Does anyone know what are the consequences/risks of having DCOM enabled in
an Internet Firewall.  I know that ISS identifies that as a vulnerability,
but I do not truly understand how this vulnerability could be exploited or
are there other controls that I could implement which would mitigate this
risk.  Unfortunately, I am not very technical so any laymen terms would be
appreciated.  Thank you.


-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to