Todd (NIH/CC/DNA) [E] wrote:

> To add my 2 cents.
>
>    1. Add Anti-virus and Anti-Spywear detection.
>    2. Configure and backup your event logs. At remote sites, I would
>       recommend collecting the event logs on a faster rotation.
>    3. Add monitoring, You want to monitor account lockout events and
>       have notification when excessive amounts of authentications are
>       occurring. (Tips you off to possible brute force attacks, and
>       up/down situations).
>    4. Use IPSEC Policies to not allow outside traffic to your DC's. (I
>       haven't tried this, but the theory seems pretty solid)
>    5. Use GPO's to enforce group memberships for EA and Domain Admins.
>    6. When possible do not have child domains, allows you to use
>       tighter security policies.
>    7. Enforce all registry changes using GPO's. Things like DNS record
>       weight, fixed ports for NTDS and FRS replication, etc should be
>       set this way to avoid mis-configuration.
>    8. At a minimum have a MFT backup of the AD system state done at a
>       central site each night. If you should lose objects, etc. Having
>       this will give you options for restore. Not having it you're doomed.
>    9. Make sure your account policies balance the need to thwart an
>       attack but also consider the potential for brute force and
>       denial of service. You don't want to come in on Monday to 40K of
>       accounts locked out, and everyone waiting for you to unlock them.
>   10. TBD
>
> Todd Myrick
>
> ------------------------------------------------------------------------
>
> *From:* [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
> *Sent:* Monday, March 06, 2006 11:23 AM
> *To:* [email protected]
> *Subject:* RE: [ActiveDir] How Secure is a Domain Controller?
>
>
> I understand/stood what you were saying, just was hoping to bring out
> a clearer answer for some of the lurker/newbies on the list (of which
> there are many). And you provided exactly that clarification which was
> excellent. Thank you.
> **[Neil Ruston] You're welcome :)**
>
> I still personally believe in the statement that if I can touch your
> server, I own your server. There just is no good technical solution to
> a physical problem, and it's part of our job responsibility to make
> that clear to management.
> **[Neil Ruston] Sometimes we're forced to make compromises due to
> management and political pressure. Ulf has written an article which
> helps to secure the DC if it finds itself physically insecure.
> Ideally, the DC would not be deployed at all, but the world [of IT] is
> far from ideal... :)**
>
> ------------------------------------------------------------------------
>
> *From:* [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] *On Behalf Of
> [EMAIL PROTECTED]
> *Sent:* Monday, March 06, 2006 9:52 AM
> *To:* [email protected]
> *Subject:* RE: [ActiveDir] How Secure is a Domain Controller?
>
> You mis-understand :)
>
> Ulf was suggesting that in order to protect the AD data on a poorly
> protected DC, that strong passwords should be used that are harder to
> crack.
>
> In the event that the disks were compromised, the hacker would not be
> able to crack a 20 char pw. He does not suggest the use of 20 char
> passwords to logon to the DC but instead, it is suggested as a way to
> further protect the AD data, in the event that physical protection is
> weak.
>
> hth,
>
> neil
>
> ------------------------------------------------------------------------
>
> *From:* [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] *On Behalf Of *Tim Vander Kooi
> *Sent:* 06 March 2006 15:44
> *To:* [email protected]
> *Subject:* RE: [ActiveDir] How Secure is a Domain Controller?
>
> Based on the subject of this discussion: if you have those regular
> users, who can't comprehend or remember a password over 7 characters,
> signing on to your domain controllers I would say that your domain
> controllers are VERY not secure. Secondly, if your domain
> administrators are so lazy as to be using 7 character passwords you
> are still very insecure.
>
> ------------------------------------------------------------------------
>
> *From:* [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] *On Behalf Of
> [EMAIL PROTECTED]
> *Sent:* Monday, March 06, 2006 2:25 AM
> *To:* [email protected]
> *Subject:* RE: [ActiveDir] How Secure is a Domain Controller?
>
> The use of >20 char passwords caught my eye.
>
> In previous discussions with MS et al, it was suggested that the
> majority of users would simply repeat a (at most ( 7 char password n
> times, so as to meet the 20+ char pw policy requirement.
>
> As a result, I have heard it suggested that in reality (not theory) a
> pw policy of more than 7 chars is actually counter productive. [Any pw
> policy with a multiple of 7 chars being most counter productive.]
>
> Food for thought,
>
> neil
>
> ------------------------------------------------------------------------
>
> *From:* [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] *On Behalf Of *Ulf B.
> Simon-Weidner
> *Sent:* 05 March 2006 08:35
> *To:* [email protected]
> *Subject:* RE: [ActiveDir] How Secure is a Domain Controller?
>
> I've written down some related thoughts once:
>
> http://msmvps.com/blogs/ulfbsimonweidner/archive/2004/10/24/16568.aspx
>
> Gruesse - Sincerely,
>
> Ulf B. Simon-Weidner
>
> MVP-Book "Windows XP - Die Expertentipps": http://tinyurl.com/44zcz
> Weblog: http://msmvps.org/UlfBSimonWeidner
> Website: http://www.windowsserverfaq.org
> <http://www.windowsserverfaq.org/>
> Profile:
> http://mvp.support.microsoft.com/profile=35E388DE-4885-4308-B489-F2F1214C811D
>
>
>     ------------------------------------------------------------------------
