Microsoft Office Communicator Web Access Security Guide
|
|
|
- Christine Cummings
- 10 years ago
- Views:
Transcription
1 Microsoft Office Communicator Web Access Security Guide 1 Microsoft Office Communicator Web Access Security Guide Published: February 2006
2 Microsoft Office Communicator Web Access Security Guide 2 Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations, products, domain names, addresses, logos, people, places, and events depicted in examples herein are fictitious. No association with any real company, organization, product, domain name, address, logo, person, place, or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Windows, Windows NT, Windows Server, and Windows Vista are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners.
3 Microsoft Office Communicator Web Access Security Guide 3 Contents Introduction... 5 Who Should Read This Guide... 5 How to Use This Guide... 5 Overview... 5 Identifying Possible Security Threats... 6 Threats Addressed by Communicator Web Access... 6 Buffer Overruns... 7 Compromised-Key Attack... 7 Denial-of-Service Attack... 7 Eavesdropping... 8 IP Address Spoofing... 8 Man-in-the-Middle Attack... 8 Sniffing... 8 Hijacking Threats... 9 Spim (Instant Messaging Spam)... 9 Viruses and Worms... 9 Credential Theft by Brute Force Token Threats Other Threats Spoofing Phishing (Password Harvesting Fishing) Malicious Administrator Identifying Threat Controls Creating a Defense in Depth Strategy Securing the Network Securing Applications Reevaluating the Strategy Keeping Current with Windows Update Detecting Compromise of the Web Server Implementing Threat Controls Deploying Communicator Web Access Hardware Securely Securing Firewalls Securing Hardware Load Balancers Securing Reverse Proxy Servers Securing Routers and Switches Securing Intrusion Detection Systems Securing SSL Accelerators and Offloaders Securing Communicator Web Access Sessions Securing Tokens Using Encryption... 17
4 Microsoft Office Communicator Web Access Security Guide 4 Using PKI, Certificates, and SSL Using Certificates for Communicator Web Access Using Certificates for Live Communications Server 2005 SP Using Certificates for ISA Server 2004 SP Using PKI Hardening IIS 6.0/ASP.NET v2 for Communicator Web Access Using Server/Application Isolation Restricting External Access Using ISA Server 2004 SP Monitoring and Logging Using Microsoft Operations Manager Logon Auditing Securing Users Security Best Practices Appendixes Appendix 1: Firewall Requirements and Recommendations Packet Filtering Appendix 2: Reverse Proxy Requirements and Recommendations Appendix 3: Security Tools Appendix 4: Additional Resources for Sections in this Guide Internet Information Services (IIS) Certificates and PKI Firewalls/Reverse Proxies General Security Live Communications Server 2005 SP Microsoft Operation Manager (MOM) Secure Sockets Layer (SSL)... 26
5 Microsoft Office Communicator Web Access Security Guide 5 Introduction The Microsoft Office Communicator Web Access Security Guide discusses how Communicator Web Access fits into your organization s overall security risk management initiatives and how you can continue to maintain security over the lifetime of your Communicator Web Access deployment. The guide covers the following topics: Identifying possible security threats to Web server applications and understanding how Communicator Web Access is designed to counteract such threats. Identifying threat controls by creating a defense-in-depth strategy. Implementing controls for potential security threats to your Communicator Web Access deployment. Implementing security best practices for Communicator Web Access. Who Should Read This Guide This document is intended for Communicator Web Access administrators and anyone responsible for securely deploying Microsoft Office Communicator Web Access or maintaining the security of a Communicator Web Access deployment. How to Use This Guide This document is a starting point for keeping your Communicator Web Access deployment secure. This guide provides general guidelines, best practices, and resources. It is a companion to other documents that discuss the concepts mentioned in greater detail. Companion documents include the following: The Security Risk Management Guide at The Windows Server 2003 Security Guide at The Windows Server System Reference Architecture (WSSRA) at Configuring Microsoft Office Live Communications Server 2003 Standard Edition with ISA Server 2004 at The Hardening the Windows Infrastructure on the ISA Server 2004 Computer at The Live Communications Server 2005 Security Guide at FE54E377C2BD&displaylang=en. For links to additional documents that are pertinent to this discussion, see Appendix 4: Additional Resources for Sections in this Guide. Overview Microsoft Office Communicator Web Access is a Web-based application with built-in security features. This guide describes design elements that were incorporated into Communicator Web Access to help mitigate threats that are unique to Web-based applications. In conjunction with the Microsoft Office Communicator Web Access Planning and Deployment Guide, this guide can help you determine
6 Microsoft Office Communicator Web Access Security Guide 6 how to incorporate Communicator Web Access into your existing infrastructure in the most secure manner. You should apply standards of risk management when designing, deploying, and managing Communicator Web Access. These standards typically take into consideration your organization s people, processes, technologies, current threats, and industry best practices to ensure data confidentiality, information integrity, and service availability. We encourage you to take this holistic approach to planning and managing the security of Communicator Web Access within your organization. One methodology that provides continual measuring of security risks and helps keep such risks at an acceptable level is the Microsoft Security Risk Management process. This process consists of the following phases: Assessing risk. Identifying and prioritizing the risk of attack. Conducting decision support. Identifying and evaluating control solutions to reduce the risk of attack. Implementing controls. Deploying and operating the solutions to reduce the risk of attack. Measuring program effectiveness. Analyzing the effectiveness of the process in maintaining acceptable risk and repeating the process as necessary. This guide assists with the first three phases of the Microsoft Security Risk management process by helping you to identify risks specific to a Communicator Web Access deployment, identify control solutions, and implement controls. For more information about the Microsoft Security Risk Management process, see the Security Risk Management Guide at Identifying Possible Security Threats Phase 1 of the Microsoft Security Risk Management process focuses on identifying and prioritizing the risk of attack on a system. In this phase, you analyze each component that makes up the system and identify the threats that may exist. This section identifies and describes some of the potential security threats to Communicator Web Access deployed to a network, and includes discussion of the ways in which Communicator Web Access has been designed to mitigate threats. Because Communicator Web Access requires Live Communications Server 2005 with SP1 to function, threats to Live Communications Server 2005 SP1 can also be threats to Communicator Web Access. For a specific discussion of Live Communications Server 2005 with SP1 deployment, see: The Live Communications Server 2005 with SP1 Security Guide at: FE54E377C2BD&displaylang=en Threats Addressed by Communicator Web Access Threats are potential methods of attacking your network. During the threat identification phase of the Microsoft Security Risk Management process, you will assess threats to determine whether they apply to your specific application. There are certain threats that specifically target Web server applications. However, the presence of a threat does not necessarily indicate that there is a vulnerability in the Web server application. Communicator Web Access is not affected by many of the threats that generally target Web-based applications because Communicator Web Access incorporates technologies that either reduce or eliminate such threats. This section describes these threats and explains how Communicator Web
7 Microsoft Office Communicator Web Access Security Guide 7 Access addresses them. In some cases, additional configuration by the administrator or user is required. Buffer Overruns A buffer overrun is a type of attack that exploits an unchecked buffer in a program and overwrites the program code with data. Attackers may attempt buffer overrun attacks by using the following methods: Stack-based buffer overrun A stack-based buffer overrun occurs when more data is written to a memory address block (buffer) than the memory address can hold. The part of the address that doesn t fit overflows into the next memory address block(s). Attackers attempt to create a buffer overrun by entering unexpected data that is not correctly checked by the application and then is passed to a function. In this manner, the attacker can send malicious code to be executed by the application. This type of attack is successful only in applications that incorrectly check the user input fields. Communicator Web Access has been designed to correctly check user input. Additionally, all of the Communicator Web Access code has been compiled with compiler stack checking enabled. Heap-based overruns A heap-based overrun is the same as the stack-based overrun, except that the overrun occurs on the heap instead of the stack. The heap is memory that is dynamically reserved by an application. Array Indexing Errors An array indexing error occurs when the user inputs an array with a different number of elements than is expected by the application and