Personally I us the Windows Server 2003 Security Guide at
http://www.microsoft.com/technet/security/prodtech/windowsserver2003/w20
03hg/.  If it is not in there I am very cautious about applying the
change.  There is also a windows XP security guide at
http://www.microsoft.com/technet/security/prodtech/windowsxp/secwinxp/de
fault.mspx.  I made one change that was not in either guide.  The change
was from a reputable source and claimed this should have no impact on
end users.  This was a modification to the behavior of IE to fix an
unpatched vulnerability.  I did test the change, but not well enough.
Shortly after rolling out the change to our entire organization, one of
our applications stopped working.  This was a third part application.
We had rolled it out using a custom adiminstrative template.  The roll
back required another modification using a custom template.  Again
testing was not totally complete.  It took several weeks before we
finally removed this from all the PCs in our domain.

Dennis

-----Original Message-----
From: Susan Bradley, CPA aka Ebitz - SBS Rocks [MVP]
[mailto:[EMAIL PROTECTED] 
Sent: Wednesday, November 09, 2005 4:23 PM
To: focus-ms@securityfocus.com
Subject: What server hardening are you doing these days?


Steve Riley's WebLog : When security breaks things:
http://blogs.technet.com/steriley/archive/2005/11/08/414002.aspx

Are folks doing additional hardening to their servers these days and if 
so, what guidance are you using?

Interesting blog post about the impact of such hardening and not 
supported ACL adjusting.

-- 
Letting your vendors set your risk analysis these days?  
http://www.threatcode.com


------------------------------------------------------------------------
---
------------------------------------------------------------------------
---


---------------------------------------------------------------------------
---------------------------------------------------------------------------

Reply via email to