Improve company productivity with a Business Account.Sign Up

x
?
Solved

common miscnfigured windows services and data exposure

Posted on 2011-09-27
2
Medium Priority
?
347 Views
Last Modified: 2012-05-12
As an internal only user often we identify what we call “open shares and directories” on our domain – that often house sensitive data. I believe we access them over the SMB protocol. Aside from open shares, where all the user really needs to do to access is be a member of everyone or domain users group and no how to mount a remote share - are there any other services or common mistakes made on windows server that could also grant internal users inappropriate access to any sensitive data resident with little or no skill required to access it? Or are “Open shares” by far the easiest and most common on windows server? If there are other common misconfigured windows services that can grant access to data on target server – please detail.
0
Comment
Question by:pma111
2 Comments
 
LVL 9

Accepted Solution

by:
jsdray earned 2000 total points
ID: 36708750
You are absolutely correct in that  “Open shares”  are the easiest and most common way of allowing inappropriate access.  So the key is to properly configure these shares to only allow those whom you'd really like to have the access.  My experience (as little as it may be) has been the over-use of the "everyone" group on shares.  Users should be categorized as much as possible in Active Directory by OUs and Groups to allow only the access needed.  Again, in my experience, I've seen the lazy method used to allow everyone access, and then we wonder why we have problems....
A second problem I've seen is another lazy implementation... overuse of the administrator group.  When this is done, your entire domain is in jeopardy.  
Not sure if I answered your question, but you've at least allowed me to vent...
0
 
LVL 3

Author Comment

by:pma111
ID: 36708761
Good points will keep open for other input
0

Featured Post

Improve Your Query Performance Tuning

In this FREE six-day email course, you'll learn from Janis Griffin, Database Performance Evangelist. She'll teach 12 steps that you can use to optimize your queries as much as possible and see measurable results in your work. Get started today!

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Are you looking to start a business? Do you own and operate a small company? If so, here are some courses you need to take before you hire a full-time IT staff.
The intent of this article is not to tell you what solution to use (you know it better) or make a big bang change to your current regime (you are well aware of), but to share how the regime can be better and effective in streamlining the multiple pa…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

579 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question