the bounds of the array are not checked correctly. A successful attacker can access the array at will to perform an unauthorized action. Communicator Web Access is designed and tested to prevent an attacker from using buffer overrun methods to control a user s Communicator Web Access session. For more information on buffer overruns, see The Compiler Security Checks In Depth article at: Writing Secure Code, Second Edition, Howard and LeBlanc, Microsoft Press, Compromised-Key Attack A compromised-key attack occurs when the attacker determines the key, which is a secret code or number used to encrypt, decrypt, or validate secret information. If the attacker is successful in determining the key, the attacker can use the key to decrypt data without the sender s knowledge. Communicator Web Access uses sophisticated encryption and periodically creates new encryption keys, which makes this attack method unlikely to be successful. Denial-of-Service Attack The denial-of-service attack occurs when the attacker prevents normal network use and function by valid users. For example, the attacker may attempt to flood the server with invalid logon attempts. The goals of a denial-of-service attack are typically the following: Disrupt applications and services on the network by sending them invalid data. Hide the evidence of a successful attack. Prevent users from accessing network resources. Confuse the victim about the origin of the denial-of-service attack. Communicator Web Accesses requires users to be authenticated before signing in to the service. You can monitor security-related counters in the Microsoft Office Communicator Web Access
8 Microsoft Office Communicator Web Access Security Guide 8 Management Pack for Microsoft Operations Manager (MOM) 2005 to detect whether the server is experiencing a large number of logon failures or rejected requests. See Monitoring and Logging. Eavesdropping Eavesdropping can occur when an attacker gains access to the data path in a network and can monitor and read the traffic. This is also called sniffing or snooping. If the traffic is in plain text, the attacker can read the traffic as soon as the attacker gains access to the path by sniffing the wire. If you enable public IM connectivity on Live Communications Server 2005 with SP1, be aware that communications between the Live Communications Server and the public IM server are encrypted; however, communications from the public IM server to the public IM client may not be encrypted. Communications between Live Communications Server and Communicator Web Access are encrypted. If you use ISA Server 2004 SP1 to publish a Communicator Web Access virtual server using SSL bridging, you should encrypt both communications between the client and ISA Server and communications between the ISA Server and the Communicator Web Access server. The default communication protocol for client to Communicator Web Access server communication is HTTPS using SSL. In the event of a sniffing attack, this protocol prevents an attacker from seeing the message, password, and user ID. IP Address Spoofing IP address spoofing occurs when the attacker determines the IP address of a network, computer, or network component and uses the address to operate as if the attacker were the entity normally identified by the IP address. The only time that IP address spoofing comes into play for Communicator Web Access and Live Communications Server 2005 is when the administrator has configured gateways that support only TCP, and the administrator has had to mark the IP address as a trusted host. Using TLS (Transport Layer Security) or working with a gateway over a trusted network is a way to resolve this problem. Other forms of spoofing, including URL spoofing, dialog box spoofing, source spoofing, and DNS spoofing, are not specifically addressed by Communicator Web Access, although they are threats to Web-based applications in general. See Other Threats in this document for more information on steps you can take to mitigate these threats. Man-in-the-Middle Attack Sniffing A man-in-the-middle attack occurs when an attacker reroutes communication between two users through the attacker s computer without the knowledge of the two communicating users. The attacker can monitor and read the traffic before sending it on to the intended recipient. Each user in the communication unknowingly sends traffic to and receives traffic from the attacker. To accomplish this attack, the attacker can either modify the Active Directory directory service to add the attacker s server as a trusted server, or modify DNS to connect clients to route traffic to the attacker s computer. To help prevent the man-in-the-middle attack, Communicator Web Access uses HTTPS using SSL as the default communication protocol between the client and the server. Sniffing is a type of eavesdropping. In a sniffing attack, the attacker gains access to the network TCP/IP traffic path, captures data packets that make up the conversation, and assembles the packets into a format that is readable to the attacker. This type of attack is not possible when Communicator Web Access virtual servers are configured to use HTTPS, and it is never possible between Communicator Web Access servers and Live Communications Server 2005 with SP1 servers, because they require TLS/MTLS. However, if gateways are configured to use TCP, this is a potential threat. You should configure gateways to use SSL/TLS.
9 Microsoft Office Communicator Web Access Security Guide 9 Hijacking Threats In hijacking, the attacker uses various methods to divert legitimate session traffic to the attacker s computer. Connection Hijacking. In connection hijacking, an attacker causes the Web server of an existing client-server conversation to send traffic to the attacker by spoofing the target s IP address. The Web server treats the attacker as the authorized client in the existing conversation. To help prevent this type of attack, Communicator Web Access uses HTTPS using SSL as the default communication protocol between the client and the server. Cookie Hijacking. Attackers can attempt to sniff a cookie from the network and send the cookie back to the server to impersonate the authorized user by using credentials cached in the cookie. Communicator Web Access uses SSL by default, which helps prevent cookie hijacking because sensitive information is encrypted while in transit. Cookie Stealing Using Malicious URLs. Attackers can attempt to steal cookies by inserting malicious URLs in and instant messages. When the user clicks the link that contains the malicious URL link, cookies on the target machine could be sent to the malicious URL source. This threat can succeed only if the attacker can exploit a cross-site scripting bug or vulnerability on the Communicator Web Access server. Communicator Web Access clients that use Internet Explorer 6.0 SP1 and later are not vulnerable to this attack. Spim (Instant Messaging Spam) Spim refers to unsolicited commercial instant messages or presence subscription requests. While not by itself a compromise of the network, it is annoying, can reduce resource availability and production, and could possibly lead to a compromise of the network. For example, users can spim each other by sending requests. Generally, users can block other users to prevent this. However, in the case of federation, a coordinated spim attack can be difficult to overcome unless you disable federation for the partner. A Microsoft SIP header extension has been added to reduce the risk of this kind of attack in federation scenarios. Live Communications Server 2005 with SP1 also introduces new settings and spim control. These new optional spim filters can be configured to suit the particular needs of each organization to reduce the likelihood of receiving unsolicited messages, and to filter messages of Communicator Web Access users. For both public IM connectivity and enhanced federation, IM and the exchange of presence information are restricted to names that are explicitly specified in each user s Allow list to reduce the likelihood of spim. In Communicator Web Access, users can override this default setting and accept IM from users not on their Allow list. Viruses and Worms A virus is a unit of code that reproduces similar code units through the use of a host, such as a file, e- mail message, or a program. A worm is a unit of code that reproduces similar code units without requiring a host. Viruses and worms are contracted primarily during file transfers between clients or when URLs are sent from other users. A virus can use a victim s identity to send instant messages on the victim s behalf. Communicator Web Access does not support file transfer, which reduces the risk of receiving worms and viruses. Communicator Web Access is vulnerable to viruses and worms only to the extent that the operating system is vulnerable. For information on protecting operating systems from viruses and worms, see the Microsoft TechNet Security Virus Alerts site at
