Solved

What are the requirements to secure Windows Environment

Posted on 2006-11-27
1
186 Views
Last Modified: 2013-12-04
I am working in a Windows 2003 AD environment which is utilizing a Cisco Router and Symantec Firewall.  If I am only using Office suite, TS services, Exchange services, Norton, Veritas Backup Exec, and closed unneccessary ports on the router and firewall, do I need to constantly execute the Windows critical security updates?
0
Comment
Question by:jahhan
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 96

Accepted Solution

by:
Lee W, MVP earned 250 total points
ID: 18019787
Does any system EVER get connected to the internet?  If so, then YES, you need to do the updates.  It only takes one user to "accidentally" install an activeX control from a malicious web site that exploits a weakness in a product and then spreads throughout your network and costs you thousands or perhaps millions of dollars.  Remember SQL Slammer?  Once that got on a network, any machine runnind an unpatched MSDE install was vulnerable.


Setup a WSUS server and deploy patches through that... but don't be silly and think because you have a ship with a hull that has no leaks it's somehow unsinkable.
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In today's information driven age, entrepreneurs have so many great tools and options at their disposal to help turn good ideas into a thriving business. With cloud-based online services, such as Amazon's Web Services (AWS) or Microsoft's Azure, bus…
SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…
If you’ve ever visited a web page and noticed a cool font that you really liked the look of, but couldn’t figure out which font it was so that you could use it for your own work, then this video is for you! In this Micro Tutorial, you'll learn yo…

691 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question