Security (RSS)

Security

I've got the Blue Magnfying glass to go with my Green Check

Prior to August of 2004, I began tracking a blog about Security ....and then one day the guy on the blog posted in the newsgroup... and then we talked on the phone...and then swapped emails...and IMs.... and started a friendship.  At SMBnation last year we met in person for the first time (you wouldn't have guess that from the presentation would you?) 

Today he's gone from being a security friend and guru, to a Small Business Security guru.  It's cool to see this come to the marketplace.  I find that it adds a great deal to my already daily routine of my morning email.... in the next phase, SBS 2003 R2 will give me "green checks" in my daily email.

But today, I get blue magnifying glass every day at 6 a.m that keeps me aware and is part of that "hardening me" the business owner process.

Scorpion Software releases Firewall Dashboard for Microsoft's Small Business Server 2003

Chilliwack, BC: March 22, 2006 - Scorpion Software Corp. today announced the general availability of version 1.0 of Firewall Dashboard, a security analytics tool to proactively identify threats before they become problems to small businesses that are using Microsoft's Small Business Server 2003 (SBS 2003). With the Firewall Dashboard, owners of SBS 2003 can now change their raw firewall logs into meaningful and interpretable graphical threat assessments. With its unique ability to first aggregate log data, and then filter out network chatter, users of Firewall Dashboard can easily peel back the layers of firewall event complexity to find the real issues their network is facing. More information about the Firewall Dashboard is available at http://www.scorpionsoft.com/products/fwdashboard/.

"The Firewall Dashboard is our first security analytics tools to help small businesses understand the real threats to their business." says Dana Epp, Scorpion Software's President and computer security software architect. "We want to get relevant computer security intelligence information to business owners, and we are pleased to have worked with the small business community in designing and testing this product. With over 100 SBS servers already running the Firewall Dashboard during its development process, we continue to receive great feedback from SBS administrators and business owners in the field who are actually using the product every day." Testimonials from some of those users can be viewed at: http://www.scorpionsoft.com/products/fwdashboard/testimonials.html

Pricing and Availability

Firewall Dashboard is available today to customers worldwide through Scorpion Software resellers and the Scorpion Software Company Store at https://secure.scorpionsoft.com/store/. MSRP for a single one year license of the Firewall Dashboard is $95 USD. Resellers can purchase the Firewall Dashboard Reseller Pack, a five (5) unit bundling of one year licenses for $356.25 USD.

About Scorpion Software Corp.

Scorpion Software Corp. is a leading provider of security analytic tools for small business, helping organizations proactively identify and remediate network and server vulnerabilities by getting relevant computer security intelligence information to business owners. Headquartered in British Columbia, Canada, Scorpion Software helps small businesses manage online risk while offering unprecedented automated audit reporting and analysis. More information about the company is available at www.scorpionsoft.com.

Small Business Server hardening guidance

On the Security 360 webcast that was on earlier today, the topic was on "browser hardening".  And the VERY first question was about Small Businesses and they were looking for guidance on hardening.. and the question included hardening of the SBS box.  I tell ya... us SBSers are EVERYWHERE aren't they? 

Here is the guidance I would highly recommend as guidance for locking down a SBS box.

  1. Walk to the server.
  2. Turn around.
  3. Yes, I said turn around.
  4. I really mean, you need to turn around.
  5. Walk to the nearest workstation that has a user working on it.
  6. Shove the user aside (nicely of course, but you want to be in front of that user's workstation using their session).
  7. Click on the date and time in the corner.

Got that?

So why is that a hardening step for locking down a SBS box?

Because I would strongly argue that your biggest threats on a SBS network is the end users.  End that have local administrator rights.  End users that can download and click.  And if you can click on that date and time and it comes up and allows you to modify it, that user most definitely has the right to introduce risks into your system.  So lets talk about how we can harden the workstations, shall we?

Want to harden a SBS server and network?  Start by hardening the user. 

  • You don't surf at the server
  • You don't use the server as a workstation
  • You educate your users that "download here for free" translates into "yes, you really do want malware on your box, don't you?"
  • You have an acceptable use policy that says "yes, this is okay to do" and "no, this isn't appropriate for our firm" - check with the sans.org policy site to set up an acceptable use policy.

So that that you have that education task out of the way... you harden the desktop.  Here's the hard part... you need to check with the applications that are poorly written and won't work under these conditions.  Some of these things are not for all..but it will take YOU some time to do, so play first on your own boxes before rolling this out to your clients.

  • Get more control using Group policy - Consider IE active X browser filtering using this KB by Nick "the naked MVP" Whittome -
    • Outlook Web Access and Small Business Server Remote Web Workplace do not function if XP Service Pack 2 Add-on Blocking is enabled via group policy:
      http://support.microsoft.com/kb/555235/en-us
    • I honestly do not think that we do enough in group policy in SBS.  We have the GPMC tool right under the hood and all it takes is us to get up to speed.  GRAB A BOOK.  And read this spreadsheet to see all the potential for things you can control.
  • Use ISA 2004 (only in premium) or your firewall software to block sites
    • We had this the other day... mysite.com is not for business and thus sites like those should not be used in the office.  Bad sites introduce risk. 
  • Get those workstations down to "normal" user mode.
    • Sit down with that client/customer and see what key line of business applications they have.  If they are "designed for XP" they will natively run under this 'normal' user mode or LUA.  If they are not logo'd, come out to the newsgroups, communitities and google on ways to get that app down to 'normal user' mode.  Yell at the vendor
    • So many of the latest security vulnerabilities will launch things in the 'context' of the user, so the lower rights you have, the better you are
    • Review Aaron's blog about these issues
  • Get patches on those boxes/Get on the latest software.
    • When SBS 2k3 R2 comes out, the "green check" of updates will be there to help keep that system up to date.  You don't have to wait until then or buy it if you don't want to.  Download WSUS now.
    • IF YOU DO NOTHING ELSE, FLIP YOUR SYSTEMS OVER TO MICROSOFT UPDATE.  Yes, I know I'm yelling, but we truly now, with Microsoft update, have the ability to patch our entire system (YES even ISA Server 2004 - which hasn't needed a patch yet), so all the way from the workstations to the server can now be done by MU.  If you have not, all you have to do is go to Windows Update and on the right hand side is the place to click to "flip the bits" over to Microsoft Update.
  • Install the same sort of security at home that you do at the office
    • We buy Trend pccillian for all home pcs (especially those that remotely connect back to the network)
    • We require that they have XP sp2, firewalls and all the normal stuff I have here at the office.
  • Follow some of the information and guidance on Dana's blog.  He had a webcast on Compliance at the SBsummit..

But even with all of this... what's the best way to harden a SBS server and a network?

You start by hardening ME.  Me the business owner.  Me the onsite admin.  You harden me, you get me to understand that you can't just harden the server, that "I" have to change.  I can't download things like I used to.  I can't surf like I used to. I have to be a little less trusting.  A little more aware.  A little more paranoid.  Accepting of the balance between security and business that I need.  We need to work on this together.  You need me to understand that there's no easy fix.  No one button that I can point you to.

You don't get it by downloading a guide.

You start by hardening ME.

Only then will you have a hardened Small Business Server network.

The "Canary"

So what is a "canary" in patch testing anyway?  Since you probably cannot recreate exactly a replica of your client's (or your) network for testing purposes.... you choose a "canary".  Back in the days of coal miners, they would take a canary into the coal mine and if the bird survived, they knew they still had good air... if it didn't.. well. then......you know you are in trouble.

So when you start testing the "now" optional patch that will soon be part of a security patch, you need to select a person, a patient person, and ask them to be your canary.  The system that is prepared to be your early warning system.  To ensure that the "other systems" survive.  Thus take that patch and Install it now on one machine.  Ensure that the person using that systems tests all the line of business applications that firm needs for business and reports back to you regarding all the key line of business applications that do not function as they should.  Contact the app developer and ensure they are aware.  If there are issues, things you just can't get around, contact Microsoft on this to see if they can work with the vendor in solving the issue.

Already there are known issues http://support.microsoft.com/kb/912945/en-us:

You may experience an access violation in the Google Toolbar when you close a window that contains an inactive ActiveX control. Microsoft and Google technical teams have been working together to address this issue. Google is expected to fix this problem by using its automatic "servicing mechanism" for Google Toolbar users. This problem affects Google Toolbar versions before version 3.0.129.2. Visit the following Google Web site to download the latest version:

 
Watch web pages, and especially anything key and critical.  Check out Sandi's post on the issue, and start your testing on one machine now, not later.
 
Use the "canary" process to identify the issue with this EOLAs/Patent driven patch now, while you have about a smidge over a month.

Start testing that IE patch now

MSFT Upstate NY Technology News and Events : Internet Explorer ActiveX Update being deployed - April 11th 2006:
http://blogs.technet.com/upstate-ny-technology/archive/2006/03/20/422522.aspx

http://support.microsoft.com/kb/912945/en-us is right now in the "optional" section.  Take a "canary" or your own shop and install this and see what it does to web apps.

That Active X patch will be in the next IE update.

What's a "canary" you ask? You take a person, patient, a bit of a uber technologist in the firm you do patching for, you deploy the patch to that person first and ask him or her to monitor the patch impact.  Check those line of business applications.  Ensure that web apps aren't affected in a dramatic way to stop business.  Start now by testing this patch.  It's in Microsoft update in the center section.  And remember ..this patch isn't there because of a security issue, but because of the way our American patent law works.

Testing plans

Identify the operating system subject to testing.

Identify the service pack level.

Identify the hotfixes installed on your systems (if in addition to security fixes).

Identify critical third party applications.

Identify third party applications that have had patching historically.

Identify those files used in patches that may have causes issues in the past. Are the included in this current patch? Assign testing resources appropriately.

Study the bulletin to determine if you can uninstall the patch. If not, determine if additional resources for testing or imaging need to be in place before approving the patch.

Test the installation of the patch both manually and via your automated patch technology.

Can you uninstall the patch using add/remove program or your patch tool?

Review the processes of your line of business applications. Are they performing as expected?

Attempt to replicate a production environment using imaged data. Having an exact image provides the best testing bed.

Set up performance and monitoring tools to review your testing machines43 such as PerfMon, tools from Sysinternals44 and review all log files.

Confirm the installation of the patches via registry review or other means.

(OPTIONAL) Confirm the effectiveness of the patch using testing code.

Follow any additional procedures your situation requires.

Approve the patch for release.

PREPARE BACKUPS.

The Infraguard Technology Risk checklist also includes the following:

  1. • When applying a patch to any system vulnerability, verify the integrity of, and test for the proper functioning of the patch
  2. • Verify that the patch will not negatively affect or alter other system configurations
  3. • Test patches on test beds before being released into the network
  4. • Backup your system before applying patches
  5. • Conduct another vulnerability test after you apply a patch
  6. • Keep a log file of any system changes and updates
  7. • Prioritize patches prioritized
  8. • Disseminate patch update information among the organization's local systems administrators
  9. • Add timetables to patch potential vulnerabilities
  10. • Require that external partners deploy all non-critical patches within 30 days
  11. • Require that external partners deploy critical patches to servers and clients within 48 hours

 

 

 

 

The "real" LUA instructions for Quickbooks

The other day I said that it got a lot colder because Intuit finally came out with official instructions to run Quickbooks as a non admin.

Well.. we just warmed up a bit... as while there is a web page with instructions... the instructions are wrong and are missing a key element that makes them not work properly.

In the "official" instructions they say that you need to

Edit permissions to Allow: Full Control for QuickBooksUser in the Access Control List for the following files and registry keys:

File System:

  • C:\Program Files\Intuit *this is the default folder; adjust the folder name as appropriate for custom installations.

  • C:\Program Files\Common Files\Intuit

Registry:

  • HKEY_LOCAL_MACHINE\SOFTWARE\Intuit

  • HKEY_CLASSES_ROOT\QuickBooks.CoLocator <<< this key is wrong<<<<

  • HKEY_CLASSES_ROOT\CLSID\{E53C85D6-E6D9-4BCF-A623-72062A99AA7F}

There's one problem...that one setting, HKCR\Quickbooks.CoLocator should be HKCR\Quickbooks.CoLocator.1

Tested here and you can see that the LUA setting works with the CoLocator.1 which ends up being the same as the community instructions here.

Dear people who code at Intuit:

If you can't get access to this link, let me know.  There is a document newly released on the web that is the "logo" requirements for Windows Vista.  You might need to take a look at this when coding your Quickbooks 2007 version... you remember..the one that was stated will run with normal user rights?  Since you are going to be changing your software ...since it can't do that now... you might as well make sure it fits the guidelines for Vista while you are under the hood fixing things.

Just holler if you can't download it... I'll make sure you get a copy.  Just send and email to sbradcpa -at- pacbell.net

Here.. lemme make it a little easier for you....just make sure you pay attention to this section:

1.1     Follow User Account Protection Guidelines

A user’s Windows experience is more secure when applications run with only the permissions they need.  Unless an application is designed to be run only by system administrators, it should run with least privilege.

 

Every application must have an embedded manifest to define its execution level:

 

<requestedExecutionLevel level="asInvoker|highestAvailable|requireAdministrator" uiAccess="true|false"/>

 

Most applications should have level=asInvoker (leastPrivilege in Beta 1).  Applications that are designed to be run by system administrators may define a higher execution level, and the justification must be documented.

 

Most applications should run with uiAccess=false.  Applications that need to drive input to the UI of another window may set uiAccess=true, and the justification must be documented.

 

Patch Tuesday

 Begin your testing folks

Two bulletins...one changes permissions on services (but if you have XP sp2 and Win2k3 sp1 or SBS 2k3 sp1 already on the systems you are unaffected.  (cannot be removed)

One is about Office and if you are on Office 2003 only affects Excel 2003 (see why we stay on up to date platforms?)

Microsoft Security Bulletin MS06-011: Permissive Windows Services DACLs Could Allow Elevation of Privilege (914798):
http://www.microsoft.com/technet/security/Bulletin/ms06-011.mspx

Microsoft Security Bulletin MS06-012: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (905413):
http://www.microsoft.com/technet/security/Bulletin/ms06-012.mspx

-----------------
If you are on SBS 2k3 sp1 it's a no reboot Tuesday.....

Those pesky Dat files

For a brief period on Friday, McAfee's security tools killed more than viruses.

 

An error in McAfee's virus definition file released Friday morning caused the company's consumer and enterprise antivirus products to flag Microsoft's Excel, as well as other applications on users' PCs, as a virus called W95/CTX, Joe Telafici, director of operations at McAfee's Avert labs, told CNET News.com.

 

"At about 1 p.m. PST we started getting reports that people were seeing an unusual number of W95/CTX infections in their environment," Telafici said. "Files that we did identify would probably be deleted or quarantined, depending on your settings."

 

 

More:

http://news.com.com/2100-1002_3-6048709.html

 

Okay first we had Trend with a bad dat file...then Microsoft Antispyware flagged Norton as a bad file...then we have McAfee flagging Excel... and Sandi reports that Trend is flagging Windows Genuine Advantage....  and yet the funny thing is most people freak out when you say you are going to turn on automatic updates in patching and possibly nail a network... what about all the OTHER gunk we are automatically updating all the time around our networks and not even blinking an eyelash?

Patch Tuesday coming... well.. next Tuesday

http://www.microsoft.com/technet/security/bulletin/advance.mspx

On 14 March 2006 Microsoft is planning to release:

Security Updates

One Microsoft Security Bulletin affecting Microsoft Office. The highest Maximum Severity rating for this is Critical. These updates may require a restart. These updates will be detectable using the Microsoft Baseline Security Analyzer and the Enterprise Scanning Tool.

One Microsoft Security Bulletin affecting Microsoft Windows. The highest Maximum Severity rating for this is Important. These updates will not require a restart. These updates will be detectable using the Microsoft Baseline Security Analyzer.

Microsoft Windows Malicious Software Removal Tool

Microsoft will release an updated version of the Microsoft Windows Malicious Software Removal Tool on Windows Update, Microsoft Update, Windows Server Update Services and the Download Center.

Note that this tool will NOT be distributed using Software Update Services (SUS).

Non-security High Priority updates on MU, WU, WSUS and SUS

Microsoft will not release any NON-SECURITY High-Priority Updates for Windows on Windows Update (WU) and Software Update Services (SUS).

Microsoft will release one NON-SECURITY High-Priority Updates on Microsoft Update (MU) and Windows Server Update Services (WSUS).

Would you live there?

I want you to think for a moment....

If your computer you use was a house would you live in it?

If your computer you use was a city, would you want to live there?

Just think about that for a moment... all of those items I asked you to think if you wanted to do with it... are all about trusting something.  Trusting the house to be safe and secure and liveable.  Trusting the city to be civil and a nice place to raise children and a good economy for jobs. 

Think of where your computer goes and what it does and what you do with it.  Do you trust it? 

Do you trust your network?  If your network was a city would you live there?  If your network was a State would you want to live in that State?

Now think of the Internet.  Think of what goes on in the Internet.  Do you trust it?  Do you feel that it's safe and secure? 

Think of it as a place to live.  A Country.  A city.  A house.  Where you would be, day in and day out.  It would be your home.  Would you want to live there unprotected?  Without a policeman?  Without a guarddog? Without the infrastructure of a 911 call system, and fireman, and doctors? 

So tell me... if you ...right now ... today... live in a house that you consider safe enough.  If you live in a city that you consider good enough to raise children and provide jobs.  If you live in a State or Country that you like to live in.  If you couldn't dream of living in a place that didn't have the basic infrasture of SECURITY as it's foundation.....you couldn't dream of living in a place where there isn't the assurances of fire protection, and emergency services, and protection, and medical attention that proactively ensures that you stay well and eat right and exercise and all of that.......

If that sounds like a really good way to live.....where you would want to be...

...then why do we do what we do to our computers?

...the very things that many of us depend on for our businesses?

...the very things that provide us with jobs?

....why do we not take care of them proactively... why do we instead spend money on the equivalent of the emergency room medical treatment....why do we not ensure we have adequate safety and protection so that we can minimize the risk....

...why do we with our computers and networks live in the equivalent of a crime infested neighborhood, not caring about cleaning up the crack houses and drug addicts, not caring about the drive by shootings and the muggings.  Not caring about our very lives.... why does it seem that if we "lived in our computers" it wouldn't be a good place to live at all....

so I want you to think about that....

If where your data lives.. is not where you'd like to live....

...why do you let your data live there and not protect it?

I'm looking for software ..and oh... I'd prefer it to be free...

I see this a lot on listserves and newsgroups....

"I have a client looking for a solution to encrypt email....oh and he'd prefer free"

"I'm looking for a RSS reader.... oh and I'd prefer free"

(Forest Gump like voice) My Mamma said that nothin' in life is for free, that there is a price to everythin....

Now I'm not saying that you can't find some software that will fit your needs and may be free or low cost, but folks, we really need to stop and remember what our Mothers taught us.  People cannot live off of air.   Sure software coders probably can get by with a box of Twinkies and Mountain Dew...but if you are running a business, and you expect to be paid for what you do, why should you consider the things you rely on any differently.  Someone normally "pays" for everything...whether that comes in the form of advertisements, banner ads, emails coming to you regarding the product you downloaded, them selling your email address everywhere, or worse case scenerio.... a malware on your system

Take a look at incidents.org for an example of this...

So when your client....or YOU...want "free software"...in the words of Sgt. Phil Esterhaus on the TV show years ago... "Let's be careful out there"......

You might get more than you paid for.....

 

Get ready for LUA - webcast

Applying the principle of least privilege webcast and whitepaper

A defense-in-depth strategy, which involves overlapping layers of security, is the best way to counter malicious software threats. The least-privileged user account approach is an important part of that defensive strategy. This approach ensures that users follow the principle of least privilege and always log on with limited user accounts. In addition, this strategy aims to limit the use of administrative credentials to administrators, and then only for administrative tasks. This webcast explains the principle of least privilege, discusses why it is an important part of a defense-in-depth strategy, and presents the tools and resources that can help implement it.

Presenter: Mike Smith-Lonergan, Technical Program Manager, Microsoft Corporation

Mike Smith-Lonergan is a technical program manager with the Solutions for Security and Compliance team at Microsoft, where he is currently working on security solutions for the upcoming release of Microsoft Windows Vista. Mike is a Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), and a Microsoft Certified Systems Engineer (MCSE). Armed with a Master’s degree in business administration, Mike spent five years duking it out with hackers as a security consultant with Microsoft Consulting Services.

About Risk

Hey ... this is a pretty cool web site that has a online checklist about business risks.....  http://www.getsafeonline.org/nqcontent.cfm?a_id=1275 Which in chatting with Dana is I think what I'll chat about at SMBTN Spring Conference.  I'm probably still going to do a quick "get ready for WSUS" overview and hit the main troubleshooting pieces... like the fact that you can click on start, type in run, then windowsupdate.log and there's your update history on that box.  Look for the "errors" and google them up.

In fact the overall sections are pretty good at getting you thinking about risk.

So, do you sit down and talk to your clients about risk?

(Insert software choice that will cause religious wars) cracked in (insert time amount that sounds insanely short)

You've probably seen the headlines that it was proven that Mac's can be cracked in about 30 minutes with some unpublished exploits out there.  Well it turns out that it's a little harder than it seems.... http://test.doit.wisc.edu/  but it makes me bring out the tinfoil nonetheless.

The SBS platform was "outted" in a USA Today article about a year or so ago about how fast it was to crack... the only problem was it was sitting bare on the Internet with a sucky password of "Password" and no firewall.  You try and survive standing in the middle of the 405 Freeway in the number one lane at the 7:45 am rush hour and see if you fare as comparatively well in what I would call a comparable test to what they did to that SBS box.

Once upon a time there was a book that said that you should plan assuming that you will get intruded on and design your network accordingly...but I think we need to also put a bit of business realism in this thought process as well and understand that ...yes...beleive it or not... even with running with administrator rights.... yes, even with running without spyware and antivirus... I do know folks...mostly uber geeks who can run their computers and not get nailed by anything bad.  Yes they are a "bit more intelligent than the average bear", but the reality is they aren't downloading stupid stuff.

The other day on the Managed Services listserve someone said that he didn't push all of his clients to run as local admin....as he couldn't push them.  And you know what... I think I agree.  But I think in order for you do to this, you need to know your clients and know their risks.  There are some clients and some end users that I just know are going to get nailed unless I do something to help.  That antivirus isn't enough, that anti spyware isn't enough that they need additional help.  But the there are some folks (and what they are using) that sometimes you just can't push it and you know you'll have to wait until Vista's LUA/UAC/UAP to come out.  And then to go yell at your software vendors to do a better job....because quite frankly some of this protection could be done a lot more natively than it is done now.

So what about you... do you do a "risk analysis" of your clients?

 

 

Seeing an issue with Window Genuine Advantage?

Eric Vogel reported that the Genuine Advantage update was having a bit of issues.  I had installed it on my XP workstation the other day with no issues, but there were newsgroup reports of problems in addition to Eric's report.

Looks like there's a solution.... as reported in the newsgroups

If you received this error 0x80070005, go to the WGA diagnostic tool which has been updated.

SMBTN Spring Conference

I'm making a mad dash down to Los Angeles on a Saturday and then back home Sunday at the end of March/first of April for the Spring SMBTN Conference.... and while I could talk about WSUS and patching issues.... since I did that last year and I seemingly have done it a lot lately... I think I'm going to ask for feedback.

If you are attending the SMBTN Spring Conference... what topic are you interested in?  I'd like to make it interactive.  So here are some ideas I have....

  • I could do WSUS (especially since it's under the hood in the R2 era) and discuss what patches come out on WSUS but since I've done that... I'm like hmmmmmm
  • I could do a brainstrorming sesson on the real risks of a SBS network.  I still strongly believe that we immediately jump to the "Oh we MUST do THAT since that's best practices" but it's my belief that you can't say that without looking at the data you are protecting.
  • I could do a talk on the Support resources and stuff available from PSS Security... how they will handle issues with a security patch, how they have investigators that review issues, what the MSRC is and what resources there are to keep aware of breaking security issues (hmmm...that one isn't a bad idea....)
  • I could do one on investigating audit logs ....

In fact the more I think about this... since Dana Epp will be there too, I'll probably bounce this off of him too since it's always fun to do a he said/she said presentation.

But got any other ideas that you'd like to see discussed and/or talked about?

Psssttt... don't tell Dana that I need to download the latest Firewall Dashboard beta as mine expired yesterday and I forgot to download it and install it today....

Today's security advisory that was released

 ********************************************************************
Title: Microsoft Security Advisory Notification
Issued: February 28, 2006
********************************************************************

Security Advisories Updated or Released Today
==============================================

* Security Advisory (912945)
 - Title:    Non-Security Update for Internet Explorer

 - Web site:
http://go.microsoft.com/fwlink/?LinkId=59550

Okay so read that........

And this is a non security update that replaces a security update and will be replaced by a security update, but it's not a security update.

Got that?  (yeah... I'm going huh?  as well)

Okay so you want to know what this is really all about?

In general it's a process called "Rembrandts in the Attic" and I don't think it's always a good thing when some of the patents issued are very vague.

And yeah... in Shavlik or WSUS you don't have to approve it.

Is leaving computers turned on a massive security risk?

There's a thread going on PatchManagement.org listserve and according to some folks I am severely deficient in allowing my end users to leave their computers on.

Because they say, when a system is turned on, it opens up a hole for intruders to drop things on those boxes.

They only want the systems on when a user is there, and they trust their users to patch their machines.  That to leave the machines on for remote access is insane of me to even think of doing.

I find these 'absolute' conversations to be quite interesting.  Because it's my belief that there is no such thing as a black and white answer in security.  It's about risk analysis and finding a balance.  Of being just enough security, of the right amount, at the right time, in the right amount of annoyance so that end users don't find a way around it.  Because at the end of the day, security HAS to take an equal weight with the business of the firm.  If it takes an extreme higher priority, then you might as well turn off the computers and servers, and stop doing business.  Because if you go and live on an island with no computers and no need for interactions, that's probably the only way you will be absolutely secure from all technology risks like Identity Theft and what not.  Of course then you will have a new set of risks to worry about.  Just go ask the folks on the TV show Lost about the risks they face "without" technology around.

I find the thoughts that "you must turn off your system otherwise bad guys are sitting there dropping bad things on your systems" to be an interesting thought.  If you believe your internal network to be that infected, then yes, design your network with that risk and threat in mind.  In my mind you must then design the network such that you assume all tcp/ip packets are hostile and you cannot trust anything that you cannot verify coming from something you trust.

It's my understanding that Microsoft designs their network in this manner with an IPSec set up so that unless you have a SmartCard you don't get domain access.  Conversely all the new Network Access Protection stuff that's coming down the pipeline looks very interesting to better protect and 'vet' the connections coming into our networks.  But in a small network, it's my opinion that I can still do what I need to do to have a somewhat more 'trusted' internal network.  Now I'm sure I'm absolutely the naive one, but with the additional tools I have  --like the SBS build in monitoring email, and ISA 2004 and the Scorpion Software's Firewall Dashboard (that just is releasing a final beta as a matter of fact) can help keep me a smidge informed that once something happens (please note I said when not if as one should always be prepared for the worst) I can act as fast as I can to take whatever actions I need to do.

But I think for someone to say "look at the packets hitting your desktop firewalls, all those bad guys trying to intrude" means that I shouldn't be just calmly looking at those firewall logs, but having a heart attack and freaking out and trying to either block the entry point, or figure out what machine on my internal network has gotten owned and starting an investigation.  As someone coined the term... "draining the network" at that point and rebuilding it.

I guess I'm of the opinion that if I can't reasonably protect with "good enough" security machines that are merely turned on, how in the world can I protect them when there are end users sitting at those machines using them?  Our end users are not trained in security AT ALL.  The entire computing industry has done a poor job in educating us at all on technology, let alone securely operating computers.  Walk into ANY office and talk to an end user about the application they are using and I'll bet you that they don't know how or if their systems are being backed up, they don't know anything about patches, or care about firewalls, don't understand that bad guys are being paid $10,000 a pop for vulnerabilities, and I would argue that it's not their job to be that geeky and know all about that... it's mine.  There job is to just do what they need to do, sticking sticky notes on the monitor for all the 'to dos' that they need to do.

I don't trust my end users to be on top of patching like I am and I want to be the one installing and approving patches.  I don't want them to be the one assigning risks to email attachments, it's my job.  There are some users of technology that telling them to look for a button in a tool bar is asking them way way too much.  Now maybe we shouldn't have those folks using computers, but the ugly reality is that we have these users in our networks, using technology.  So we'd better plan our networks for these folks.  Ensuring that as much as we can we build in secure processes that aren't such an extreme bother that folks go around it and find another way to do their job. 

I know they say that the network guys shouldn't be in charge of the security because there's a conflict of interest, but where is it in the computer security book that the folks on the business side can't be involved in this process of security as well.

Because folks at the end of the day this is about acceptable risk.  And quite honestly I cannot see how you can make a determination without a business hat at the table.

I just don't think that the risks that are acceptable for my network are acceptable for yours.  Especially not if we're not the same size and you don't have the technology that I do (like Remote Web Workplace).

And you know what.... that's OK.

Windowsupdate.log

You running Microsoft update?  You are?  Good.

I want you to click, Start, Run and in the box type in windowsupdate.log and hit enter.

Now scroll around that file... see what it is?  Is the history of your Security Updates.

I'm stealing these from Robear.....in case you need any WU/MU info.

How to troubleshoot Windows Update, Microsoft Update, and Windows Server Update Services installation issues:
http://support.microsoft.com/?kbid=906602

1. See the "Need more help? Tell us what problem you are having" section of
http://support.microsoft.com/?scid=ph;en-us;6527

3a. Check Windowsupdate.log (%windir%\Windowsupdate.log) for errors associated with the download/install.

How to read the Windowsupdate.log file:
http://support.microsoft.com/?kbid=902093

3b. Compare errors to those listed here:
http://inetexplorer.mvps.org/archive/windows_update_codes.htm and/or go to http://windowsupdate.microsoft.com > click on Help and Support link in left pane > Solve problems on your own.

4. Windows Update Checklist:
http://www3.telus.net/dandemar/updtcl.htm

5. Windows Update-specific newsgroup:
news://msnews.microsoft.com/mi­crosoft.public.windowsupdate

Archive of Windows Update newsgroup:
http://groups-beta.google.com/group/microsoft.public.windowsupdate

Installing Quickbooks 2006 on a network

 I am still not comfortable with installing Quickbooks 2006 on a network....
***** AUDIENCE AFFECTED *****

QuickBooks ProAdvisors and/or their clients who are installing and
configuring QuickBooks 2006 on a network.

***** KEY INFORMATION *****

There have been a number of questions that have surfaced around
networking QuickBooks 2006. Many of these questions have stemmed
from the fact that QuickBooks 2006 has changed the way it accesses
company files from previous versions. The purpose of this alert is
to ensure that you have the information and resources you need to
optimize for this new environment.

The process for how company files are accessed is different because
QuickBooks 2006 is now built on top of a robust SQL database. This
new database will enable us to deliver some significant performance
and functionality improvements year over year, and we’ve only begun
to realize these advantages in QuickBooks 2006.

In response to the questions, we have created a NEW support
Web page dedicated to setting up QuickBooks 2006 on a network.
This page contains a variety of reference materials including;
a useful installation guide, tips & tricks on optimizing QuickBooks
2006 performance and more. It will be updated on a frequent basis
and will contain the latest and most up-to-date information.

As a result, we recommend that you use the following Web page as
your one-stop resource in order for you to successfully install
QuickBooks 2006 on a networked environment:

http://www.quickbooks.com/support/networking


***** QUICKBOOKS 2006 NETWORK SET-UP FAQs *****

The use of file servers has generated a number of questions.
Therefore we start this list of FAQs by addressing file-server
installations, as taken from the new Web site:


> Why do I need to install QuickBooks on my data-only file server?

If you designated one computer to hold company files only, even
though that computer is not used for data entry, you should install
QuickBooks on that computer (this is a change from previous versions
of QuickBooks).
The QuickBooks 2006 software includes a database manager, which
is a software component that manages QuickBooks company files. The
database manager is responsible for managing users who are working
in a company file, including users who are accessing the file from
a remote computer. Users communicate with the database manager, and
the database manager communicates with the company file, making
sure that data is verified before it is saved.
Any QuickBooks company file that is opened in version 2006 must
be linked to, and hosted by, a database manager. Because all the
communication between the user and the data file takes place through
the hosting database manager, QuickBooks works smoothly and
efficiently when the database manager is installed on the same
computer as the company files.


> Does QuickBooks need to be running on the data file server to
access a company file from another computer?