10 Microsoft Office Communicator Web Access Security Guide 10 Credential Theft by Brute Force Brute force theft of credentials occurs when an attacker guesses the user ID and password combination required for authentication to obtain access to an asset. The attacker usually uses a brute force utility to automate the guessing process, which can take some time. Brute force theft is a general threat to all server applications. It can be mitigated by intrusion detection systems, monitoring and logging, and security event auditing for logon failures. The Microsoft Office Communicator Web Access Management Pack for Microsoft Operations Manager (MOM) 2005 contains counters and alerts that can notify administrators if a large number of logon failures occur in a short period of time, which may indicate this type of attack. For specific counters that are useful for security monitoring, see Using Microsoft Operations Manager later in this document. Session Fixation In a session fixation attack, the attacker sets the user s session token before the session is established between the user and the Web server. By doing so, the attacker already has the session ID and does not need to determine it after the session is established. Communicator Web Access is designed to minimize this threat. Session Hijacking In session hijacking, the attacker accesses a user s session by sniffing unencrypted traffic on the network. Communicator Web Access minimizes this threat by using SSL as the default communication protocol between the client and the Communicator Web Access server. Session Riding/Double Riding Session riding is when an attempt to use an established session between a user and a Web-based application to execute commands while posing as the user. The attacker does so by sending the user an message or otherwise enticing the user to visit a Web site specifically developed to execute malicious code. The commands that can be executed by the attacker include opening firewalls, deleting data, and executing other commands within the internal network. Communicator Web Access is designed to prevent an attacker from using this method to control a user s Communicator Web Access session through a malicious Web site. Cross Site Scripting (CSS, XSS, Code Insertion) A cross-site scripting attack (sometimes referred to as a CSS, XSS, or code insertion attack) occurs when an attacker uses a Web application to send malicious code, generally in the form of a script, to a target user. The target user s browser has no way of detecting that the script should not be trusted and will execute the script. When the malicious script is executed, it can access cookies, session tokens, or other sensitive information that is retained by the end user s browser. Such scripts can also rewrite the content of the HTML page. Cross-site scripting attacks can be stored or reflected. Stored attacks are those in which the malicious script is permanently stored on the compromised Web server, for example in databases, message forums, visitor logs, and comment fields. When the user accesses the Web server, the user s browser executes the script. In reflected cross-site scripting attack attacks, a user is tricked into clicking a link or submitting a specially crafted form that contains malicious code. When the user clicks the link to submit the form data, the URL, which contains the malicious code, is sent to the Web server along with the user s data. When the Web site displays the user s information back to the user, the information appears to originate from a trusted source. However, the information contains the malicious code, which is then executed on the user s computer. This vulnerability exists only in Web sites that do not properly validate user input. Communicator Web Access uses extensive user input validation to prevent this threat. Token Threats HTTP is a connectionless protocol, and each Web page requires multiple server requests and responses to complete the page. Various methods are used to maintain session persistence between page requests
11 Microsoft Office Communicator Web Access Security Guide 11 during a session. One method used by the Web server is to issue a token to the client browser making the request. This is the method used by Communicator Web Access. After the Communicator Web Access server successfully authenticates an internal or external user, it issues a token into a session cookie, which is returned to the client. This cookie is used for access to the server for a single session. Therefore, clients must accept cookies from the Communicator Web Access server to function correctly. An attacker could possibly steal and reuse this token. Communicator Web Access mitigates the token threat by issuing only a session cookie, using SSL (when enabled) to transport the token, clearing the token when the session ends, and causing the token to expire after a period of client inactivity. Token Ping (Token) In a token ping, also known as a token keep-alive, an authenticated user repeatedly sends a request to the Web server to prevent the session, and therefore the session token, from expiring. A token ping attack can be considered a threat because it bypasses the timeout logic built into the server. However, the threat level is low, because the user must be authenticated first. Other Threats Spoofing Communicator Web Access uses various methods to mitigate the threats discussed up to this point. There are additional threats that target Web applications in general, but that Communicator Web Access does not specifically address. During the threat identification phase of the Microsoft Security Risk Management process, you should consider the additional threats listed in this section. For information about mitigating these types of threats, see the Microsoft TechNet Security Center at Spoofing is an attempt by an attacker to obtain information users by appearing to be a legitimate entity. URL Spoofing. URL spoofing is a vulnerability in which an attacker creates a hyperlink that appears to come from a legitimate, trusted Web site but actually links to a possibly malicious Web site. For more information, see KB at Dialog Box Spoofing. Dialog box spoofing is the ability of an attacker to display a dialog box that appears to be from a trusted site but is not. The attack capitalizes on the fact that JavaScript dialog boxes do not show the site from which they originate. This attack is used to trick the user into entering information in the dialog box. Source (Origin) Spoofing. Some supported non-internet Explorer browsers have a vulnerability that allows an attacker to spoof the source in the download dialog box. This vulnerability exists because long subdomain and path names are not displayed correctly. DNS Spoofing. In a DNS spoofing attack, the attacker alters records that are used by a DNS server to resolve IP addresses of hosts on the network. The attacker alters the records by replacing the intended IP address resolution with the attacker s IP address. The DNS server then identifies the server FQDN with the attacker s IP address. You should educate end users about the spoofing methods that attackers use to obtain information. Phishing (Password Harvesting Fishing) Phishing uses spoofing and is a type of man-in-the-middle attack. The unauthorized attacker tries to obtain information from users by posing as an entity authorized to have the information. The attacker typically does this by tricking the user into entering a password or account number into a fake Web site, Web form, or message. You should educate end users about the methods that attackers use to obtain personal information.
12 Microsoft Office Communicator Web Access Security Guide 12 Malicious Administrator If a user has local administrator rights on a Communicator Web Access server that has been configured for forms authentication, the user can view the credentials for any user who logs on to the server. Even though the credentials are encrypted in transit between the authenticating user s computer and the server, the credentials are in plain text when they arrive at the server. The malicious user may then be able to use those credentials to log on and escalate his or her resource privileges on the network. Organizations can minimize this threat through better hiring and screening processes and by putting policies into place whereby administrators activities are audited. Identifying Threat Controls Phase 2 of the Microsoft Security Risk Management process focuses on identifying and evaluating control solutions to reduce the risk of attack. This section identifies how you can create a defense-indepth strategy to implement controls for the potential Communicator Web Access security threats identified earlier in this guide. Creating a Defense in Depth Strategy To implement a defense-in-depth strategy to secure your Communicator Web Access deployment, you should do the following: Secure the network. Secure applications. Evaluate, re-assess, and adjust the strategy as necessary. Keep current with patches and upgrades. Detect any compromise of the Web server. Securing the Network The network infrastructure consists of an organization s IT components, such as Active Directory domain controllers, DNS servers, other database servers, and other application and Web servers. The network infrastructure can include a mixture of operating systems. The components making up the system are interdependent, and the potential for a security breach increases with a deficiency in any one of them. This section provides a brief discussion of ways you can secure network and operating system components. Segmenting the Network Use a firewall and/or a reverse proxy to segment the network. For firewall and reverse proxy requirements, see Implementing Threat Controls, Appendix 1: Firewall Requirements and Recommendations, and Appendix 2: Reverse Proxy Requirements and Recommendations in this document. Hardening Operating System, Active Directory, and DNS For details on how to secure the Windows Server 2003 operating system, Active Directory, and DNS see the Windows Server 2003 Security Guide at Hardening Mixed Environments Your network might consist of more than one operating system, which complicates the security process. For more information on integrating Windows with UNIX and Linux environments, see the Windows Services for UNIX (SFU) 3.5 Home Page at
