"Douglas, It looks like you've never had the chance to check what is
going on behind the scenes part, namely, technical details. This is a
Privilege elevation, which allows the unprivileged  "internal" user to
take the complete control over the system.  Where firewalls' only weak
point, where you should consider some internal security. To give you a
clearer idea, we've 6 Imail administrators currently adding accounts,
deleting and making some modifications on Imail."

Not entirely sure what you were talking about here but her goes:

I see your situation varies a bit from mine.  However to contradict you
I did take a look at the technical details and hindsigth being 20/20
shouldn't have installed this as it is not an issue with my setup due to
additional sercurity that we had in place.  Namely IDS, and other
NON-Windows security credentials that would have to first be bypassed
before a non-privledged user can even touch the box.

"If you get hacked, it's too late even for a recovery because  there is
no time to cry over spilled milk in the world of network security."

That is all the more reason for a good disaster recovery plan.  We are a
Vertias shop and have restored our I-Mail server in a lab environment in
under 20 minutes with IDR.  With Norton Ghost we have managed to do it
in 25 minutes.  Add to that our I-Mail server sits in a DMZ all by
himself with no other computers to talk with.  So if we were compromised
at that point then it would most likely be limited to that one box.  For
us this is an acceptable solution.  However, I understand that you may
have a much larger setup than our 5 domain/220 user environment and
probably cannot afford that kind of down time.  If you took my e-mail
the wrong way then please let it roll off your back as I was not
necessarily singling you out.


To Unsubscribe: http://www.ipswitch.com/support/mailing-lists.html
List Archive: http://www.mail-archive.com/imail_forum%40list.ipswitch.com/
Knowledge Base/FAQ: http://www.ipswitch.com/support/IMail/

Reply via email to