No. After installing QuickBooks 2006 on a data-only file server
and turning on hosting, you do not have to open QuickBooks on the
server in order to let remote users access the files stored on that
computer from another computer. Only the other computer, the one
being used by a QuickBooks data entry person, needs to be running
QuickBooks 2006.
When you install QuickBooks 2006, the QuickBooks database manager
is configured to run automatically, without the need to open
QuickBooks. This function is technically called "Running as a
Service", and it means that Windows runs the database manager
automatically when you start the computer.


> Do I need to buy a license for the data file server copy of
QuickBooks?

If you are not going to use the computer on which the data
files reside for QuickBooks data entry, you do not need to buy
a license for the software. When you use a data file server,
data entry is performed by users working at remote computers
that are running licensed copies of QuickBooks.


> How do I make sure that the data file server is properly set
up to manage company files?

You must configure QuickBooks as the host of the data files
that are on the data file server. After you install QuickBooks,
open the software and enable the Multi-User hosting function by
selecting File > Utilities > Host Multi-User Access. This
configures QuickBooks 2006 as the host for all QuickBooks 2006
data files on the computer for all users that access the files.
In addition, you must make sure that users have sufficient
permissions to work with the data files, which is the same
requirement that exists in previous versions of QuickBooks
(as well as all software data files). Create a folder for your
QuickBooks 2006 data files and share it, making sure that all
users can save data. See the QuickBooks 2006 Network Installation
Guide (available from www.quickbooks.com/support/networking) to
learn how to set permissions.


> I have installed QuickBooks 2006 on my file server. Do I need to
open every data file on my file server before remote users can
access them?

No. QuickBooks may prompt you to do this if you have attempted
to open a data file on the file server from a remote computer that
has not been accessed through the Database Manager.

This request is generally the result of not having the level of
permissions that QuickBooks requires. On the computer that holds
the data file(s), you should have a local user account for every
user who accesses the file from another computer. That local user
account must be configured for Power User permissions (or higher).
As an alternative, you can also create a local Power User and have
all users log in to the computer holding the files with that user
name, instead of creating user names for all your network users on
that computer. Details about executing these tasks are available in
the Installation Guide and Technical White Paper available from
www.quickbooks.com/support/networking.

If you prefer not to use Power User permission levels, you can
open each data file on the file server. This automatically creates
a small file linked to the company file, and the database uses that
small file to enable remote users to work on the company file. You
only need to open the file once.

However, this approach could be quite cumbersome for an accounting
firm that accesses multiple data files, and we are continuing to
look at how we can improve this process. As an immediate step,
Intuit has a utility that creates the small file automatically for
every file in the QuickBooks 2006 data file folder. This means you
don't have to open QuickBooks and open each file. You can download
the utility from: www.quickbooks.com/support/networking.


ADDITIONAL FAQS. The following FAQS relate to questions that are
not specific to the data-file only server model.

> How do I install QuickBooks on my network where multiple
computers are running QuickBooks and each computer has its own set
of data files?

If you have multiple computers on your network that house
QuickBooks data files, merely install QuickBooks on each computer.
(Note: Since no computer in this scenario is a data-only file
server, you must have a paid QuickBooks license for each QuickBooks
installation.) If users on other computers need to access any of
the files on the computer, configure the QuickBooks software for
multi-user access. After you install QuickBooks, open the software
and enable the Multi-User hosting function by selecting File >
Utilities > Host Multi-User Access. This configures QuickBooks
2006 as the host for all QuickBooks 2006 data files on the
computer, including users who access the files from remote
computers.
It is possible (and common) for QuickBooks users to store data
files on their own computers, but occasionally need to access data
files that are on another computer. This works the same way it did
for previous versions of QuickBooks, as long as the QuickBooks 2006
software is configured for multi-user hosting.
Note that it is important in this case to always open files that
are on a given machine’s local disks using the local disk’s drive
letter (i.e. c:\ or d:\) and not through a mapped drive letter or a
network file path.


> QuickBooks asks me if I want to open the company file in
"Alternate" mode. What is this?

The “Alternate” mode is in contrast to the “Recommended” mode of
installation. You see this message when you try to open a data file
on another network computer, and that computer is not configured for
hosting QuickBooks data files. No QuickBooks database manager is
controlling this file. This could mean that QuickBooks 2006 is
installed on that computer, but the hosting mode has not been
configured, or it could mean that the file is on a computer that
is not running QuickBooks.

THE OTHER NETWORK COMPUTER HAS QUICKBOOKS 2006 INSTALLED.
If the 
computer has QuickBooks 2006 installed, open QuickBooks on that
computer and configure Hosting Mode by choosing File > Utilities >
Host Multi-User Access. This enables the database service, and
hereafter the file will open normally from a remote computer.
THE OTHER NETWORK COMPUTER DOES NOT HAVE 
QUICKBOOKS 2006 INSTALLED. 
If the computer does not have QuickBooks 2006 installed, you 
should install it. If nobody is using QuickBooks on that computer
(that is, you are installing the QuickBooks software solely to
manage the data files on that computer), you are not required to
buy a license for the software.

ADDITIONAL NOTE ON OPERATING SYSTEMS. If you serve your company
files from a Novell or Linux file server we STRONGLY recommend that
you set up a Windows machine to service your company files for
QuickBooks 2006. Otherwise no SQL database server, including the one
in QuickBooks, can deliver appropriate levels of performance or
reliability accessing the database across a network. For more
information the Alternate Mode, see the technical White Paper at:
www.quickbooks.com/support/networking.


*****ADDITIONAL RESOURCES*****

TECHNICAL SUPPORT: We have also established a network helpdesk for
QuickBooks ProAdvisors which will be staffed with agents
experienced in networking issues, in order to provide you with
the best possible help. You can either access this helpdesk by
calling the QuickBooks ProAdvisor support line at 888-333-3451
Monday through Friday during the hours of 6:00am – 6:00pm Pacific
Time. Or you can take advantage of our online call-back tool at:
www.quickbooks.com/pap/callback. (Be sure to check the box
designating that you are a QuickBooks ProAdvisor.)

----------

(C) 2006 Intuit Inc. Intuit, the Intuit Logo, QuickBooks, and
QuickBooks ProAdvisor are registered trademarks and/or registered
service marks of Intuit Inc. in the United States and other
countries. Other parties' trademarks or service marks are the
property of their respective owners and should be treated as such.


This notice is provided as a convenience for our customers and is
not intended to supplement, modify, or extend the Intuit software
license agreement between Intuit and the customer for any Intuit
product or service. Terms and conditions subject to change without
notice.

Issues with connectivity?

Installing security update MS05-019 or Windows Server 2003 Service Pack 1 may cause network connectivity between clients and servers to fail
http://support.microsoft.com/default.aspx?scid=kb;en-us;898060

Lately some folks have been complaining about RWW 'dropping' out after someone sitting there and using it and there's two things you might want to check....first I've noticed sometimes with folks on Linksys routers getting that 'drop' issue...and secondly you might try that patch to see if that helps.

Download details: Update for Windows Server 2003 (KB898060):
http://www.microsoft.com/downloads/details.aspx?FamilyId=A0245532-0ACE-4B85-85BF-758E936173DF&displaylang=en

And yes that's a Windows 2003 sp1 patch (which means it's still valid for us under the hood) and I've applied that here at the office and at home with no problems.

P.S.  I'm lifting up Alun's comment into the main post as another thing you might want to look at..

I debugged someone through a similar issue with a Linksys router - it was clear that small packets were getting through, but large packets (1500 bytes) were being dropped by something, and we ruled out MS05-019 fairly early on. It did seem to be specifically the router that was at issue.

We 'solved' it by specifically setting the MTU to 1450 bytes
.

 


 

The Trend login script

Installing the Trend Version 3 here at home to test it out... and I still haven't quite figured out the scanmail part of it.... did find my favorite way that I connect workstations... the Login script method:

 

Installing with Login Script Setup

Use Login Script Setup to automate the installation of the Client/Server Security Agent on unprotected computer(s) when they log on to the network. Login Script Setup adds a program called autopcc.exe to the server login script.
If you want to use Login Script Setup, please go to Program Files\{Trend Micro Security Server}\PCCSRV\Admin\, and launch "SetupUsr.exe".

And while I'll run this first as an admin (after all SBS connectcomputer sets us up and admin) after I flip the users to regular user, it seems to keep on working just fine.

 

The L2TP connection attempt failed error because security policy for the connection was not found.

 Passing this along in case someone else hits this:

"We implemented a new IPSec VPN using ISA Server 2004.  Cool
idea - our PPT VPN just wan't cutting it.

I gladly installed the requisite certificates on my machine to gain
access to the new VPN.  Had to battle with the box for a while as my
Cisco VPN client was blocking my MS VPN client from functioning.  After
hours of battle, I got them installed in the proper order so I can use
both on my system.

To test the new VPN, I plugged into a DMZ port outside of our firewall,
received a public IP address, then launched the IPSec VPN.  Worked
great.

Went home, looking forward to the new connection.  No go.  Error msgs at
the starting gate.

(Error says --

Error 791:  The L2TP connection attempt failed error because security policy
for the connection was not found.


Stupid me, I followed the context of the error msg.  Found my certs.
All looked good.  Deleted certs and re-installed certs.  No luck.
Searched google.  Hundreds of copies of the error msg, but not one post
about a solution.

Went back to work.  Operates fine at work.  Back home, no go.

Sent the issue to our lan admin - he tries it on his system - works fine
from work and home.

We configured a router at work and had me plugin to a NAT'd connection
at work outside the firewall.  This did it - the connection failed.

More research, no answers.

Last night I pulled up the help files for my actiontec DSL modem.  At
the very bottom of that page was a reference to a Microsoft KB article
about VPN connections and NAT routers.  Read that KB and it pointed to
two other articles.  One article nailed it:

http://support.microsoft.com/kb/818043/)

"Microsoft has released an update package to enhance the current
functionality of Layer Two Tunneling Protocol (L2TP) and Internet
Protocol security (IPsec) on computers that run Microsoft Windows 2000,
Microsoft Windows XP without service packs installed, and Windows XP
with Service Pack 1 (SP1).This functionality is included in Windows XP
Service Pack 2 (SP2). Computers that run Windows XP with a service pack
do not have to install this update package.

This update includes improvements to IPsec to better support virtual
private network (VPN) clients that are behind network address
translation (NAT) devices. If you apply this update to a computer that
is running Windows XP, and if the IPsec service encounters a runtime
error and cannot start for any reason, the IPsec driver operates in
block mode because it cannot secure network traffic."

Sounds good, right?  I'm running XP SP1 (I don't want to limit my
outbound half-open tcp connections), so I figure maybe this is it, and
I'm eager to try the patch.  KB article includes information on
obtaining Win2K SP4 patch.  However, there is no patch for XP SP1.
Instead, it says to install XP SP2.  Right.  Not gonna go there.
Stymied again.

Turns out that KB 842933 (
http://support.microsoft.com/?id=842933) is
applicable to XP SP1 and includes ipsec.sys.  Wouldn't ya know, it's the patch for "The following
entry in the [strings] section is too long and has been truncated" error
message when you try to modify or to view GPOs in Windows Server 2003,
Windows XP Professional, or Windows 2000"

Installed that this morning.  Rebooted.  Connected through NAT'd router
at work.  Launched VPN.  Bingo.  Connection succeeded.

I'm a happy camper.

Thanks MS for not mentioning in the 818043 article that this is solved
for XP SP1 in 842933."

Are patches tested?

Mike asks "was KB 913446 tested" and the answer is yes, Mike it was.  You see the problem is not with the patch...  the problem is in the deployment engine.

You see there are two things that have to be good and solid for a security patch to work exactly as expected.... the first is the patch itself... and in this case the patch was just fine..... and the engine to push the patches.  Obviously in this case that was the issue.

So Mike...sometimes the problem is not the patch...it's how the patch gets to you and the engine it uses to be installed.

Don't think that patches aren't tested.  As they are.  It's just that sometimes the engine needs a bit of carburetor cleaner is all.

BTW the issue with this bulletin has been cleared up.  It's now MU installing here just fine and Bobbie Harder confirms that the issue is fixed and will be ensured to not happen in the future.

Bulletins out today

www.incidents.org is reporting issues with deploying 06-007 with MU/AU.

Remember if you have issues, call 1-866-pcsafety if you have issues with security patches 

Microsoft has released the security bulletins and patches for February:

MS06-004: Cumulative Security Update for Internet Explorer (910620)
Critical
http://www.microsoft.com/technet/security/bulletin/MS06-004.mspx

MS06-005: Vulnerability in Windows Media Player Could Allow Remote Code
Execution (911565)
Critical
http://www.microsoft.com/technet/security/bulletin/MS06-005.mspx

MS06-006: Vulnerability in Windows Media Player Plug-in with
Non-Microsoft Internet Browsers Could Allow Remote Code Execution
(911564)
Important
http://www.microsoft.com/technet/security/bulletin/MS06-006.mspx

MS06-007: Vulnerability in TCP/IP Could Allow Denial of Service (913446)
Important
http://www.microsoft.com/technet/security/bulletin/MS06-007.mspx

MS06-008: Vulnerability in Web Client Service Could Allow Remote Code
Execution (911927)
Important
http://www.microsoft.com/technet/security/bulletin/MS06-008.mspx

MS06-009: Vulnerability in the Korean Input Method Editor Could Allow
Elevation of Privilege (901190)
Important
http://www.microsoft.com/technet/security/bulletin/MS06-009.mspx

MS06-010: Vulnerability in PowerPoint 2000 Could Allow Information
Disclosure (889167)
Important
http://www.microsoft.com/technet/security/bulletin/MS06-010.mspx

ISO image of 06-004 through 06-009 patches available here:
http://tinyurl.com/cjwm2

Symantec and Microsoft Antispyware

This alert is to notify you that Microsoft and Symantec are aware of an
issue currently affecting customers using both Microsoft Windows
AntiSpyware Beta 1 and versions of Symantec AntiVirus (SAV) Corporate
Edition and Symantec Client Security (SCS).  The issue involves a
Windows AntiSpyware Beta 1 signature (5805) released at 11:30pm on
Thursday, February 9th which incorrectly identified a registry key
affecting these Symantec products as belonging to a password stealing
malware known as PWS.Bancos.A.  
 
Customers running Symantec's consumer products, Norton Antivirus and
Norton Internet Security, are not impacted by this issue.  This issue
also does not affect customers using Symantec's software alongside
Microsoft Windows Defender Beta 2 either in Windows XP or preview
versions of Windows Vista.
 
Customers running Symantec Antivirus (SAV) Corporate Edition versions 7,
8, 9 or 10 or Symantec Client Security (SCS) versions 1, 2 or 3 in
combination with Windows AntiSpyware Beta 1 could be impacted by this
issue. The beta software will prompt and allow the user to remove a
registry key containing subkeys belonging to these Symantec products.
The deletion of these registry keys will cause all versions of the SAV
and SCS software to stop operating correctly.  No files are removed in
this situation, only registry keys.
 
Once this issue was discovered, Microsoft quickly released a new
signature set (5807) to remove this false positive. Both companies are
working jointly together to identify the number of affected customers,
which we believe to be very limited.

Microsoft and Symantec have worked jointly on an automated tool to
repair installations of Symantec's software that were affected by this
issue.  This tool is available at no charge from Symantec Product
Support Services.

If you have any questions regarding this alert please contact your
Technical Account Manager or Application Development Consultant.

Thank you,
Microsoft PSS Security Team

Wanna encrypt email?

A question today from the mailbag asked "what do you recommend for being able to encrypt email using Outlook 2003 of course?  Our small business is a nonprofit health care provider, and we need to be able to do this when patient information is involved as per HIPAA.  Anything that works particularly well for SBS?"

First off in this arena SBS isn't unique.... the same PKI deployment issues affect our SBS boxes and big server land boxes and this is why encrypted email hasn't yet caught on.  As you know with Alice and Bob (the she and he of Cryptography) for Alice and Bob to encrypt email they have to swap certificates first.

Out of the box SBS 2003/Outlook 2003 does not encrypt email...and you have to add digital certificates (purchase them from Verisign).  Now you "could" do an entire PKI infrastructure rollout and all that....but normally I've found for small businesses, a firm wide PKI infrastructure may not be worth it and just the Verisign digital certificates are enough.

Here's a past post about how the digital cert thing works.....

Patch time for Sam the SBS Server

Q.  Hi Sam...my goodness Sam...you act like you are really happy about something

A.  Oh my yes.. I a SOOO excited!

Q.  Why is that?

A.  The folks at Microsoft update are ensuring that all my fellow SBS server are going to get a very special patch!

Q.  A special patch?

A.  Yes, you see, that statement that I can do more with less, weeeellll.... I kinda got a little carried away with that logo.

Q.  You did?

A.  Yes, you see I had a slight glitch in my software and I could singlehandedly mail out a huge amount of email.  Which wasn't exactly the greatest thing to be written up about.

Q.  No kidding.

A.  But Nick posted that really soon this patch will be sent out to all my fellow SBS boxes as a high priority patch.

Q.  Oh that's really cool!

A.  Oh no kidding.  Yeah the gang listened and now we'll all be patched up.  Now then.... this stll means that if they do get this patch that they don't have my Service Pack 1 on them, so if you do get offered up KB835734 you might want to see what else needs to be installed.  Don't forget, next week is Patch Tuesday when security patches come out!  Happy patching!

On the list of things for Valentine's day....

Just a news flash for you guys... "I" may see it as romantic for a guy to patch my computer on Patch Tuesday to be the perfect Valentine's Day present...but the average gal will not.

Chocolate... flowers..... card.... something other than patch deployment to her computer on that day....

...trust me on this one.....

 

********************************************************************
Title: Microsoft Security Response Center Bulletin Notification 
Issued: February 09, 2006
********************************************************************

Summary
=======
As part of the monthly security bulletin release cycle, Microsoft 
provides advance notification to our customers on the number of new 
security updates being released, the products affected, the 
aggregate maximum severity and information about detection tools 
relevant to the update. This is intended to help our customers plan 
for the deployment of these security updates more effectively.

In addition, to help customers prioritize monthly security updates 
with any non-security updates released on Microsoft Update, Windows 
Update, Windows Server Update Services and Software Update Services 
on the same day as the monthly security bulletins, we also provide:

.	Information about the release of updated versions of the 
Microsoft Windows Malicious Software Removal Tool.

.	Information about the release of NON-SECURITY, High Priority 
updates on Microsoft Update (MU), Windows Update (WU), Windows 
Server Update Services (WSUS) and Software Update Services (SUS). 
Note that this information will pertain ONLY to updates on Microsoft 
Update, Windows Update, Windows Server Update Services and Software 
Update Services and only about High Priority, non-security updates 
being released on the same day as security updates. Information will 
NOT be provided about Non-security updates released on other days.

On 14 February 2006 Microsoft is planning to release:

Security Updates

.	One Microsoft Security Bulletin affecting Microsoft Windows 
Media Player. The highest Maximum Severity rating for this is 
Critical. These updates will not require a restart. These updates 
will be detectable using the Microsoft Baseline Security Analyzer 
and the Enterprise Scanning Tool.

.	Four Microsoft Security Bulletins affecting Microsoft Windows. 
The highest Maximum Severity rating for these is Critical. Some of 
these updates will require a restart. These updates will be 
detectable using the Microsoft Baseline Security Analyzer.

.	One Microsoft Security Bulletin affecting Microsoft Windows 
and Microsoft Office. The highest Maximum Severity rating for these 
is Important. These updates will require a restart. These updates 
will be detectable using the Microsoft Baseline Security Analyzer.

.	One Microsoft Security Bulletin affecting Microsoft Office. 
The highest Maximum Severity rating for this is Important. These 
updates may require a restart. These updates will be detectable 
using the Microsoft Baseline Security Analyzer.

Microsoft Windows Malicious Software Removal Tool

.	Microsoft will release an updated version of the Microsoft 
Windows Malicious Software Removal Tool on Windows Update, Microsoft 
Update, Windows Server Update Services and the Download Center. 
Note that this tool will NOT be distributed using Software Update 
Services (SUS).

Non-security High Priority updates on MU, WU, WSUS and SUS

.	Microsoft will not release any NON-SECURITY High-Priority 
Updates for Windows on Windows Update (WU) and Software Update 
Services (SUS).

.	Microsoft will release one NON-SECURITY High-Priority Updates 
on Microsoft Update (MU) and Windows Server Update Services (WSUS).

Although we do not anticipate any changes, the number of bulletins, 
products affected, restart information and severities are subject to 
change until released. 

Microsoft will host a webcast next week to address customer 
questions on these bulletins. For more information on this webcast 
please see below:
.	TechNet Webcast: Information about Microsoft's February 2006 
Security Bulletins (Level 100)   
.	Wednesday, 15 February 2006 11:00 AM (GMT-08:00) Pacific Time 
(US & Canada) 
http://msevents.microsoft.com/CUI/WebCastEventDetails.aspx?EventID=1
032288940&EventCategory=4&culture=en-US&CountryCode=US

At this time no additional information on these bulletins such as 
details regarding severity or details regarding the vulnerability 
will be made available until 14 February 2006.
********************************************************************

Support: 
========
Technical support is available from Microsoft Product Support 
Services at 1-866-PC SAFETY (1-866-727-2338). There is no 
charge for support calls associated with security updates. 
International customers can get support from their local Microsoft 
subsidiaries. Phone numbers for international support can be found
at: http://support.microsoft.com/common/international.aspx
 
Additional Resources:
=====================
* Microsoft has created a free monthly e-mail newsletter containing
  valuable information to help you protect your network. This
  newsletter provides practical security tips, topical security
  guidance, useful resources and links, pointers to helpful
  community resources, and a forum for you to provide feedback
  and ask security-related questions.
  You can sign up for the newsletter at:

  http://www.microsoft.com/technet/security/secnews/default.mspx

* Protect your PC: Microsoft has provided information on how you 
  can help protect your PC at the following locations: 

  http://www.microsoft.com/security/protect/

  If you receive an e-mail that claims to be distributing a 
  Microsoft security update, it is a hoax that may be distributing a 
  virus. Microsoft does not distribute security updates via e-mail. 
  You can learn more about Microsoft's software distribution 
  policies here: 

http://www.microsoft.com/technet/security/topics/policy/swdist.mspx

WMF revisited?

A new advisory today indicates there's another WMF expoit out there and it's not related to the issue fixed in the first patch of the year.

The good news is that it only affects really old browsers (IE 5.01 sp4 on Windows 2000 sp4 and IE 5.5 SP2 on Windows ME.

Microsoft Security Advisory (913333): Vulnerability in Internet Explorer Could Allow Remote Code Execution:
http://www.microsoft.com/technet/security/advisory/913333.mspx


*Note *This is not the same issue as the one addressed by Microsoft Security Bulletin MS06-001 (912919).

Do your applications you install make you more insecure?

 -------- Original Message --------
Subject:     Windows Access Control Demystified
Date:     31 Jan 2006 23:08:18 -0000
From:    
sudhakar+bugtraq@cs.princeton.edu
To:    
bugtraq@securityfocus.com


Hello everybody,

We have constructed a logical model of Windows XP access control, in a declarative but executable (Datalog) format.  We have built a scanner that reads access-control configuration information from the Windows registry, file system, and service control manager database, and feeds raw configuration data to the model.  Therefore we can reason about such things as the existence of privilege-escalation attacks, and indeed we have found several user-to-administrator  vulnerabilities caused by misconfigurations of the access-control lists of commercial software from several major vendors.  We propose tools such as  ours as a vehicle for software developers and system administrators to model and debug the complex interactions of access control on  installations under Windows.

The full version of the paper can be found at:

http://www.cs.princeton.edu/~sudhakar/papers/winval.pdf

All the vendors and CERT are aware of this paper. The bugs are *not* remotely exploitable. The CERT id is VU#953860.

regards,
Sudhakar Govindavajhala and Andrew Appel.

Bio:

Sudhakar Govindavajhala is a finishing PhD student at Computer Science department, Princeton  university. His interests are computer security, operating systems and networks. Sudhakar is looking for employment  opportunities.
Andrew Appel is a Professor of Computer Science at Princeton University.  He is currently on sabbatcal at INRIA Rocquencourt. His interests are computer security, compilers, programming  languages, type theory, and  functional programming.

------------------------------------

 This Alert is to advise you that Microsoft Security Advisory (914457),
Possible Vulnerability in Windows Services ACL's, has been released on 7
February 2006.

Microsoft is aware of published information and proof-of-concept code
that that attempts to exploit overly permissive access controls on
third- party (i.e., non-Microsoft) application services. This code also
attempts to exploit default services of Windows XP Service Pack 1 and
Windows Server 2003. If these attempts were successful, a user who has
low user privileges could gain privilege escalation.

Microsoft has investigated these reports and the findings are summarized
in the chart below. Microsoft has confirmed that customers who run
Windows XP Service Pack 2 and Windows Server 2003 Service Pack 1 are not
vulnerable to these issues because security-related changes were made to
these service packs as part of our ongoing security improvement process.
Users who run Windows XP Service Pack 1 and Windows Server 2003 Gold may
be at risk, but the risk to Windows Server 2003 users is reduced.

Users are encouraged to contact their third-party software vendors whose
products require services installation to determine if any non-default
Windows services are affected.

Microsoft is not aware of any attacks attempting to use the reported
vulnerabilities or of customer impact at this time. Microsoft will
continue to investigate the public reports to help provide additional
guidance for customers as necessary.

Mitigating Factors:

*    The latest Microsoft operating systems, including Windows XP
Service Pack2 and Windows Server 2003 Service Pack 1 are not vulnerable
to these issues.
*    A malicious user who launches an attack based on the finder's
report would require at least authenticated user access to the affected
operating systems
*    Two of the four services identified in the paper (NetBT and
SCardSvr) require an attacker to already be running in a privileged
security context. Additionally, the two services that do allow an
authenticated user to attack are vulnerable only on Windows XP Service
Pack 1.
*    Firewall best practices and standard default firewall
configurations can help protect from attacks that originate outside the
enterprise perimeter. Best practices also recommend that personal
firewalls be used within a network and that systems connected to the
Internet have a minimal number of ports exposed.

More information can be found:
http://www.microsoft.com/technet/security/advisory/914457.mspx
Microsoft Security Advisories are located at this location:
http://www.microsoft.com/technet/security/advisory/default.mspx

If you have any questions regarding this alert please contact your
Technical Account Manager or Application Development Consultant.

Thank you,
Microsoft PSS Security Team

------------------------

Okay would it be mean of me to ask them to run their tool on Intuit's Quickbooks?....okay okay.. yeah.. I know....bad Susan...bad Susan....

ISA 2004 tracking file (like your C: drive wasn't full enough already?)

In the newsgroups today... Gary reports the following:
-----------------------

Well, here's a reason not to install ISA2K4/SP2: It will create a new 400mb

file, Windir\Debug\ISALOG.BIN, and a second, new 400mb file, ISALOG.BAK, on

the C: drive. According to my admittedly superficial reading of the technote

(google ISALOG.BIN), this file's purpose is for troubleshooting by MSSupport

in the event of problems with ISA 2004.

 

You can get rid of this by going to HKLM/Software/Microsoft/ISATracing and

setting the BootTracing parameter to 0. Then reboot and delete both

ISALOG.BIN and ISALOG.BAK.

 

The technote further says that you can prevent the creation of these files

by adding the reg key and value before installing SP2.

 

Below is the relevant info from the technote:

 

Nearly one gig of space taken up on crowded C: drives JUST IN CASE

MSSupport wants to look at the log file. Someone at MSSupport has lost his

mind.

 

GaryK

 

http://www.microsoft.com/technet/prodtechnol/isa/2004/plan/sp2.mspx

(search page for isalog.bin)

Tracing

Service Pack 2 includes an error-level tracing mechanism that operates

continually in the background. If necessary, the tracing information is

available for Microsoft Product Support Services. The tracing mechanism does

not collect personally identifiable information.

 

Tracing takes place in the background, and has a negligible affect on ISA

Server performance. A 400 megabyte (MB) file (%windir%\debug\isalog.bin) is

created by Service Pack 2 on each computer running ISA Server services, to

contain the tracing information.

 

We recommend that you use the default settings for this feature.

However, if you want to modify the tracing mechanism, you can do

so through the registry key

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ISATrace.

To change the size of the file used by tracing, change the value of

CircularlLogSizeMB. To disable tracing, change the BootTracing value to 0.

This does not delete the file, which has to be deleted manually.

After registry changes, restart the computer so that the changes

take effect. If you create the registry key before installing

Service Pack 2, and set the BootTracing value to 0, the

tracing file will not be added during the installation, and tracing

will not be enabled.

----------------------------

And of course ...what does that do to an already full C:... 
yeah you guess it.  Fill it up even more...
There appears to be a way to move it to another drive letter before you install.. 
checking and will post and update to the blog

Patches protect you from viruses?

"Notice: To protect your system from viruses, Dell recommends that you download any recommended patches and hotfixes by visiting the Microsoft Support website at support.microsoft.com or by selecting Tools -- Windows Update in your Internet Explorer browser"

I have some issues with that statement... for one... viruses can be unleashed on fully patched systems and do damage, so the statement that patching alone protects you isn't good enough.  Secondly that statement is from page 7 of the "Setup and Installation Guide" of a Dell OEM SBS server.

  • Where's the discussion of configuration of automatic patching and flipping to Microsoft Update (should you want to do that)?
  • Where's the discussion of obtaining a desktop/server/email antivirus to protect all the methods of potential infection?
  • Where's a discussion that patches come out once a month and therefore expect a possible reboot of the machine if you set up automatic patching?
  • Where's a link or discussion of what Service packs are appropriate for a SBS box.
  • Where's a discussion how you shouldn't even be using the Internet Explorer browser on your server

Yeah yeah... probably way over the head and in the next part of the server install set up from Dell..but I just though it funny that they define "viruses" as being preventable by patching.

Remember the 123 protect my PC:

  • Firewall
  • Antivirus
  • Patching

Maybe they shouldn't be running a computer?

http://www.cnn.com/2006/TECH/internet/01/31/kamasutraworm/index.html

Apparently the world will come to an end tomorrow...that is if you clicked, and installed, and not have up to date antivirus...

Sometimes folks just have to learn a lesson and you can't protect folks from their own stupidity.  This is one of those cases where... if they click...if they don't have up to date antivirus....maybe they shouldn't be running a computer.

Now... should computer users be better educated?  Oh yeah....

There are times the paranoia meets the blonde....

So I'm looking at my new and improved 443/4125 firewall dashboard going ..okay who the heck from this ip address is hitting me on port 443...as it's not my IP from home so who is that hitting my server and why are they banging on my port 443.  Exactly who the heck do they think they are anyway? 

So I go and pull an whois on it.....

Oh.

DUH.. all my cell phones syncing with my server you idiot........

OrgName:    Cingular Wireless National Networks
OrgID:      CWNN
Address:    Cingular Wireless, LLC
Address:    12555 Cingular Way, Suite 4546
City:       Alpharetta
StateProv:  GA
PostalCode: 30004
Country:    US

Firewall Dashboard...asking for good feedback

 So you tried it out yet? Remind me of someone I know who urges me not to just give feedback like...'this sucks' or 'that's broken'... he wants me to say why something is broken and if I were in charge of the universe...what would I do to fix the item I'm complaining about.

So do you give good feedback?  Now's your chance.

When the community talks, we listen!

With the latest release of the Firewall Dashboard behind us, Scorpion Software is now taking some time to plan the commercial launch of the product later next month. When I was talking to some of my colleagues about the best way to ensure we seriously take into consideration what the SBS marketplace is wanting, I felt the best way was to ask you directly. And some of you already know that. I have been trying to make a few personal phone calls in an effort to discuss this with you. Realizing I just can't get to all of you, I thought maybe it was time to do a survey and try to collect as much community insight as I could.

This email is a call to action. I am personally asking that each and every one of you who have been on the beta of the Firewall Dashboard to take a few moments to answer 7 questions to the best of your knowledge and experience. It will help Scorpion Software to formulate the best way to go to market with our product, and allow us to continue to build the best executive firewall dashboard for Small Business Server. We want to service you, and ask that you please take a few moments to let us know how we can best do that. Good or bad, we want to hear from you.

How can you do that? By simply filling in the 7 questions on the online survey that we have prepared. Answering the questions honestly and thoroughly will go a long way to help us understand how you feel about the Firewall Dashboard, and how we can service you and the SBS community going forward.

The survey will be online for the next week, but we would love to hear from you sooner than that. Please take a few moments and take action by filling out the online survey. Your responses will go a long way to help the Firewall Dashboard to reach the SBS community.

