Solved

common miscnfigured windows services and data exposure

Posted on 2011-09-27
2
337 Views
Last Modified: 2012-05-12
As an internal only user often we identify what we call “open shares and directories” on our domain – that often house sensitive data. I believe we access them over the SMB protocol. Aside from open shares, where all the user really needs to do to access is be a member of everyone or domain users group and no how to mount a remote share - are there any other services or common mistakes made on windows server that could also grant internal users inappropriate access to any sensitive data resident with little or no skill required to access it? Or are “Open shares” by far the easiest and most common on windows server? If there are other common misconfigured windows services that can grant access to data on target server – please detail.
0
Comment
Question by:pma111
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 9

Accepted Solution

by:
jsdray earned 500 total points
ID: 36708750
You are absolutely correct in that  “Open shares”  are the easiest and most common way of allowing inappropriate access.  So the key is to properly configure these shares to only allow those whom you'd really like to have the access.  My experience (as little as it may be) has been the over-use of the "everyone" group on shares.  Users should be categorized as much as possible in Active Directory by OUs and Groups to allow only the access needed.  Again, in my experience, I've seen the lazy method used to allow everyone access, and then we wonder why we have problems....
A second problem I've seen is another lazy implementation... overuse of the administrator group.  When this is done, your entire domain is in jeopardy.  
Not sure if I answered your question, but you've at least allowed me to vent...
0
 
LVL 3

Author Comment

by:pma111
ID: 36708761
Good points will keep open for other input
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others.  This conference is aimed mainly at government agencies.  So it addresses the various compli…
There is a lot to be said for protecting yourself and your accounts with 2 factor authentication.  I found to my own chagrin, that there is a big downside as well.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Suggested Courses

631 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question