13 Microsoft Office Communicator Web Access Security Guide 13 Securing ISA Server 2004 and other Firewalls For ways to secure ISA Server 2004 SP1, see the following links to additional information: Controlling Secure Internet Access Using ISA Server 2004 at x. ISA Server Security Hardening Guide at Securing Applications Because Communicator Web Access requires Live Communications Server 2005 with SP1 to function, threats to Live Communications Server 2005 SP1 can also be threats to Communicator Web Access. This section discusses application security related to Live Communications Server. For information about securing the Communicator Web Access application, see Implementing Threat Controls later in this guide. Deploying Live Communications Server 2005 with SP1 Securely For ways to deploy Live Communications Server 2005 with SP1 securely, see Live Communications Server 2005 Security Guide at FE54E377C2BD&displaylang=en. URL Filter Application The URL filter application IMFilter.am is installed with Live Communication Server 2005 with SP1 except servers in the Proxy and Archiving roles, and is enabled by default. IMFilter.am provides a way to block messages that contain clickable URLs or that attempt to initiate a file transfer. The IMFilter.am program detects any attempt to initiate a file transfer during an IM session and denies such attempts. In Communicator, the user is notified that the request was blocked by system policy. In Windows Messenger 5.1, the request is silently. In Communicator Web Access, the request is blocked, and the user is informed. Reevaluating the Strategy We recommend that you periodically evaluate your current defense-in-depth strategy to assess whether it is meeting your security needs. Adjust the strategy based on the results of your evaluation as necessary. It is also important to keep up to date on security issues. See the following resources for more information: The Security home page at Security bulletins at Recent Security Incidents at The Technet Security Center at Keeping Current with Windows Update Check for updates regularly and security patches by using Windows Update Services. Doing so helps prevent vulnerabilities in other system components that may allow attackers to gain access to Communicator Web Access servers by using administrator privileges, thereby compromising your network. Detecting Compromise of the Web Server There are many ways to detect a potential compromise of a web server. Some common methods include: Intrusion Detection Systems
14 Microsoft Office Communicator Web Access Security Guide 14 Honeypots Monitoring and logging Proprietary appliances and software Hacking tools or focused penetration testing to discover security weaknesses. Some useful tools for detecting server compromise are summarized in Appendix 3: Security Tools. Implementing Threat Controls In Phase 3 of the Microsoft Security Risk Management process, you deploy the solutions that reduce the threats identified in the first two phases. This section focuses on ways that you can protect your Communicator Web Access deployment from the threats identified earlier in this guide. Deploying Communicator Web Access Hardware Securely The hardware components within your IT infrastructure should be configured in the most secure manner possible. This section discusses ways that you can maximize the security of hardware associated with a Communicator Web Access deployment. Securing Firewalls Firewalls can consist of single-purpose or limited-purpose physical hardware devices or generalpurpose servers with firewall software. The firewall software that is included in Microsoft Internet Security and Acceleration (ISA) Server 2004 SP1 functions as both a proxy server and a stateful packet filtering firewall. ISA Server 2004 SP1 can help you protect your network against Internet attackers. You can use ISA Server to securely publish your Communicator Web Access servers to external users. The firewall is often the first computer that attackers try to breach, because it is directly connected to the Internet. For this reason, the firewall computer itself should be configured as securely as possible, and it should be dedicated to detecting and deterring intruders. Firewall software other than ISA Server can be used with Communicator Web Access. For more information about firewalls, see the Firewall Services Blueprint included with the Windows Server System Reference Architecture, version 2.0, documentation available at Secure the firewalls that protect Communicator Web Access by doing the following: Using a firewall, such as ISA Server 2004 SP1. Running only the firewall services on the firewall device. Hardening the Windows Server 2003 SP1 operating system (see the Windows Server 2003 Security Guide at px). Deploying the firewall in the perimeter network. Unbinding any unnecessary services from any network adapter cards connected to the Internet. Disabling the Administrator and Guest accounts. Disabling the Client for Microsoft Networks and the File and Printer Sharing for Microsoft Networks options on the external interface.
15 Microsoft Office Communicator Web Access Security Guide 15 For more information about securing firewalls, see Appendix 1: Firewall Requirements and Recommendations. Securing Hardware Load Balancers A hardware load balancer can be used with both Communicator Web Access and Live Communications Server 2005 with SP1 to distribute user traffic in the following configurations: Multiple Communicator Web Access servers One or more Live Communications Server 2005 with SP1, Enterprise Edition, servers forming an Enterprise pool Multiple Live Communications Server 2005 with SP1, Directors Multiple Live Communications Server 2005 with SP1, Access Proxies Depending on the vendor and model, the security features included with a hardware load balancer can include: Default deny IP address checking Port mapping NAT (network address translation) SNAT (secure network address translation) SSH (Secure Shell) and SSL (Secure Sockets Layer) management For more information about supported hardware load balancing topologies for Communicator Web Access, see the Microsoft Office Communicator Web Access Planning and Deployment Guide. For security recommendations, refer to the product documentation for the hardware load balancer that you plan to use with Communicator Web Access. Securing Reverse Proxy Servers A proxy server acts as an intermediary between the Communicator Web Access server and the external client. By eliminating the need for a direct connection between external clients and internal servers, the proxy server keeps the Communicator Web Access server s host name and direct URL private. Proxy server functionality can be implemented through hardware devices or through software. It is often combined with firewall software and firewall devices. ISA Server 2004 SP1 functions as both a proxy firewall and a stateful packet filtering firewall. For more information about reverse proxy servers, see the Firewall Services Blueprint included with the Windows Server System Reference Architecture, version 2.0, documentation available at Secure Reverse Proxy Servers used for Communicator Web Access deployments by: Deploying reverse proxy servers in the perimeter network. Using the server only as a reverse proxy. Hardening the Windows Server 2003 SP1 operating system. Keeping current with updates and patches. Removing all unnecessary bindings on the external interface. Disabling the Administrator and Guest accounts. Disabling the Client for Microsoft Networks and the File and Printer Sharing for Microsoft Networks options on the external interface.
16 Microsoft Office Communicator Web Access Security Guide 16 For additional reverse proxy security requirements, refer to Appendix 2: Reverse Proxy Requirements and Recommendations. Securing Routers and Switches Secure routers and switches used for Communicator Web Access deployments by: Using the Web-based management page from a computer that is not logged on to an client and is not connected to the Internet. Changing the default password to a strong password. Changing the default management IP address to a different IP address. Using router ACLs. Disabling redirection, broadcast, and Address Resolution Protocol (ARP). Securing the management interface. Disabling the HTTP server for Web-based management. Using virtual local area networks (VLANs) to segment the network (see Improving Web Application Security: Threats and Countermeasures at Using private VLANs for hosts. Using port security. Securing Intrusion Detection Systems For security recommendations, refer to the product documentation provided with the intrusion detection system that you are using with Communicator Web Access. Securing SSL Accelerators and Offloaders Communicator Web Access uses symmetric and asymmetric encryption for Secure Sockets Layer (SSL). Symmetric encryption is used for authentication; asymmetric encryption is used for session establishment and key exchange. The majority of Communicator Web Access resources that are spent on encryption are spent on symmetric encryption. Although both SSL acceleration and offloading can reduce the performance impact of encryption, SSL offloading provides greater performance benefits for symmetric encryption and is the better choice for Communicator Web Access. Note With respect to SSL accelerators and offloaders, Communicator Web Access imposes no requirements or limitations over and above those of Windows Server 2003 SP1 or Microsoft Internet Information Services (IIS) 6.0. Communicator Web Access supports SSL offloading by using network accelerators. Network accelerators are devices, appliances, or computers, separate from the Communicator Web Access server, that handle all SSL processing. When using an offloader, none of the Communicator Web Access server main memory or processor resources are used for SSL encryption. Each network accelerator that performs SSL offloading can handle multiple Communicator Web Access servers on the network. SSL offloaders both encrypt and decrypt data. An SSL offloader can be used with other devices, such as antivirus systems and intrusion detection systems (IDSs) that cannot decrypt data, so that the device can inspect the data packet, greatly improving security of the network. There are two ways of decrypting data, SSL termination and SSL bridging.