Thank you very much for taking the time to help us out. I look forward to having Scorpion Software meet your organization's needs in the near future.

Sincerely,
Dana Epp
President, CEO
Scorpion Software Corp.

ISA 2004 sp2 (do not do this remotely and read the release notes)

ISA server 2004 sp2 just released on the download site and since we are READING the release notes before installing...they say...

If ISA Server services are installed, ISA Server will enter lockdown mode during installation. Following installation, the ISA Server computers or array members will have to be restarted

That means... you either have that SBSPodcast recommended setting where your IP address is a trusted network.... or better yet, you don't do this SP remotely at all and you do any firewall service packs on site.

 

Can we wait until it ships before wacking off the security please?

http://www.msreadiness.com/WS_abstract.asp?eid=15003662

Come and join us for the “Windows Client Licensing and Windows Vista” introduction to the Windows Vista Enterprise License and upcoming improvements to Software Assurance Benefits (SAB) 3.0. This is our second Windows Client Licensing and Windows Vista web seminar that will provide greater licensing details than what was covered previously back in September. This session will focus on training our volume licensing reseller partners on: Windows Vista value propositions, Windows Vista Enterprise License, SAB 3.0 and Windows Vista Skus. We will provide you with the strategic guidance and compelling value propositions to convince your customers to renew their existing Windows Client Enterprise Agreement (i.e., maintain within Platform EA) and Software Assurance licenses, and consider the purchase of a new Windows Client that includes Software Assurance. You will also learn about all the licensing changes to SAB 3.0 and the impact for your customers.

Uh... it's still in beta last I checked and we're having webcasts already on licensing?  I guess maybe we need this lead time to figure out the licensing or something.  Today Dana showed me a link to a guy who's top "tip" for Vista is turning off User Access Control.

Nice.

We say we want security ...and the first thing we wack off is that security feature.  Nice going...

 


A beta release of IE 7 means....

Beta -- http://en.wikipedia.org/wiki/Development_stage#Beta When a beta becomes available to the general public it is often widely used by the technologically savvy and those familiar with previous versions as though it were the finished product

Translation? You as the IT pro can start playing with it.....do you install it in clients? Uh...no.

Spyware Sucks : Installation tips for IE7 Beta 2 Preview:
http://msmvps.com/blogs/spywaresucks/archive/2006/02/01/82205.aspx
Spyware Sucks : Heads up for SBS Sites using self-signed certificates:
http://msmvps.com/blogs/spywaresucks/archive/2006/01/31/82198.aspx
Spyware Sucks : IE7 Beta 2 has gone live:
http://msmvps.com/blogs/spywaresucks/archive/2006/01/31/82195.aspx

In case RWW doesn't want to play nice..make IE7 act like IE 6:

Problems with web sites - Internet Explorer 7:
http://www.ie-vista.com/sites.html

MyWife Malware

 This alert is to notify you of the release of Microsoft Security
Advisory (904420).

Microsoft wants to make customers aware of the Mywife mass mailing
malware variant named Win32/Mywife.E@mm. The mass mailing malware tries
to entice users through social engineering efforts into opening an
attached file in an e-mail message. If the recipient opens the file, the
malware sends itself to all the contacts that are contained in the
system's address book. The malware may also spread over writeable
network shares on systems that have blank administrator passwords.
Customers who are using the most recent and updated antivirus software
could be at a reduced risk of infection from the Win32/Mywife.E@mm
malware. Customers should verify this with their antivirus vendor.
Antivirus vendors have assigned different names to this malware but the
Common Malware Enumeration (CME) group has assigned it ID CME-24.

On systems that are infected by
Win32/Mywife@E.mm, the malware is
intended to permanently corrupt a number of common document format files
on the third day of every month. February 3, 2006 is the first time this
malware is expected to permanently corrupt the content of specific
document format files.  The malware also modifies or deletes files and
registry keys associated with certain computer security-related
applications. This prevents these applications from running when Windows
starts. For more information, see the Microsoft Virus Encyclopedia
(
http://www.microsoft.com/security/encyclopedia/details.aspx?Name=Win32/Mywife.E@mm).

As with all currently known variants of the Mywife malware, this variant
does not make use of a security vulnerability, but is dependant on the
user opening an infected file attachment. The malware also attempts to
scan the network looking for systems it can connect to and infect   It
does this in the context of the user. If it fails to connect to one of
these systems, it tries again by logging on with "Administrator" as the
user name together with a blank password.
Customers who believe that they are infected with the Mywife malware, or
who are not sure whether they are infected, should contact their
antivirus vendor.  Alternatively, Windows Live Safety Center Beta Web
site (
http://safety.live.com) provides the ability to choose "Protection
Scan" to ensure that systems are free of infection. Additionally, the
Windows OneCare Live Beta (
http://www.windowsonecare.com), which is
available for English language systems, provides detection for and
protection against the Mywife malware and its known variants.

For more information about the Mywife malware, to help determine whether
you have been infected by the malware, and for instructions on how to
repair your system if you have been infected, see the Microsoft Virus
Encyclopedia
(
http://www.microsoft.com/security/encyclopedia/details.aspx?Name=Win32/Mywife.E@mm).

For Microsoft Virus Encyclopedia references, see the
"Overview" section. We continue to encourage customers to use caution
with unknown file attachments and to follow our Protect Your PC guidance
of enabling a firewall, getting software updates, and installing
antivirus software. Customers can learn more about these steps by
visiting the Protect Your PC Web site
(
http://www.microsoft.com/athome/security/protect/windowsxpsp2/Default.mspx).   
Suggested Actions:

*    Use up-to-date antivirus software
Most antivirus software can detect and prevent infection by known
malicious software. You should always run antivirus software on your
computer that is updated with the latest signature files to
automatically help protect you from infection. If you don't have
antivirus software installed, you can get it from one of several
companies. For more information, see
http://www.microsoft.com/athome/security/downloads/default.mspx

*    Use caution with unknown attachments
Use caution before opening unknown e-mail or IM attachments, even if you
know the sender. If you cannot confirm with the sender that a message is
valid and that an attachment is safe, delete the message immediately,
and run up-to-date antivirus software to check your computer for
viruses.

*    Use strong passwords
Strong passwords on all privileged user accounts, including the
Administrator account, will help block this malware's attempt to spread
through network shares. 
*    Remove unneeded network shares
Malware can often spread over network shares. Remove unneeded network
shares that are mapped to your computer. To remove network shares in Windows XP
o    On the Start menu, click My Computer.
o    On the Tools menu, click Disconnect Network Drives...
o    In the Disconnect Network Drives dialog box, click the drives to
disconnect and click OK.

*    Protect Your PC
We continue to encourage customers follow our Protect Your PC guidance
of enabling a firewall, getting software updates and installing
ant-virus software. Customers can learn more about these steps by
visiting Protect Your PC Web site (
http://www.microsoft.com/protect).
For more information about staying safe on the Internet, customers can
visit the Microsoft Security Home Page
(
http://www.microsoft.com/security).

More information can be found:
http://www.microsoft.com/technet/security/advisory/904420.mspx
Microsoft Security Advisories are located at this location:
http://www.microsoft.com/technet/security/advisory/default.mspx

If you have any questions regarding this alert please contact your
Technical Account Manager or Application Development Consultant.

Thank you,
Microsoft PSS Security Team

A blog should not have email

The RSA Security Conference is coming up and if you remember last year's conference Bill Gates made two announcments.... one was that IE 7 was going to be released for Windows XP and the second was that Antispyware was to be free to individuals.  It will be interesting to see what keynotes there are this year.  Last year the major ones were webcast.  So I'm out on the site and they have a new "Security Exchange" that includes Blogs....well..let's just say it has "one" blog.  And here's the kicker that made me laugh.  When you go to the page where the blog content is, there isn't ...that I can see anyway... a RSS subscribe icon.  Instead there's a place to click to..... "Subscribe to receive emailed updates of new blog entries from Ira Winkler"

Uh... gang... there's this thing called RSS? You know it's where you have a RSS reader like Newsgator or RSS bandit and all your RSS feeds come to you...and they aren't jumbled in all with all that junk mail I already get?

It's bad enough that the Orange XML tag is "RSS" on some pages and "XML" on another...but can we have another standard?  A blog standard?  That it comes with a XML feed that can be sucked in?

Not emailed, thank you very much.

https://www.rsaconference.com/exchange/blog_view.aspx?id=3

Trend and the dog file

 

Problem:   After deploying new OfficeScan clients, the user sees small executable files on the WINNT\Temp or Windows\Temp folder of the client machine. The size of the files is 169 KB and has random names. Also, the files have a small dog icon.
 
Solution:   The file is the OfficeScan Watchdog service on the anti-hacking mode. The Watchdog service keeps an eye on the OfficeScan client services. The Watchdog service also restarts the OfficeScan services when they are unexpectedly terminated due to hacker or virus attack. The anti-hack mode allows the Watchdog service to have random names to prevent viruses or other malicious threats from identifying the service and terminating it.

Trend and Compression issues

So in this corner is Trend...recommending that you uncheck "use compression" on the IIS web sites because otherwise the install will not go well.....

...but in this corner is Microsoft with their WSUS install info that "does" check "use compression"

1. Some clients have been impacted by a known issue in with Windows Server 2003 http.sys and IIS. In some cases, this transient issue will appear to prevent clients from checking in, because they receive invalid responses from the server after some attempts. It was previously believed to be an issue with IIS compression and there was a workaround suggested to disable compression, and then rename the %windir%\system32\inetsrv\suscomp.dll file and restart the IIS, and the Update Services service. Further Investigation shows the problem source to be a known condition with IIS and http.sys, which is not related to compression, and for which there is an available hotfix. It is not recommended to disable compression as this will not impact the problem source, and possibly increase network traffic & server load, while reducing the number of clients you can effectively serve. Further information about the issue and obtaining the hotfix can be found: http://support.microsoft.com/?id=898708 . This hotfix does require Service Pack 1 be installed to the Windows Server 2003

Yeah, one could argue that as SBSboxes we don't have THAT many clients to worry about...but it's still interesting to see the Vendors recommend two different things...

Trend.... v2 or v3?

Les Connor has always been our "Les is More" guy... and when he posts...this is not done lightly...

 

Folks, I've been using Trends's products on SBS since 4.5 - it's been a pretty good trip.

 

CSM v2 was(is) the icing - very very reliable antivirus and anti-spam capabilities - as close to zero maintenance as you can get or would want. There were a couple of things that could have been better integrated - but on the whole a really solid solution for SMB.

 

I don't take this recommendation lightly - I've worked hard to try and make V3 work - but I just can't afford to use it any longer.

 

CSM v3 hasn't proven to be an improvement. The integrated console is nice - but the product (mostly the console) is unreliable, and the anti-spam feature is a step backwards in performance and features.

 

I'd recommend staying with V2, and would still recommend V2 for new installs - and will be installing V2 on new SBS networks - as IMHO it's still the best thing going.

 

I *do* have *some* faith that progress is being/will be made, and there will be an updated version of CSM for SMB that will be as good (probably better) than V2. I'll be among the first to acknowledge it when it arrives.

 

--

Les Connor [SBS Community Member - SBS MVP]

-----------------------------------------------------------

SBS Rocks !

 

In case you don't want to install V3, V2 still is available and the keys still work... 

http://www.trendmicro.com/download/product.asp?productid=39

Terry posts in.....

 

If you're having trouble connecting your workstation to your SBS server, and you've recently installed Trend Micro CSM 3.0, and you may also have recently upgraded to SBS SP1  ------ check to see if you have the following within the affected workstatation's event viewer/application log :

 

event ID 1006 - windows cannot bind to local domain, group policy processing aborted

event ID 1030 - windows cannot query for the list of group policy objects ....

 

If so, it's likely have the "Trend Micro Client/Server Security Agent Personal Firewall" service started on your SBS server.  Even though the default for Trend's Firewall utility is to have it disabled within the application, the service itself has been installed, started and set for automatic start up.  Stop this specific service on your server, change it's startup status to disabled, and the workstation error messages should disappear.

 

Additional ---- from what I've read elsewhere, this condition sometimes manifests itself on only a few workstations in your SBS environment....sometimes it's only one workstation that seems to be affected (haven't figured that one yet).  However, if you do have this configuration (using Trend Micro CSM 3.0), you might want to check the event viewer/application logs on your workstations for error codes 1006 & 1030.  A couple of the more notable symptoms is the increased time it takes a workstation to boot up (the "applying personal settings" splash screen runs longer than normal), and connecting to Exchange server via Outlook client is problematic.

 

Trend's KB link is here....

 

Dear Mr. Cook and Mr. Bennett:

January 27, 2006

Scott Cook Chairman, Executive Committee

Steve Bennett, President and CEO

Intuit, makers of Quickbooks

Dear Sirs:

Just thought I’d type up this official blog post to let you and other firms like yours know that there’s some resources you’d probably need to pay attention to in the coming months.  You see there’s a new Operating system in beta testing right now, …it’s called Vista.  And in this new operating system it handles user rights a little differently than has been in the past.  Certainly a lot differently than Windows 98 anyway and even a bit different than Windows 2000 and XP logo program specifications that used to be the benchmarks in the past for a good way to code software.   

Vista will be going beyond those guidelines to something new… something called UAC. User Account Control.  There are already some resources that you might want to download and let the folks that work on developing your software know about. 

 

The first is a MSDN article called “Developer Best Practices and Guidelines for Applications in a Least Privileged Environment“ and it can be found at this link.  The second resource that you should have your folks subscribe to in their RSS reader is the UAC blog.  The User Account Control Blog is the team that used to be called LUA and then called UAP and now they are called UAC.  Yes, I know it’s sometimes hard to follow what the name of some of these Microsoft programs are as they keep changing (let’s not even bring up the WUS to WSUS naming shall we?) …but as long as you just remember that LUA/UAP/UAC is just another name for not requiring administrator rights to merely run a software program, and just subscribe to that blog, that should keep your developers well informed of what lies ahead.

 

In case your folks are not involved in a MSDN beta test of Vista, feel free to holler as I have a one or two Vista beta invites available that I can send to your employees. 

 

Speaking of Vista, fellow Security MVP Dana Epp blogged about some of the changes that Vista is making in an earlier blog post of his and it reminds me that while I’m on the beta, I keep forgetting to load up Quickbooks 2006 and see how it does on the current test build of Vista.

 

In the meantime, thanks again for Brad Smith’s statement that this will be fixed in the 2007 version and I’ll get cracking on updating the webpage on www.threatcode.com to document the 2006 instructions on getting Quickbooks to run without admin rights that “Tbone” posted to the Quickbooks community forum.

 

Thanks again for keeping us informed about the issues with the 2006 version and how we should install the R3 version directly.

 

Susan Bradley

Okay so how is this a "worm"?

When reports of this "worm" (and the word should be used loosely) came out it was impacting over 700,000 computers because there was a counter on the site... well now it comes out that there was a script running to up the count...so it's not 700,000...but more like 300,000.

Incidents.org has some write up on it...and in a listserve someone made a valid point.... this takes a "click" to infect....so...why is it being called a worm?

In the “Weekly Assessment” sent out last Friday, we provided our members with information regarding the W32.Blackmal.E@mm (Symantec) worm. This worm is expected to delete certain files from infected systems on the third of each month - starting on February 3rd. As there has been some confusion surrounding the various naming conventions for this worm, we would like to note that the Common Malware Enumeration (CME) group has assigned it the following ID: CME-2412. Some of the naming conventions associated with CME-24 are Win32/Blackmal.F (Computer Associates), Nyxem.E (F-Secure), Email-Worm.Win32.Nyxem.e (Kaspersky), W32/MyWife.d@MM (McAfee), and WORM_GREW.A (TrendMicro). The majority of the antivirus vendors are rating this worm a “Low”. We continue to recommend that our members review the publications supporting their AV solution, ensuring that the current protection updates against this threat are applied.

More info on the malware blog...

How do you get the Industry journalists to care?

Earlier today I was called by a journalist for my industry to ask some follow up questions about some statements I had made to an author... and it showcased to me just how far we need to go to get people to care about Computer Security.

---------------------------

Thanks for the follow up call regarding the article that was written for _my industry journal_.  I am concerned a bit that you stated that your reviewer of the article did not understand that running with administrator rights on our systems is a key factor of why we get malware and spyware on our machines.  By all means forward this email and my email address to him or her and I'd love to discuss this in greater detail.

In my own office I had a Secretary that was getting malware and spyware on her system and the antivirus and spyware tools would not stop them.  Remember that such software is always 'reactionary' and not proactive in defense.  Since I took the time to adjust her system to run without administrative rights, she can no longer surf to sites and download icons and emoticons that I have not authorized, she can no longer merely 'surf' to web sites that may infect her system.

Two actions can get malware on a system typically in my office.

1.  Clicking and downloading from web sites that are designed to 'trick' the user into installing spyware.
2.  Surfing to a site that injects the spyware into the system because it piggy backs on unpatched web browsers, Sun Java or other 'infection' means.

Now given that I keep my web browsers fully patched, the second risk is lessened, but unless we stop the end users from downloading and installing software that they are truly not authorized to install, we will always be one step behind the bad guys.

Moving to another web browser is not the answer in the fight against malware and spyware.

Let me point you to a couple of articles on this topic:

http://www.thechannelinsider.com/print_article2/0,1217,a=166172,00.asp

http://blogs.technet.com/jesper_johansson/archive/2005/11/30/415328.aspx

"Barring users from gaining administrative access—and thus restricting their ability to install such unwanted or malicious software—will automatically tighten security and will garner other benefits as well."

Spyware and Malware was voted number 10 of the Top Tech issues by the CITP and ISACA members in an AICPA poll recently.  Spyware and Malware is big business that includes Russian mobs and other criminal elements.  By not doing all we can to protect our weak links in our firms…the desktops… we are playing right into their hands.  Firewalls do not stop this activity.  Antivirus and Antispyware are always one step behind.  As long as we do not control our desktops and instead rely on the ability for our end users not be be 'tricked' and 'scammed' we cannot adequately protect our systems.  The average user doesn't want or need to be a geek, but we in business need to protect their systems accordingly.

http://www.crt.net.au/etopics/migmaf.htm

Vendors like Quickbooks that consistently require "Administrator" rights also impact our security decisions.  I built a web site to highlight these vendors www.threatcode.com They don't have to care about coding securely because we… the buying marketplace does not care.  We do not care because we do not know why running with administrator rights is dangerous.  It's a vicious cycle.  Because the marketplace doesn't care, the vendor won't change.

To give credit to Intuit, the maker of Quickbooks, they have stated that they will change the way the 2007 version of the software is built to be more secure.  But this was only after the SANS.org organization made them their first "Hall of Shame" vendor for coding in this manner:

http://www.sans.org/newsletters/newsbites/newsbites.php?vol=7&issue=59

Application Vendor Demands Unnecessary Administrative Privileges Violates Policy of Least Privilege

This new section allows the user community to share intelligence on applications that require users to lower their barriers to cyber attacks. Now that the US Air Force has established a minimum standard of due care, soon to be adopted by other government agencies, there is a standard against which to measure the application designers' security decisions.

The first inductee into the Application Security Hall of Shame is QuickBooks.

The latest release of Intuit's QuickBooks, widely used by accountants and businesses, negates the security attributes of the underlying operating system (e.g., Windows) on a computer using this Intuit product. Installation and operation of QuickBooks requires granting operating system "Administrative privileges" to the user, giving users complete control over the security features of the computer on which it is installed. In an enterprise setting, this hinders the organization's ability to ensure security policies are implemented appropriately for password control, user privileges, and other security disciplines for a computer with QuickBooks installed. This is an unfortunately perfect example of an application software product demolishing the security capabilities of the underlying operating system. Computers with unprotected operating systems are easy pickings for would-be intruders looking for personal identity and financial information in QuickBooks files.

In response to Newsbites' recognition, Brad Smith, senior vice president of QuickBooks, confirmed on December 2, 2005 that this problem will be fixed in the next major release (QuickBooks 2007), scheduled for delivery within 12 months.

--------------

Bottom line... as long as we don't know...don't understand.... we won't care.  We won't ask for vendors to make the software help us be more secure.  We and vendors both have to understand that that least privilege is an absolute minimun in this day and age of security issues.

Blame the fruitcakes in Calfornia on this one....

A followup post about the issue of Access and Excel

 

You cannot change, add, or delete data in tables that are linked to an Excel workbook in Office Access 2003 or in Access 2002:
http://support.microsoft.com/default.aspx?scid=kb;EN-US;904953
 

Background and Summary

 

A recent decision from a court case has determined that certain portions of code found in Microsoft Office Professional Edition 2003, Microsoft Office Access 2003, Microsoft Office XP Professional and Microsoft Office Access 2002 infringe a third-party patent.  As a result, Microsoft must make available a revised version of these products with the allegedly infringing code replaced. 

 

To comply with the court order Microsoft is now requiring all future deployments of Microsoft Office Professional 2003 and Microsoft Access 2003 to include service pack 2. Microsoft is also requiring all new deployments of Microsoft Office XP Professional and Access 2002 to include a special patch.

 

Customers who have previously installed affected products are being requested to voluntarily install the patch although installation is not required. In order to ensure customers are aware of these new requirements, Microsoft has been mailing notification letters throughout the month of January.

 

We have received requests from customers to provide more information about the situation leading to this requirement. The attached frequently asked questions document goes into more detail on the circumstances related to this requirement, information on deployment and additional context to the legal situation.

 

 

Frequently Asked Questions

General Questions

 

Q: Who needs to install Microsoft Office 2003 SP2?

A: Any customer installing Microsoft Office Professional 2003 or Microsoft Office Access 2003 from the date of their notification must install Office 2003 SP2. All customers will have been notified, worldwide, by February 2006.  

 

Q: Who needs to install the patch for Microsoft Office XP Professional and Microsoft Access 2002?

A: Any customer installing Microsoft Office XP Professional or Microsoft Office Access 2002 from the date of their notification must install the special patch. All customers will have been notified, worldwide, by February 2006.  

 

Q: What if I am in the middle of an existing deployment of Microsoft Office Professional 2003? Am I affected by this requirement?

A: Yes. Customers currently deploying Microsoft Office Professional 2003 or Microsoft Office Access 2003 are required to apply service pack 2 to all computers from the date of their notification. All customers will have been notified, worldwide, by February 2006.  

 

Q: If I have a computer with Microsoft Office Professional 2003 already installed on it do I need to update that computer with Office 2003 SP2?

A: A customer is not required to install Office 2003 SP2 on any machine already deployed. However, Microsoft strongly recommends they do install SP2 as the service pack includes many product updates the customer will likely value.

 

Software Deployment and Technical Questions

 

Q: Can you explain to me exactly what product behavior needed to be changed to address the intellectual property concerns in question?

A: You can find more technical information on the patch at http://support.microsoft.com/default.aspx/kb/904953/

 

Q: The letter I received directed me to the Microsoft site http://office.microsoft.com/en-us/officeupdate/default.aspx, but this is a very general Office Update site. Is there a more direct link I can go to for downloading the appropriate patch for my software?

A: This is the Office Update site.  Clicking on “Check for Updates” link from this page will activate the process necessary to download the patch for Office XP or Office 2003 SP2.

 

To directly obtain the patch for Office 2003 please visit:

http://www.microsoft.com/downloads/details.aspx?FamilyId=57E27A97-2DB6-4654-9DB6-EC7D5B4DD867&displaylang=en

 

To directly obtain the patch for Office XP Professional and Access 2002 please visit: http://www.microsoft.com/downloads/details.aspx?FamilyId=7497D7F0-BEF5-4054-B854-B1240B5135F5&displaylang=en

 

Q: How can I find out if I have Office 2003 SP2 already installed on my PC?

A: You can find out if Office 2003 SP2 has been installed on a machine by starting any Office application, selecting the “Help” menu choice and then selecting the “About” menu choice. In the “About” dialog box, next to the product name, the letters “SP2” will be displayed.

 

Q: Must I download Office 2003 SP2 from the web?

A: Office 2003 SP2 is included in volume license media kits.  If volume license media kits are not part of your volume licensing program or you have not received a disk and prefer not to download the service pack over the Internet you may order a disk by visiting http://office.microsoft.com/en-us/FX010383631033.aspx

 

Q: Office 2003 SP2 makes more changes than simply updating the code affected by the US court case.  Is there a patch or hot fix I can use that takes care of the intellectual property concerns without making all the other changes related to this service pack?

A: Office 2003 SP2 is the only patch available to properly update Office Professional 2003 and Access 2003.

 

Q:  If a customer is only using Microsoft Access 2003 do they need to install Office 2003 SP2 or is there a separate Access only service pack?

A:  There is not a separate service pack for Microsoft Access.  Office 2003 SP2 is the correct patch to apply for suites and individual applications such as Access.

 

Q:  How will this affect Office 2003 SP1?

A:  Office 2003 SP2 is a cumulative release and includes SP1. This does not, however, affect the support policy for SP1.  Microsoft will continue to support SP1 as defined in the lifecycle support policy.  More information can be found at http://support.microsoft.com/.

 

Q: I deploy Microsoft Office using a standardized corporate installation image. Do installation images that have been previously created and tested with Microsoft Office 2003 need to be updated to include SP2?

A: Any new installation of Office Professional 2003 requires SP2 be applied. If you use a standardized installation image to facilitate corporate deployments you will need to update that image to include SP2.

 

Q: How does this affect Windows Terminal Server installations of Office 2003?

A: New installations would require Office Professional 2003 to be installed with SP2.

 

Q: If I just deployed SP1 do I have to go back and now deploy SP2?

A: No, you do not need to deploy SP2 on an existing installation. Only new installations of Office Professional and Access 2003 require deployment with Office 2003 SP2. Existing machines with no service pack or with service pack 1 do not need to be updated. However, Microsoft strongly recommends they do install SP2 as the service pack includes many product updates the customer will likely value.

 

Q: I have noticed that the date for Microsoft Office 2003 SP2 on the Microsoft download site has changed several times from its initial release. Has Microsoft changed service pack 2 and does that mean I need to download SP2 again and apply it to my machines?

A: No you do not need to download Office 2003 SP2 again or re-apply it to machines already patched with SP2. The contents of service pack 2 have not changed since its initial release.

 

Q: What are the system requirements for Office 2003 SP2?

A: Office 2003 SP2 system requirements are the same as the Office 2003 System requirements for Office client applications. In order to install SP2, you must have installed Office 2003 on a system that meets the installation requirements.

 

Legal Liability and Microsoft’s Indemnity Policy Questions

 

Q: Microsoft has told me that this action is required because of a ruling in a court case. Can you tell me which case this is and which court is involved?

A: The case which necessitated this action is Amado vs. Microsoft which was filed in federal court in California.  

 

Q: Am I considered out of compliance with my volume licensing agreement if I do not deploy Office 2003 SP2 in future installations?

A: Installation of Office 2003 SP2 is a requirement for any new deployments of Office Professional 2003, regardless of which licensing program you are enrolled in. Any future deployments of Office 2003 without Office 2003 SP2 included would be considered out of compliance with Microsoft’s licensing requirements.

 

Q: Are retail customers affected by this action?

A: Yes.  Our retail license has been changed and all retail boxes which contain the affected products will also include a disk with Office 2003 SP2.

 

Q: Is it correct that if I have deployed Office 2003 SP2 then I have nothing to worry about with respect to intellectual property infringement?

A: If Office 2003 SP2 is installed you are in compliance, you will not infringe the intellectual property that is at issue in this case.

 

Q: I thought that Microsoft’s indemnity policy meant that Microsoft stands behind their software and limits my liability against a third party suing me for intellectual property issues related to that software. Doesn’t Microsoft’s indemnity policy protect me from actions like this?

A:  Microsoft’s indemnity policy does cover your pre-existing installations with respect to intellectual property claims in this case.  Microsoft’s ability to protect customers from future infringement claims depends on our ability to change products to comply with court orders. Microsoft respects the intellectual property of others. As such, Microsoft’s licenses specify that new installations of affected products only be made with the appropriate patches applied.

Quickbooks 2006 - non admin rights instructions

So you are now installing the 2006 [the R3 version of course] and you want to run without admin rights on the 2006 version?

Here's the updated instructions:

QuickBooks Community - Running QB 2006 without Power User or Admin Privs.:
http://www.quickbooksgroup.com/webx/forums/install/385

I'll try to spare you any editorializing. Suffice to say, these changes will allow regular users to run and use QuickBooks 2006. Updating will not work unless you are an administrator, but it will abort relatively gracefully with a message along the lines of "Only adminsitrators are allowed to update QuickBooks." I'm not quite sure how I feel about this development. I can't verify this yet, but it seems that this is not a matter of file or registry permissions, or of windows installer policies, but rather a direct check of group membership tokens. In which case we'll probably just have to learn to live with it.

 

 

Is that where WSUS puts the IMF updates?

No wonder I'm not getting the Exchange IMF updates offered up to me on WSUS... I didn't have the box checked.  Or at least I think that's where they should be triggered from... but it's not clear is it? 

On the WSUS blog it sounds like this will be the section that will be updates for Windows defender, but I think these are also the place for the Exchange IMF junk file updates. 

WSUS in sychronizing now... I'll let you know if my guess is right.

Update:  Nope..not right... hmmm... wonder if I forgot the registry edit to enable detection or something?

...and as your domain admin, I'm not going to let you delete that

The IE7 blog talks about a feature that you can delete your IE 7 history.

Well first... delete is a relative term because in operating systems unless you write over it, it's not deleted, and secondly, I as an Admin will want that 'feature' turned off.

I want to see where you are going and what you are doing in my firm.. it's in my Internet Use Policy that I can do it in fact.

Patching risk

SANS - Internet Storm Center - Cooperative Cyber Threat Monitor And Alert System:
http://www.incidents.org/diary.php?storyid=1052

"Before he turns it off though he tells me something very worrisome. It went like: "We turned off the windows automatic updates". I wasn't sure if I'd wipe the harddisk or not at that point, but as such things would convince me to wipe, I answered "No problem, I'll enable it when I get home, thanks for the warning". Then he goes on to explain they do that always as "In our experience windows update and all those patches break more than the viruses harm you. Just add a good anti-virus program, we've already tightened up the windows firewall. You'll be safe, don't worry. In our experience it is best to install the service packs Microsoft brings out, but stay away from the crap in between". Painfully wrong advise in my opinion, from a shop I like a lot for their hardware."

I read that today and there's a part of me that sees that ...and it kinda in a weird way... breaks my heart.  That people have such an untrust about patches.  In my world, I have not had the issues with the individual patches, hotfixes and the like.  Service packs?  Now those are what are icky to me.  But security patches?  To me that's a normal monthly ritual now of test, deploy, evaluate.  In my network, in my workstations, on my computers, patches don't do more harm than the viruses that harm me.  If a virus harms me, it's because my defense isn't good enough.  They've broken in.  If a patch hurts me, even a little bit, that's just a normal process of software in my book.  Why would anyone want to choose a virus over a patch making the help file inside my tax program not work?  And honestly that's the last 'thing' that broke in my office.

The help file inside my tax program didn't work until I adjusted it. 

Now compare that with the risk of a virus that disrupts my network, my email, introduces a back door into my network or any other nasty thing...and someone thinks the risk of THAT is preferable over a possible issue with a patch?  I'm sorry but that risk is too great in my book.  You have a problem with your computer if a patch is an issue. 

Now that said.... many folks say that patching should not be knee jerk automatic in a business that depends on software... if you depend on an app...and that app has a history of breakage...then you need to fix the app, for find a way to protect that app, and mitigate the issues without patching.

That's the tricky part.  In most small firms, it's much easier to patch and risk the small chance of patch issues than to take the time to 'mitigate' for not patching.

Bottom line...don't turn off automatic updates...and Mr. Computer maker... I agree with the gang from Incidents.org... that's bad advice.

The Non Admin white paper is out!!!!

This technical white paper describes the least-privileged user account approach and provides information on related tools and resources.

Whoo hooo the LUA paper is out!  LUA...you know ... LUA.. Least privilege and non admin and all that.  If you want to begin to get control back over your network, this, in my opinion, is the way to go.  We HAVE to get control of the desktops.  And having your stupidest user [lets face it, we all have them] have the right to click, to install, to launch, to load, to do anything on their workstation...those days are over.  Vista will be doing a better job in this area...but Vista is later...not now and we need all the help we can get to take back our desktops and make them part of the security fabric of our network.

The XP sp2 firewall is step one.  Non Admin is step 2.  Now this is not a trivial task and takes time and energy to do.  But if you can do this... you will be one more step on the way to defeating the bad guys.

