SunBow
asked on
Security of Terminal Services (maintaining, configuring)
Given an existing system running apps with Terminal Services, what are the security concerns, and what is best way to address them?
This is more relevant to auditing and managing configuration of existing system than seeking alternatives.
Am more interested in real world experience and behavior than simple theory, but I could always use a few more links to good documents or websites currently dealing with same issues.
This is more relevant to auditing and managing configuration of existing system than seeking alternatives.
Am more interested in real world experience and behavior than simple theory, but I could always use a few more links to good documents or websites currently dealing with same issues.
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
ASKER
Notice:
I intend to close this, as it is not progressing, and I no longer have pressing need. To date, the other parties are not getting too specific on terminal services per se, but are spinning wheels on old issues regarding site security. The site's been hardened again and again, continually. So I consider first comment as sufficient.
I likely have further questions as this develops, but will likely run them in another TA, such as networking. For anyone else having interest or potential contribution wanting a notif, just add a simple "listening" remark below, and I'll drop a link here if it develops.
I intend to close this, as it is not progressing, and I no longer have pressing need. To date, the other parties are not getting too specific on terminal services per se, but are spinning wheels on old issues regarding site security. The site's been hardened again and again, continually. So I consider first comment as sufficient.
I likely have further questions as this develops, but will likely run them in another TA, such as networking. For anyone else having interest or potential contribution wanting a notif, just add a simple "listening" remark below, and I'll drop a link here if it develops.
ASKER
I'd like to think there's a better 'answer' to be had, for this database, (unsure that it warrants A on own) but it may be sufficient, I got none better, and if nothing else, I've benefitted from edmonds_robert elsewhere.
Closing.
Closing.
Hi,
You wanted a link - this is what we do
www.neanco.com
Pervasive security - will also fix your terminal services security issue.
Take a look.
/NEA
You wanted a link - this is what we do
www.neanco.com
Pervasive security - will also fix your terminal services security issue.
Take a look.
/NEA
ASKER
[this is rather a man-in-middle question. say, one person configured, a security team is going to ask a third party (someone I know) about some details. Looking to prepare the man-in-middle, unwary 3rd party, for what to expect; assume this is more an audit type question than one of planning or design or implementation]
How best to ascertain, to assess some vulnerability, or what have you. But perhaps you have something there, in not leaving too much, in assumptions, to those who manage applications
(as fyi, we did do citrix on NT, before. but that is another topic)