Admins who can install things on servers, can just as easily tweak the Windows 
FW to make “calls out” on whatever ports required. And by default, the Windows 
FW doesn’t block anything outbound.

FWIW, our servers (except in the restricted outbound DMZ) are not allowed to 
make calls out to the wider internet. All external access is via application 
proxies, so we have some control over what goes out, and we get logs on where 
it’s going. Centralising that outbound access gives us a choke point for IPS 
and DLP to examine the outbound content.

Cheers
Ken

From: [email protected] [mailto:[email protected]] On 
Behalf Of Ed Ziots
Sent: Friday, 23 May 2014 2:16 AM
To: [email protected]
Subject: Re: [NTSysADM] Do you run Windows firewall on your internal servers?

In the absence of what Ken as described below the Windows Firewall is turned on 
and left on, and its pretty hassle free from using it in the past.

If you are lucky to have internal firewalls, security zones and proper 
segmentation on your internal network ( most are not that lucky) then defintely 
can manage it via the rules in the Internal FW set, but that doesn't stop a 
trusted admins installing something on the server that then makes outbound 
calls on allowed ports ( 80/443/etc), it also doesn't stop pivoting internally 
if they compromise a box and then abuse the trust of the allowed ports to other 
systems, unless you got a good bit of egress filtering and logging and its 
being reviewed. I am sure in Ken's case that is the case and even more 
stringent, but its not like that in most places.

EZ
On Mon, May 19, 2014 at 7:22 PM, Ken Schaefer 
<[email protected]<mailto:[email protected]>> wrote:
We have the Windows FW off.

Traffic between major apps, and/or between internal security zones, is routed 
via internal firewalls. So, we rely on the internal FWs to avoid the scenario 
you describe below.

Cheers
Ken

-----Original Message-----
From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]<mailto:[email protected]>] 
On Behalf Of Kennedy, Jim
Sent: Tuesday, 20 May 2014 1:16 AM
To: [email protected]<mailto:[email protected]>
Subject: RE: [NTSysADM] Do you run Windows firewall on your internal servers?

He needs to think about what is called pivoting.  Where a box is compromised 
and they use it to pivot to the next box. Your external firewall won't see that 
happening. Windows Firewall might. The firewall on 2008 and up is pretty hassle 
free as far as I have experienced.

-----Original Message-----
From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]<mailto:[email protected]>] 
On Behalf Of Dave Lum
Sent: Monday, May 19, 2014 11:11 AM
To: [email protected]<mailto:[email protected]>
Subject: [NTSysADM] Do you run Windows firewall on your internal servers?

All y'all leave Windows Firewall on on your servers right? I heard a comment 
recently that "Win 2008 R2 and later have so many services off by default 
nowadays, running with it off saves headaches vs. the value it adds for servers 
that are behind our firewall".

I leave it on and spend the time to make exceptions as necessary - sometimes 
it's frustrating and does take a lot of time, but still it seems like the 
prudent way to go.

Seems odd to not run it, but I'm willing to change my thinking if I can hear 
reasonable arguments, but they'd have to be pretty convincing...

Dave







Reply via email to