"Douglas, It looks like you've never had the chance to check what is going on behind the scenes part, namely, technical details. This is a Privilege elevation, which allows the unprivileged "internal" user to take the complete control over the system. Where firewalls' only weak point, where you should consider some internal security. To give you a clearer idea, we've 6 Imail administrators currently adding accounts, deleting and making some modifications on Imail."
Not entirely sure what you were talking about here but her goes: I see your situation varies a bit from mine. However to contradict you I did take a look at the technical details and hindsigth being 20/20 shouldn't have installed this as it is not an issue with my setup due to additional sercurity that we had in place. Namely IDS, and other NON-Windows security credentials that would have to first be bypassed before a non-privledged user can even touch the box. "If you get hacked, it's too late even for a recovery because there is no time to cry over spilled milk in the world of network security." That is all the more reason for a good disaster recovery plan. We are a Vertias shop and have restored our I-Mail server in a lab environment in under 20 minutes with IDR. With Norton Ghost we have managed to do it in 25 minutes. Add to that our I-Mail server sits in a DMZ all by himself with no other computers to talk with. So if we were compromised at that point then it would most likely be limited to that one box. For us this is an acceptable solution. However, I understand that you may have a much larger setup than our 5 domain/220 user environment and probably cannot afford that kind of down time. If you took my e-mail the wrong way then please let it roll off your back as I was not necessarily singling you out. To Unsubscribe: http://www.ipswitch.com/support/mailing-lists.html List Archive: http://www.mail-archive.com/imail_forum%40list.ipswitch.com/ Knowledge Base/FAQ: http://www.ipswitch.com/support/IMail/