Demand that our vendors support this.

www.threatcode.com

It's time we start setting our risks...and not our vendors.

Looking for WSUS resources?

Need resources to get your brain around WSUS?

Here's my recommendations

Btw ...just opened up a new category on the blog about WSUS

 

 

So how do I track RWW?

A commenter [I'm too lazy to go link it up as I was in the office at 6 ungodly am this morning to ensure that a Tax Webcast training seminar was working properly and right now I'm blogging as the Earl Grey tea attempts to clear the grogginess from my brain matter], was wanting to open up RWW for all employees but wanted to track/log/audit it.  And I got to thinking how I do it here.. or I should say...how I've started to be able to keep a real close eye on it here.

There isn't [as far as this sleep deprived brain can remember] a RWW log in database.....but.... the beta that I'm on with the Scorpion Firewall is giving me the tracking that keeps the paranoid me happy.  In the firewall dashboard new beta, Dana tracks connections...and guess what...443 and 4125 are just that...connections.. and every morning [since I set the dashboard email report up to hit my inbox at 6 a.mish like my other emails] I look and see just who connected in on port 443 and in particular 4125.  90% of the time the IP address I see that come in from is me at home [yeah it's pretty sad when you recognize your own IP].  But that 4125 port ... I should only see the connections I expect on that one.  Every now and then I see a 443 connection from Korea or Guatemala and I've been building up a 'block connection list'.  In fact I should take the time and dig up a really good 'this are typically bad IP addresses' list or just break down and get one of those ISA add in thingymajiggers [you expect me to coherently remember a vendor's name at this hour of the morning?] that do the work for you.

In the meantime, if anyone is more awake than I am.... comments about ISA add ons that you use and like would be appreciated so my brain doesn't have to wake up.

Hey... the antispyware thingys are going to be in WSUS

WSUS Admins:

Today you will see a new product category and update classification in your WSUS Synchronization Options dialog.  Windows Defender, formerly Microsoft Windows AntiSpyware (Beta), will as of today’s synchronization show up as a new Windows product category.  A new update classification will also come on line called “Definition Updates”.   Currently Windows Defender is only released as part of a VISTA beta release.  Definition Updates will only be available to beta participants from the Microsoft Update site, with Vista Windows Defender Beta installed.   Windows Defender beta will be available to down level clients, and Definition Updates available via WSUS in the coming months.   As with CodeName Max, when new product updates are released to MU, their categories and classifications also appear on the corresponding WSUS options dialogs.  Unlike CodeName Max, Windows Defender  Definition Updates will be available to synchronize to WSUS servers and approve for installation on clients in the coming months.  For right now, no Definition  Updates for Windows Defender will be available from MU to WSUS servers. 

To learn more about the Windows Defender Vista beta see:  http://www.microsoft.com/presspass/newsroom/winxp/12-19WinVistaDecCTPFS.mspx  Visit the Windows Defender team blog for the latest news on Windows Defender and Definition Updates availability via WSUS at  http://blogs.technet.com/antimalware/archive/2005/11/04/413700.aspx.

 

Thanks -Bobbie
--
Bobbie Harder
Program Manager, WSUS
Microsoft

The spyware guys know we don't care.

In a spyware listserve I hang in... comes a sad but true story.... in the registry log file of a malware and spyware'd computer was this line....

 HKLM\..\Run: [I downloaded pirated Software from P2P and now I post my Hijack log whining] C:\WINDOWS\system32\Fifa Football 2006 crack.exe

Look at that...the bad guys are laughing at us and how we download software.  How we don't care about security... how we don't even validate what we are downloading.  They know that people will download anything if given the choice. 

Look at that ...they are taunting us that we don't care enough about what we download...what we do on our computers...it's sad isn't it...that they know we don't care.

Knock it off Apple

Matt blogs....

Ever try to JUST install Quicktime recently?

You cant.  If you want to download the new version, you have to download Quicktime WITH Itunes.  Yea, you can uninstall ITunes later on...but, why is apple forcing me to do this?

I am 100% content with my current media player, Windows Media player, and the library it puts together.

I hate when they do this stuff!!!!!!

------------------------

Dear Mr. Jobs.  Yes I bought an Ipod for my sister for Christmas so if you are attempting to entice me to buy it... I already did.... in the meantime ...if this is true [and I'll go check if he's right that you don't have the option up front during the install] ... STOP IT.

Okay I just checked... he's right... oh good... more insecurity automagically in my network [see the eweek article about the itunes flaw]...

P.S. Donna points out that there is a standalone player ...look very carefully on the download page in tiny writing....there "is" a link...but it sure doesn't make it obvious.

AICPA names top 10 technologies

In today's Consulting Insights.. Bob Scott reports that the AICPA Top 10 Technologies is out..... and look what's number 10!

AICPA NAMES TOP TEN TECHNOLOGIES.
The American Institute of CPAs has named information security as its No. 1 technology issue for 2006, a repeat winner, and it's hard to disagree with the choice. I think this year's Top Ten is more practically oriented than some I've seen in the past. Either that, or I know more than I did and they were right all along. Issue No. 2 was assurance and compliance apps. Here are the rest of the winners:

  • 3. Disaster and business continuity planning;
  • 4. IT governance;
  • 5. Privacy management;
  • 6. Digital and authentication technologies;
  • 7. Wireless technologies;
  • 8. Application and data integration;
  • 9. Paperless digital technologies; and
  • 10. Spyware detection and removal.

Ensure tinfoil is in place please?

Quick you may need this protection..... especially if you go and listen to the latest Steve Gibson podcast about the 'rogue developers of Microsoft' who placed 'an intentional back door' into the operating system.  In the meantime you may wish to also read the MSRC blog and their take on the same issue.

Now Steve says 'he's leaning toward Open Source because you can review what's in there'.  Oh.. really ...just like this vulnerability in Novell's SuSe Linux that just came out today and appears to already be under attack.  The vendor was notified on 11/15 and the fix out 1/13/2006.  "Remote exploitation of a heap overflow vulnerability in Novell Inc.'s Open Enterprise Server Remote Manager allows attackers to execute arbitrary code."  Why isn't that a 'back door built by rogue developers like the WMF exploit?

Tim says he's waiting for next week in his blog about this...and that's exactly what Steve wants.  Look at the 'buzz' this one podcast has gotten.  Talk about a very VERY unprofessional way to handle this.  First off... Mr. Gibson, I email secure@microsoft.com ALL THE TIME and seemingly even with the spam filters that tend to mark my pacbell.net as spam, I get responses from them.  Secondly, whether he cares or not, on the backchannels of security listserves, his podcast is being ...well quite frankly...laughed at.  Next...for him to say that he is the 'first' in this charge.....he was not the first to charge that WMF issue was a 'backdoor', on January 2nd to be exact, other bloggers and companies did.

If you are going to charge something like this, Mr. Gibson... first off don't charge something of this magnitude without contacting the company first, secondly .... to podcast something when you aren't even sure of all the facts?  That's just irresponsible in my book.

Enough with the tinfoil folk... get real....flaw yes.  Intentional backdoor by rogue developers?  Get reasonable Mr. Gibson.

So what about coffee shops?

So in the comments of a previous blog entry about remote access, comes the question about 'coffee shop' access.

That is indeed in a different section, along with the information that before an employee takes a company laptop and is anticipated to use a Starbucks, they get a one on one training course on remote access.  I do and have allowed connectivity ala java, ala airport wireless and what not, but ensure that the employee understands the 'expected behavior' of each.

Starbucks access should always be a T-mobile web site access with an expected look.  So yes, I do allow this, but yes, there is the same stress of paranoia.  Now yes, there is the risk of someone putting up a fake AP and all that...but remember RWW is over SSL and thus information isn't passing in 'clear text'.  The other day I had a ping about a business owner who wanted to 'pop' back into his SBS box and one of the things that I warned the Admin was that when you use POP, you pass that username and password over clear text.

Is coffeeshop access secure?  Secure enough in my book.  I'm willing to accept the risks knowing that I have protection in place.

"You have successfully updated your computer"

.... yup...no reboot this month.  Did everyone catch that?

SBS aka 'the kitchen sink' normally has at least one patch that causes or forces a reboot...but not this month.  All of the patches that came down on this Patch Tuesday [excluding 06-001 for the WMF of course...as that was earlier...] did not force a reboot.

I personally thing that the "world record for uptime" that everyone boasts about is overrated...but that's just me...

 

What's in your remote access policy?

Here's a section of mine.....

In general:

 

When you are accessing the Firm’s network from a remote location, you must pay the same attention to security and privacy regarding client files that is required at the office.  Those employees previously identified by Management as needing remote access should ensure that at all times the connection to the Firm’s network does not in any way jeopardize the safety and security of the network.  Therefore, anyone with permission to run remote access is required to have installed an up to date antivirus and an active firewall on their personal home computer.  Periodic onsite visits by the Network Administrator may be required in order to approve a request for remote access and to maintain the access.  If you feel it is necessary for you to have remote access to the Firm’s computer network, please fill out a request form for remote or offsite access. [Please see a copy of this form in the appendix].

 

Remote access via Kiosks:

 

It is recommended that only personal equipment be used to remotely access the Firm’s network resources.  You should refrain whenever possible from using open, Internet café style connections.  Those users with remote connectivity will require special training on the risks of such access and will be instructed on ensuring that usernames and passwords are not saved on such devices.  This type of access should only be used in an emergency and only when deemed to be appropriate for the need.  Remote access may be necessary while traveling.  You should submit a request for a laptop for use while traveling prior to your trip.

 

...and we'll be adding a section on our Audiovox Cell phones as they have usernames and passwords on them.  Even with this... I monitor the access.  I have a rule that lets me know when a password attempt has been made on the system. 

 

But I think I'll be going back and beefing up that section and instead forbid Kiosk access entirely.  One should ensure they can 'trust' the device they are using to access the network with. 

A conversation on Malware

Microsoft TechNet Radio:
http://www.microsoft.com/technet/community/tnradio/default.mspx

Steve Santorelli spent most of his career in Scotland Yard, so what is he doing at Microsoft? Steve is putting his sleuthing skills to work for you. Working with international law agencies, he and others in his group are tracking down the criminals who are creating the malware that keeps your IT group up at night. Steve is about prevention — not through technology, but through law. He is making sure the creators of malware are brought to justice. Hear a conversation with Steven on the human side of malware

...now if they can just put a podcast feed on this site......

All port scan attacks in ISA

On a listserve today someone indicated that their client had shut off VPN because they were concerned about the 'intrusion' alerts they were getting and thought their server was compromised.

First... don't panic.  Many of these are false positives.

ISA Server Port Scan Alerts: Tip of the Month - December 2005:
http://www.microsoft.com/technet/community/columns/sectip/default.mspx

Two read that.

Three... check out a beta of a product that I think adds a lot more information and value to ISA server 2004.

The Scorpion Software Firewall Dashboard..."Cases 123-125: We have added a few new reports to show top service and connection usage so you can see what IS getting through your firewall. You can match this up against your server connection logs to see if things match up. There is a top service usage over the last 24 hours graph which shows the top 3 services against each other."

An ISO for the patches?

Download details: January 2006 Security and Critical Releases Bulk Update:
http://www.microsoft.com/downloads/details.aspx?FamilyID=27eb2d43-5f8e-4c93-b2dc-7954d7624758&DisplayLang=en

Alun just emailed.....
Tales from the Crypto : Not quite "SUS on a disk", but...:
http://msmvps.com/blogs/alunj/archive/2006/01/10/80720.aspx

Two bulletins today

January 10, 2006

Today Microsoft released the following Security Bulletin(s).

Note:
www.microsoft.com/technet/security and www.microsoft.com/security are authoritative in all matters concerning Microsoft Security Bulletins! ANY e-mail, web board or newsgroup posting (including this one) should be verified by visiting these sites for official information. Microsoft never sends security or other updates as attachments. These updates must be downloaded from the microsoft.com download center or Windows Update. See the individual bulletins for details.

Because some malicious messages attempt to masquerade as official Microsoft security notices, it is recommended that you physically type the URLs into your web browser and not click on the hyperlinks provided.

Bulletin Summary:

http://www.microsoft.com/technet/security/Bulletin/ms06-Jan.mspx

Critical Bulletins:

Vulnerability in Embedded Web Fonts Could Allow Remote Code Execution (908519)

http://www.microsoft.com/technet/security/Bulletin/ms06-002.mspx

Vulnerability in TNEF Decoding in Microsoft Outlook and Microsoft Exchange Could Allow Remote Code Execution (902412)

http://www.microsoft.com/technet/security/Bulletin/ms06-003.mspx

/...they've done that thing where each Outlook patch has a separate KB article and then Exchange has a KB article number.  I understand the process [it's one vulnerability] but I see it as two programs/patches and thus track it differently/

This represents our regularly scheduled monthly bulletin release (second Tuesday of each month). Please note that Microsoft may release bulletins out side of this schedule if we determine the need to do so.

If you have any questions regarding the patch or its implementation after reading the above listed bulletin you should contact Product Support Services in the United States at 1-866-PCSafety (1-866-727-2338). International customers should contact their local subsidiary.

 

Okay I'm leaving WMF's blocked

The other day I put in place blocking of WMF files in my network.... and I'm not going to adjust that setting one bit.

There is no need for my users to have or need that file and today's update on the MSRC blog proves that indeed.

http://blogs.technet.com/msrc/archive/2006/01/09/417198.aspx

Let's just keep those files blocked, shall we?

Over my dead body

On a couple of listserves and blogs the idea that now that this patch got out so quickly that all patches can get out this fast. 

First off, I think that's a simplistic view as not all patches are created equal.  This one was a small file.  Take a look at the IE patches and their file manifest.  Huge in comparison.  Thus to say that say an IE patch can be written, tested, and signed off in the same fashion as this patch is ... I think... too simplistic of a view of how 'change management' works and how each security issue is not the same as another. 

It's easy for bloggers to say 'oh we need to demand beta patches as admins can decide the risk and apply them" and not realize the near 'freak out' that I'm sure would result because quite honestly we have no clue whatsoever as to our real risks out here.  None.  Zilch.  And as a result, each of us would think that we are in need of that fix.  So what would happen?  Untested patches unleashed on our networks.  Okay so how do we track issues now?  Is it beta version 1 of that patch you are seeing that with or beta version 2?  Yeah right, that would work out well wouldn't it?  We'd have absolute freak out on our hands.

Furthermore, I don't see these posters and bloggers in the newsgroup on the day after patching when, on the rare occasion, we do see issues.  I don't see you there helping that computer user try to get that box into a usable condition.  It's easy to ask for this when you are where you are at and do have the resources to handle such things, unlike most home and small businesses.

Yeah there are times that I will look at how long a patch takes to come out and wonder ...gee..that's a long time... but at the same time... I ...nor many out here making these demands...have no idea of the process that it takes to get a patch out, coded, tested on the umpteen versions.  It's easy to say these things when we're on this side.

Some have suggested that beta patches be handled like KB articles so that you'd call into PSS to get them.  And all that would do would to get code that could be reverse engineered into the hands of the bad guys that much faster.

I'm not saying that I know the right answer here, the right balance, or anything.  But I'm tired of 'standards' and 'best practices' being used in such an easy way without understanding what you are saying and asking for.  Sometimes 'standards' force you into being too rigid and not being agile enough.  I'm not going to ask for a standard patch build timeline because we truly have no way to set such a standard.  Some issues may be so deep and embedded in the operating system that it will need additional analysis.

I do like the once a month patch deployment because it means I can plan my month and security accordingly. 

The standards that are in place now... a patch no sooner than it's ready... a patch for all critically vulnerable systems at the same time.... a patch for all languages..... a patch for all versions.....released on patch Tuesday unless it's an unusual event.....that's enough of a standard in my book.

Except for one more standard....... over my dead body will untested patches be unleashed on the SBS community.  That's one standard I will enforce.

So why aren't 98's being patched?

Microsoft Security Bulletin MS06-001: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution (912919):
http://www.microsoft.com/technet/security/bulletin/ms06-001.mspx

A question that even I had came up on a listserve... why isn't this critical to Windows 98/ME machines?  Because on all the machines my fellow MVPs attempted to automagically infect with this exploit, none of them would automagically get nailed.  All of the 98's and ME's needed user intervention.  Now one could argue that Windows still has more stupid users, but the reality is, because the 9x series did not use the default viewer, they are less vulnerable.  Thus, not critical.  Thus, because 98's only get patched when it's a critical issue, there will be no patch.

Newsflash at 11....the sky will continue to fall....

In our continuing saga of keeping secure online...just wanted to update everyone that even though I'm fully patched the sky will continue to fall.

Why?

Read this.

In particular ...this..."Patches are always likely to be necessary because software will never be perfect as long as it is written by imperfect human beings,"

So to me..it's pointless to argue over the merits and numbers of patches and what not.  Because we will always want to interact with one another... we will always be at a slight risk.  Not to mention.... " Though Windows suffered fewer flaws it is still the platform with the most security problems, given its wider user base of less tech-savvy users."  ...that's politically correct speak for 'we got more stupid users than you do"

What I learned from this

First read a good blog post from Mike Nash on why this came out early.

And here's what I learned from this....

  1. This is my firm and only I can decide the risks.  It got to the point yesterday and today that I was about ready to yell "enough" and stop reading the blogs, the news sites, the stories of how I was at risk.  So much of what we were getting as 'gospel' was second hand and third hand and never disclosed the actual methodologies of how numbers and stats were determined.  On the one hand there were folks saying they did see threats, on the other hand folks were not seeing any. 
  2. The security biz is a PR opportunity.  Security should be icky and boring.  About as boring as reading financial statements.  Man the 'spin' on this issue was unbelieveable.  'The worst security event ever''Every OS back to pencil and paper is vulnerable'.  [okay so now I'm exaggerating...but you get the idea].  Most of the headlines were not facts but spin jobs done to sell more product of 'fill in the blank'.
  3. No one has a good handle on the true risks of their firm [and we may not ever].  My impression is from all this 'yes it works', 'no it doesn't', 'yes it's vulnerable', 'no it's not', is that none of us truly have a handle on what is installed on our systems and all of us have so much third party crap.  So much of this incident was fear of the unknown, fear that something bad was going to get us, yet .... it was said that it was not an RPC type issue, it would not turn into a worm and yet look how much at what we were freaking out on this.  On a daily basis we have risks out here on the Internet.  And if there's only a patch between you and the bad guys... maybe we are in more trouble than we think?  Maybe we need to ensure we have layers, and defensive moves, and stop running as admin....and all those things that we really should be doing so that we're not totally going wacko over a security issue that some bozo brain timed to screw up our holidays.

And now if you'll excuse me.... Shavlik is ready to patch and so am I.

 

...so you didn't get an email until hours later...

...well then you don't have instant paranoia now do you?

First off we should understand that mail servers take time... so don't expect the Microsoft security email to get to you immediately.  Next you can easily sign up for 'Instant Paranoia Alerts' on MSN....then you will get them and be instantly paranoid....but I think we should give everyone a break on this.

 

Security bulletin 06-001

Microsoft Security Bulletin MS06-001: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution (912919):
http://www.microsoft.com/technet/security/Bulletin/ms06-001.mspx

Gentlemen start your testing on the real patch

ONE OUT OF BAND PATCH HEADING OUR WAY

 Important Information for Thursday 5 January 2006

Microsoft announced that it would release a security update to help
protect customers from exploitations of a vulnerability in the Windows
Meta File (WMF) area of code in the Windows operating system on Tuesday,
January 2, 2006, in response to malicious and criminal attacks on
computer users that were discovered last week.
 
Microsoft will release the update today on Thursday, January 5, 2006,
earlier than planned.
Microsoft originally planned to release the update on Tuesday, January
10, 2006 as part of its regular monthly release of security bulletins,
once testing for quality and application compatibility was complete.
However, testing has been completed earlier than anticipated and the
update is ready for release.

In addition, Microsoft is releasing the update early in response to
strong customer sentiment that the release should be made available as
soon as possible.
Microsoft's monitoring of attack data continues to indicate that the
attacks are limited and are being mitigated both by Microsoft's efforts
to shut down malicious Web sites and with up-to-date signatures form
anti-virus companies.

The security update will be available at 2:00 pm PT as MS06-001.
Enterprise customers who are using Windows Server Update Services will
receive the update automatically.  In additional the update is supported
Microsoft Baseline Security Analyzer 2.0, Systems Management Server, and
Software Update Services.  Enterprise customers can also manually
download the update from the Download Center.

Microsoft will hold a special Web cast on Friday, January 6, 2006, to
provide technical details on the MS06-001 and to answer questions.
Registration details will be available at
http://www.microsoft.com/technet/security/default.mspx.
Microsoft will also be releasing additional security updates on Tuesday,
January 10, 2006 as part of its regularly scheduled release of security
updates.

What is this alert?

As part of the monthly security bulletin release cycle, Microsoft
provides advance notification to our customers on the number of new
security updates being released, the products affected, the aggregate
maximum severity and information about detection tools relevant to the
update. This is intended to help our customers plan for the deployment
of these security updates more effectively.

In addition, to help customers prioritize monthly security updates with
any non-security updates released on Microsoft Update, Windows Update,
Windows Server Update Services and Software Update Services on the same
day as the monthly security bulletins, we also provide:

*    Information about the release of updated versions of the
Microsoft Windows Malicious Software Removal Tool.
*    Information about the release of NON-SECURITY, High Priority
updates on Microsoft Update (MU), Windows Update (WU), Windows Server
Update Services (WSUS) and Software Update Services (SUS). Note that
this information will pertain ONLY to updates on Windows Update and only
about High Priority, non-security updates being released on the same day
as security updates. Information will NOT be provided about Non-security
updates released on other days.

On 10 January 2006 Microsoft is planning to release:

Security Updates
*    1 Microsoft Security Bulletin affecting Microsoft Windows. The
highest Maximum Severity rating for these is Critical. These updates may
require a restart. These updates will be detectable using the Microsoft
Baseline Security Analyzer (MBSA).
*    1 Microsoft Security Bulletin affecting Microsoft Exchange and
Microsoft Office. The highest Maximum Severity rating for these is
Critical. These updates may require a restart. These updates will be
detectable using the Microsoft Baseline Security Analyzer (MBSA).

Microsoft Windows Malicious Software Removal Tool
*    Microsoft is planning to release an updated version of the
Microsoft Windows Malicious Software Removal Tool on Windows Update,
Microsoft Update, Windows Server Update Services and the Download
Center. Note that this tool will NOT be distributed using Software Update
Services (SUS).

Non-security High Priority updates on MU, WU, WSUS and SUS
*    Microsoft is planning to  release 1 NON-SECURITY High-Priority
Update on Windows Update (WU) and Software Update Services (SUS).
*    Microsoft is planning release 3 NON-SECURITY High-Priority
Updates on Microsoft Update (MU) and Windows Server Update Services
(WSUS)

Although we do not anticipate any changes, the number of bulletins,
products affected, restart information and severities are subject to
change until released.
Microsoft will host a webcast next week to address customer questions on
these bulletins. For more information on this webcast please see below:
*    TechNet Webcast: Information about Microsoft's Security
Bulletins (Level 100)   *    Wednesday, January 11, 2006 11:00 AM (GMT-08:00) Pacific Time
(US & Canada
http://msevents.microsoft.com/CUI/WebCastEventDetails.aspx?EventID=10322
87360&EventCategory=4&culture=en-US&CountryCode=US At this time no additional information on these bulletins such as
details regarding severity or details regarding the vulnerability will
be made available until 10 January 2006.


Thank you,
Microsoft PSS Security Team

The sky must be falling

We have truly gone insane around here.....

Tonight comes this comment....

Is this blog payed for by Microsoft? This was the strangest thing I ever read. The 3rd party patch you're advicing people not to install is made by a very respected programmer and is also an adviced install by f-secure and others. (and it is reversible once the microsoft patch is released)

 

Advicing people not to patch their machines is just pure stupidity. I didn't know you were a Microsoft Extremist but now I do.

 

For the record Klas I can't make your risk analysis for you...only you can.  For number one..that post that I did is a cut and paste from the Security advisory apparently you didn't read it closely enough as I didn't post anything in there that wasn't a cut and paste.  For two, this blog comes out of my personal pocketbook, and is thus my opinion and only my opinion....for three, I'm not going on record as advising anything but this....

 

IF YOU DO INSTALL THIS PATCH TEST THIS SUCKER and understand that you have possibly put this in an unsupported position.

 

I find it insane that folks are wanting untested patches on their systems, both in the form of a third party patch or in the form of an untested Microsoft patch.  Sorry folks, but I don't see you in the newsgroups scraping the dead servers off the floor come the aftermath of Patch Tuesday.  F-secure doesn't understand my network, my risk tolerance, my lob apps any more than Microsoft does.  So if I do my own risk analysis and don't always follow Microsoft's advice, why should I follow anyone else's?

 

I'll bet you a 6 pack of Mountain dews that folks that are wanting a quick untested patch would also be the ones screaming bloody murder when their boxes got nailed by a bad patch.

 

I can't do your risk analysis for you...but neither can F-secure or anyone else.

 

Read this.

 

Make up your OWN mind please.  And I think we need to ask ourselves... if the existence of a patch is the only thing between us and utter doom... we got bigger problems on our hands as we can't patch everything around here.

ISA server team blog opens up!

ISA Server Product Team Blog : Welcome to the ISA Server Product Team Blog:
http://blogs.technet.com/isablog/archive/2006/01/03/416787.aspx

Very cool....

 

The risk

So as we get back to work all of us have to evaluate the risks… do we deploy a third party patch or do we check our other defenses to see if we have enough in place.  There’s been a couple of interesting threads on this that I wanted to capture.

 

  1. If only they’d rip everything out and make it more secure, we wouldn’t have this.  The reality is folks, when business and security are weighed side by side, business will win hands down each time.  And if we are going to argue that we should rip out and make things more secure from the ground up, you’d better start at the very foundations of the Internet.  TCP/IP is not built with security in mind.  So if you want to build things from the ground up with security, then you’d better start ripping out from that level.  But given that we can’t even kill off Win 98, do you honestly think that this is a reasonable solution?  I’m not convinced that we can secure even things we design from the ground up….again it gets back to that secure enough argument.  Put too many barriers in my way and as a business person, I’ll find a way around those barriers to provide the collaboration w need.
  2. Patches should be released when they are ready, not on an artificial time table and schedule.  Now this is where I will argue against this one, as I’ve been patching for a long time and I don’t think the folks saying this are remembering what it as like before.  The comments are ‘oh but then patching could be on ‘your timetable’ and I don’t think people understand that patching is not on ‘my’ timetable per se’ but on the bad guys time table.  It takes a mere 20 minutes after a patch is released to build an exploit.  I honestly don’t think all those folks who are asking for this truly remember the mess patching was a few years back when patches could come out any time, any day.  I will also strongly argue with the folks that say ‘oh just release a patch and then if there is a problem, release another’.  Yeah right, folks, be careful what you ask for ‘cause if you have just one bad patch that would nail our SBS boxes, just imagine how much you’d be screaming after that one. 
  3. Getting good feedback.  The one area that I am a bit concerned about is the issue of ‘good feedback’.  There’s a difference between true facts and second hand information.  This event more than any other has proven to me that sometimes relying on others for your info could leave you confused and uncertain.  On the one hand, I’m not sure Microsoft sees all the ‘body counts’ I do since my communities don’t call PSS, don’t have TAMs and what not.  We don’t use the big programs that capture body counts [like postini and message labs]. I also hope that the a/v vendors are sharing information and not holding it back.  My SBS community sometimes isn’t nailed in the same way as the big server community.  Slammer, Idon’t feel had a lot of impact.  So the problem here is …what is real damage and what is psychological damage?  I hope that the consumer and small businesses are represented well enough when Microsoft makes their decisions, but I don’t know.
  4. Using a third party patch.  I haven’t made up my mind on this one…. On the one hand if you have to depend on a third party patch for your protection because the risks are too great, I’m not sure that’s where we need to be heading.  Maybe we need to ensure we have other layers in place, because I’ve got tons of third party crap on my network that I know I can’t patch it all and I’m positivie that each one is introducing threats into my network.  On the other hand, I don’t like feeling that ‘patch Tuesday’ is being used as the release date for this one.  How many dead bodies does there have to be before an out of band patch is released?

 

It reminds me of my New Year’s trip to Disneyland.  Disneyland is a risk.  Yes, it’s the happiest place on earth, but in reality, folks have died there from accidents on equipment and devices meant to entertain.  I must trust that Disneyland has in place processes and procedures to ensure my day is safe.  But at the end of the day I have to trust that they’ve done their job.  I don’t have the same level of forced trust for my operating system.  I do have more control over it.  So the question becomes…. Whom do I trust?  What is my risk tolerance? 

 

All I know is that it’s easy to say stuff when I’m not the one making the final decisions.

Patch on the 10th

http://www.microsoft.com/technet/security/advisory/912840.mspx

What's Microsoft's response to the availability of third party patches
for the WMF vulnerability?
Microsoft recommends that customers download and deploy the security
update for the WMF vulnerability that we are targeting for release on
January 10, 2006.

As a general rule, it is a best practice to utilize security updates for
software vulnerabilities from the original vendor of the software. With
Microsoft software, Microsoft carefully reviews and tests security
updates to ensure that they are of high quality and have been evaluated
thoroughly for application compatibility. In addition, Microsoft's
security updates are offered in 23 languages for all affected versions
of the software simultaneously.

Microsoft cannot provide similar assurance for independent third party
security updates.

Why is it taking Microsoft so long to issue a security update?
Creating security updates that effectively fix vulnerabilities is an
extensive process. There are many factors that impact the length of time
between the discovery of a vulnerability and the release of a security
update. When a potential vulnerability is reported, designated product
specific security experts investigate the scope and impact of a threat
on the affected product. Once the MSRC knows the extent and the severity
of the vulnerability, they work to develop an update for every supported
version affected. Once the update is built, it must be tested with the
different operating systems and applications it affects, then localized
for many markets and languages across the globe.

 

P.S.  That's a cut and paste from the advisory folks... apparently you aren't reading them as this is a verbatim from that...and for the record this blog is paid out of my pocket.

Getting good information

...so we're in the car driving to Los Angeles and the radio DJ talks about an upcoming story on radio

"A problem in Microsoft Windows?  Nahhhhhhhh" she says.......

The chatter on SBS listserves today is one of disappointment.  This security issue points out the problem we have down here in SBSland.  The "test" problem.  For large firms they have the resources to test, to have matching images on the desktops, to try to understand the risk for their firm.  Down here we rely on the guidance we get from official sources. 

So the gang is now stratching their heads as to how we went from "DEP" works to one where only "Hardware DEP" works.  They are seeing that antivirus and spyware bloggers first brought up the issue that software DEP wasn't working [especially on real world boxes]. 

Getting good info is hard....and unfortunately this event just pointed out how hard.

 

Just a heads up the Security Advisory was updated

 *I have DEP enabled on my system, does this help mitigate the vulnerability?*
Software based DEP does not mitigate the vulnerability. However, Hardware based DEP may work when enabled: please consult with your hardware manufacturer for more information on how to enable this and whether it can provide mitigation.


http://www.microsoft.com/technet/security/advisory/912840.mspx

....so what am I going to do? Nothin' for now because the office is closed and the machines are off so they are as protected as they can be..... ask me next Tuesday and I'll let you know what my risk tolerance is then.... for now... I'm sitting tight....

------------ 

 Shavlik Provides Workaround For Zero-Day WMF Exploit

On December 28^th , Microsoft announced a Security Advisory (912840) for a zero-day exploit that could allow an attacker to execute arbitrary code on a user’s system by hosting a specially crafted Windows Metafile (WMF) image on a malicious Web site. Malicious code on a number of web sites exploited the vulnerability on users’ machines. Microsoft has not issued a patch for this security exploit at this time. Users running a fully patched version of Microsoft Windows are still vulnerable to attack.

For administrators that cannot wait for Microsoft to issue a patch to protect against this vulnerability and need an immediate workaround, Shavlik Technologies has released updated XML files for Shavlik NetChk Protect, its patch and spyware management solution, to help users protect against this attack. Shavlik NetChk Protect allows users to un-register the SHIMGVW.DLL files that enable the malicious code to attack systems on Windows XP and Windows 2003. This is a workaround recommended by the United States Computer Emergency Readiness Team (CERT) as an option for vulnerability protection. Shavlik Technologies cannot validate this as a proper fix. To read more about this vulnerability, visit the CERT web site at _
http://www.kb.cert.org/vuls/id/181038_.