17 Microsoft Office Communicator Web Access Security Guide 17 SSL Termination. SSL termination is the less secure of the two decryption methods, but it is faster. In SSL termination, the traffic is decrypted at the SSL offloader, inspected, and sent unencrypted to the Communicator Web Access server. SSL Bridging. SSL bridging is the more secure of the two decryption methods, but it reduces the performance benefit of SSL offloading. In SSL bridging, the traffic is decrypted, inspected, and then re-encrypted before being sent to the Communicator Web Access server. The SSL sessions on another device should be offloaded and terminated only if the connection to Communicator Web Access is secured by other mechanisms. For security recommendations, refer to the product documentation provided with the SSL offloader that you plan to use with Communicator Web Access. Securing Communicator Web Access Sessions The sessions between clients and the Communicator Web Access server can be secured through session timeouts and encryption. This section discusses ways to secure sessions between the client and Communicator Web Access. Securing Tokens In Communicator Web Access, the same token is used for the session token and the authentication token. You can secure tokens by using short timeouts on Communicator Web Access virtual servers that service external requests. You can set different timeout values for public and private computers in the external virtual server s properties. Using Encryption The following are the requirements and recommendations regarding encryption: You must use TLS/MTLS for all communications between Communicator Web Access servers and servers that are running Live Communications Server 2005 SP1. You should always use HTTPS unless SSL offloading is used for performance reasons and effective security safeguards are in place. You may use HTTP for communications between a hardware load balancer or other device and the Communicator Web Access server if SSL offloading is used for performance reasons. In this case, the physical link should be secured. Do not use HTTP between the client and the Communicator Web Access server. Caution Both forms and NTLM authentication that use HTTP between client and the server, when sniffed, can provide sensitive information in clear text to the person sniffing the traffic. Using PKI, Certificates, and SSL Communicator Web Access and Live Communications Server 2005 require certificates to ensure security. Communicator Web Access can use certificates that are issued by your existing PKI (public key infrastructure). You can use a certificate that is issued by either an internal certification authority (CA) or an external CA (also referred to as a public or third-party CA). For any external server, we recommend that you use a certificate issued by an external CA. A public CA is trusted by default by Windows and other popular client operating systems. Using a public CA will eliminate the security message on the client computer when the user accesses the Communicator Web Access site. The three supported internal PKI CA (certification authority) implementations are:
18 Microsoft Office Communicator Web Access Security Guide 18 Microsoft Windows Server 2003 Enterprise CA Microsoft Windows Server 2003 Standalone CA Microsoft Windows 2000 Standalone CA Although Communicator Web Access supports the use of a solitary root CA, we recommend that your internal CA consist of at least one offline root CA and one subordinate (issuing) CA. Using Certificates for Communicator Web Access Communicator Web Access requires two certificates: An MTLS certificate for communication with the Live Communications Server 2005 with SP1 computer An HTTPS/SSL certificate for client communication In both cases, you can use a certificate that is issued by either a Microsoft internal CAor a third-party CA. Both NetBIOS and FQDN names are supported as the subject name of the certificate that is provided by a Certification Authority. For more information on how to configure certificates using the NetBIOS name, see: Using Certificates for Live Communications Server 2005 SP1 You must use a PKI from either Microsoft or a third-party CA infrastructure. For details, see Live Communications Server 2005 SP1 Configuring Certificates at 719CE6EC4E5A&displaylang=en. Using Certificates for ISA Server 2004 SP1 Using PKI You can publish the Communicator Web Access server by using ISA Server 2004 SP1 to provide external users with access to Communicator Web Access while protecting the internal network. The recommended ISA configuration has at least two network adapters, one at the internal edge and one at the external edge. An SSL certificate must be requested, and the CA certificate chain must be downloaded to the Trusted Root Certification Authorities, Certificates folder on the local ISA computer. The SSL certificate is bound to the Listener for the external edge network adapter on the ISA computer. For details on certificate requirements and procedures, see Digital Certificates for ISA Server 2004 SP1 at For general information about certificates and PKI, see the following documents: Best Practices for Implementing a Microsoft Windows Server 2003 Public Key Infrastructure, at bp.mspx. Windows Server 2003 PKI Operations Guide at og.mspx. Hardening IIS 6.0/ASP.NET v2 for Communicator Web Access You can secure IIS and ASP.NET for Communicator Web Access by isolating internal traffic from external traffic and by restricting external access to the network.
19 Microsoft Office Communicator Web Access Security Guide 19 Using Server/Application Isolation We recommend that you physically separate internal user traffic from external user traffic by installing the internal and external Communicator Web Access servers on different physical servers. However, even when this is not possible, all Communicator Web Access servers use server isolation offered by IIS 6.0 to run the virtual servers in different processes on the same physical server. The same Communicator Web Access virtual server cannot serve both internal and external user requests. Restricting External Access We recommend that you give external access only to those users who absolutely need it. Communicator Web Access uses external access settings that are configured in Active Directory Users and Computers. A user s external access is designated in the user s properties on the Live Communications tab in the advanced settings under Enable remote user access. Using ISA Server 2004 SP1 We recommend Microsoft ISA Server 2004 SP1 for segmenting the network and publishing Communicator Web Access for external users. We also recommend that you use SSL Web Publishing using the Bridging mode. See the Microsoft Office Communicator Web Access Planning and Deployment Guide at for information on how to configure ISA Server Monitoring and Logging You can enable logging from both the Live Communications Server pool and from the Communicator Web Access service. In addition, you can install the Microsoft Office Communicator Web Access Management Pack for Microsoft Operations Manager (MOM) Using Microsoft Operations Manager With the release of Communicator Web Access, a Microsoft Office Communicator Web Access Management Pack for Microsoft Operations Manager (MOM) 2005 is now available. This management pack includes Communicator Web Access event and performance monitoring features. You can monitor events in the Management Pack to detect possible compromise of your network. Specific performance counters that may be useful for this purpose are listed in Table 1. The Office Communicator Web Access Management Pack for MOM 2005 is available at 36D &displaylang=en.
20 Microsoft Office Communicator Web Access Security Guide 20 Table 1. Security-Related MOM Counters For additional information about the Communicator Web Access Management Pack, see the Microsoft Office Communicator Web Access Planning and Deployment Guide at For additional MOM 2005 information, see the MOM Catalog at Logon Auditing Use Group Policy or local security policy (Secpol.msc) to audit failed logon attempts. For Integrated Windows Authentication, if the client performs preauthentication, only domain-level auditing can detect failed logon attempts. For other scenarios, failed logon attempts can be detected by a local security policy. Securing Users Internal users are users that access the Communicator Web Access servers from within the internal, protected, and trusted network. External users are domain users accessing the Communicator Web Access external virtual server from outside the trusted network. Each of the following types of users must be secured: Counter NUM_FORMS_LOGON_FAILURES NUM_IWA_LOGON_FAILURES NUM_TICKET_CHECK_FAILURES_SEC REQUEST_NO_SESSION_TOTAL Description Shows the total number of forms logon attempts that have failed since the Communicator Web Access virtual server was started. Failures may be caused by Active Directory connectivity problems, incorrect information supplied by users, or users who are not authorized to use Communicator Web Access. A large number of logon failures could indicate abnormal logon activity. Shows the per-second rate of successful NTLM and/or Kerberos logons since the Communicator Web Access virtual server was started. Failures may be caused by Active Directory connectivity problems, incorrect information supplied by users, or users who are not authorized to use Communicator Web Access. A large number could indicate abnormal logon activity. Shows the per-second rate of requests that were rejected due to an invalid ticket in the request. This problem occurs occasionally under normal circumstances, but spikes can be symptomatic of a denial of service attack or an attempt to gain unauthorized access to your server. Shows the number of requests that were targeted to sessions that were terminated or never existed. A high number could indicate an attempt to gain unauthorized access to the server. Internal users. Secure your internal users by requiring that users install all security updates, and require strong passwords. External users who are using private computers. Limit external access to users that absolutely require external access. Secure your external users by requiring users to install all security updates, and by requiring strong passwords. External users who are using public computers (for example, kiosks). Secure your external users who are using public computers by using a separate physical server for public access and using short timeouts. The default timeout for public computer access is 15 minutes.
