http://www.jsiinc.com/TIP0000/rh0096.htm

This tells you how to disable admin. shares.  I don't recall if it
actually works though.

-Jason

On Fri, 11 Jun 1999, Brian Steele wrote:

> Date: Fri, 11 Jun 1999 20:06:04 -0400
> From: Brian Steele <[EMAIL PROTECTED]>
> To: Jean Morissette <[EMAIL PROTECTED]>,
>     "Paul D. Robertson" <[EMAIL PROTECTED]>,
>     Don Kelloway <[EMAIL PROTECTED]>
> Cc: [EMAIL PROTECTED]
> Subject: Re: Why not NT?
> 
> I think there's a reg-hack for it, but I can't remember what it is.  Check
> one of the NT newsgroups.
> 
> Brian Steele
> 
> -----Original Message-----
> From: Jean Morissette <[EMAIL PROTECTED]>
> To: Paul D. Robertson <[EMAIL PROTECTED]>; Don Kelloway
> <[EMAIL PROTECTED]>
> Cc: [EMAIL PROTECTED] <[EMAIL PROTECTED]>
> Date: Friday, 11 June, 1999 3:12 PM
> Subject: RE: Why not NT?
> 
> 
> >Well, since we have the attention of all NT'ers now I have a quick
> question:
> >
> >Is there a better way to delete the unwanted shares like c$, d$, admin$
> >etc... than running a DOS batch file every time an admin logs in?
> >
> >Thanks
> >Jean Morissette
> >
> >> -----Original Message-----
> >> From: [EMAIL PROTECTED]
> >> [mailto:[EMAIL PROTECTED]]On Behalf Of Paul D. Robertson
> >> Sent: Thursday, June 03, 1999 8:08 AM
> >> To: Don Kelloway
> >> Cc: [EMAIL PROTECTED]
> >> Subject: Re: Why not NT?
> >>
> >>
> >> On Wed, 2 Jun 1999, Don Kelloway wrote:
> >>
> >> > But IMO, I think people are either forgetting or overlooking
> >> the fact that
> >> > the Windows NT4 op/sys can be made "C2" and "E3/F-C2" secure
> >> and that the
> >>
> >> 1.  C2 doesn't mean much at all, executive summary is "Have to log on to
> >> access the system and it logs that fact."  Discretionary access control
> >> isn't exactly rocket-science.
> >>
> >> Right from the evaluation report itself:
> >>
> >>   The TOE implements all of the security enforcing features of
> >> Functionality
> >>   Class F-C2 defined in Scheme Information Notice (SIN) No. 053
> >> [k] which is
> >>   based on TCSEC [j] Class C2 requirements. These features are:
> >>
> >>   a.    mandatory identification and authentication of all users;
> >>
> >>   b.    Discretionary Access Control (DAC);
> >>
> >>   c.    accountability and auditing; and
> >>
> >>   d.    object reuse.
> >>
> >> 2. Trusted Solaris has E3/F-B1, does that make it a better firewall
> >> platform?
> >>
> >> 3. The NT 3.51 evaluation was used as a basis for the ITSEC
> >> certification.
> >> According to the ISEC report, the new SEFs evaluated provide:
> >>
> >>    a.  simplified user administration by supporting the
> >> configuration of an
> >>        initial user profile (covering facilities available to the user)
> >>        established the first time a user logs onto the TOE; and
> >>
> >>    b.  simplified system administration by providing a 'system policy'
> >>        that can be used to configure a number of machines.
> >>
> >> Big firewalling properties there!  To be fair, they did peek at a few
> >> lines of code including some that were previously evaluated.
> >>
> >> [off-topic aside follows]
> >>
> >> Dredging up the 3.51 report shows an interesting requirement
> >>
> >> p.    Each domain and computer within a domain shall be assigned a unique
> >>       name.
> >>
> >> [end of off-topic aside]
> >>
> >> The 3.51 evaluation also states the system is supposed to protect against
> >> access by untrusted Workstations or Domain Controllers, but we've
> >> historicly had Linux boxes with SAMBA take over and refuse to relinquish
> >> the PDC role accidently in the past and 3.51 had the whole LM hash
> >> problem.
> >>
> >> > "E3/F-C2" is widely acknowledged to be the highest ITSEC
> >> evaluation rating
> >> > that can be achieved by a general-purpose operating system and "C2" is
> >>
> >> Define "general-purpose operating system" and describe how DG/UX at
> >> _Red_Book_ *B2* doesn't meet that criteria.  (The Red Book includes
> >> trusted networking for those following along)  Security starts at B1, and
> >> assurance is really B2 and up.
> >>
> >> The gulf between C2 and B2 is far and wide and includes a source code
> >> review of the Trusted Computing Base.
> >>
> >> > widely acknowledged to be the highest TCSEC evaluation rating
> >> that can be
> >> > achieved by a general-purpose operating system.
> >>
> >> Firewalls aren't general-purpose computing functions, so I'm not sure the
> >> argument isn't specious anyway.
> >>
> >> The Common Criteria seem to me to be the ISO-9000 of evaluations.
> >> Correct me if I'm wrong, but under ITSEC and the CC doesn't the
> >> evaluation team run tests specified/developed by the manufacturer?
> >>
> >> I have a much higher general assurance of the TCSEC at B2 and above.
> >>
> >> Paul
> >> ------------------------------------------------------------------
> >> -----------
> >> Paul D. Robertson      "My statements in this message are
> >> personal opinions
> >> [EMAIL PROTECTED]      which may have no basis whatsoever in fact."
> >>
> >>    PSB#9280
> >>
> >> -
> >> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> >> "unsubscribe firewalls" in the body of the message.]
> >>
> >
> >-
> >[To unsubscribe, send mail to [EMAIL PROTECTED] with
> >"unsubscribe firewalls" in the body of the message.]
> 
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
> 


AT&T Wireless Services
IT Security
UNIX Security Operations Specialist

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to