Tech or Treat! Write an article about your scariest tech disaster to win gadgets!Learn more

x
?
Solved

What are the requirements to secure Windows Environment

Posted on 2006-11-27
1
Medium Priority
?
189 Views
Last Modified: 2013-12-04
I am working in a Windows 2003 AD environment which is utilizing a Cisco Router and Symantec Firewall.  If I am only using Office suite, TS services, Exchange services, Norton, Veritas Backup Exec, and closed unneccessary ports on the router and firewall, do I need to constantly execute the Windows critical security updates?
0
Comment
Question by:jahhan
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 96

Accepted Solution

by:
Lee W, MVP earned 1000 total points
ID: 18019787
Does any system EVER get connected to the internet?  If so, then YES, you need to do the updates.  It only takes one user to "accidentally" install an activeX control from a malicious web site that exploits a weakness in a product and then spreads throughout your network and costs you thousands or perhaps millions of dollars.  Remember SQL Slammer?  Once that got on a network, any machine runnind an unpatched MSDE install was vulnerable.


Setup a WSUS server and deploy patches through that... but don't be silly and think because you have a ship with a hull that has no leaks it's somehow unsinkable.
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot has fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In today's information driven age, entrepreneurs have so many great tools and options at their disposal to help turn good ideas into a thriving business. With cloud-based online services, such as Amazon's Web Services (AWS) or Microsoft's Azure, bus…
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
In this video, Percona Solution Engineer Rick Golba discuss how (and why) you implement high availability in a database environment. To discuss how Percona Consulting can help with your design and architecture needs for your database and infrastr…
In response to a need for security and privacy, and to continue fostering an environment members can turn to for support, solutions, and education, Experts Exchange has created anonymous question capabilities. This new feature is available to our Pr…
Suggested Courses

647 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question