21 Microsoft Office Communicator Web Access Security Guide 21 Security Best Practices The following is a summary of best practices for securing your Microsoft Office Communicator Web Access deployment. Require strong password policies. Educate end users about password disclosure risks and the methods that attackers use to obtain passwords. Conduct periodic audits of usage by Communicator Web Access server administrators. Allow only highly trusted staff to become administrators of Communicator Web Access or Live Communications Server. Use SSL and NTLM/Kerberos authentication. Deploy a firewall or reverse proxy in the perimeter network. If you use an SSL offloading device or a hardware load balancer, use SSL to secure traffic between the device and the Communicator Web Access server. If this is not possible, ensure that the physical link from the load balancing device to the Communicator Web Access server is physically secure at all times. Use ISA Server 2004 SP1 and segment the network. Use physical server isolation to separate Communicator Web Access virtual servers when possible and practical. Use SSL Web Publishing, provided by ISA Server 2004 SP1, when providing Communicator Web Access to external users. Use MOM 2005 SP1 and the Communicator Web Access MOM Pack for monitoring. Use monitoring, logging and tracing in Live Communications Server 2005 SP1. Harden the operating system, application servers, and firewalls. Use group policy to implement security lockdowns. Use certificates from a public CA to avoid the security dialog box. Use Systems Management Server 2003 for change and configuration Management. Use recommendations from the Identity and Access Management series at: Run Windows XP Service Pack 2 on the client. Monitor IIS logs. Use intrusion detection system software or hardware. Use an account name that is difficult to guess for the service account that is used by the Communicator Web Access server (created during setup). Configure gateways to use SSL/TLS. Secure routers and switches. Use the NTFS file system to protect data. Use Microsoft Partner Solutions. Keep current with Windows Update Services. Periodically reevaluate and adjust your security process. Have a plan to rapidly detect, and deploy countermeasures against, denial-of-service attacks.
22 Microsoft Office Communicator Web Access Security Guide 22 Appendixes Appendix 1: Firewall Requirements and Recommendations A firewall or a reverse proxy server can help secure Communicator Web Access. Some firewalls and reverse proxy devices, such as Microsoft ISA Server 2004 SP1, have features of both firewalls and reverse proxies. A firewall can be used to perform packet filtering, which allows only HTTP or HTTPS traffic to pass between specific IP addresses. A firewall can use the following methods to control traffic: Filter packets Proxy Stateful inspection (may not be available on all firewall devices) The firewall must use packet filtering for protecting Communicator Web Access. Packet Filtering The firewall can be placed in front of or behind a reverse proxy server, if a reverse proxy is deployed. When placed in front of a reverse proxy server, the firewall can filter traffic based on: IP address. The firewall can filter based on IP address to block known malicious users and allow only traffic whose destination IP address matches the IP address of the reverse proxy server. Domain names. The firewall can filter based on domain name to block traffic received from certain domains. Protocols. In a Communicator Web Access deployment, the firewall should be configured to allow only the HTTPS protocol. Ports. In a Communicator Web Access deployment, the firewall should be configured to allow only the traffic whose destination port is the port published by the reverse proxy server. Specific words or phrases. Communicator Web Access does not require this filter. When placed behind a reverse proxy device, the firewall (also referred to as the back firewall in this case) can filter traffic based on: IP address. The firewall can filter based on IP address to allow only traffic whose destination is the Communicator Web Access server. Domain names. The firewall can filter based on domain name to allow only traffic that is received from the same domain in which the Communicator Web Access server is located. Protocols. In a Communicator Web Access deployment, the firewall should be configured to allow only the HTTPS protocol. Ports. In a Communicator Web Access deployment, the firewall should be configured to allow only traffic whose destination port is the port used by the Communicator Web Access server. Specific words or phrases. Communicator Web Access does not require this filter. Appendix 2: Reverse Proxy Requirements and Recommendations Some firewalls and reverse proxy devices, such as Microsoft ISA Server 2004 SP1, may have features of both firewalls and reverse proxies.
23 Microsoft Office Communicator Web Access Security Guide 23 The reverse proxy device acts as an intermediary between the Communicator Web Access server and the external client. It eliminates the need for a direct connection between the external client and the Communicator Web Access server in the private network. A reverse proxy device can also be configured to decrypt SSL requests from the client and encrypt responses from the Communicator Web Access server. This configuration enables the reverse proxy device to inspect each incoming packet to ensure that the connection between client and server is always secured by SSL. A reverse proxy device must provide the following features: Request URL mapping. Request URL mapping is used to map the request URL (public URL) to the URL of the Communicator Web Access server. For example, if the public URL is and the URL of the Communicator Web Access server is this mapping must be configured on the reverse proxy. Request header mapping. The client request will have a host header with a value of the host name of requested URL. This header must be mapped to the Communicator Web Access server so that the Communicator Web Access server receives the proper host header value. Response header mapping. The server response will have headers that contain information about the Communicator Web Access server. To conceal the host name of the Communicator Web Access server, the reverse proxy device should remap the host header value to the public host name. SSL bridging or tunneling. To ensure that the client always has a secured connection to the server, the reverse proxy device must provide SSL bridging or tunneling functionality. Bridging is recommended. Authentication. Some reverse proxy devices, such as servers running ISA Server, can authenticate the client when the client tries to access the internal network. Authentication on the reverse proxy is not required. Appendix 3: Security Tools This section contains a brief summary of security tools. Account Lockout Status (LockoutStatus.exe) This tool is a combination command-line and graphical tool that displays lockout information about a particular user account. LockoutStatus.exe collects information from every contactable domain controller in the domain of the target user account. This update addresses the following issues: Password set dialog box does not limit textual input to password and confirm password edit boxes. Password set operation fails to set a proper password. Password length is miscalculated, resulting in a password of one character. The LockoutStatus.exe tool can be downloaded from Group Policy Inventory (GPInventory.exe). This tool allows administrators to collect group policy and other information from any number of computers in their network by running multiple Resultant Set of User Policy (RSOP) or Windows Management Instrumentation (WMI) queries. The query results can be exported to either an XML or a text file, where they can be analyzed in Excel. You can download the tool from