Shavlik Technologies recommends that administrators determine their security needs and implement this workaround only if it offers an acceptable solution to their individual security needs and all risks are understood. By offering this workaround, Shavlik Technologies puts the option for protection in the hands of the administrator. Users should be aware that by un-registering the .dll file, other applications that use this .dll file can break, but this is the only workaround available at this time, as quoted from the advisory.

For Shavlik HFNetChkPro™ users, Shavlik Technologies has developed a workaround to help administrators address this vulnerability. For more information visit Shavlik’s Support Forum at _
http://forum.shavlik.com/viewtopic.php?t=2731_

The Microsoft Security Advisory affects the following operating systems:

         o Windows 2000 SP 4
         o Windows XP
         o Windows Server 2003

More information on the Microsoft Security Advisory can be found on Microsoft’s Web site at: _http://www.microsoft.com/technet/security/advisory/912840.mspx_.

Users are affected by either navigating to web sites that contain a link to a Windows Metafile that exploits this security vulnerability, or opening an email attachment that exploits this security vulnerability.

When Microsoft releases a patch to protect against this vulnerability, Shavlik NetChk Protect will include this patch and will allow users to re-register the .dll file, returning the system to its previous state.

For further information about this zero-day exploit, visit Shavlik’s Security Center at _www.shavlik.com_
<http://www.shavlik.com>.

Oh let's just rip out those dll's shall we?

One of the suggestions I see on many of the Security sites are to unregister certain DLL's to ensure that this WMF vulnerability can't be exploited.  Now maybe it's just me...but unregistering DLLs that break image, thumbnails and what not... and especially if I have to worry about registering those files and sticking them back in seems to me a bit drastic.  To me the saner approach is to ...again...use our Risk Analysis view....

Which machines in my office are most at risk.... uh... honestly?  Mine.  But do give extra protection for all in the office...what's an easy protection mechanism that I can do on my network?

Steps I've already done...block files at the mail gateway ....block image types at the firewall.....

Okay so what else can I do on my machine.... Enable DEP protection for all programsViruslist says that DEP is marginally effective and doesn't work if you have image viewers like Irfanview.  Yo.  Folks.  Irfanview is a known image program in the forensic biz that can view ANYTHING.  I don't define it as the 'viewer of choice for many'.  Geeks maybe.  But my Mom and Dad?  No.

Do I have it on any other machine except for mine?  Nope.  Does it appear that enabling DEP for all programs is effective for mere mortals that have normal software at this time?  Yes.  Can DEP be enabled without major impact?  You bet your bippy.  Working just fine here and so I'm thinking...why the heck am I leaving it at the default?

P.S. Knowing my luck I'll probably find out that bippy means something obscene....

WMF and blocking

As many have pointed out ...the instructions for blocking 'just' the WMF extensions won't protect me if the threat vector comes in via renamed files.... but I think folks are missing the point here.  NPR the other morning had a news report on the communication regarding the potential for a Bird Flu Pandemic.  They discussed how there's a fine line between communication and 'freaking someone out'.  And they said that when a person get communication that helps them act on something so that they feel part of the solution, that person feels calmer. 

I think this occurs in Security communication as well.....that's exactly what's going on here...there's a psychological affect of "me" taking proactive measures to block what I know I can easily do at the border.

"Lanard and Sandman say risk communicators must walk a tightrope. On one side is the risk of promoting irrational fear. On the other side is irrational complacency. The goal is to instill appropriate fear that gets people to take appropriate precautions.

Lanard says accomplishing this means presenting information that is accurate, complete, and often frightening.

"Good information should increase the level of fear in people that haven't been thinking about it at all," she says. "It should decrease the level of fear in people who are over-imagining how bad it could be."

Sandman and Lanard say that in the short run, individuals can do far more than the government to protect themselves.

For example, he says, people can keep extra food in case a pandemic disrupts distribution systems. They can prepare to work from home, in case it becomes hazardous to be in contact with other people. They can learn proper hand washing techniques to keep from spreading the virus.

And Sandman says there's another reason for the government to involve the public in any bird flu preparations.

"Everything that's known about the psychology of fear tells us that people can tolerate more fear if there is something for them to do," he says. "So it's not just inaccurate for the government to imply that the government will take care of it. It's not only getting in the way of the public's beginning to take preparedness more seriously. It's getting in the way of the public's ability to endure the threat of the pandemic itself.""

...see the correlation between Pandemic communication and Security communication here?  So give me something to do...even as stupid as building a block for WMF files and I won't feel as scared.  Give me a role and I feel like I'm helping.  Make me feel dependent on things I can't control and I do freak out.

Communicate with me...give me something to do....and I feel better.

Blocking those WMF's at the email border

Okay so even before I blocked the WMF's via ISA server so that they are blocked while surfing...the first thing I did [because I knew easily how to do this] was to go into my antivirus program that protects my Exchange server and add WMF file extensions to be blocked at the server [in fact why do I need them anyway... I think I'll leave the setting exactly like that from now on]

So on my Trend Exchange a/v it looks like this:

So what if you were insane, stupid, or too cheap to buy a Antivirus that covers your Exchange server?  And boy you have to be all three these days not to get an antivirus suite that does this....but say you were... what else could you EASILY do on your SBS box to block those kinds of files....

If you've never done this before... you rerun the "Connect to Internet Wizard" and rerun the wizard to add file type blocking at the server...remember it looks like this:

Click on "add" to add the WMF file blocking:

And click OK...but what if you already did that and you don't want to rerun the wizard?

No problem... just follow this prior post...but here's a trick I found... Nathan said to right mouse click and click on "edit" but on my newly pristine server... I had no edit and Notepad sucked as an XML editor.  So I brought it over to my workstation where I have Frontpage, right mouse clicked on Edit, opened it in Front Page, clicked on "Reformat XML"

And edited the page in a much more user friendly format

<Attachment Enabled="True" Extension="wmf" Description="WMF Zero Day"/> which looks like this

Remember these are kinda like those backwards group policy settings where "True" is a good thing.... so when we get all done, I saved the file on my workstation and then stuck it back up on the server and it looks like this:

My resulting XML file.... is copied below:

===============================

<?xml version="1.0" encoding="utf-8" ?>

<SecAttsConfig>
    <Enabled>True</Enabled>
    <SaveToFile Enabled="False" Location=""/>
    <UnsafeAttachments>
        <Attachment Enabled="True" Extension="ade" Description="Microsoft Access project extension"/>
        <Attachment Enabled="True" Extension="adp" Description="Microsoft Access project"/>
        <Attachment Enabled="True" Extension="app" Description="FoxPro generated application"/>
        <Attachment Enabled="True" Extension="bas" Description="Microsoft Visual Basic class module"/>
        <Attachment Enabled="True" Extension="bat" Description="Batch file"/>
        <Attachment Enabled="True" Extension="chm" Description="Compiled HTML Help file"/>
        <Attachment Enabled="True" Extension="cmd" Description="Microsoft Windows NT Command script"/>
        <Attachment Enabled="True" Extension="com" Description="Microsoft MS-DOS program"/>
        <Attachment Enabled="True" Extension="cpl" Description="Control Panel extension"/>
        <Attachment Enabled="True" Extension="crt" Description="Security certificate"/>
        <Attachment Enabled="True" Extension="csh" Description="Unix shell script"/>
        <Attachment Enabled="True" Extension="exe" Description="Program"/>
        <Attachment Enabled="True" Extension="fxp" Description="FoxPro file"/>
        <Attachment Enabled="True" Extension="hlp" Description="Help file"/>
        <Attachment Enabled="True" Extension="hta" Description="HTML program"/>
        <Attachment Enabled="True" Extension="inf" Description="Setup Information"/>
        <Attachment Enabled="True" Extension="ins" Description="Internet Naming Service"/>
        <Attachment Enabled="True" Extension="isp" Description="Internet Communication settings"/>
        <Attachment Enabled="True" Extension="js" Description="JScript file"/>
        <Attachment Enabled="True" Extension="jse" Description="Jscript Encoded Script file"/>
        <Attachment Enabled="True" Extension="ksh" Description="Unix shell script"/>
        <Attachment Enabled="True" Extension="lnk" Description="Shortcut"/>
        <Attachment Enabled="True" Extension="mda" Description="Microsoft Access add-in program"/>
        <Attachment Enabled="True" Extension="mdb" Description="Microsoft Access program"/>
        <Attachment Enabled="True" Extension="mde" Description="Microsoft Access MDE database"/>
        <Attachment Enabled="True" Extension="mdt" Description="Microsoft Access add-in data"/>
        <Attachment Enabled="True" Extension="mdw" Description="Microsoft Access workgroup information"/>
        <Attachment Enabled="True" Extension="mdz" Description="Microsoft Access wizard program"/>
        <Attachment Enabled="True" Extension="msc" Description="Microsoft Common Console document"/>
        <Attachment Enabled="True" Extension="msi" Description="Microsoft Windows Installer package"/>
        <Attachment Enabled="True" Extension="msp" Description="Microsoft Windows Installer patch"/>
        <Attachment Enabled="True" Extension="mst" Description="Microsoft Windows Installer transform; Microsoft Visual Test source file"/>
        <Attachment Enabled="True" Extension="ops" Description="FoxPro file"/>
        <Attachment Enabled="True" Extension="pcd" Description="Photo CD image; Microsoft Visual compiled script"/>
        <Attachment Enabled="True" Extension="pif" Description="Shortcut to MS-DOS program"/>
        <Attachment Enabled="True" Extension="prf" Description="Microsoft Outlook profile settings"/>
        <Attachment Enabled="True" Extension="prg" Description="FoxPro program source file"/>
        <Attachment Enabled="True" Extension="reg" Description="Registration entries"/>
        <Attachment Enabled="True" Extension="scf" Description="Windows Explorer command"/>
        <Attachment Enabled="True" Extension="scr" Description="Screen saver"/>
        <Attachment Enabled="True" Extension="sct" Description="Windows Script Component"/>
        <Attachment Enabled="True" Extension="shb" Description="Shell Scrap object"/>
        <Attachment Enabled="True" Extension="shs" Description="Shell Scrap object"/>
        <Attachment Enabled="True" Extension="url" Description="Internet shortcut"/>
        <Attachment Enabled="True" Extension="vb" Description="VBScript file"/>
        <Attachment Enabled="True" Extension="vbe" Description="VBScript Encoded script file"/>
        <Attachment Enabled="True" Extension="vbs" Description="VBScript file"/>
        <Attachment Enabled="True" Extension="wsc" Description="Windows Script Component"/>
        <Attachment Enabled="True" Extension="wsf" Description="Windows Script file"/>
        <Attachment Enabled="True" Extension="wsh" Description="Windows Script Host Settings file"/>
        <Attachment Enabled="True" Extension="xsl" Description="XML file that can contain script"/>
        <Attachment Enabled="True" Extension="wmf" Description="WMF Zero Day"/>
    </UnsafeAttachments>
</SecAttsConfig>

So if you have ISA here are some things you can do

So.... let's see..... we have a Zero Day WMF exploit nailing even fellow MVPs .... websites that nail you with malware so bad you have to flatten and rebuild....that merely visiting the web site..no clicking.... will nail you.... and Trend [and most a/v companies] has the definition for this in there 'beta' def but not their released one....so what's a gal to do?

So I already blocked WMFs in email in the Trend Antivirus

  • I don't want to pull down a beta def file
  • I'm not sure I want to unregister a dll.......shimgvw.dll
  • So how about looking at what my ISA server can do 'eh?

Jesper's Blog : Blocking certain extensions in ISA server:
http://blogs.technet.com/jesper_johansson/archive/2005/12/28/416565.aspx

Very cool huh! And how about we block those wmf's via ISA server.

So we go into the ISA management console..and we access the SBS Internet Access Rule [on mine this is rule 23]

  • Click on Protocols
  • click on Filtering
  • Click on configure http
  • Click on Extensions
  • Choose "Block Specified Extensions and allow all others" and then put the list in you want to block
  • Click "add" and put in wmf.

Click OK, click apply and now when i go to the test page... voila...the image doesn't show up.

Is this cool or what?  Now I feel a lot better since Trend hasn't updated yet.

"A good bug wasted on a malware site"

On the security listserves, there's discussion of a image vulnerablity that uses WMF files to inflect/inject malware... and one of the posters had a line about it that had me laughing ... "a good bug wasted on a malware site".

The discussion of this bug [for which at this time, there is no patch] is discussed on

http://www.f-secure.com/weblog/archives/archive-122005.html#00000752
http://isc.sans.org/diary.php?storyid=972
http://www.heise.de/newsticker/meldung/67794

And as reported by Andreas Marx, some A/V companies are already creating signatures for this.....

AntiVir TR/Dldr.WMF.Small
Dr Web Exploit.MS05-053
F-Secure Exploit.Win32.Agent.r
Fortinet W32/WMF-exploit
Kaspersky Exploit.Win32.Agent.r
McAfee (BETA) Exploit-WMF trojan
Symantec (BETA) Download.Trojan

If you enable DEP to cover all programs the WMF exploit attempt will result in a warning as per www.incidents.org but folks are recommending a blended protection:

  • Using up to date antivirus
  • Enabling DEP
  • Teaching users not to click on suspicious links
  • Blocking wmf files at the border

A temporary 'out the door' policy in ISA 2004

Okay so you wanna do a temporary "anything out the door in ISA 2004"?  Just so you can see if something works, or temporarily allow something out and you'll figure it out later?

No prob....just go to the Firewall Policy in the ISA console and then the SBS Internet access rule and add "All Users" in addition to the "SBS Internet Users" and click okay and then "Apply" at the top.... now anything inside will go outside.....

To undo it just take out all users and you are back to the normal SBS default rule set/setup.

Two follow ups...

ONE - this is TEMPORARY and I'll wack you upside the head with my 2x4 if you leave it permanently...now with the ISA monitoring ...man there is NO NEED for you to leave this like this... as you can tell what is being blocked.....

TWO - Obiwan had a great idea to build another rule set and leave it disabled and just 'enable' it when you needed to rather than messing with [and possibly screwing up] an existing rule.

We're losing the war on the home front

...so we ask around the communities that I hang in and the consensus comes back that while 2005 was a good year for the Admin and business crowd, it was not for the home front.  Just today a client brings in a computer that I needed to post some journal entries to the accounting program and she says "it does some wacko stuff when I go on the Internet" [she's on dial up] and I notice that she's got Xp sp2 waiting down in the system tray to be loaded up.  Knowing that Xp sp2 doesn't like malware on the box 'before' installing it, I attach it to an external access to our dsl and plug in the RJ 45. 

The second it has a tcp/ip connection and I launch IE is when the fun starts.  I first install the MVP hosts file to get it to a state where I can even work with the system as IE freezes up too much without that.  Then I boot into safe mode and use Counterspy, Microsoft Antispyware, Windows Safety live and Trend's Housecall, and each one finds a new little critter that the other one didn't find.

I boot into normal mode and now the popups have stopped and the machine appears ready enough for the Xp sp2 application.... I also notice on this box that had the firm's accounting application on it was AOL's IM program that was pretty obviously used by a teenager and it reminds me of the cardinal rule of mixing "business with pleasure"

Buy a computer for your teenager and have them screw that machine up.

In the home office security checklist...it makes this clear but doesn't stress this enough...

"Don't let children use your business computer without your supervision. Ideally, you should not allow your children to use your home office computer. If your computer needs to serve both your business and family, be sure to supervise your children whenever they use it."

I would say don't let them use it period...buy a new computer....don't let them near the one you use for business or the office.

OOF messages

This time of year, people have a ton of out of office messages and they don't realize how much they 'leak' good social engineering information about their offices [or even a lot of funny information]

This was suggested as one way to combat the OOF messages that end up on listserves:

Microsoft Exchange Server: Suppressing Out-of-Office Generation:
http://www.microsoft.com/exchange/techinfo/tips/mailtip01.asp

The point is that OOF messages are not automatically set up to go outside the domain.  Exchange, by default, does not send them out the domain.

Why are they a security issue?  Because they disclose information that could be used to do Social Engineering in a firm.  Thus ensuring that only those people that NEED the information about out of office should get it.

To be honest with you, with my Audiovox 5600 Cell phone, I'm hardly out of touch to need a "Out of Office Message"

So my Dad has this card for a $1,000 online shopping spree...

And the first clue that this should be suspect is that on the card it says "Visit our website by typing into the address in your browser bar, do not use a seach engine to find the site"  Hmmm...now that's interesting that they say to type in the address and not use a search engine....

Maybe it's because the "word of mouth" out there is that this is a scam?

So what are the clues this is bogus?

  1. The car dealership that Dad got this from isn't a major car dealership but one of the "sub" dealerships
  2. The fact that they wanted us to just go to the site and not use a search engine

When getting these too good to be true offers... remember that they ARE too good to be true.

Patching Webcast for your viewing pleasure

For Chris Rue's Alabama SBS Partner group I did a webcast on Patching/Patch Management with special emphasis on WSUS and SBS.  The recorded session is here: 
View Recording

Recording Details

    Subject:              Patching your network - how to get started
    Recording URL:        https://www.livemeeting.com/cc/winserver_usergroup/view
    Recording ID:         B3H4JQ
    Attendee Key:         N"}P_8b
If you want the slide deck, it's at www.sbslinks.com/WSUS/WSUS.ppt 

Year end review...how was your year in Security?

Microsoft and Computer Security in 2005: Real progress was made by Microsoft and its industry partners in 2005.:
http://www.microsoft.com/presspass/features/2005/dec05/12-21Security2005WrapUp.mspx

Forget that Diet: Microsoft Encourages Consumers to Resolve to be More Secure Online in 2006: Q&A: Amy Roberts of Microsoft’s Security Technology Unit discusses the “Protect Your PC in 2006” resolution and other Microsoft consumer-security efforts.:
http://www.microsoft.com/presspass/features/2005/dec05/12-20Security.mspx

--------------------------

As we close the year... think of your security related issues in 2004 versus 2005

How was your year?

Better?
Worse?
Why?

(and please comment to the blog as I'd love to see your thoughts)

Call me wacko but the sight of this thrills me ....

Windows SharePoint Services components may be deleted after you reinstall the Intranet component of Windows Small Business Server 2003 SP1:
http://support.microsoft.com/default.aspx?scid=kb;en-us;909988

Look at this... it's our first automagically deployed SBS critical patch... isn't that COOL!  Do you realize how long and far we've come from the day I sat across from folks and explained to them how patching was one of the worst things I did on the SBS 2000 box?  Do you realize how far we've come from when I first read about a 99 page white paper from Jeff Middleton who suggested that patching needed to be done monthly?  Do you realize how far we've come from when Jeff explained the qchain process and the dependancies and how it was a mess?

We've come a long long way.....and yes.. that patch is SBS approved [pretty obviously SBS approved since it's specifically for us]

Sometimes it's embarrassing to be an Accountant

Truly there are times that when I'm at geek events I drop the "CPA" credential because second only to Attorneys, my profession has a reputation of being behind on technology.

These days I'm embarrassed as well by the Accounting applications... between ones that won't support patches past a Security patch in 2004, to my favorite poster child of Quickbooks that to this day requires local adminiatrator access, for a profession that prides itself on Accountability and SOX and all that control stuff....we sure don't know how to code up an application worth beans.

So in addition to the information here on how to get Quickbooks to share data on a server, and here, Stefan reports on the smallbizit listserve that to get the program to share out properly, he had to give the Quickbooks service account full control of the directory where the data is residing.  Also he had to exclude the service account from the password policy and set it to 'password never expires'.  Then you had to stop and restart the service.

Okay so I don't know about you but the fact that with a $39.95 password cracker program from www.elcomsoft.com I can hack the passwords of Quickbooks in mere seconds, the fact that they still require local admin rights in the 2006 version, that they won't even address the local admin issue until 2007, doesn't give me all warm fuzzys that that application is sitting on my domain controller.

When is the backbone of business, the accounting application, going to step up to the 'secure coding' initiative here?

Guys, this is embarrassing when it's the accounting applications leading the pack here.

Setting up automatic updates

This blog post started when someone insisted that Windows update 'forced a reboot' on a system, and I argued that it did not.  Sometimes I wish there was a handout with each new computer that would in picture format explain exactly how to secure a system, how to patch, how the process worked...because I think there would be a lot less folks thinking that Microsoft 'forced' things on people.  BTW the entire contect for this post came from inside the help file of a XP SP2 machine

Options for setting up Automatic Updates on your computer

To choose when and how updates will be delivered to your computer, you have four options:

Automatic (recommended)

When you are connected to the Internet, Windows finds and downloads updates in the background—you are not notified or interrupted during this process and the updates do not interfere with other downloads. If you do not change the default schedule, updates that have been downloaded to your computer will be installed at 3 A.M.

If your computer is turned off during a scheduled update, Windows will install the updates the next time you start your computer. If you need to help complete the installation process, Windows will notify you. For example, you might need to accept an End User License Agreement (EULA) before some updates can be installed. If you need to restart your computer for an update to take effect, Windows will notify you and will restart your computer at the scheduled time.

Download updates for me, but let me choose when to install them

To receive alerts, you must be a member of the Administrators group for your computer. When you are connected to the Internet, Windows finds and downloads updates in the background—you are not notified or interrupted during this process and the updates do not interfere with other downloads.

After downloading is complete, the Windows Update icon  appears in the notification area and an alert pops up, letting you know that the updates are ready to be installed. To review and install available updates, click the icon or the alert. You can install all or some of the available updates.

Notify me but don't automatically download or install updates

To manually download and install updates, you must be a member of the Administrators group for your computer. Windows checks for important updates and notifies you if any are available; updates are not delivered or installed on your computer until you choose to do so. When Windows finds updates for your computer, the Windows Update icon  appears in the notification area and an alert pops up, letting you know that updates are ready to be downloaded. After you click the icon or the alert, you can select some or all of the updates to download.

Windows downloads the updates in the background—you are not notified or interrupted during this process and the updates do not interfere with other downloads. When downloading is complete, the Windows Update icon appears in the notification area again, this time to let you know that the updates are ready to be installed. You can choose to install all or some of the available updates.

Turn off Automatic Updates

You will never be notified when important updates are available for your computer, and you will never be asked to download or install them. This means that your computer can be vulnerable to security threats and harmful viruses that can damage your computer or your files. Viruses can also spread over the Internet to other people with whom you exchange e-mail, share files, or work with on a network.

New viruses and security threats are continually developed by attackers, so helping protect your computer is an ongoing process. If you do not turn on Automatic Updates, we recommend that you regularly install updates from the Windows Update Web site (http://www.microsoft.com/).

 Notes

  • To open System, click Start, click Control Panel, click Performance and Maintenance, and then click System.
  • Installing updates before you shut down your computer is another way to keep your computer up to date and more secure. This option is available only in Microsoft Windows XP with Service Pack 2 (SP2), Microsoft Windows Server 2003 with Service Pack 1 (SP1), or an x64-based version of a Windows Server 2003 or Windows XP operating system and only if important updates have been downloaded but not yet installed. Do not turn off or unplug your computer while updates are installing. Windows will automatically turn off your computer after the updates are installed.
  • Only users with administrator privileges may add or remove programs, including Windows updates. It is strongly recommended that you log out of the computer administrator account when you are not performing tasks that require administrator privileges. If you are logged on as an administrator when your computer is the target of a virus or malicious user, the attack can cause extensive damage. For example, it might be able to reformat your hard drive, delete all your files, or create a new administrator account so the attacker can take over your computer. For more information about user accounts and why you should not run your computer as an administrator, see Help and Support.

So what's the best Antivirus?

I get asked this alot... what's the best antivirus for SBS 2003... and to be brutally honest... I'm not sure I know anymore.

You know the other day Vlad made a comment that the Microsoft Blogs being "filtered" and he says that I'm brutally honest..but you know what...there are times that even I hold back until I find out all the facts.  "Power brings with it great responsibility" and the SBS Podcast gang understand that.  So I totally respect that they are not ranty and fly off the handle and do what I do sometimes...just like today... this post is hard for me to do, because I know I have to be brutally honest.

If you would have asked me a month ago what I thought the best antivirus for SBS 2003 was I'd probably way less neutral than I am today.  From the 'chatter' on the newsgroups, the spam filtering on the version 3 of Trend's CSM suite, it's just not comparable to the version 2.  That combined with the fact that you have to watch the compression issue on the default web site and that some folks are ending up with Trend's firewall on the workstations [which shuts down traffic] and well... if you are looking to deploy version 3 on an existing 2.0 client... you might not want to do that...... you might want to hold off.... and if you are deploying a new client, you might want to ensure that you get a code that works on the version 2.0 and deploy that one.  Folks are having to install the Exchange IMF along side the version 3.0.  The issue is how Trend has place the handling of spam squarely in the hands of the end user in the version 3.0.  The problem is for some firms like mine... we want it centrally managed.  My boss doesn't want to handle the spam, he wants me to.  And while spam isn't exactly virus related...in his mind it is.

So... after hearing Hilton talk about this... and seeing stuff on the web... I think it's time I download some trials and take a look around.  I know that Eriq and Marina love Sophos, and Handy Andy loves Symantec [not the yellow box but the corporate version] ......

so..what's the best antivirus for SBS 2003?  I'll let you know... as I'm not sure....

The UI grab

...so if you've downloaded the patches and not rebooted the computer annoyingly about every 5 minutes or so reminds you that you haven't rebooted....

But here's the problem... on the XP annoying reminder... you can't see that there are two letters that will make the system thing you have said "yes, go head and reboot"

But you CAN see them on the Server version of the same.

See that "N" and "L"?  So if you are typing away and the Annoying 'Restart now" grabs the focus of the computer on you...and you just happen to type an "N"...guess what... there goes your system with anything you had open and running at that time and it's rebooting whether you like it or not.  Now on my laptop, if a patch has come down, I've opted on shutdown to choose the "don't install" but on shutdown there is a "install on shutdown" when the system has been set to detect patches.

I don't think all these choices are made clear enough, because so many people think that these options are force on them...and they aren't... they just don't understand what they are 'opting' into, that's all.

Well I'm patching the server in my jammies today

I had patched all my workstations earlier this week [remember ... I put Internet Explorer on high priority on the workstations, low priority on the servers] and this time I did it via Microsoft update versus my normal Shavlik just to point out a few things as a follow up to the Patching Podcast

First off... remember I said I always do the "High Priority" updates... this month the server needs the IE update and the fixer for the update mechanism.  I also do the monthly software removal tool.  Did you see the article that more of the malware found by that cleaner tool is rootkit based stuff these days?

I sometimes might do the optional... since I have no apps at this time that need .Net Framework 2 or Smart Card... there is no need at this time to add those.  I never ever do a driver from Microsoft update, but I do use it as an indicator that I need to go to the HP website and find a new one.....

Uh..note to self... go to HP and look for update NIC driver...

And the thing that I never do is the following setting:

See that "Automatic and install them automatically [and thus force a reboot]?  I never do that.  Now Chad and others, do select the "Download updates for me, but let me choose" which ends up with an icon in the system tray that looks like this:

So then, when you are ready you can click on the button and install the patches, but just be ready to reboot as the system will remind you that you are not fully patched unless you reboot for certain patches.  Rebooting isn't mandatory for all patches, but this month, to be protected you need to reboot.

Embracing our Spots.

You see that down there?  Windows Small Business Server in the Microsoft Update category?  Do you have any idea how cool that is to see that down there...ready to go... ready for any patches that are unique to SBS.

You know sometimes I think we SBSers argue so hard [too hard] that we are just like our big brother servers.  And you know what.... we're not.  And that's okay.  We have unique stuff just to us and they don't.

So make sure you flip youself over to Microsoft Update by going to Windows update and on the right hand side clicking on the button to switch to Microsoft Update and get all tingly when you see that "Windows Small Business Server" category.

What's on your To Do List?

What's on your client's ToDo lists next year?

  1. Disaster recovery/business continuity
  2. Employee awareness programs
  3. Data backup
  4. Overall information security strategy
  5. Network firewalls
  6. Centralized security information management system
  7. Periodic security audits
  8. Monitoring employees
  9. Monitoring security reports (log files, vulnerability reports and so on)
  10. Spending on intellectual property protection

According to this, This list further reinforces the reactive nature of information security. Awareness programs often score high as a strategic priority because they’re relatively low-cost.  One should expect number 10 on this list will shoot up in priority next year, given the steady stream of identity thefts and other major information crimes.

Now this is a bit "big server land", but i think even us SBSland folks can take a page out of this. This has been a year of disasters.... we started out the beginning of the year with the tsumani of last Christmas, we're ending the year with the Hurricanes that hit the USA. 

Think SBSized... but how are your clients on that list?

Is McAfee [and other preloaded software] a virus?

So it's that time of the year that we look around and ensure our systems are up to date before busy season and get new computers if needed.  So I go and I buy the Dell Optiplex line, this time making sure that I bought the extra PS2 port option which isn't really 'extra' per se at all as it doesn't come standard with the box.

So I boot up, get it up to a workstation mode [before joining the domain] and there's my first lovely Red Mcafee window that hits me in the face.... well...says I.... let's get rid of that since I have the firm antivirus.....and I realize that there's no "x" in the corner to shut down this annoying configuration wizard.  You have to go through about four screens before you can finally get to a place to cancel.  Then to rip it off the box, you have to remove about three McAfee programs that are on the system....and I don't want McAfee in the first place!

The major insult to injury is the fact that in being installed on the Optiplex, it has with it's McAfee Security Center, taken over the duties of the XP sp2 Security Center.  Even though the a/v is out of date, there is no little red icon of Windows down in the system tray telling me "I'm screwed", instead there's the 'normal' McAfee red icon that tells me nothing.  So I uninstall that... reboot the machine...and the XP sp2 security center does not restart... I ended up having to restart the box 'again' to get the Red shield down there like I wanted it to be, being the indicator of the patches and the antivirus.  I still don't have my fully functioning antivirus that I want... and everyone that I tell this rant to said "oh just flatten the box, those preinstalled things are like a virus".  But how's the Mom and Pop non geek person going to handle this?  They don't need a McAfee security center... how are they going to follow Microsoft guidance for how Microsoft update and patching works when there's no shield in the corner?  No icon? 

Mr. Dell?  I bought this computer.. I didn't give you the right to shove the antivirus that you made a corporate deal with down my throat.  It's getting to the point that I'd pay more for a plain computer, because quite frankly I've had enough of this.

 

Dear Susan Bradley, we are writing to inform you....

We are writing to inform you that on December _ of 2005, we discovered a security breach of our electronic records.  We quickly investigated the incident and determined that in November of 2005, a hacker penetrated our perimeter defenses and obtained unauthorized access to one of our servers, which contained our database of customer records.  That database contained the credit card numbers.......

uh oh.....oh yeah.... one SB1386 notification that I personally got today from a software vendor that.... well... lemme just say that I would be totally freaking if I were in their shoes right now.

Here's what they are doing...they contacted the U.S. Secret Service and is fully investigating the incident.  In the mean time, they deleted all of the credit card data from that database.  The recommended that I call the three major credit bureaus and put a 90 day fraud alert on my account and review the accounts for any unusual transactions, and request a free credit report.  They recommend that I keep a close eye on my accounts for the next several months and report any suspicious activity to the banks.  If I think my ID is being improperly used in any manner, that I should call the Federal Trade Commission at 1-877-IDTHEFT [877-438-4338].

 

Equifax

P.O. Box 740241

Altanta, GA  30374-0241

www.equifax.com

To request a credit report call 1-800-685-1111

To report fraud call 1-800-525-6285

 

Experian

P.O. Box 2002

Allen, TX 75013

www.experian.com

To request a credit report call, 1-888-EXPERIAN (397-3742)

To report fraud call the same number.

 

Trans Union

P.O. Box 1000

Chester, PA  19022

www.transunion.com

To request a credit report call 1-800-888-4213

You know...sending out a letter to your clients with this kind of information during the holiday season just might be a nice proactive feature to do.  There's a lot of potential for fraud these days. 

Bottom line folks... this isn't a trivial matter and while I know nothing about the underlying nature of the breach, it gets back to the threads of doing all you can to be proactive on security.  I'm not saying that this kind of event is at all likely to happen to a Small Business like it did this much larger one, but folks... if your small business clients are still running things like Windows 98 and Windows NT and they have confidential client data that includes potential identity theft data?  Boy I'd be sitting them down and getting them on XP sp2 and SBS 2003 as fast as I could.

Good Enough Security

The blog post is here.

The article is here.

Okay read both? 

The other day in a listserve someone asked about Tools to check the security of a server and he asked if MBSA was good enough....and I said....

Define your role and your boundaries.  If your job is to just look at the security of that server operating system and nothing else then yeah, MBSA would be a good start.
If it's the security of your network, I would argue it's not enough.