>
>     *From:* [EMAIL PROTECTED]
>     [mailto:[EMAIL PROTECTED] *On Behalf Of *Edwin
>     *Sent:* Sunday, March 05, 2006 4:17 AM
>     *To:* [email protected]
>     *Subject:* [ActiveDir] How Secure is a Domain Controller?
>
>     How Secure is a Domain Controller that is fully patched on a
>     default install of Windows 2003? When promoted the domain
>     controller has the two default policies, both of which are
>     recommended not to be modified. But there are things that could be
>     done better for added security. For example, NTLMv2 refuse NTLM
>     and LM. Is it common practice to add additional GPO's to the DC
>     OU? Or is DC protected enough to where all that is needed to worry
>     about are the member machines?
>
>     If adding additional GPO's to the DC OU, is there anything that
>     should definitely be avoided?
>
>     Edwin
>
> PLEASE READ: The information contained in this email is confidential and
>
> intended for the named recipient(s) only. If you are not an intended
>
> recipient of this email please notify the sender immediately and
> delete your
>
> copy from your system. You must not copy, distribute or take any further
>
> action in reliance on it. Email is not a secure method of
> communication and
>
> Nomura International plc ('NIplc') will not, to the extent permitted
> by law,
>
> accept responsibility or liability for (a) the accuracy or
> completeness of,
>
> or (b) the presence of any virus, worm or similar malicious or disabling
>
> code in, this message or any attachment(s) to it. If verification of this
>
> email is sought then please request a hard copy. Unless otherwise stated
>
> this email: (1) is not, and should not be treated or relied upon as,
>
> investment research; (2) contains views or opinions that are solely
> those of
>
> the author and do not necessarily represent those of NIplc; (3) is
> intended
>
> for informational purposes only and is not a recommendation,
> solicitation or
>
> offer to buy or sell securities or related financial instruments. NIplc
>
> does not provide investment services to private customers. Authorised and
>
> regulated by the Financial Services Authority. Registered in England
>
> no. 1550505 VAT No. 447 2492 35. Registered Office: 1 St
> Martin's-le-Grand,
>
> London, EC1A 4NP. A member of the Nomura group of companies.
>
> PLEASE READ: The information contained in this email is confidential and
>
> intended for the named recipient(s) only. If you are not an intended
>
> recipient of this email please notify the sender immediately and
> delete your
>
> copy from your system. You must not copy, distribute or take any further
>
> action in reliance on it. Email is not a secure method of
> communication and
>
> Nomura International plc ('NIplc') will not, to the extent permitted
> by law,
>
> accept responsibility or liability for (a) the accuracy or
> completeness of,
>
> or (b) the presence of any virus, worm or similar malicious or disabling
>
> code in, this message or any attachment(s) to it. If verification of this
>
> email is sought then please request a hard copy. Unless otherwise stated
>
> this email: (1) is not, and should not be treated or relied upon as,
>
> investment research; (2) contains views or opinions that are solely
> those of
>
> the author and do not necessarily represent those of NIplc; (3) is
> intended
>
> for informational purposes only and is not a recommendation,
> solicitation or
>
> offer to buy or sell securities or related financial instruments. NIplc
>
> does not provide investment services to private customers. Authorised and
>
> regulated by the Financial Services Authority. Registered in England
>
> no. 1550505 VAT No. 447 2492 35. Registered Office: 1 St
> Martin's-le-Grand,
>
> London, EC1A 4NP. A member of the Nomura group of companies.
>
> PLEASE READ: The information contained in this email is confidential and
>
> intended for the named recipient(s) only. If you are not an intended
>
> recipient of this email please notify the sender immediately and
> delete your
>
> copy from your system. You must not copy, distribute or take any further
>
> action in reliance on it. Email is not a secure method of
> communication and
>
> Nomura International plc ('NIplc') will not, to the extent permitted
> by law,
>
> accept responsibility or liability for (a) the accuracy or
> completeness of,
>
> or (b) the presence of any virus, worm or similar malicious or disabling
>
> code in, this message or any attachment(s) to it. If verification of this
>
> email is sought then please request a hard copy. Unless otherwise stated
>
> this email: (1) is not, and should not be treated or relied upon as,
>
> investment research; (2) contains views or opinions that are solely
> those of
>
> the author and do not necessarily represent those of NIplc; (3) is
> intended
>
> for informational purposes only and is not a recommendation,
> solicitation or
>
> offer to buy or sell securities or related financial instruments. NIplc
>
> does not provide investment services to private customers. Authorised and
>
> regulated by the Financial Services Authority. Registered in England
>
> no. 1550505 VAT No. 447 2492 35. Registered Office: 1 St
> Martin's-le-Grand,
>
> London, EC1A 4NP. A member of the Nomura group of companies.
>

--
Letting your vendors set your risk analysis these days? 
http://www.threatcode.com

List info   : http://www.activedir.org/List.aspx
List FAQ    : http://www.activedir.org/ListFAQ.aspx
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/


List info   : http://www.activedir.org/List.aspx
List FAQ    : http://www.activedir.org/ListFAQ.aspx
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/

Reply via email to