Exchange 5.5 SP4 Had a general question to post. We have the IIS 4.0 running on a couple of Exchange systems for OWA access. It's not on the systems that house the primary mailbox accounts and the systems were patched when code red came out. One of our Web Administrators suggested making some additional changes to help prevent additional IIS attacks. One was to create a dummy root.exe file and have it set to read only. Also, the suggestion was made to either rename or delete the scripts directory. I was wondering if anyone had any comments on the suggestions. Pete Pfefferkorn Senior Systems Engineer/Mail Administrator University of Cincinnati 51 Goodman Street Cincinnati, OH 45221 Phone - (513) 556-9076 Fax - (513) 556-2042 _________________________________________________________________ List posting FAQ: http://www.swinc.com/resource/exch_faq.htm Archives: http://www.swynk.com/sitesearch/search.asp To unsubscribe: mailto:[EMAIL PROTECTED] Exchange List admin: [EMAIL PROTECTED]
Additional steps to prevent IIS compromise!
Pfefferkorn, Pete (PFEFFEPE) Fri, 21 Sep 2001 05:40:50 -0700
- RE: Additional steps to prevent IIS compromis... Pfefferkorn, Pete (PFEFFEPE)
- RE: Additional steps to prevent IIS comp... Tom Meunier
- RE: Additional steps to prevent IIS comp... Pfefferkorn, Pete (PFEFFEPE)