All MBSA will tell you is the status of patches and passwords and a few other 'baseline' security things.  In my little SBSland...here's what it doesn't tell me about the security of my servers.

It doesn't tell me if those servers are running Sun Java and need a JRE update [I don't run Sun Java on them for that reason...but in case I had it on my servers it doesn't tell me that]

It doesn't tell me about the patch status of the applications on my box.

It doesn't tell me if I was running Veritas Backup exec that there's a vuln in that.

It doesn't tell me that my AV is either up to date, working as it should, has a vulnerability, etc etc...

It doesn't tell me if someone has compromised my system, has cracked the admin password and is now relaying out spam email out my server.

It doesn't tell me if malware has infested my server and I'm now got a back door or root kit that has me owned by some former drug syndicate that is now making more money on malware than it did on drugs.

It doesn't tell me if my Secretary has downloaded something from NakedDancingPigs.com because on average 80 to 90% of my systems are running as local admin and has introduced a trojan into my system.

It doesn't tell me that the sales guy that has the Windows Mobile Audiovox 5600 cell phone just left it behind in the Burger King at the airport and it has on it a domain username and password.

It doesn't tell me that someone used a Kinkos kiosk computer to log in remotely to my network and a keylogger just grabbed a username and password.

It doesn't tell me how many of my staff are VPNing in over unsecured lines, with malware and virus infected machines ready to pounce on my servers.

You know what I think keeps me secure?
Paranoia.

Not tools, but paranoia.

http://www.protectyourwindowsnetwork.com/  is an excellent resource and book I think for kicking up that paranoia.

BTW two security bulletins out yesterday including one for that IE zero day and MBSA will indeed tell you which machines need that.

Number one on 'how to get your network hacked' as per Dr. Jesper Johansson and Steve Riley, NFC, is "don't patch".

Bottom line security isn't about absolutes... it's about balancing risk, isn't it?

Trend needed hotfix to send Perf reports out after V3

Wayne in the newsgroup reports that .....

FYI..There is a patch for Trend Micro V3 which corrects issues with SBS2003 Reports and other not being sent to external domains.

For more information read the thread Trend Micro V3 Issues 12/04/05

 

For  others who may have this issue you need; Client Server Messaging Security 3.0 - Messaging Security Agent Hot Fix - Build 1157

The zip file is; Smex_7.2_11571.zip

 

Which includes; csm_30_smex_72_win_en_hfb1157.exe

 

Which fixes:

"This hot fix corrects an issue that some MIME formats could cause    Message Module(TMMSG) to convert the original SMTP message into a wrong format. Converting the SMTP message into the wrong format  might cause Outlook Express to time out when retrieving email messages using the POP3 protocol."

 

Applies to SMTP too. Once the hotfix was applied SBS2003 Performance reports go straight out and Meeting Requests arrive intact.

 

Wayne

 

Okay I gotta rant... come on Trend "Request the smex70_win_en_hfb1157.exe file from TREND MICRO Technical Support.

Premium Support Program (PSP) clients can contact their Technical Account Manager (TAM) directly

No, Trend, you put a patch like that in a place that those of us who live in a 24/7 world work and live in can get to it.

 

[btw that wasn't Wayne ranting...that was me, Susan as usual!]

 

Issue with SUS Servers

This Alert is to make you aware of the release of Microsoft Knowledge Base Article 912307, Synchronizing SUS 1.0 SP1 Servers with Windows Update after December 12, 2005 may cause previously approved updates to be unapproved.

 

Microsoft is aware of an issue affecting Software Update Services 1.0 users where all previously approved updates, including security updates, have had the approvals removed and replaced with a status of 'updated'.

 

Microsoft is currently investigating the issue and has found that Windows Server Update Services users are not affected.

 

Microsoft has published a knowledge base article providing workaround information for customers who may be impacted by this issue. 

 

Microsoft will continue to investigate this issue to help ensure SUS administrators can deploy Windows updates properly. 

 

More information can be found at:

 

http://support.microsoft.com/?kbid=912307

WSUS IMF patch expiration

If you saw that ...and wonder what it was and what happened to it, this is that IMF patch that the SBS podcast gang were talking about that was the bogus patch.  Just mark it off and continue your patching.

Speaking of IMF...they will be having their deep dive on IMF next Monday!

Info on Trend CSM 3.0 suite upgrade

Need some resources for Trend's new 3.0 suite?

Check out this link!

So far the biggest issues I've seen is that it doesn't like compression turned on the web site [which WSUS has turned on] and that the firewall is supposed to not be turned on the workstations via deployment but sometimes gets enabled.

 

Have you WSUS's sych'd today?

Courtesy of Tom Alverson on the WSUS listserve via www.patchmanagement.org

New Update Alert

The following 26 new updates have been synchronized since Tuesday, December 13, 2005.

Critical and Security Updates

Update for Windows Server 2003 (KB910437)
Install this update to prevent or resolve an issue in which Windows Update and Automatic Updates can no longer download updates after an Access Violation error occurs when using the Automatic Updates service. After you install this item, you may have to restart your computer.
 
Update for Windows Server 2003 for Itanium-based Systems (KB910437)
Install this update to prevent or resolve an issue in which Windows Update and Automatic Updates can no longer download updates after an Access Violation error occurs when using the Automatic Updates service. After you install this item, you may have to restart your computer.
 
Update for Windows XP x64 Edition (KB910437)
Install this update to prevent or resolve an issue in which Windows Update and Automatic Updates can no longer download updates after an Access Violation error occurs when using the Automatic Updates service. After you install this item, you may have to restart your computer.
 
Update for Windows XP (KB835409)
Install this update on Windows XP Service Pack 1 systems to resolve an issue where System Restore may not work correctly or certain services may not function properly after using System Restore on SP1. After you install this item, you may have to restart your computer.
 
Security Update for Windows 2000 (KB908523)
Severity: Important
A security issue has been identified in Microsoft Windows based systems that could allow an attacker who successfully exploited this vulnerability to take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After you install this item, you may have to restart your computer.
 
Update for Windows XP (KB910437)
Install this update to prevent or resolve an issue in which Windows Update and Automatic Updates can no longer download updates after an Access Violation error occurs when using the Automatic Updates service. After you install this item, you may have to restart your computer.
 
Security Update for Windows Server 2003 (KB904706)
Severity: Critical
A security issue has been identified that could allow an attacker to remotely compromise your Windows-based system using DirectShow and gain control over it. You can help protect your computer by installing this update from Microsoft. After you install this item, you may have to restart your computer.
 
Security Update for Windows 2000 (KB904706)
Severity: Critical
A security issue has been identified that could allow an attacker to remotely compromise your Windows-based system using DirectShow and gain control over it. You can help protect your computer by installing this update from Microsoft. After you install this item, you may have to restart your computer.
 
Security Update for Windows XP (KB904706)
Severity: Critical
A security issue has been identified that could allow an attacker to remotely compromise your Windows-based system using DirectShow and gain control over it. You can help protect your computer by installing this update from Microsoft. After you install this item, you may have to restart your computer.
 
Update for Windows Server 2003 x64 Edition (KB910437)
Install this update to resolve the issue in which Windows Update Automatic Updates can no longer download updates after an Access Violation error occurs. After you install this item, you may have to restart your computer.
 
Cumulative Security Update for Internet Explorer 5.01 Service Pack 4 (KB905915)
Severity: Critical
Security issues have been identified that could allow an attacker to compromise a computer running Microsoft Internet Explorer and gain control over it. You can help protect your computer by installing this update from Microsoft. After you install this item, you may have to restart your computer.
 
Cumulative Security Update for Internet Explorer 6 Service Pack 1 (KB905915)
Severity: Critical
Security issues have been identified that could allow an attacker to compromise a computer running Microsoft Internet Explorer and gain control over it. You can help protect your computer by installing this update from Microsoft. After you install this item, you may have to restart your computer.
 
Cumulative Security Update for Internet Explorer for Windows Server 2003 (KB905915)
Severity: Moderate
Security issues have been identified that could allow an attacker to compromise a computer running Microsoft Internet Explorer and gain control over it. You can help protect your computer by installing this update from Microsoft. After you install this item, you may have to restart your computer.
 
Cumulative Security Update for Internet Explorer for Windows Server 2003 for Itanium-based Systems (KB905915)
Severity: Moderate
Security issues have been identified that could allow an attacker to compromise a computer running Microsoft Internet Explorer and gain control over it. You can help protect your computer by installing this update from Microsoft. After you install this item, you may have to restart your computer.
 
Cumulative Security Update for Internet Explorer for Windows Server 2003 x64 Edition (KB905915)
Severity: Moderate
Security issues have been identified that could allow an attacker to compromise a computer running Microsoft Internet Explorer and gain control over it. You can help protect your computer by installing this update from Microsoft. After you install this item, you may have to restart your computer.
 
Cumulative Security Update for Internet Explorer for Windows XP (KB905915)
Severity: Critical
Security issues have been identified that could allow an attacker to compromise a computer running Microsoft Internet Explorer and gain control over it. You can help protect your computer by installing this update from Microsoft. After you install this item, you may have to restart your computer.
 
Cumulative Security Update for Internet Explorer for Windows XP x64 Edition (KB905915)
Severity: Moderate
Security issues have been identified that could allow an attacker to compromise a computer running Microsoft Internet Explorer and gain control over it. You can help protect your computer by installing this update from Microsoft. After you install this item, you may have to restart your computer.
 

Non-critical and non-security Updates

Update for Windows Server 2003 (KB908521)
Severity: Unspecified
Install this update to resolve various issues that can occur when you use remote procedure call (RPC) for client/server communication in Microsoft Windows Server 2003 and Microsoft Windows XP. After you install this item, you may have to restart your computer.
 
Update for Windows Server 2003 for Itanium-based Systems (KB908521)
Severity: Unspecified
Install this update to resolve various issues that can occur when you use remote procedure call (RPC) for client/server communication in Microsoft Windows Server 2003 and Microsoft Windows XP. After you install this item, you may have to restart your computer.
 
Update for Windows Server 2003 x64 Edition (KB908521)
Severity: Unspecified
Install this update to resolve various issues that can occur when you use remote procedure call (RPC) for client/server communication in Microsoft Windows Server 2003 and Microsoft Windows XP. After you install this item, you may have to restart your computer.
 
Update for Windows XP (KB908521)
Severity: Unspecified
Install this update to resolve various issues that can occur when you use remote procedure call (RPC) for client/server communication in Microsoft Windows Server 2003 and Microsoft Windows XP. After you install this item, you may have to restart your computer.
 
Microsoft .NET Framework 2.0: ia64 (KB829019)
Severity: Unspecified
The .NET Framework version 2.0 improves scalability and performance with improved caching, application deployment and updating with ClickOnce, and support for the broadest array of browsers and devices with ASP.NET 2.0 controls and services. After you install this update, you may have to restart your computer.
 
Microsoft .NET Framework 2.0: x64 (KB829019)
Severity: Unspecified
The .NET Framework version 2.0 improves scalability and performance with improved caching, application deployment and updating with ClickOnce, and support for the broadest array of browsers and devices with ASP.NET 2.0 controls and services. After you install this update, you may have to restart your computer.
 
Microsoft .NET Framework 2.0: x86 (KB829019)
Severity: Unspecified
The .NET Framework version 2.0 improves scalability and performance with improved caching, application deployment and updating with ClickOnce, and support for the broadest array of browsers and devices with ASP.NET 2.0 controls and services. After you install this update, you may have to restart your computer.
 
Update for Windows XP x64 Edition (KB908521)
Severity: Unspecified
Install this update to resolve various issues that can occur when you use remote procedure call (RPC) for client/server communication in Microsoft Windows Server 2003 and Microsoft Windows XP. After you install this item, you may have to restart your computer.
 
Windows Malicious Software Removal Tool - December 2005 (KB890830)
Severity: Unspecified
After the download, this tool runs once to check your computer for infection by specific, prevalent malicious software (including Blaster, Sasser, and Mydoom) and helps to remove any infection found. If an infection is found, the tool will display a status report the next time you start your computer. A new version of the tool will be offered every month. If you want to manually run the tool on your computer, you can download a copy from the Microsoft Download Center or run an online version from microsoft.com. This tool is not a replacement for an anti-virus product. To help protect your computer, you should use an anti-virus product.
 

New Updates Today

MS05-054: Cumulative Security Update for Internet Explorer (905915) Rated: CRITICAL
http://www.microsoft.com/technet/security/Bulletin/MS05-054.mspx

MS05-055: Vulnerabilities in Windows Kernel Could Allow Elevation of
Privilege (908523) Rated: IMPORTANT
http://www.microsoft.com/technet/security/Bulletin/MS05-055.mspx

Other non security patches released today:

Update for Windows XP (KB910437) Install this update to prevent or resolve an issue in which Windows Update and Automatic Updates can no longer download updates after an Access Violation error occurs when using the Automatic Updates service.

Update for Windows Server 2003 (KB910437) Install this update to prevent or resolve an issue in which Windows Update and Automatic Updates can no longer download updates after an Access Violation error occurs when using the Automatic Updates service.

Update for Windows XP (KB908521) Install this update to resolve various issues that can occur when you use remote procedure call (RPC) for client/server communication in Microsoft Windows Server 2003 and Microsoft Windows XP.

Update for Windows Server 2003 (KB908521) Install this update to resolve various issues that can occur when you use remote procedure call (RPC) for client/server communication in Microsoft Windows Server 2003 and Microsoft Windows XP.

Update for Windows Server 2003 (KB896427) Install this update to resolve an issue in which you cannot view the contents of a subfolder on a network share. This issue becomes apparent after you install Microsoft Security Bulletin MS05-011: Security Update for Windows Server 2003 (KB885250).

Update for Windows XP (KB835409) Install this update on Windows XP Service Pack 1 systems to resolve an issue where System Restore may not work correctly or certain services may not function properly after using System Restore on SP1.

Updated Malicious Software Removal Tool
http://support.microsoft.com/?id=890830

Sam the SBS Server is very upset today

I was going to interview Sam the SBS server for this ...but right now he's yelling and is so upset I can't calm him down enough for the Interview.  He's very upset that a year after he was deeply embarrassed by what he did that it happened again.  That people still have the original code on their systems and have not patched.

Server bug cripples Dublin law firms | The Register:
http://www.theregister.co.uk/2005/12/10/server_bug_cripples_dublin_law_firms/

He said that when this first happen it was Microsoft's fault.... now this is yours.

We now have this patch on the Microsoft update site.

You now have no excuse whatsoever to not have this patch on SBS 2003 boxes.  All you have to do is flip that server from Windows Update to Micrsoft update...which ... if you've ever WU'd that box it now recommend that you do so.

If these servers were installed by an IT Pro?  This is your job.  Both Sam and I cannot understand how the IT pros of the world not at LEAST know about Microsoft update, not trying to be learning WSUS, not be proactively helping your client to patch.  Want to know one of the ten ways to get your server hacked as per Johansson and Riley's book “Protecting your Windows Network“?

Don't patch it.

If this is a DIY setup, okay I'll cut you a little slack ...but even still... you don't even have to install WSUS... all you have to do is visit Microsoft Update as those SBS patches are now offered up.  I cannot believe that just as we reach the milestone of patches now being offered up on our boxes, that someone cannot find their way to Microsoft update... I cannot believe that they went this long without updating...that's RTM code of October of 2003 that hasn't been updated.

Let's review class of exactly how easy it is to visit Microsoft update.... start, click on Windows Update.

There?

Now on the right hand side, see that Microsoft Update box?  Click there and go through the process of installing it.  Download what it tells you to.

Heck, turn on autoupdates, because I'd rather you have unmanaged patches being installed on your box than none at all.

I'm sorry but I'm in a mood.... if you buy a computer READ THE INSTRUCTIONS.  It's our duty these days to patch.  It's our responsibility to learn the power of the technology we have.

Learn to patch.

Go to Microsoft Update.

Sam the SBS Server was ashamed of what he did the last time... today he's ashamed of us.   That we can't take the time to understand enough on how to keep him running.

If you don't have Microsoft Update 'flipped' to being the update mechanism on the server[s] you have and control, do it today. Make Sam the SBS Server proud of you and not embarrassed that you couldn't even keep him up to date.

Whoo hooo another SBS Support Podcast

The Official SBS Support Blog : Inside SBS Episode #12 - The ISA Server Meltdown:
http://blogs.technet.com/sbs/archive/2005/12/09/415881.aspx

The SBS gang have another podcast just in time for the weekend!

I need more granularity in my audit logs

Eric Fitzgerald is going to hate me.  I want more details.  More granularity.  I want more codes in my audit logs.  Why?

Because in order to figure out who is accidentially sliding files and folders underneath another one I have to track a couple of audit entries and I think the tracking of access needs to be way more granular than it is.

I had to set up auditing of Object Access and then enable the auditing of the folder for delete and write in order to track when a folder was accidentially being slid.  The events that show up in the audit logs indicate an access of “synchronize“. 

I don't think the number of audit codes are enough.  And I think kicking up the auditing is getting more and more important.  The Wall Street Journal has an article on how compliance is pushing a tech industry.

Bottom line.... I want more detail and more default auditing turned on, and I want to filter out for those events I don't need to audit. 

Does my filtering software have to be part of the native OS?  Not really.  Given my issues and needs and given this is now a “business issue“ this is where I go “okay I need to purchase a solution“, so I'm looking at GFI's SELMonitor.  But should the operating system natively be able to turn on more granualarity... I think so.  I think we're going to need a lot more codes than what are now available...but that's just my thoughts....


Event Type:    Success Audit
Event Source:    Security
Event Category:    Object Access
Event ID:    560

    Object Name:    F:\client data\Susan Bradley\Client
  
    Accesses:    DELETE
           SYNCHRONIZE
           ReadAttributes
              Privileges:    -
    Restricted Sid Count:    0
    Access Mask:    0x110080


For more information, see Help and Support Center at
http://go.microsoft.com/fwlink/events.asp.



---------------------------------------------------
Event Type:    Success Audit
Event Source:    Security
Event Category:    Object Access
Event ID:    560

    Object Name:    F:\client data\Susan Bradley\Test
       Accesses:    SYNCHRONIZE
           AppendData (or AddSubdirectory or CreatePipeInstance)
              Privileges:    -
    Restricted Sid Count:    0
    Access Mask:    0x100004


For more information, see Help and Support Center at
http://go.microsoft.com/fwlink/events.asp.

Write them down

You've seen it haven't you?  Documentation that says how to select a password and many times is says “Oh, heavens, don't write it down!“

My sister refuses to write down the password to her online banking accoount.   So what happens?  She forgets it and she has to reset it which normally means a long hold time on a lovely help phone line as by this time she's locked the account out.  Afterwards when we argue that she should write it down I remind her that every time we have this argument about her not writing down the password is each time she has to call and reset it because she can't remember it.

Have you read the article about writing down your passwords?

Writing down a password means I pick a better one.  Writing it down would mean I wouldn't argue with my sister each times she does online banking.  Writing it down is not the end of the world.

Setting passwords and password policies are, I think, one of the hardest things to do.  Why?  Because look at what happens with me and my sister.  I end up arguing with a person who is a very educated and talented person because she'd bought into the “don't write it down“ line.

It's okay to write down your passwords...just protect where they get written down to.

ISA Server Best Practices Analyzer

The result of the Firewall Dashboard

So yesterday I found out via the Scorpion Software Firewall “in your face” Dashboard that my router had been pinging me to death.  So I “un RIP'd“ my hardware firewall on the outside about 9 p.m last night.

So what does my 'attack' radar look like today showing yesterday's attacks? 

It looks like someone ate a piece of Mince or Pumpkin pie is what it looks like.  Look at the reduction in pings.

And so far none of the annoying notifications that I was getting before.... ISA Server name: DOMAIN  -- ISA Server detected a port scan attack from Internet Protocol (IP) address 69.225.175.113. A well-known port is any port in the range of 1-2048. ..... that I would get... so we'll see if that fixes that issue.

The SANS “Application Security Hall of Shame” first inductee is Quickbooks

The SANS “Application Security Hall of Shame” first inductee is Quickbooks

In response to Newsbites' recognition, Brad Smith, senior vice president of QuickBooks, confirmed on December 2, 2005 that this problem will be fixed in the next major release (QuickBooks 2007), scheduled for delivery within 12 months.

And in one of my CPA lists, a poster asked “so we have to risk our machines because some of our clients are running 2006?  2007 is a long way off”.  To which I responded that we are risking our machines NOW.  Can you install software on your system now?  If so you are already running as an administrator and that means that malware can easily get in now too.

More info can be found on www.threatcode.com [and yes I need to add more to the nomination list and update the QB as non admin section]  You can see that more and more folks are saying that they don't want to hack up registries anymore.

Where I live and work

Where I live and work used to be a lot friendlier.  I could leave my defenses down.  I could leave my doors and windows open.  I could be open and friendly with everyone.  I could share out everything with all my neighbors.

But then 'they' moved in.  Criminals moved into where I live and work and now make more money off of my neighborhood than when they sold drugs.  I can't live and work the way I used to.  I now have to put locks and protection in place.  I can't be the trusting person I used to be. I must be more protective and proactive to secure where I live and work.

Think I'm taking about the house that I live or the office where I work?

I'm not.

I'm talking about the computer I use.  Criminals now make more money from cybercrime than drug crime.  So why in the world are folks still running an operating system who's threat level was build back when we trusted everyone, considered everyone our friend and had no paranoia.

This month's Redmond Magazine has an article about Anti-Spyware and one of the top five gripes is.....

Dearth of Support: Windows AntiSpyware runs on XP and 2000 machines. Users say they would like to see it run on Windows 98 machines as well.

Windows 98?  Folks... back in July of 1998 the AICPA journal ran an article about whether it was time to upgrade to NT from Windows 95.  Given that this is now 2005, almost 2006, I think the time has come folks. 

If where you live and work is a Windows 98, it's not safe enough or secure enough.  It's dragging down your neighborhood if you have it in your network.

Be a good cybercitizen and do your part.

 

Two security patches next week

Microsoft Security Bulletin Advance Notification:
http://www.microsoft.com/technet/security/bulletin/advance.mspx

Two patches next week and three non security updates on Microsoft update/WSUS next week.

Remember .... Second Tuesday of the month .... it's patch Tuesday.

So you want to know two ways you can check for issues with patches?  The first is right inside the article itself in the 'caveats' section.  Click there and there's the known issues.  The second is the "community method".  Go to www.google.com and then Google Groups and put in the KB article number and do a search.

Now you'll sometimes have to weed a bit through some postings, but if there's a trend of 'dead bodies' where folks are having issues, it should show up via that search of Usenet.

My ISA Server just got a smidge better [okay a lot better]

So I ran a test install of the Scorpion Firewall Dashboard on a VMware SBS 2003 [yes with ISA as you can do two nics] at home and the install was so nice and clean and easy and just sooooo cool...and well while the reports were fun.... well.. being a vmware stuck behind a real SBS box and a firewall meant that ...well, quite frankly the logs kinda boring ...that I wanted to see was it was like on a more 'production' system.

Now keep in mind that at the office ISA is 'behind“ a hardware firewall... but it's one that quite honestly I don't patch that one as well as I do the ISA server one.

So imagine my surprise when the graph that came up indicates that the hardware router I have on the outside is pinging my poor SBS box to smithereens.  Dana says it looks like every 30 to 45 seconds a RIP request is being fired to the SBS box.  He said that there should be a setting in the router to not do dynamic routing on the internal interface.  That should stop all that icky traffic like that.

Did I know that was doing that?  Nope.  Once again proving the power of “in your face“ email reports.

Suddenly I get this overwhelming urge to go stand up ISA servers all over the place to get more data.  This is cool.  If you haven't checked it out.. do it... and while it works on other firewalls... you know me I'm kinda partial to ISA server.

Sign up for the beta...and get more 'in your face' reporting from your firewall.

P.S.  I'm now RIP-less... I'll let you know what the updated firewall email looks like.

Paranoia for Laptops - it's already here

Abhi asks...when will we get the same level of support for a remote wipe of stolen or lost laptops....Abhi?  We already have the tools, we're just not using stuff already in the marketplace or stuff under our noses.  Steve Riley did an article on security of laptops and I already bought a service that monitors traveling laptops.

You know what?  We have these products now and sometimes we ask Microsoft for too much.  Let them do the core technology, but do we have to ask them to do everything including the kitchen sink around here?  I mean there already is technologies and services that do this?  Why are we needing more than the marketplace has already has in place.

So you want remote wipe?  We've got that.

You want security of data?  It's called EFS or PGP Drive.

Bottom line, it's already there.

 

 

Can I delete KB###### files?

You've seen them.  In the Windows subdirectory if you've been a good paranoid person, you'll find these KBinstall/log files all over that subdirectory.  Chris in the SBS podcast said that yes you could delete all these log files these especially if you knew the patches were installed.... and I'm going to disagree just a little bit.

Here's what I do... for one... make sure that C: drive is big enough that you really don't care, but since you do, go into add/remove programs and write down all the Windows KB article numbers in there on a piece of paper.

Now go into your windows folder that has those KBarticle numbers that correspond to all the patches on your box.  Delete the ones that YOU DON'T find on your listing.

What this allows you to do is easily remove any patch that is active on your system just in case you need to and review the log files.  The KBs that you don't see in that add/remove have been replaced with other patches and service packs. 

So I won't remove all of those log files....just some of them....

Deploying a third party cert

So someone the other day asked me about installing a Certificate authority on a SBS box.... and I argued with them and pointed to the post I had done the other day about self signed certs.  So today I realized that all we needed to know about how SBS handled the Certs and where it saved them was in the “More information“ click box inside the Connect to the Internet wizard.....

You'd think I'd learn to read by now wouldn't you....


Web Server Certificate

Several of the Web services require Secure Sockets Layer (SSL) to secure communications between a Web browser and your Web server. For the wizard to configure SSL, you must either have the wizard create a Web server certificate or you must provide a certificate file from a trusted authority.

A certificate is needed to establish identity and create trusts for the secure exchange of information. The certificate must be signed by a certification authority (CA). The wizard can create a certificate signed by your server, or you can obtain your own certificate signed by a commercial CA, such as VeriSign.

Option Description

  • Create a new Web server certificate Click to create a self-signed certificate, and then type the full Internet name of your server that is used to access your server from the Internet.
    The certificate expiration period is set to five years. The certificate will also be saved as SBScert.cer in the Clientapps\SBScert folder so that it can be deployed to client computers by the Client Setup Wizard.
  • Use a Web server certificate from a trusted authority Click to use a certificate obtained from a trusted authority, and then click Browse to locate the certificate.
    If you do not have an existing certificate from a trusted authority, but would like to obtain one, you must create a certificate request using the Web Server Certificate Wizard in Internet Information Services (IIS). To do so, complete the following:

    To create a certificate request

    Open Server Management.
    In the console tree, click Advanced Management, click Internet Information Services, click YourServerName (local computer), and then click the Web Sites folder.
    In the details pane, right-click Default Web site, and then click Properties.
    On the Default Web Site Properties page, click the Directory Security tab, and under Secure communications, click Server Certificate.
    On the Server Certificate page of the IIS Certificate Wizard, click Create a new certificate.
    On the Delayed or Immediate Request page, prepare a request to be sent later or immediately as needed.
    On the Name and Security Settings page, in Name, type a name for the new certificate. Next, select the appropriate bit length based on your organization's requirement. Verify with the CA that they support certificates of the corresponding encryption strength before submitting the certificate request.
    On the Organization Information page, in Organizational Name, type the legal name of your organization. In Organizational unit, type the name of your division of department. If your organization does not have a division, you can type the legal name of your organization.
    On the Your Site's Common Name page, type the common name for your site exactly as it appears to the external users, such as
    www.mydomain.com.
    On the Geographic Information page, type the required information.
    On the Certificate Request File Name page, type a file name.
    On the Request File Summary Page, click Next.
    Click Finish.
      Note

    To open Server Management, click Start, and then click Server Management.
    Once you have completed the process for obtaining the certificate, the organization will send you the certificate along with instructions for installing the certificate. You must then rerun the Configure E-mail and Internet Connection Wizard to change your Web server certificate settings.

      Notes

    This certificate is not deployed to client computers as is it already a trusted certificate.
    If you want users to securely access their Internet e-mail on the server using either Wireless Application Protocol (WAP) 2.x devices or Microsoft Smartphone 2002 or Microsoft Pocket PC Phone Edition 2002 mobile devices, either the server must have a commercial certificate from a trusted CA or you must follow a procedure so the device works with a self-signed certificate that you create. This procedure decreases the security of your mobile device. Therefore, the recommended and more secure method is to use a commercial certificate. For more information, see “Connecting Mobile and Remote Users” at the Microsoft Web site (
    http://go.microsoft.com/fwlink/?LinkId=33539).
    The 2003 versions of these mobile devices do not require a commercial CA for the higher level of security.  [The Audiovox 5600 will easily accept the self signed certs]
     
    Do not change current Web server certificate Click if you are rerunning the wizard, and you do not want to change the settings specified the last time you ran the wizard.

Two white papers on Blaster and Malware

Msblast significantly affected Microsoft software design and development, including specific impacts on Windows XP Service Pack 2 (SP2).

These developments included:

• Enabling the Windows Firewall by default. In addition to enabling the Windows Firewall by default for Windows XP users, Windows XP SP2 also closed a vulnerability in previous versions of Windows XP, where, as Windows started up, there was a small period of time for which networking was enabled but the firewall was not yet active.

• Making it easier for users to enable Automatic Updates (AU). Immediately after installing Windows XP SP2, users are presented with a full-screen dialog box that prompts them explicitly to choose whether to enable AU.

Windows Security Center (WSC). The WSC feature in Windows XP SP2 alerts users if they have not chosen to enable AU, a firewall, or real-time anti-virus protection.  WSC also alerts users if the anti-virus product they have installed is out of date.

• RPC/DCOM authentication. The RPC interface was significantly locked down in Windows XP SP2 to prevent unauthenticated connections, such as the one that allowed Msblast to infect a computer.

 

Declaration of Administrators and End Users for installation of software and patch standardization

Sun Microsystems:
http://www.sun.com/2005-1004/feature/
read that link regarding the Google toolbar being now included in runtime updates

I hereby put forth a Declaration of Administrators and End Users for installation of software and patch standardization.

If software companies can do End User License Agreements, I can have my own agreement and declaration of rights.

Dear Software Vendors.

When updating me, you will not bundle in technologies that I didn't realize you were partnering with.  You will not make it confusing to my Mom and Dad when keeping their computers safe. 
This has got to stop.  You say that this is being done to support free and open source software and all it is doing is adding tool bars I don't want, software I don't need.

I refuse to install any Sun Java Runtime as long as you bundle software with it.

I don't want to have the Yahoo toolbar with Adobe reader either.  I don't want MSN desktop search with my MSN IM.  I don't want to have to constantly monitor every single application for options, uncheck boxes or any other ways I have to constantly monitor for unknown applications entering into my networks, my parent's computers.

As an administrator, as an end user, I demand that you do not make me have to ensure I read every screen, click every click to only get the software that I thought I was getting.

I agreed to install one application from one vendor.  I did not give you the right to insert a tool bar that gathers information from me.  I did not give you the right to precheck "yes" to installing additional software.

I want all of my vendors to start agreeing on a patch installation standard.  I want them to publish in a database their supported versions, where one can easily go to see in the registry what version one has, and other such standard procedures to audit the application of patches.  I want to be notified via email or rss feed when you are releasing patches for my applications.

You want my trust?  So that I'll buy products from you?  Use your software?  Then you be way more transparent and accountable to me.

I'm the user of your software only as long as I want to be.

Remember that.

Susan Bradley
Admin

Yeah I know... it's Friday... I'm in a mood.....so....anyone know the email address for Scott McNeally?

SBS on WSUS and MU

Steve Mattox posted to the newsgroup.....

 

The SBS team is proud to announce the availability of Windows Small Business Server (SBS) on Microsoft Update (MU) and Windows Server Update Services

(WSUS).

 

Today, fixes to issues that are found in the SBS product will now be available through MU and WSUS.  Also today you will notice a change in the SBS download Center web page.

 

The Windows Small Business Server team is recommending Microsoft Update or WSUS to be the method for keeping your Windows Small Business Server network

Up-to-date and Secure.  For guidance and information, please visit the SBS download Center

(http://www.microsoft.com/windowsserver2003/sbs/downloads/default.mspx ).

 

If you are interested in installing WSUS, please refer to "Step-by-Step Guide to Getting Started with Microsoft Windows Server Update Services on

Windows Small Business Server 2003"

(http://www.microsoft.com/downloads/details.aspx?FamilyID=28c43d57-2e15-47b2-9a6f-1514aa3ed05f ).

