thats a nice list of pointers also try iptables.org etc to setup free
firewalls
use port sentry to listen & block ports etc. your best friend is google web
& groups. read read read
regards
dp

----- Original Message -----
From: "Bejon Parsinia" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>
Sent: Friday, March 22, 2002 12:03 AM
Subject: RE: win 2k


| Talk about a loaded question.
|
| First of all, make sure you have a firewall on your network with solid
rules
| blocking all ports and allowing only the ones you need to access your
| network open.  And then only to selected IP Addresses (via NAT).  You may
| even want to consider rolling out software firewalls and make sure you
have
| good AntiVirus software throughout your network.
|
| Then, scan your network with something like Nessus (www.nessus.org),
| LanGuard (www.gfi.com), or the Cisco Scanner (www.cisco.com *Commercial
App
| running about $500).  This should give you a fairly complete report of
what
| is open on each device in terms of ports/services.  Close up ports that
you
| don't need.
|
| Don't stop there.  Do a system by system audit (Servers and Workstations,
| they are all vulnerable).  Document what software is running, what
services
| are running.  Then, get rid of anything that is unwanted or unneeded.  You
| don't want to keep spending CPU cycles on something you don't use that can
| be a security threat.
|
| Now, in terms of a tool to use, I point you right back at the OS you are
| running.  Sit down and think seriously about implementing stronger
policies.
| The stronger they are, the harder you are to hack.
|
| A great book on the subject of securing Win2k is Hacking Windows 2000
| Exposed (www.hackingexposed.com).  Read it, it will scare the hell out of
| you yet really help you lock down your network.  Patch all OS'es with the
| latest SP's and Hotfixes.  Stay on top of this for all servers AND
| WORKSTATIONS.
|
| Lastly, consider installing a program like Snort (www.snort.org) as a
| Network Intrusion Detection System (NIDS).  These are usually implemented
in
| front of the firewall, in a DMZ and behind the firewall.  But at the very
| minimum, install one behind the firewall to see what traffic is on the
local
| wire.
|
| A lot of work?  Yes, securing a network often is.  There is no one way to
| keep a system from being hacked.  AND, with all I have suggested here, you
| can still be hacked.  But this makes it much tougher.
|
| Good luck,


Reply via email to