24 Microsoft Office Communicator Web Access Security Guide 24 Group Policy Management Console (GPMC). This tool provides a user interface for managing group policy. For more information about obtaining and using the Group Policy Management Console, see IIS Lockdown Tool 2.1. This tool turns off unnecessary features, thus reducing the attack surface. To provide multiple layers of protection against attackers, URLScan, with customized templates for each supported server role, is integrated into the IIS Lockdown Wizard. To keep the server protected against known vulnerabilities, however, all hotfixes are required before and after applying IIS Lockdown Wizard. You can download the tool from Microsoft Baseline Security Analyzer (MBSA). This tool includes graphical and command line interfaces that can perform local or remote scans of Windows systems. MBSA runs on Windows Server 2003, Windows 2000, and Windows XP and will scan for common security misconfigurations in the following products: Windows 2000, Windows XP, Windows Server 2003, IIS 5.0 and 6.0, SQL Server 7.0 and 2000, Internet Explorer 5.01 and later, and Office 2000, 2002 and MBSA also scans for missing security updates, update rollups and service packs that are published to Microsoft Update. You can download the MBSA tool from 7b51ec2e5ac9&DisplayLang=enIIS. URLScan. This tool is designed to secure IIS 5.0 and, in some cases, IIS 6.0. For more information on the UrlScan Security Tool v2.5, see the home page at Appendix 4: Additional Resources for Sections in this Guide This section lists additional security-related resources. Internet Information Services (IIS) Securing Internet Information Services 6.0: Certificates and PKI Enterprise Design for Web Application Services: mspx For information on how to configure certificates using the NetBIOS name, see Live Communications Server 2005 SP1 Configuring Certificates: 719CE6EC4E5A&displaylang=en Digital Certificates for ISA Server 2004 SP1: Best Practices for Implementing a Microsoft Windows Server 2003 Public Key Infrastructure: bp.mspx Windows Server 2003 PKI Operations Guide: og.mspx
25 Microsoft Office Communicator Web Access Security Guide 25 Firewalls/Reverse Proxies Firewall Services Blueprint included with the WSSRA v2 documentation: Controlling Secure Internet Access Using ISA Server 2004: x General Security ISA Server Security Hardening Guide: MSA Chapter 3 - Firewall Design: WSSRA Security Architecture Blueprint: Security Risk Management Guide: Windows Server 2003 Security Guide: Hardening the Windows Infrastructure on the ISA Server 2004 Computer: Live Communications Server 2005 Security Guide: FE54E377C2BD&displaylang=en Microsoft Security home page: Security bulletins: Recent security incidents: TechNet security center: Patterns and Practices article, Threat Modeling : Secure Access Using Smart Cards Planning Guide: d=&srcfamilyid=794571e c59-bfa9- B4BFE54D8DD8&u=details.aspx%3ffamilyid%3dAD196BCE-876B-44E0-9E90-2A0C %26displaylang%3den Services and Service Accounts Security Planning Guide: d=&srcfamilyid=794571e c59-bfa9- B4BFE54D8DD8&u=details.aspx%3ffamilyid%3dF4069A30-01D7-43E8-8B DB2D9C2F%26displaylang%3den Implementing Quarantine Services with Microsoft Virtual Private Network Planning Guide: d=&srcfamilyid=794571e c59-bfa9- B4BFE54D8DD8&u=details.aspx%3ffamilyid%3dC6970C14-B8E3-4BE0-BC38- B06BCB769696%26displaylang%3den
26 Microsoft Office Communicator Web Access Security Guide 26 Microsoft Baseline Security Analyzer v2.0 (for IT Professionals): d=&srcfamilyid=794571e c59-bfa9- B4BFE54D8DD8&u=details.aspx%3ffamilyid%3d4B4ABA06-B5F9-4DAD-BE9D- 7B51EC2E5AC9%26displaylang%3den Administrator Accounts Security Planning Guide: d=&srcfamilyid=794571e c59-bfa9- B4BFE54D8DD8&u=details.aspx%3ffamilyid%3d04D81D4F-3B B37A- C C662%26displaylang%3den Live Communications Server 2005 SP1 Live Communications Server 2005 SP1 Security Guide: FE54E377C2BD&displaylang=en Microsoft Operation Manager (MOM) The MOM Catalog: The MOM Resource Kit: Office Communicator Web Access Management Pack for MOM 2005: 36D &displaylang=en Secure Sockets Layer (SSL) Secure Sockets Layer Acceleration and Key Management Partners: FIX: You cannot use a different SSL certificate for each array member in an ISA Server 2004, Enterprise Edition-based array.
Microsoft Lync Server 2010
Microsoft Lync Server 2010 Scale to a Load Balanced Enterprise Edition Pool with WebMux Walkthrough Published: March. 2012 For the most up to date version of the Scale to a Load Balanced Enterprise Edition
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Installation and configuration guide
Installation and Configuration Guide Installation and configuration guide Adding X-Forwarded-For support to Forward and Reverse Proxy TMG Servers Published: May 2010 Applies to: Winfrasoft X-Forwarded-For
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
Installation and configuration guide
Installation and Configuration Guide Installation and configuration guide Adding X-Username support to Forward and Reverse Proxy TMG Servers Published: December 2010 Applies to: Winfrasoft X-Username for
Sitefinity Security and Best Practices
Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management
How to Secure a Groove Manager Web Site
How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
Application Firewall Overview. Published: February 2007 For the latest information, please see http://www.microsoft.com/iag
Application Firewall Overview Published: February 2007 For the latest information, please see http://www.microsoft.com/iag Contents IAG Application Firewall: An Overview... 1 Features and Benefits... 2
How To Secure An Rsa Authentication Agent
RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
Technical Brief for Windows Home Server Remote Access
Technical Brief for Windows Home Server Remote Access Microsoft Corporation Published: October, 2008 Version: 1.1 Abstract This Technical Brief provides an in-depth look at the features and functionality
Deploying F5 to Replace Microsoft TMG or ISA Server
Deploying F5 to Replace Microsoft TMG or ISA Server Welcome to the F5 deployment guide for configuring the BIG-IP system as a forward and reverse proxy, enabling you to remove or relocate gateway security
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
Session Hijacking Exploiting TCP, UDP and HTTP Sessions
Session Hijacking Exploiting TCP, UDP and HTTP Sessions Shray Kapoor [email protected] Preface With the emerging fields in e-commerce, financial and identity information are at a higher risk of being
Deploying F5 with Microsoft Active Directory Federation Services
F5 Deployment Guide Deploying F5 with Microsoft Active Directory Federation Services This F5 deployment guide provides detailed information on how to deploy Microsoft Active Directory Federation Services
Mobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: [email protected] Information in this document is subject to change without notice. Companies names
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
Deploying the Barracuda Load Balancer with Office Communications Server 2007 R2. Office Communications Server Overview.
Deploying the Barracuda Load Balancer with Office Communications Server 2007 R2 Organizations can use the Barracuda Load Balancer to enhance the scalability and availability of their Microsoft Office Communications
Microsoft Systems Architecture 2.0 (MSA 2.0) Security Review An analysis by Foundstone, Inc.
Microsoft Systems Architecture 2.0 (MSA 2.0) Security Review An analysis by Foundstone, Inc. Foundstone Labs October, 2003 Table of Contents Table of Contents...2 Introduction...3 Scope and Approach...3
www.mvatcybernet.com PRODUCT VERSION: LYNC SERVER 2010, LYNC SERVER 2013, WINDOWS SERVER 2008
PRODUCT VERSION: LYNC SERVER 2010, LYNC SERVER 2013, WINDOWS SERVER 2008 With Forefront Threat Management Gateway 2010 now discontinued, we sought a suitable reverse proxy solution that works with Lync
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Security IIS Service Lesson 6
Security IIS Service Lesson 6 Skills Matrix Technology Skill Objective Domain Objective # Configuring Certificates Configure SSL security 3.6 Assigning Standard and Special NTFS Permissions Enabling and
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
INSTANT MESSAGING SECURITY
INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part
Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.