 

What updates are available now?

 

There will only be 2 updates available through MU\WSUS at this time and they will only apply to SBS 2003.  These updates are not new; they are the

existing updates previously available through our Download center.

 

Hotfix for Windows Small Business Server 2003: KB 833992

 

·         Description: This download address a particular way mail downloads can fail when using the POP3 connector in Small Business Server 2003. This issue causes the process IMBDOWNL.EXE to be hung with the CPU utilization at 25, 50 or 100%. A warning with event ID 1067 will be recorded by the POP3 server in the event log when this error occurs.

 

·         Security/Critical/Recommended? Recommended

 

·         Available sources:  MU, WSUS, and DLC

 

·         New update/Changes to existing update? Re-release of old Update which was previously released through DLC

 

Update for Windows Small Business Server 2003: KB 835734 [my comment -- yeah finally the patch for .....yes, your SBS box is sending out all those emails patch]

 

·         Description: There is a problem with how the POP3 connector processes certain messages downloaded from a POP3 server. This problem could

result in the POP3 connector accidentally re-sending certain messages to recipients who are not part of the SBS server e-mail domain. This may happen

only in the cases where the POP3 connector is used to download mail from an external POP account. Customers using Exchange to host their mail internally

will not experience this problem. This update resolves this issue. All SBS customers are encouraged to install this update.

 

·         Security/Critical/Recommended? Recommended

 

·         Available sources:  MU, WSUS, and DLC

 

·         New update/Changes to existing update? Re-release of old Update which was previously released through DLC

 

What Updates will be available in the future?

 

All updates that SBS releases will be available on MU\WSUS.

 

 

What other products that SBS ships will be available on MU\WSUS?

 

The major products now supported are: Windows Server, Exchange Server, SQL, SharePoint Services and Outlook.  ISA will be supported from their ISA 2004

SP2 and on (Feb 06).  More products to come in the next wave.

 

 

How do I configuring WSUS?

 

As some of you have seen, SBS is now a category in WSUS Admin.  This category only covers SBS specific fixes.  You will need to select the other

available applications that are on your SBS server so that the updates for those applications will also be downloaded.

 

 

Upcoming Updates:

 

Yes, we are working on a Critical update to be released on 12/13.  This is an issue that was found were reinstalling Windows SharePoint Services will

randomly delete a document library.  This will only be applied to SBS SP1 Slipstream installations, not web downloads.

So now you have a server... what do you monitor?

I'm stealing a post from the newsgroup from fellow MVP Dave Nickason with my comments in italics...

 

FWIW, this is what I do:

  • check all logs daily for errors or possible problems (or as close to daily as I can) [yup so do I - but remember your daily email will alert you... read it!]
  • make sure the backup ran successfully, and that the designated person changed the tapes, also daily  [these days it's a usb harddrive]
  • monitor the AV software to make sure it's updating the servers and workstations as it should be [this is where your early warning indicator is XP sp2 with the security center comes in handy-- when it freaks ....so do I]
  • frequently check the server monitoring program to make sure no hardware is failed or failing.  I try to do this in the server room rather than remotely so I can make sure that there's not a vacuum cleaner plugged into the UPS or someone's coat hanging on a server [I lock the server room at night and check for physical issues, my HP machine has additional monitoring software that lets me know of issues[
  • occasionally monitor the drives for free space [the daily emails tell me how much the server drives are growing]
  • occasionally check the UPS status [one of our main printers is also in the network room so the green lights are pretty obvious]
  • keep track of patch releases and install all necessary patches shortly after their release (you can subscribe to security alerts, etc. from Microsoft or watch for Susan Bradley to post something when they're released)  [who me?  Yeah I get the security alerts on my IM and my cell phone I also watch the chatter from the Patch Management listserve and Shavlik emails me with patches that are ready to use in their deployment tool.... unlike... uh.. WSUS who will shove stuff out without telling me.  I normally install patches depending on the risk, the 'chatter' on the backchannel regarding threats out there, and what firm deadlines might be of concern.  Most of the time I'll patch on a Friday, but there are times I have patched on “Patch Tuesday evening“. You do know about patch tuesday, right?  Second Tuesday of the month is the day the bulletins get released]

For Exchange, I do nothing except monitor the server logs daily and the database size occasionally.  Rightly or wrongly, I almost never defrag.  [same here, and mine is the biggest mailbox.  These days with 75 gigs it's less of an issue]

 

Two comments:  If you frequently monitor the server logs, you may spot something at the warning stage and avert a problem before it becomes critical (and thereby makes it into the e-mail report).  And, it's a good idea to do some monitoring so that you're familiar with how things run normally - this can help a lot in troubleshooting when something goes wrong.  [Honestly I think I'm going to set up some baseline Perf mons on my baby...we did it on the Yoda server box and Vlad constantly kept saying “baseline it“ “baseline it“ and all of us SBSers are going...do what-line it?

 

There's one more thing that has come in handy over the years... have the DSL modem in a place where you can see it.  There's been a couple of times that I've caught things [usually people downloading something they shouldn't... by seeing the solid lights on the DSL box and thinking to myself “okay what's doing a solid yank on our pipe like that?“  In a normal small office those DSL light connectors should blink.  Unless you are streaming media, watching a webcast, there's a pulse of activity, but not a solid light.  After a while as an admin, you'll know your firm's 'pulse“...and you'll know when something isn't right.  Every now and then pull up the live logging of ISA and see what's up and what your folks are doing.  Your acceptable use policy [you do have one, right?] says that you have the right to review anything and everything on that employee's system.  If your DSL modem is stuck solid on, fire up that ISA real time monitor and check it out.

 

Bottom line just be a smidge proactive, a smidge nosey, a smidge inquisitive... you'll be a very good SBS admin.

My soapbox

Brian Tankersley today talks about my soapbox issue. 

User rights.

I'm tired of the major accounting vendors setting such an horrible example of security.  We should be ashamed that our major accounting applications, the backbone our of financial records do this to us.  That they weaken our desktops so much as to introduce risk.

Dr. Jesper Johansson today talks about the story in his book where someone had administrator rights on their machines and one person did not.  One had a mess.  One did not.

Eweek did a study and 'found no persistent malware showed up on the system where the user was not an administrator'.

In the year 2006, that a major business accounting application can still code insecurely and be a top seller means that “we” the marketplace does not care. It's only when we do that things will happen.

Only 6

I was at yesterday's TS2 presentation and only 6 people in attendance were using WSUS.  Remember SBS 2003 in the R2 era will have WSUS inside the box.

Now I will still honestly tell you I vastly prefer Shavlik's push, patch, done versus WSUS's setup, tinker, approve, review reports....but gang... you need to download WSUS on your own systems and start playing with it now. 

To me WSUS isn't just a patching program, this is risk management for that firm.  And if you are not helping that firm deploy patches, service packs...why not?\

Want to stay safe and secure?  You patch.  To me it's just a natural part of the computing process.  And as long as I've built in the processes to ensure I have a easy way to recover on the rare remote chance something might occur, patching is not an issue.

Today in the newsgroup someone said “I have an old backup”...I'm sorry but with USB harddrives as cheap as they are, given that you can hang one off a shared drive off a workstation, you have NO excuse not to have a backup.  As easy as the SBS wizard is.....shame on you for not doing what you can to protect your business.  You have a responsibility to yourself, your family, your employees families this Christmas time to keep your business operational.

Patching and Backups.  Two EASY ways to keep yourself in business.

Antispyware gets an update

Microsoft Antispyware gets an extension of time so you should start seeing this pop up in your systems.....

So what do I choose in WSUS

Amy asks if we should just choose the “Windows Small Business Server” now as our only WSUS option, and I'll double check, but I think the answer is “no”.  It's my understanding that the patches that come under that section are unique to SBS only patches.  We haven't had one in a while, but it's things like the POP connector patches or our Sharepoint only patch.

Stay tuned, I'll let you know for sure though.

So what's the risk of Self Signed Certs?

You've seen it haven't you?  This:  The self signed cert prompt before getting into RWW.

So you are probably wondering why... with all my paranoia I don't go out and buy a third party certificate that I can trust from someplace like instantssl.com?

Because. 

Why do I trust them any more than I do my own box?

As it stands now I can make a workstation like my home one trust the certificate, I can easily click on View Certificate and examine that it came from my box, I can examine the SHA-1 thumbprint as I install it on my workstation.

An Expert on Encryption once came and did a presentation on the topic to our CPA group.  And he made the point that why do we trust any third party publishing certificate anymore than we do ourselves?  In the proper world of PKI and such topics, you should really meet a person face to face, swap identity information, and swap certificate information to ensure that you can confirm you got that certificate from that very person.  So if I can explain the process to my employees, if I tell them what the SHA-1 thumbprint is if they really want to be paranoid and check this, what's the risk of a self-signed certificate once I've installed it on a workstation to then accept the cerificate from my server?  Heck if I“m that paranoid I can type up the Thumbprint and have folks verify that.

Okay let's look how someone might trick me...or any of my employees that have remote access [remember not all do] with a self signed certificate especially if I've told them how to install it on their workstation once.

Okay they'd have to first build enough of web site that looked like the SBS front page.  They'd have to grab the DNS records and redirect those settings to their system. 

Do you get the idea that the risk of this...while ... I mean I can't honestly say it's non existent.... well let's just say that some bad guy is going to send a phishing email or trick one of employees to a web site to download malware is a greater risk.  The risk that employees today were using up your bandwidth to do Christmas shopping is greater.

So why would you need a third party certificate?

Do you need one for cell phones?  Nope.  You can add the cert to the phone.  In fact I do this all the time.

Do you need one for RWW for XP workstations?  Nope. As you can see above.

When 'might' you need one?  Macintoshes.  But even then we have a workaround for that too.

So why do we need to have a third party web site that we don't have control over be a verifier for my SBS box that I do have control over?  Some might say that using third party certs add more flexibility....but I just keep thinking about that padlock story.....

“There is a lesson here for security architects who worry at length about the number of bits of key to use in a cipher or the security of a CA, but not about the computer, operating system, protocol, human interface or physical environment of the application allegedly made secure by that cipher or PKI

I'm spending my time and paranoia elsewhere thank you very much.....

More to WSUS

So Amy on the mssmallbiz lists reports that the WSUS syncronization options now list SBS as an option

Hey, cool, remember how any of our unique to SBS patches are only offered up on Shavlik right now?

Oh and another thing....

It would be really nice if there was a 'landing page' for all the post XP sp2 patches in one easy to click place.. I'm going to try out Windows Catalog and see if it will help.  The other day when I brought up a Dell Optiplex it needed 29 patches.... There are 70 critical patches I can put in a basket here but there are a lot of multi-language ones I don't need.... too bad I can't sort by language.  Hey you know... on the outside screen I said “English“ yet I get all the .Net service packs and patches in all the languages...what's up with that?  Weird.

Grrrr...and now the pop up blocker built into XP sp2 caused the download to fail so I have to start the selection process all over.  I wish Microsoft's own web sites would not do that.  Place nice with your own security controls, please?

There we go... there's the downloads starting... have to see if I can point MU/WU to this cdrom once I've burned it in.

I think I need to buy Dad DSL

Had to run home because I forgot that one of Dad's computers is not running XP sp2 [shame on me] and to bring it down on a dial up it would be 6 hours.... wow... I don't know how someone can fix a computer, secure a computer, keep it safe without DSL or cable modem.

Dad said “oh I'm going to build up a computer and then just have that one for the Internet... that way if it gets thrashed I won't care”.  While having a 'throw away” computer might we wise, I said to him that I didn't want him to get his system into that condition because I didn't want to know that a computer that our family owned was helping out the bad guys.

These 'bad guys' are changing our lives....look how much my Dad just takes it for granted... and he doesn't care.... but I think we do need to care.  We do need to secure...even for our home machines.... especially on our home machines.

They are waging war on us... it's time we wage war on them....and before someone says “Oh you just need to change operating systems“... no.  That's like saying “you need to move your house to a new neighborhood“.  No.  I'm not moving.  I'm drawing a line in the sand and saying ...enough.  I think we all need to do our part to clean up the Internet and stop taking it for granted. 

BTW in case you need this today.....some ideas on malware removal here....

http://wiki.castlecops.com/MRP

http://castlecops.com/article-6341-nested-0-0.html

So what data protection resources are there?

So what rules and laws are in place that you have to abide by for security personal identity information in your network?

Where do you live?  What clients do you serve?  If you have California residents you are bound by AB1950/SB1386... but if you are International there could be rules the world wide that affect you.

   This bill would require a business, other than specified entities,
that owns or licenses personal information about a California
resident to implement and maintain reasonable security procedures and
practices to protect personal information from unauthorized access,
destruction, use, modification, or disclosure.  The bill would also
require a business that discloses personal information to a
nonaffiliated third party, to require by contract that those entities
maintain reasonable security procedures, as specified.  The bill
would provide that a business that is subject to other laws providing
greater protection to personal information in regard to subjects
regulated by the bill shall be deemed in compliance with the bill's
requirements, as specified

Okay so is 'reasonable security procedures' defined?  Heck no.  So if that's the laws for “my“ state, what about yours?  Get your mouse out and start clicklin.....

Privacy Journal -

Compilation of State and Federal Privacy Laws
:
http://www.privacyjournal.net/work1.htm

EPIC Bill Track - 109th Congress Privacy and Cyber-Liberties Legislation:
http://www.epic.org/privacy/bill_track.html

Legal Protections for Personal Data:
http://www.epic.org/privacy/consumer/legal.html

ConsumerPrivacyGuide.org | Law Protection:
http://www.consumerprivacyguide.org/law/

CDT's Guide to Online Privacy:
http://www.cdt.org/privacy/guide/protect/

Visa USA | Small Business & Merchants | Operations & Risk Management:

But if you need some 'basics' try here... in general the best thing to do is inventory where your PII is... then put safegards in to protect the data.

Computer Security Guidance Center from Microsoft Small Business Center:
http://www.microsoft.com/smallbusiness/support/computer-security.mspx

Security Toolkit PDF download from Microsoft Small Business:
http://www.microsoft.com/smallbusiness/support/security-toolkit-pdf.mspx

SMB signing... black and white revisited

In the SBS community there have been long standing discussions back and forth regarding the merits ....or lack therof... of the benefits of SMB signing.  If you are not aware... by default on a domain controller, the signing policies are enabled.  Over the years we've had discussions back and forth of the need for them.  Written up documentation about disabling them.  Mac's have to have them disabled.  Along with many of the older network scanners. 

So it's funny to see this post:

Jesper's Blog : Exceptions to the rule - When you may WANT to turn off SMB message signing:

Because I know someone will be saying “AH HA!  See!“

The point is... these days there is no right answer and we have to make an assessment of our needs and our risks.  Someone today asked for a listing of the laws regarding data security on a state by state basis and the security measures required for each data.... there isn't a black and white unfortunately. [I will be posting links for resources next though]

So ... make up your own mind..... Risk?  Needs?  Mitigation?



 

Yes, by now I'm sure my IP address has been tracked by the FBI and no, thank you, I don't want to see Paris's videos

Okay is it sad that I've had emails all day today with all of these and because they were about Paris Hilton and my IP address being tracked I just kinda went 'oh yeah...whatever...“?

'At least two of the English versions of WORM_SOBER.AG spoof the Federal Bureau of Investigation (FBI) or Central Intelligence Agency (CIA), alerting the user that the agency has found evidence of the user visiting "more than 30 illegal Websites", and asks them to complete the attached "questionnaire". Launching the attachment activates the Worm. Similarly, one of the German versions spoofs Bundeskriminalamt, and threatens legal action against the users' illicit downloads of films, software, and MP3s. The email promises more details of the case in the attached file.

Another version promises a free download of "video clips, pictures and more" of Paris Hilton and Nicole Richie, stars of "The Simple Life" reality television series in the U.S. Attachments are disguised as zipped files.

WORM_SOBER.AG can download and run executable files from certain Web sites that it points to. However, this worm does not seem to have any backdoor capabilities.'

I so totally block zip files  from even entering my Exchange server these days it's not funny.....

Dang, I'm impressed..that is indeed the CIA's phone number....

P.S.  if you are wondering.... yes, I use Thunderbird for my spammed to death, junk mail, every vulnerability listserve known to mankind email account.  I have several emails accounts....some go into Exchange.....some don't.  This one has a benefit of being my early warning system [even though I wasn't paying attention today].  In the Exchange server though, I block anything with a zip for just this reason.

Security Advisory posted tonight

********************************************************************
Title: Microsoft Security Advisory Notification
Issued: November 21, 2005
********************************************************************

Security Advisory Released Today
==============================================

* Security Advisory (911302) 

  - Title:  Vulnerability in the way Internet Explorer Handles 
	    onLoad Events Could Allow Remote Code Execution

  - Web site: http://go.microsoft.com/fwlink/?LinkId=56599

Trend CSM 3.0 and the Compression issue

We've been tracking an issue with Trend CSM 3.0 getting installed on SBS boxes and with think we know the trigger event. 

Let's review the issues.... Mariette reported that the Security Center was 'choking' because Compression was checked and Trend's CSM 3.0 didn't like that there.  We think we found the trigger event.

WSUS

When Windows Software Update Services is installs is turned on compression on the web site, affecting all web sites.  During the beta we found we had some issues in that workstations would not check in with the WSUS server if compression was on and we were told to disable it temporarily, but that long term wise to grab a hotfix and install it.

From the WSUS wiki -- It is not recommended to disable compression as this will not impact the problem source, and possibly increase network traffic & server load, while reducing the number of clients you can effectively serve. Further information about the issue and obtaining the hotfix can be found: http://support.microsoft.com/?id=898708 .

See that article that talks about WSUS enables compression by default?  In the IIS, in “Web sites“, right mouse click, and click on service.  See what you have there.  If you have 'compress application files' on the outside affecting all sites, you'll probably have issues with Trend's dashboard.

To see what I mean.....

So, for those in testing stage, I'd try installing that hotfix and see if that helps, otherwise follow Mariette's workaround to allow Trend to handle it's site without compression.

BTW for us SBS boxes... you probably are not going to massively affect traffic nor reduce the number of clients you can effectively serve.  Hey, we are SBS.  We don't have that many to serve in the first place!

 

Yes the sky is falling

Incidents.org reports a “0-day” for Internet Explorer and while one should always use caution these days when surfing I think we're not fixing the real problem here.  This issue along with many others can be mitigated against if we run any software program more securely.

The issues is javascripting that can leave the attacker in the “rights of the user”.  Don't run as admin or tighten up your browser ...which everyone should do...

Run IE in high security or if you are surfing on unknown places use 'drop by rights', but let's stop yelling the sky is falling and instead, lets fix the real problem.  We're trusting all of our browsers too much and our workstations that run as admin are not protected enough.  Firewalls are not enough here.

Update:  Read Dana's blog and reports are on Mozilla browsers it's a Denial of Service.  I'm going back to waxed string and paper cups.

Top issues with Microsoft Update and WSUS

 

Problem1

====================

 

Symptom:

---------------------------

You get a .Net error when accessing the WSUS Admin page:, such as:

 

Cannot execute a program. The command being executed was "c:\winnt\microsoft.net\framework\v1.1.4322\csc.exe" /noconfig

@"C:\WINNT\Microsoft.NET\Framework\v1.1.4322\Temporary ASP.NET Files\wsusadmin\f85b3721\1e6721d6\dzsrdqit.cmdline".

 

Solution:

----------------------------

Try stopping the IIS services, and the update services. Delete the files in the wsusadmin directory in the ASP.NET temporary files.

Start the update services

Start the IIS Services

 

 

 

Problem2

=======================

 

Symptom:

---------------------

Some clients fail during detection with "Failed to find token" 800706d3 In the windowsupdate.log:

 

Examples:

WARNING: Failed to evaluate Installed rule, updateId = {ED300F67-421C-4C08-B3BA-F35C55F3B427}.100, error = 0x80041017

WARNING: Failed to find token for SID S-1-5-21-535373826-676671268-524510473-1001 with hr = 800706d3.

 

Solution:

---------------------

If the Client for Microsoft Networks is not installed, you can get this error. Install/Enable Client for Microsoft Networks

 

Problem3:

==================

 

Symptom:

------------------------

Automatic Update clients appear to randomly fail during detection: when updating via WSUS on Windows Server 2003.  WindowsUpdate.log file shows that

detection fails with0x8024400a (WU_E_PT_SOAPCLIENT_PARSE) or 0x80072f78 (ERROR_WINHTTP_INVALID_SERVER_RESPONSE) error or

WARNING: SOAP Fault: 0x00012c or WARNING: SyncUpdates failure, error = 0x8024400D, soap client error = 7

 

Solution:

----------------------

The problem is caused by a known issue with IIS6 and http.sys, which there is an available hotfix.

 

http://support.microsoft.com/?id=898708

 

This hotfix does require Service Pack 1 be installed to the Windows Server 2003.

 

 

 

NEW & UPDATED KB ARTICLES

-----------------------------------------------------------

908921 Detection and deployment guidance for the October 11, 2005 security

http://support.microsoft.com/?id=908921

 

894199 Description of Software Update Services and Windows Server Update

http://support.microsoft.com/?id=894199

 

903262 A Windows XP-based computer that was set up by using a Windows XP image

http://support.microsoft.com/?id=903262

 

905682 Support life cycle for Microsoft Software Update Services 1.0

http://support.microsoft.com/?id=905682

 

906798 You cannot install Windows Server Update Services 2.0 on a computer that

http://support.microsoft.com/?id=906798

 

905422 A client computer cannot receive new updates from a Windows Server 2003

http://support.microsoft.com/?id=905422

 

903773 No Microsoft Office updates are displayed when you use Microsoft Update

http://support.microsoft.com/?id=903773

 

903774 If you disable the Ose.exe file, Microsoft Office updates do not install

http://support.microsoft.com/?id=903774

 

903775 Office 2003 updates are offered to a user even if that user has

http://support.microsoft.com/?id=903775

 

906304 Installation options for Windows Server 2003 Service Pack 1

http://support.microsoft.com/?id=906304

 

906602 How to troubleshoot Windows Update, Microsoft Update, and Windows Server

http://support.microsoft.com/?id=906602

 

902093 How to read the Windowsupdate.log file

http://support.microsoft.com/?id=902093

What you should do - Security steps for IT Pros

Security resources

More stuff from today's presentation:

Security web sites

Sign up for notifications

Sign up for the Security webcast each month

RSS feeds for Security bulletins

More from the Microsoft Security Response Center

Security bulletins search

Security advisories

So it's acting a little strange is it?

Earlier today there was an interesting presentation on how to know when you had a “security incident“ and I thought these bulletpoints were excellent.... so I got the okay to blog them.

If you suddenly find that your machine is acting strange....and you suspect viruses or malware and the like, you can call Microsoft at 1-866-PCSafety and get their help.

So what's strange, you ask? Things like this....

  • Port contention
  • Dropped admin shares
  • Unaccounted for processes
  • Unknown accounts
  • Unaccounted for services
  • Missing disk space or files
  • Processes listening on suspicious ports
  • Unusual network connections or bandwidth consumption
  • Out of place or unusual log entries
  • Abnormal process, service, file or resource usage

So?  You see anything strange on your systems?  That's why keeping an eye on what is normal is a good thing.

 

Are you Out of Office?

With the holidays coming up... I'm looking forward to all that social engineering stuff I can learn from out of office messages.  You know... by default an mail server does not send outbound to the Internet OOF messages, but admins the world over have them set up to send to everyone and everywhere.

Today I was asked to find a Security guide that would say “don't do that” and other than a KB article, my short time googling it is coming up blank.

I have it lucky here... I set the policy...and as long as I think it's reasonable, sane, I make the decision.  I don't have to justify it to a board or a group of committee members.  I'm the 'buck stops here' person.

So when this KB --  How to enable Out-of-Office replies to the Internet in Exchange 2000 Server:
http://support.microsoft.com/default.aspx?scid=kb;en-us;262352 says:

By default in Microsoft Exchange Server 2000, Out-of-Office replies to the Internet is disabled. Many administrators do not allow Out-of-Office auto-replies to be sent outside of the Exchange organization to prevent unauthorized people from learning when users are out of the office.

I just find it to be quite reasonable.  I was surprised to find it wasn't listed in the Exchange hardening guide.  Steve Riley of Microsoft kinda hints about it in his Social Engineering presentation, but I just think about the thing I bought off of ebay a bit back.  It was an offficial FBI evidence from Kevin Mitnick.  He was selling it.  And it was a Western Washington Tech Directory who's who guide book of firms, their Presidents, their Secretaries and what not.  You know Mr. Mitnick's specialty these days?  Advising people against Social Engineering.  Think about what power he had with knowing who the Secretary's name was.  The phone numbers.  All that 'stuff' that can be used to make a social engineer pretend that he or she knows more than they should so as to trick people out of user names and passwords.  I saw a study the other day [and Steve Riley talks about this in his presentations as well] that networks are getting harder to crack so they are going after Social Engineering methods and Database intrusions rather than the way they used to intrude.

So the next time your firm sends out a OOF message to the universe that says “I'm out of the office, for help call extension ####” and then lists the person, his title, his address, his office number, his fax, his cell phone, his email...etc. etc.. I think that information just might be information that people INSIDE the firm need to know but DO I?

Remember ...the DEFAULT for Exchange 2000 and above is to not send those to the Internet, merely internally.  So for them to go outside of the physical boundaries of your domain into MY inbox, your management had to choose to do that.

Sometimes...defaults are good....

P.S.  Just a follow up here....with Windows Mobile phones like the Audiovox 5600 and Exchange 2003 activesync  ..when I'm out of the office I have my email with me.  Updated calendar items are with me.  If I need more connectivity while on the road,  I never travel without a laptop.  These OOF that I'm refering to are not responses from direct mails that I've sent to people, nor am I a client of these folks that I get OOF messages from, but the responses I get when I post to listserves.  Your firm should not be having your employees sending OOF messages to subscribers of a public listserve.  They are not clients of your firm, they are not authorized, nor do they need the gobs and gobs of detail that I get back from these messages.  If I'm in a position where I'm 'unplugged' ... I'm not emailing back that client that day.  OOFs don't belong sent on public listserves.  They may and probably do belong to your client.  Like Amy says, we need an 'opt in' for those we do want OOFs to go to.  Until then, I'm shutting 'em off.

Where's your perimeter?

Where's your border?  What do you have to defend?  Tuesday at 9 a.m PST there will be a web cast on this very subject

Webcast:

Because businesses today have more network connectivity and more kinds of devices, firewalls no longer represent barriers that separate corporate intranets from the Internet. We need to move from the familiar scenario, where the physical boundary determines access, to a world where access is determined instead by policy. This Security360 webcast with host Mike Nash addresses how unmanaged devices can more securely connect to corporate networks. You will learn about solutions that are available now and can be built on your company’s existing investments. You will also learn about security innovations that are coming soon. As with every Security360 webcast, this session includes a checklist of recommendations and resources, and also a live question-and-answer session with Mike and guests.

For firms large and small that network perimeter is moving farther and farther... this week my network is in Las Vegas at the Bellagio where a firm laptop is at at a conference.  I packed it up, made sure it was patched and ready to go and sent it off in the big bad world. 

Got vendors that come into your network and want/need a password to your network?  Your perimeter is in their office.  Othertimes my perimeter is my phone.

I've heard stories where outside vendors that have had no background checks end up transfering around data and moving things around using harddrives and usb devices with no policy or procedures regarding data handling.  We always think big firms have more security, but I've heard stories that would make your toes curl.  User data transfered over usb drives with no follow up on any sort of data wiping afterwards.  Servers that have no backup and redundancies. 

I think none of us are really doing all the things we should be doing.  I know that one thing I will be doing over Thanksgiving is looking at the software that I need to ensure I have licenses better documented ... things like cdrom media for certain software that I cannot easily get replacements for.  My Microsoft software via volume licensing I can easily replace and easily get the product key codes.  That's not true for others I have.

So?  Where's your perimeter?

Do you know about the Network configuration operators group?

I'm strongly beginning to think that Windows 2003 and XP are like Office.... every time we say “I'd like the OS to do that“, there's something already in the platform that will probably do what we need it to do.

Did you know about the Network Configuration Operators Group in Windows XP?  One of the issues I find with my Tablet PC in restricted user mode is that it sometimes does not like to attach to new wireless connections.  I think this just might solve my issues:

A Description of the Network Configuration Operators Group:
http://support.microsoft.com/default.aspx?scid=kb;en-us;297938&Product=winxp

http://www.windowsitpro.com/Windows/Article/ArticleID/37939/37939.html

“XP Pro features the new built-in group Network Configuration Operators, which lets you delegate network configuration management tasks. In addition to providing a measure of control over who can alter network settings, this group lets you give a local user the ability to change certain settings without making the user a member of the local Administrators group. In some cases, members of the Network Configuration Operators group can modify the TCP/IP properties to rename, enable, and disable LAN connections available to all users on the system; in other cases, these members can modify only the settings for their own connections. Group members can also delete, rename, and modify properties of remote access connections for the current user, and they can issue ipconfig release and renew commands.

To add a local user to this group, go to the Computer Management dialog box and expand the Microsoft Management Console (MMC) Local Users and Groups snap-in. Select the Groups object in the console tree and double-click the Network Configuration Operators item in the details pane. Click the Add button to enter the user's name. If you aren't sure about the syntax or spelling of the user object, click the Advanced button to query either the local user database or the Active Directory (AD) user database and choose from the available list of relative distinguished names (RDNs). After adding the name to the group, click OK to close the Network Configuration Operators Properties window.

After you add a user to the Network Configuration Operators group, the user can perform simple network configuration tasks in XP Pro, even when the user is away from the office.”

What is the impact of having a domain controller in a virtual environment?

The SBSPodcast gang brought up the issue of ...does having a domain controller in a Virtual Environment have Security issues?   The topic came up about offering a service to your clients for an additional domain controller, that you could set up a virtual DC across a VPN connection.  The question was about what impact doing this for a DC have?   The answer to the question of whether there are security issues is...Yes. (Doesn't everything in life have security issues?) 

 

Read this thread from the Ad list

http://www.mail-archive.com/activedir@mail.activedir.org/msg35202.html

 

Download details: Using Domain Controller Virtual Machines:

http://www.microsoft.com/downloads/details.aspx?FamilyId=64DB845D-F7A3-4209-8ED2-E261A117FC6B&displaylang=en

 

·         Security. A significant security issue is the protection of .vhd files.

 

·         Handling image files: Anyone who handles or has other access to .vhd files must be highly trusted within the organization and a member of trusted security groups within the forest. Any user who has the ability to copy a .vhd file effectively owns the forest and its data. An attacker or unauthorized administrator could use a copied virtual machine file to compromise passwords or, in extreme circumstances, corrupt the forest.

 

·         Securing image files: Unlike the theft of a physical computer, theft of a .vhd file is more likely to go undetected. Consequently, you should secure the host operating system and the guest operating system .vhd files with the same physical and software restrictions you use to secure a physical domain controller. Such restrictions include controlling access to the files and auditing file access. For more information about securing image files, see “Security Recommendations” later in this document.

 

Security Recommendations

 

It is recommended that .vhd files, including backup files, be as well secured as a physical server that is running as a domain controller. For information about how to secure domain controllers, see “Best Practice Guide for Securing Active Directory Installations” on the Web at http://go.microsoft.com/fwlink/?LinkID=28521.

 

To secure virtual machine domain controller files, complete the following tasks on the host computer during domain controller installation, and repeat them for all locations where system state backup files are kept:

 

·         Be sure that only reliable and trusted administrators are allowed access to the domain controller .vhd files.

 

·         Create a folder for storing all virtual machine domain controller files (.vhd, .vmc, and so on).

 

·         Assign permissions to the folder that contains the .vhd and .vmc files so that only domain administrators have access to the folder. Additionally, ensure that the security account that Virtual Server is running under has access to the folder holding the .vhd and .vmc files.

 

·         Audit Read\Write access to the .vhd folder and monitor the security logs for unauthorized access attempts.

 

·         Secure the Virtual Server Administration Website tool (VSWebApp.exe) so that only privileged users have access to the Virtual Server service (Vssrvc.exe). The Administration Website is a browser-based tool for configuring and managing Virtual Server 2005 and its associated virtual machines and virtual networks. For information about securing Internet Information Services (IIS) and the Administration Website, see “Securing Virtual Server” in “Virtual Server Deployment Guide” of the “Virtual Server 2005 Administrator’s Guide” on the Web at http://go.microsoft.com/fwlink/?LinkID=27540.

 

·         Use Group Policy to manage who can restart a host server that is running domain controllers on guest operating systems in virtual machines.

