1. Keep your servers up to date on patches. NIMDA used old
vulnerabilities
2. Use something like URLScan and IISSecure on Web Servers
3. Make use of AV software
4. Employ good security practices
5. Read the security lists
6. Read the AV sites
See the following:
http://www.ultratech-llc.com/KB/?File=Security.TXT
http://www.ultratech-llc.com/KB/?File=AntiVirus.TXT
==============================================================
ASB - http://www.ultratech-llc.com/KB/?File=~MoreInfo.TXT
==============================================================
"Nakedness has no color: this can come as news only to those
who have never covered, or been covered by, another naked
human being." -- James Arthur Baldwin, NNITS.
>-----Original Message-----
>From: Roger Ali [mailto:[EMAIL PROTECTED]]
>Sent: Saturday, September 22, 2001 2:06 PM
>To: NT System Admin Issues
>Subject: Nimda Breakout Help!
>
>
>Guys,
> Does anyone know a way to prevent the PE_Nimda and all other
>variations from infecting servers. I've got a mixed network
>2K and NT and
>all my servers were hit, I have trend office scan and trend
>server protect
>and all it does is notifies me about the virus and that it
>couldn't clean or
>move the files. I've gotten the cumulative patch from
>trend's site and
>applied it to all my servers but they keep getting infected.
> Is there a way
>to stop this at all?? Please help.
>
>Thanks
>Roger Ali
>
http://www.sunbelt-software.com/ntsysadmin_list_charter.htm