Architecture The policy discussed suggests that the network be partitioned into several parts with guards between the various parts to prevent information from leaking from one part to another. One part
Achieving PCI Compliance Using F5 Products
Achieving PCI Compliance Using F5 Products Overview In April 2000, Visa launched its Cardholder Information Security Program (CISP) -- a set of mandates designed to protect its cardholders from identity
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
TS Gateway Step-By-Step Guide
TS Gateway Step-By-Step Guide Microsoft Corporation Published: December 2007 Modified: July 2008 Abstract Terminal Services Gateway (TS Gateway) is a new role service available to users of the Microsoft
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL AWF Series Web application firewalls provide industry-leading Web application attack protection, ensuring continuity
The Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002
User Identification and Authentication
User Identification and Authentication Vital Security 9.2 Copyright Copyright 1996-2008. Finjan Software Inc.and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included
Sophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis? This paper presents a scenario in which an attacker attempts to hack into the internal network
Global Partner Management Notice
Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with
RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2
RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks
Fifty Critical Alerts for Monitoring Windows Servers Best practices
Fifty Critical Alerts for Monitoring Windows Servers Best practices The importance of consolidation, correlation, and detection Enterprise Security Series White Paper 6990 Columbia Gateway Drive, Suite
Basic & Advanced Administration for Citrix NetScaler 9.2
Basic & Advanced Administration for Citrix NetScaler 9.2 Day One Introducing and deploying Citrix NetScaler Key - Brief Introduction to the NetScaler system Planning a NetScaler deployment Deployment scenarios
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
Bendigo and Adelaide Bank Ltd Security Incident Response Procedure
Bendigo and Adelaide Bank Ltd Security Incident Response Procedure Table of Contents 1 Introduction...1 2 Incident Definition...2 3 Incident Classification...2 4 How to Respond to a Security Incident...4
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
My FreeScan Vulnerabilities Report
Page 1 of 6 My FreeScan Vulnerabilities Report Print Help For 66.40.6.179 on Feb 07, 008 Thank you for trying FreeScan. Below you'll find the complete results of your scan, including whether or not the
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
10 Configuring Packet Filtering and Routing Rules
Blind Folio 10:1 10 Configuring Packet Filtering and Routing Rules CERTIFICATION OBJECTIVES 10.01 Understanding Packet Filtering and Routing 10.02 Creating and Managing Packet Filtering 10.03 Configuring
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014 Introduction: Cyber attack is an unauthorized access to a computer
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
F5 and Microsoft Exchange Security Solutions
F5 PARTNERSHIP SOLUTION GUIDE F5 and Microsoft Exchange Security Solutions Deploying a service-oriented perimeter for Microsoft Exchange WHAT'S INSIDE Pre-Authentication Mobile Device Security Web Application
13 Ways Through A Firewall
Industrial Control Systems Joint Working Group 2012 Fall Meeting 13 Ways Through A Firewall Andrew Ginter Director of Industrial Security Waterfall Security Solutions Proprietary Information -- Copyright
Network Security and Firewall 1
Department/program: Networking Course Code: CPT 224 Contact Hours: 96 Subject/Course WEB Access & Network Security: Theoretical: 2 Hours/week Year Two Semester: Two Prerequisite: NET304 Practical: 4 Hours/week
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
GE Measurement & Control. Cyber Security for NEI 08-09
GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4
DMZ Network Visibility with Wireshark June 15, 2010
DMZ Network Visibility with Wireshark June 15, 2010 Ashok Desai Senior Network Specialist Intel Information Technology SHARKFEST 10 Stanford University June 14-17, 2010 Outline Presentation Objective DMZ
Load Balancing for Microsoft Office Communication Server 2007 Release 2
Load Balancing for Microsoft Office Communication Server 2007 Release 2 A Dell and F5 Networks Technical White Paper End-to-End Solutions Team Dell Product Group Enterprise Dell/F5 Partner Team F5 Networks
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
ITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
Barracuda Web Site Firewall Ensures PCI DSS Compliance
Barracuda Web Site Firewall Ensures PCI DSS Compliance E-commerce sales are estimated to reach $259.1 billion in 2007, up from the $219.9 billion earned in 2006, according to The State of Retailing Online
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
HTTP connections can use transport-layer security (SSL or its successor, TLS) to provide data integrity
Improving File Sharing Security: A Standards Based Approach A Xythos Software White Paper January 2, 2003 Abstract Increasing threats to enterprise networks coupled with an ever-growing dependence upon
Integrated SSL Scanning
Software Version 9.0 Copyright Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE
CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE Due to the encouraging feedback this series of articles has received, we decided to explore yet another type of cyber intrusionthe Man In The Middle (MITM)
FBLA Cyber Security aligned with Common Core 6.14. FBLA: Cyber Security RST.9-10.4 RST.11-12.4 RST.9-10.4 RST.11-12.4 WHST.9-10.4 WHST.11-12.
Competency: Defend and Attack (virus, spam, spyware, Trojans, hijackers, worms) 1. Identify basic security risks and issues to computer hardware, software, and data. 2. Define the various virus types and
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
How To Set Up A Load Balancer With Windows 2010 Outlook 2010 On A Server With A Webmux On A Windows Vista V2.2.5.2 (Windows V2) On A Network With A Server (Windows) On
Load Balancing Exchange 2010 OWA for External Access using WebMux Published: April 2011 Information in this document, including URL and other Internet Web site references, is subject to change without
How To Protect Your Network From Attack From Outside From Inside And Outside
IT 4823 Information Security Administration Firewalls and Intrusion Prevention October 7 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
VOICE OVER IP SECURITY
VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
Firewalls, Tunnels, and Network Intrusion Detection. Firewalls
Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
The Key to Secure Online Financial Transactions
Transaction Security The Key to Secure Online Financial Transactions Transferring money, shopping, or paying debts online is no longer a novelty. These days, it s just one of many daily occurrences on
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
Achieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
Deploying F5 for Microsoft Office Web Apps Server 2013
Deploying F5 for Microsoft Office Web Apps Server 2013 Welcome to the F5 - Microsoft Office Web Apps Server deployment guide. This document contains guidance on configuring the BIG-IP Local Traffic Manager
WatchGuard Technologies, Inc. 505 Fifth Avenue South Suite 500, Seattle, WA 98104 www.watchguard.com
SMALL BUSINESS NETWORK SECURITY GUIDE WHY A REAL FIREWALL PROVIDES THE BEST NETWORK PROTECTION AUGUST 2004 SMALL BUSINESS NETWORK SECURITY GUIDE: WHY A REAL FIREWALL PROVIDES THE BEST NETWORK PROTECTION
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
Web Application Security Considerations
Web Application Security Considerations Eric Peele, Kevin Gainey International Field Directors & Technology Conference 2006 May 21 24, 2006 RTI International is a trade name of Research Triangle Institute
GlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
How to Install Microsoft Mobile Information Server 2002 Server ActiveSync. Joey Masterson
How to Install Microsoft Mobile Information Server 2002 Server ActiveSync Joey Masterson How to Install Microsoft Mobile Information Server 2002 Server ActiveSync Joey Masterson Copyright Information
PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ
PAVING THE PATH TO THE ELIMINATION A RSACCESS WHITE PAPER 1 The Traditional Role of DMZ 2 The Challenges of today s DMZ deployments 2.1 Ensuring the Security of Application and Data Located in the DMZ
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
AD RMS Step-by-Step Guide
AD RMS Step-by-Step Guide Microsoft Corporation Published: March 2008 Author: Brian Lich Editor: Carolyn Eller Abstract This step-by-step guide provides instructions for setting up a test environment to
CYBERTRON NETWORK SOLUTIONS
CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified
Internet Security and Acceleration Server 2000 with Service Pack 1 Audit. An analysis by Foundstone, Inc.
Internet Security and Acceleration Server 2000 with Service Pack 1 Audit An analysis by Foundstone, Inc. Internet Security and Acceleration Server 2000 with Service Pack 1 Audit This paper presents an