 

On a personal note...my Domain controller is in a locked room... for you the consultant to physically secure that box... I think you'd need to assure your customer on the disaster relief aspects.

The Religious wars ....the technology wars

You know what gets tiring on some listserves that have a security focus?  The religious wars.  The “my software is better than your software” stuff.  The the whole “I don't want to pay for software” or the “we use open source software because it's free”.

Nothing in life is free, or so my Mother told me. 

Maybe I”m the weird one, I don't know...but the idea that I'm going to trust my business to “software by a volunteer committee” or something somone downloaded for free it just slightly freaks me out.  I have to stop and make a business risk decision regarding my choices.  I guess it's because I've been on volunteer committees and ...well.... I know how they work.  There are times I've been on committees that it is really excellent people and really the people that should be at the table are indeed at the table.  And then I've been on other less structured committees and ...well...the people that end up at the meeting table are just the people that showed up.  In my own City where I live where the people that show up day in and day out at the Council meetings, that give feedback regularly, that give input to the Council meeting...well that's their life.  That's all they do.  And they don't live in the real world enough to bring that view to the table.  They are just 'there'.  They just show up. 

The reality for today's business world is that we need a blend of tools.

Many argue that the active directory structure of Microsoft [especially in Windows 2003] hands down is better than other platforms to give a firm control.

Many argue that the desktop permission structure in other platforms, both Mac and Linux is more superior. [Well at least they are better at forcing their vendors to code appropriately anyway]

Arguably the platform with more forensic tools and distributions [KnoppixSTD and the like] is Linux.

As a business owner if I were picking an operating system based on “free“, you'd still see me at the checkout stand buying Novell's SuSe distribution.  Why?  Because I want an organization behind what I deploy.  I want support.  Don't get me wrong ...the community support of SBS is fabulous...but at the end of the day if there something amiss with my system, I want someone at the other end of a phone line that I can talk to.  I want someone who's made it their career and not a hobby to support the platform.  I want an operating system...no matter what the brand.....built by a person who has a vested interest in that platform from a career standpoint. 

Sometimes the decisions that come out of committees don't end up always the greatest decisions.  Look at our Congress for evidence of that [need I say more?].  The manuvering and deal making to get some of these decisions out the door is just crazy.  Yeah, big businesses can have just as much politics as Congress going on some times, but I still just have a lot warmer, fuzzier feeling about buying the things my business depends on. 

The funny thing I find when the “religious wars“ start up is NEITHER side knows enough about the other one to make reasonable arguments regarding their position worth a darn.  Windows NT is dead.  If you are still having to support NT, 98, 95 or ME I'm real sorry for you but stop using it as a benchmark. 

The next problem we admins have is not knowing.  It's getting to the point these days in the Server platform that we're getting like the Office platform.  “I want the OS to do this“..... “uh...it does that.“ 

I think some of this comes down to not taking the time to learn.  You know the guy who found that Sony Rootkit?  He wrote a book.  Windows Internals.  And what's the stereotype for the average IT person?  We don't read.  

I'll bet many of this blog have not read or know and I'll bet little of us out here use some of the following:

  • Software restriction policies - want to restrict what software users load up?
  • IPSec - want to ensure that only computers you want talk/connect/link up with the computers you want?
  • Group Policy - control desktops, what the user gets to use, lock down IE, control the firewall...
  • Windows 2003 Security guide - and if you are looking for a “click here and secure me“ ..this is a learn more about your system..the point is to this guide is that YOU have to understand your system to make the choices

Someone in a listserve today said they liked a certain vendors setup because it didn't rely on agents but rather forced you into better understanding the foundations of what you were setting up... ISA 2004, IIS, Windows 2003 server and XP sp2.  He said he prefered that over 'agent based' because it masked and made you not understand the foundations of the network you were setting up. 

It's funny isn't it?  Technology wars have parallels with human ones.  I think if all of us took a bit more time to learn, to understand, to find out more about the other guy, the other platform, the other technology, we'd stop these silly arguments and start fighting the real enemy

So my challenge for you this weekend is as follows.....Don't just read Mark Russinovich's blog about the Rootkit issue, download one of the free tools from the Sysinternals site.  Learn what it does.  Peek under the hood of the operating system.  Go read a book or two.  Listen to a podcast or two.  But lay down the weapons shall we?  Because as a small business owner, we don't necessarily care what you recommend, we just want you to listen to us, pick the solution that will best fit our needs and then we want you to know it.

Making sense of 05-019 and the post patch

Prior to installing Exchange 2003 sp2 the release notes say you need to install 898060, but the confusion lies in the bulletin.  The bulletin says that 05-019 has been re-released to fix for this issue.  So us SBSers would think..okay ...so as long as I install 05-019 on my box I'm okay, right?

And if you read this page on TechNet, it says that the last security bulletin in Windows 2003 sp1 is 05-015, right?  But it's not.  You see 05-019 'IS' inside of Windows 2003 sp1 contrary to this page, so you DO need to install 898060 on your system.  Confusing isn't it?

Bottom line... for SBS boxes, yes you need this patch.

Installing security update MS05-019 or Windows Server 2003 Service Pack 1 may cause network connectivity between clients and servers to fail:

Download details: Update for Windows Server 2003 (KB898060):

Flash advisory

Microsoft released a security advisory on Macromedia Flash that needs an update.  But what I also found interesting was an issue brought up on the Patch Management listserve.  It appears the old Flash bits are left behind... behind so that if someone is crafty enough ....oops... there goes that truth and honesty and perhaps making others insecure again?

Is the truth harmful?

The webopedia defines a rootkit as...

A rootkit is often used to hide utilities used to abuse a compromised system. These often include so called "backdoors" to help the attacker subsequently access the system more easily. For example, the rootkit may hide an application that spawns a shell when the attacker connects to a particular network port on the system. Kernel rootkits may include similar functionality. A backdoor may also allow processes started by a non-privileged user to execute functions normally reserved for the superuser. All sorts of other tools useful for abuse can be hidden using rootkits. This includes tools for further attacks against computer systems the compromised system communicates with such as sniffers and keyloggers. A common abuse is to use a compromised computer as a staging ground for further abuse. This is often done to make the abuse appear to originate from the compromised system or network instead of the attacker. Tools for this can include (D)DoS tools and tools to relay chat sessions, (spam)E-mail or attacks.

Recently, some spyware and even commercial CD DRM software (Sony's, for example) have started using rootkit technology to hide themselves from the anti-spyware software and make uninstallation difficult.


Recently on a listserve there was a discussion that came up about Sony DRM and Rootkits.  And it wasn't the typical conversation you might think.  It was about disclosure.  About the process of telling a vendor to clean up their act.  It was about asking if Mark Russovich had given Sony a chance to fix the problem.  It was about asking if what we ask about responsible disclosure for software companies applied equally to an entertainment company.  And it was an interesting exercise in stopping me in my tracks and asking myself...especially with the blurring of the lines between Entertainment and Software these days, did the technology industry, and in particular Mark do the responsible thing in handling this “rootkit”.  What this a blog event to be picked up in the media...or was this an event better handled a bit more quietly by notification of the vendor to allow for them to prepare a fix?  

But first, I'm still not quite sure about the 'black and white-ness' of the categorization of this as a rootkit.  I guess my problem is that I add an additional word to the front of the word rootkit.  It's a word that I .... well I think of this word as part of the basic definition of rootkit, but if you read the wikipedia definition...maybe not.

That word is “malicious”.  Similar to Spyware, there's a scale in my mind, a sliding scale that a software crosses over.  From the first step of not asking me, not informing me, all the way to stealing information from me, I guess in my mind the software that is defined as a 'rootkit' is down on that grey scale.  It's malicious, it's out to do me harm. 

In Sony's case, that file...it's intent... is to protect someone's intellectual property rights.  It's to keep others from stealing information, not to steal information from me.  So in Sony's case... the intent wasn't there.  While we'd all argue that Sony's implemenation of DRM was stupid, uninformed, is making us lose trust of the entire DRM movement, can we truly say they had malicious intent?  Even a guy at Sophos said What they did was not intentionally malicious“.  Okay so if they were not intentionally bad...but just stupid....was the process that they were informed...fair? 

So what's happened now?  It got blogged, picked up in the media, and now in fact, unfortunately in all this... bad guys are now using the public information that was disclosed on the web are now targeting this “rootkit' DRM software.  Have we harmed ourselves in 'outting this vendor' like this?  In not going to Sony and saying ..hey...can you clean up your act and disclose more of what you are doing?  Was this disclosure process fair to us, the folks trying to keep computer users safe out here?

Look at me.  I run a website called www.threatcode.com who's goal in life is to shame those vendors into cleaning up their acts.  Yes I personally have beta bugged and emailed Intuit, but does my 'outting' of them and other vendors like them, does the truth cause harm?  This is normally a non denominational blog..but it reminds me of a passage in the Bible that says “And you shall know the truth, and the truth shall make you free”.  In this case...did it?  Does this information made us free?  Or has it made us more untrusting of software programs and what not?  Has in in fact endangered us instead?  Does my web site endanger folks?

I will tell you this though...Sony blew the PR on this.  They weren't honest, their PR could have been a lot better on this.  I think this should be a lesson to all companies to handle things better..say “we screwed up“ rather than blowing off the concerns of the customers.  Sometimes throwing yourselves on the gauntlet of public opinion and saying “I'm sorry, we were stupid“ ... I think might have been better than how they did this.

Finally... I'm sorry .... anyone who buys a Neil Diamond record.... I think they deserve a bit of root-kit-ting don't you? 

Okay okay...kidding...just kidding..

SUS problem fixed

For those still running SUS 1.0 the issue with the files is fixed per the MSRC blog.  I've finished my testing here and will probably be rolling out the patches tonight... a smidge earlier than ususal, but with just the one patch, didn't have to do quite the review.  I'm seeing more issues reported from the Patch Engines than the patches this time around.

Quickbooks 2006

Now that Quickbooks 2006 has hit the streets, just letting you know that you will continue to have to hack the hives and registries to get it to run in anything less than Administrator or Power user. 

Now before you go running off to load up in Power user, remember that this mode is not recommended.  So you'll have to continue to hack up your hives to get this to work.  One of my fellow CPAs went to a seminar and the presenter said to load up a virtual drive and give the restricted user full permissions.  No, software should run securely.  I, as a end user, shouldn't have to hack up anything.

Then they load up Flash 7 player in their software...which...Microsoft just released a security advisory on yesterday. 

Nothing like demanding and installing insecurity, 'eh?

Setting up and trusting

Gordo talks about how a misconfiguration of a Desktop search caused issues in a network.  Are you aware of the other issue that it may have?  On your Exchange?  The SBSPodcast guys talked about it last week and they pointed to the KB article

Exchange 2000 Server and Exchange Server 2003 performance may be affected when desktop search engine software is running on Outlook or other MAPI client computers:

I'm getting a bit annoyed about all these defaults that some of these programs are doing and when I ... okay..so I.ranted about how Thunderbird had automatically set itself up to update, I forgot about my MOST hated silent installers.

Adobe.

Tsee reminded me of the sneaky way when you download the Reader that if you don't uncheck the boxes you end up with the Yahoo toolbar.

Yup, I agree... hands down ...probably right behind Sony's DRM issue are installers like this.

You know what Robert, if Microsoft OR ANY of these software/webware vendors expect to earn my trust, how about in addition to a privacy policy that I can read ahead of time, how about a “my rights as a end user“ doctrine.  That you only install want I give you the right to install, you only do it in the manner in which I agree to, and above all else you stop taking me for granted.  If you think my small business clients are going to trust you or any software vendor these days the way you guys are treating us?  I'm sorry but the lack of respect that the online world gives to us out here..... Bill and Steve may be saying it's 'turn turn turn' time to go to the web, but until we “trust, trust, trust” the web, we ain't buying out here. 

Quite frankly .... we don't trust you.

You guys are going to have to earn it first.

About those good passwords

Dana posts about an issue he hit when he had a good strong password chosen and used it to also sync with his SmartPhone.  You know...he had a space in his password.  Now windows likes it just fine....

Smartphones...well let's just say that they needed a bit of help from the Active Sync client.

But what if I don't have the resources to test?

Every month we get security updates from Mothership Redmond.  And each time, especially in the server world, we say “you need to test patches” and many times in the SBS community the question comes back “but how can I set up a test lab?”

There are a couple of ways to ensure that you can have successful patching experiences even without a test network

1.  Minimize your tweakages in SBSland.  My job here at the office is to keep this network, this server chugging.  So I only 'tweak' things that I know are SUPPORTED by the SBS support gang.  I'm actually getting tired of the SBS gang tweaking the OWA to be domain/user versus our SBS user.  If the Exchange folks in their patches and service packs want it to be domain/user and there's obviously more of them than us... I say stop tweaking.  BE STANDARD.  If you have no test network, don't change the defaults.  Microsoft tests these patches on default systems and includes external parties, ISVs and OEMs in patch testing.   

Steve Riley's blog yesterday talks about my favorite recent BE STANDARD example of Security bulletin 05-051, the patch that if you had followed third party advice on your security hardening and had messed with ACLs you ended up getting your servers and workstations messed up.

I once said on a listserve that in my space you had to have a real good reason for me to recommend not following the guidance of Mothership Redmond, Mothership Los Colinas or Mothership Shanghai.  That's SBS Dev, SBS Support, and SBS Partner Support.  You move away from their guidance and you need to start setting up your own test network.  You've just made it your responsibility to test.  It's not Redmond's anymore.  You just made it your job when you followed something not advocated and in turn, tested by support.

2.  Watch the communities.  I watch a couple of listserves like patchmanagement.org and my SBS community for issues.  You don't have to be first in applying these patches.  People like me that have test networks will report in when we see issues.

...okay so what does it take to set up a testing network?  You know it doesn't even have to be a real one, just try to virtualize as best as you can a micro version of your network.  For the consultant crowd that means tools like Action pack from the Microsoft partner program, and VMware's PtoV tool.  In mid sized companies, they will do things like breaking the mirror, patching, ensuring everything is working, and then redoing the mirror.

And what are the tools to help you keep an eye on things?  Event logs.  In a SBS network it also means I send an email out, make sure it's received.  Make a RWW connection, VPN is good to go and all the other connectivity things..including these days the Audiovox cell phone, to make sure all is well.

So bottom line... if you don't have a test network... we do.  Wait for us.  We'll tell you.  But remember the key to having consistent, good patching experiences is mainly to stay with what the Motherships say to do. And if they say “Don't mess with those ACLs”, that's exactly what I'm going to do.

I have been patching this network of mine for many years..and while I can say a few third party applications and broken a time or two [and rightfully so since they depended on insecure things], I cannot say that I've had bad experencies with Security patches.  Service Packs I won't quite lump in the same kind of “gee I love them” category because in our space they are bigger and quite honestly cause more disruption.  But security patches?  Especially not these days.  I stay with the recommended guidance and certainly don't mess with ACLs and what not.  I have a good backup.  I know that I can remove them if it's truly critical, and I know if....IF.... I have issues with them, when I call in, give the credit card number, at the end of the call if the issue is the security patch/service pack related, it's a free call.

Bottom line...staying within the boundaries of what is recommended means that I will have a good solid patching experience and happy and protected servers and workstations.

There's a new Trend in town

And folks have reported that they or their clients have gotten an email from Trend Antivirus saying that they are eligible for the upgrade from 2.0 to 3.0 since they a Trend customer.

Now .. I'd love to copy and past this email to show you what it says ....but you see.. I can't.

I haven't received one.

Neither my subscription at my office, nor the one at home has been sent any sort of notification that I'm eligible.  I'm feeling left out. Sniff sniff.  Unwanted.  Sniff Sniff.  Non Trendy.  Sniff Sniff. 

Seriously those that have updated say it's a painless process, can be done over the top of version 2.0 but YOU DO NOT WANT TO INSTALL THE FIREWALL ON THE WORKSTATIONS, as you want to leave the network controlled one that is provided by SBS and the XP sp2 firewall.

Non Security updates on Microsoft Update/WSUS

Microsoft is today also making the following High-Priority NON-SECURITY
updates available on WU, MU, SUS and WSUS:

KB887624    Windows SharePoint Services Language Template Pack
Service Pack 2        WU, MU
Description of Windows SharePoint Services Service Pack 2:

KB907492    Outlook 2003 Junk E-mail Filter update: November 2005
MU
Description of the Outlook 2003 Junk E-mail Filter update: November 2005:


KB907417    Update for Office 2003
MU
Description of the update for Office 2003: November 8, 2005:

It's Tuesday and it's patch day!

November 8, 2005

 

Today Microsoft released the following Security Bulletin(s).

Note: www.microsoft.com/technet/security and www.microsoft.com/security

are authoritative in all matters concerning Microsoft Security

Bulletins! ANY e-mail, web board or newsgroup posting (including this

one) should be verified by visiting these sites for official

information. Microsoft never sends security or other updates as

attachments. These updates must be downloaded from the microsoft.com

download center or Windows Update. See the individual bulletins for

details.

 

Because some malicious messages attempt to masquerade as official

Microsoft security notices, it is recommended that you physically type

the URLs into your web browser and not click on the hyperlinks provided.

 

Bulletin Summary:

http://www.microsoft.com/technet/security/Bulletin/ms05-Nov.mspx

 

Critical Bulletins:

Vulnerabilities in Graphics Rendering Engine Could Allow Code Execution

(896424)

http://www.microsoft.com/technet/security/Bulletin/ms05-053.mspx

 

This represents our regularly scheduled monthly bulletin release (second

Tuesday of each month). Please note that Microsoft may release bulletins

out side of this schedule if we determine the need to do so.

 

If you have any questions regarding the patch or its implementation

after reading the above listed bulletin you should contact Product

Support Services in the United States at 1-866-PCSafety

(1-866-727-2338). International customers should contact their local

subsidiary.

 


There are two non critical releases that I'm not sure what they are now, but my MU on my workstation here is 'broke' with a 0x8024402F code ...so I'll keep you posted.  [yes I could only find a Japanese bulletin on that]

 

Also check out the Macromedia Flash vulnerability talked about on the MSRC blog.

So does turning off the SSID on your AP of any good?

You cannot reconnect to a wireless network that uses a hidden SSID after you manually disconnect from that network on a Windows XP Service Pack 2-based computer:
http://support.microsoft.com/?kbid=907405

Just remember that there are tools that allow the attacker to 'sniff' this SSID as you connect to the device, so does turning it off the access point really help? 

Or would ensuring that you are using better encryption on that device be better?

I say setting up your device with better encryption, don't you?

Haven't yet installed SBS sp1? We have a new way for you to do so

Okay so you know that SBS sp1 is a five step process right?

Downloading the service pack. The download for Windows SBS SP1 includes the service packs necessary for the Standard Edition of Windows SBS 2003. As a part of this process, you must download five separate files, which could take a considerable amount of time depending upon the speed of your Internet connection. If any of service packs 1-4 are already installed, it is not necessary to do so again.

 

 

1. Service Pack 1 for the Windows Server® 2003 operating system

2. Windows SharePoint® Services 2.0 Service Pack 1

3. Exchange Server 2003 Service Pack 1  ------Instead of deploying Exchange 2003 sp1, stick Exchange 2003 SP2 here

4. Windows XP SP2 for Client Deployment

5. Windows Small Business Server 2003 SP1

And if you are a Premium customer and finish up with SQL 2000 sp4 and ISA 2004, you don't end up with the “Not to all seven times” effect that if you if you stick Exchange 2003 sp2 on 'after' SQL 2000 sp2.

Les [is more] Connor is reporting that he's doing this at clients and it's working like a champ.

Don't forget to read the Community release notes before...and have a backup.

This is merely the application of a service pack and we are not seeing any issues in switching out the Exchange service pack 2 versus the 1.  I'm double checking, but I cannot imagine that it would be unsupported in any way.

I'll tell you this...I'd definitely recommend it for your premium boxes as a way to ensure that the right files are laid down.

Excuse me, Thunderbird? But did you TELL ME you were going to do that?

So I run Thunderbird to pull in my 'external' non firm Email [all my junk mail, listserves, etc....] so I'm running the 1.5 [beta... I guess I should know better] and in the middle of having the email client open it tells me it downloaded an update and needed to restart.  Which did two things.  Number one it reminded me that I forgot I had flipped myself to admin to get an new program working and forgot to flip myself back [bad Susan] and two... exactly WHEN did I agree for Thunderbird to download stuff on my box without asking me?

Is anyone else getting tired of all the programs that sneak in via installers, or options that these programs don't warn you about?  I'm not talking about Spyware here, I'm talking about regular stuff like installing Google toolbar and making sure that your search engine selections are as you want them, or installing the upgrade to MSN 7.5 and having to make sure that your home page isn't reset.

You have to really make sure you look at all the selection boxes and checkmarks to make sure you aren't selecting the wrong one and ending up with something you didn' t want.

...and funny... I sure don't remember telling Thunderbird they could check that box to auto update like that......it's not that I don't mind ensuring that I'm up to date... it's just that I want to be told what my software is doing and ensure I'm informed about it first.

Writing them down

We're now a two Audiovox house.  My sister now has an Audiovox that matches mine.  So we were setting up the MSN IM on the device and she couldn't remember the MSN IM password she set up. 

Is it _________? I asked since that's the password I had set up for her the last time.

No, I changed it.

Okay to what?

I don't remember.

Did you write it down?

No.

Okay, but if you can't remember what the password is, and you didn't write it down?

But if I write it down someone may find it and break into things.

Only if you don't protect where you write it down.

We're starting to get to the hard part about security.  We've worked on the technology side of the security issue, now we've got the biggest battle of all in front of us. 

The people one.

Pick a good password folks say.  But when we do one that's good and strong we can't remember it.  I noticed as she was resetting up the Passport password [and resetting it in the process] it indicated to her the complexity of the password she chose.  Pick one that's weak, one that she and any one of us can remember and the Password complexity meter said “Weak”.  Pick one that is a good password and the average person can't remember it.  Can't remember the security question.  Can't remember the needed two factor authentication that the system is needing.

You remember the triangle they talk about... Secure... Cheap... Easy... pick two.  My sister won't write down the strong password because she doesn't trust any personal security she has, yet she'll chose a weak password instead.  Somewhere there's a happy medium

Sis and I haven't found it yet though....and we're struggling..... and arguing... about it.

Heck even the banking system is struggling with it.  Bank of America for example..... will become the first major U.S. bank to add another level of authentication, as banking and tech-security experts debate how to best balance convenience and security. 

The Federal Financial Institutions Examinations Council last month called on all banks to toughen log-on procedures by the end of 2006. But the council, a consortium of five federal banking agencies, stopped short of specifying how to do that.

 

"No one knows what the right answer is yet," says Unisys banking security consultant John Pironti.

 

Which means... me and my Sister will probably argue again that she needs write down her passwords in order to have better ones.  I can't convince her to write them down and she'll forget the strong ones.

 

...like I said... we're in the hard part of security aren't we?

Trend and Scan mail deployment

In the mailbag this morning, Roger asks “ So how do you get ScanMail client to autodeploy with the other bits? The best I've been able to do is a shortcut dropped on the desktop that installs the Trend Micro client.“

 

I guess I'm not understanding because ScanMail client has nothing to do with my desktop.  Remember all of my email is prescanned by the Exchange server and I do not use pop to pull in email.  Scanmail is totally up on the server doing it's job.  I don't want a pop connection on a domain joined machine because that bypasses the security settings of the fabric of my network. 

 

I want my server to be the 'big brother' and scan and monitor the stuff that comes into this computer.  I don't want a workstation to bypass that scan/strip email attachments, etc.  Let me tell you why...heck let me SHOW you why...

That's why.  That's a file that I downloaded to my harddrive as a test.  It went around the protection of the file server and it was on my workstation.  I never want to have my antivirus at my desktop to 'freak' out like this.  If it does it means that a layer of my protection setup has failed.  I've not done my job as admin keeping the network secure. 

For instructions on setting up Trend's CSM suite on a SBS box I'd recommend Wayne's pictorial version located at SBSFaq.com

BTW I always use the login script feature of Trend.  That option tends to work the best for me.  And I think that's what Roger was really asking about.  How do I get the Trend to automagically deploy... I use the Server tool feature of “login script” to add it to the SBS login script.  Works like a champ.

No to all -- Seven times

Well I finally did it tonight.  Patched the real baby at the office with Exchange 2003 sp2.

I manually shut off the Trend Exchange antivirus

I shut off the server antivirus

I manually shut down the SMTPservice ...just in case....

And I hit the 'No to all” issue.  You know..the No issue.  When we SBS 2003 sp1 premium folks [that translates to having SQL 2000 sp4 on the box] install Exchange 2003 sp2 on our systems we get prompted along the way to replace existing files with older ones.  And...well... given that Exchange 2003 sp2 is 'supposed' to be the new kid on the block for a moment you scratch your head going... huh?

For the record you say “No to all” a total of Seven times.....

For whatever reason the versions of the files that Exchange 2003 sp2 wants to put on are 9.107.8320.4 whereas the ones already ON my box are 9.107.8320.9

..bottom line folks...in the Patching world... Exchange needs to catch up with the other server platforms when it comes to patching.  I really have no idea if the difference between a .4 or a .9 is of consequence... I'll keep you posted on that one.

I like my Windows Server patches.  They install so much nicer.  Time to check the phone for syncing..and it looks like everything is working quite nicely!

P.S.  if you replaced them.. merely rerun the SQL 2000 sp4 installation from your SBS 2003 sp1 premium disk 3

A new Macromedia Flash Player is Available

I hate little programs that suddenly wake up and need updates when I've flipped to admin mode.  I need a way for notifications to come to me no matter what user rights I'm in.

Macromedia has addressed this issue in the following security bulletin;
http://www.macromedia.com/devnet/security/security_zone/mpsb05-07.html
Systems Affected:
Macromedia Flash 6 (on all Windows platforms) 
Macromedia Flash 7 (on all Windows platforms)

Overview:
eEye Digital Security has discovered a vulnerability in Macromedia Flash
Player versions 6 and 7 that will allow an attacker to run arbitrary
code in the context of the logged in user.  An array boundary condition
may be violated by a malicious SWF file in order to redirect execution
into attacker-supplied data.
 
Right now they haven't updated their advisory page to 
show it as published.... but it will be
 
Now if you want to take this one step farther you can donate to
and use Corey's Flashbang [aka the Flash player killer]
 ...it could come more in handy than just shutting off annoying 
ads but also shutting down a launching flash player.
 
P.S.  That reminds me... I need to dump the icon for the Nokia
PC suite as I don't need that anymore with my Audiovox phone
that doesn't need cables.

Scorpion Software's Firewall Dashboard [sneak peak]

Now just so you know I got his okay to post this in the blog as long as I warned people this is the “ALPHA” view of Dana's Firewall dashboard.  Right now he's just looking for folks to sign up to be beta testers and ...well... based on the sneak peak he gave me of the Alpha version..... I'm already loving it.

One of things I love the MOST about my SBS network is the monitoring email it sends me daily.  But I've always wanted something more for my ISA reports.  I set up the email per Handy Andy's instructions, but ...well.. you know me... always wanting just a bit more paranoia and information.  I love information.  And the Firewall Dashboard that Dana is working on....let's just say .... even in the Alpha stage...it's major cool.

So are you ready for the sneak peak?

I'm not going to show you the entire email...but just ....well...some of my really favorite parts....

There are two sections that are my personal favorites...the first is this 'top ports attacked' grid that gives the 'management pie chart' view.  In your face, what gunk is hitting your box view.... very cool.  Remember this is looking at the reports not from the inside, as what threats are from the outside.  So this is unlike the ISA reporting, it's much more targeted in this Alpha version for one.

This image is near the top of the dashboard email that gets sent.

Now the cool thing about this is my next favorite area where the information about the risks of those attacked ports are discussed....Cool isn't it?  Right now in the Alpha version he's got the Country identified as where these ports being hit are coming from.  Dana said most of it is his neighbor's infected computers. 

For those of you in the bandwidth challenged areas of the world... there's a bandwidth received and sent report.

Okay that's enough of a sneak peek... you are just going to have to drop him a note and sign up on the beta.

I've been reading Security bulletins this long and only now learned this

Okay so I'm a Security bulletin junkie.  I don't know of them by KB numbers but by the year and number, but I just learned something new ... when there is wording changes they increment up by a .1, .2, etc.  When they update binaries, they change the version by a full digit.

05-052 is now on

Version: 1.3

which means it's had wording changes only to that bulletin but has not had an update in the binaries...the patch files.

05-004 is now on Version: 2.0 - obviously that one indicates a file or binary has changed.  Either a rerelease or another package release.

I mean I always read the revision information but I guess I just never put two and two together to realize their numbering structure.

Stepto posts about the change in the bulletin to alert folks about some issues with customized Web Apps.

More and more of these web app issues in patches is a good thing in my opinion..it means that browser is being tightened up.

Learned something new today.

One patch next week

********************************************************************
Title: November 2005 Microsoft Security Response Center Bulletin
Notification
Issued: November 03, 2005
********************************************************************

Summary
=======
As part of the monthly security bulletin release cycle, Microsoft
provides advance notification to our customers on the number of new
security updates being released, the products affected, the aggregate
maximum severity and information about detection tools relevant to
the update. This is intended to help our customers plan for the
deployment of these security updates more effectively.

In addition, to help customers prioritize monthly security updates
with any non-security updates released on Microsoft Update, Windows
Update, Windows Server Update Services and Software Update Services
on the same day as the monthly security bulletins, we also provide:

.Information about the release of updated versions of the Microsoft
Windows Malicious Software Removal Tool.

Information about the release of NON-SECURITY, High Priority
updates on Microsoft Update (MU), Windows Update (WU), Windows Server
Update Services (WSUS) and Software Update Services (SUS). Note that
this information will pertain ONLY to updates on Windows Update and
only about High Priority, non-security updates being released on the
same day as security updates. Information will NOT be provided about
Non-security updates released on other days.

On 8 November 2005 Microsoft is planning to release:

Security Updates

1 Microsoft Security Bulletin affecting Microsoft Windows. The
highest Maximum Severity rating for this is Critical. These updates
will require a restart. These updates will be detectable using the
Microsoft Baseline Security Analyzer (MBSA).

Microsoft Windows Malicious Software Removal Tool

Microsoft will release an updated version of the Microsoft Windows
Malicious Software Removal Tool on Windows Update, Microsoft Update,
Windows Server Update Services and the Download Center. 

Note that this tool will NOT be distributed using Software Update
Services (SUS).

Non-security High Priority updates on MU, WU, WSUS and SUS
.Microsoft will release two NON-SECURITY High-Priority Updates on
Microsoft Update (MU), and Windows Server Update Services (WSUS).
Microsoft will release one NON-SECURITY High-Priority Updates on
Windows Update (WU), and Software Update Services (SUS).

Although we do not anticipate any changes, the number of bulletins,
products affected, restart information and severities are subject to
change until released. 

Microsoft will host a webcast next week to address customer questions
on these bulletins. For more information on this webcast please see
below:
.TechNet Webcast: Information about Microsoft's Security Bulletins
(Level 100)   
Wednesday, 9 November 2005 11:00 AM (GMT-08:00) Pacific Time (US &
Canada) 

At this time no additional information on these bulletins such as
details regarding severity or details regarding the vulnerability
will be made available until 8 November 2005.

********************************************************************

Support: 
========
Technical support is available from Microsoft Product Support 
Services at 1-866-PC SAFETY (1-866-727-2338). There is no 
charge for support calls associated with security updates. 
International customers can get support from their local Microsoft 
subsidiaries. Phone numbers for international support can be found
at: http://support.microsoft.com/common/international.aspx
 
Additional Resources:
=====================
* Microsoft has created a free monthly e-mail newsletter containing
  valuable information to help you protect your network. This
  newsletter provides practical security tips, topical security
  guidance, useful resources and links, pointers to helpful
  community resources, and a forum for you to provide feedback
  and ask security-related questions.
  You can sign up for the newsletter at:

  http://www.microsoft.com/technet/security/secnews/default.mspx

* Protect your PC: Microsoft has provided information on how you 
  can help protect your PC at the following locations: 

  http://www.microsoft.com/security/protect/

  If you receive an e-mail that claims to be distributing a 
  Microsoft security update, it is a hoax that may be distributing a 
  virus. Microsoft does not distribute security updates via e-mail. 
  You can learn more about Microsoft's software distribution 
  policies here: 

http://www.microsoft.com/technet/security/topics/policy/swdist.mspx

Speaking of Wireless

So are you up on your TLAs?  Three letter acronyms?  Wireless has TONS of 'em.  On the download center a document about wireless was just posted.

Presents two deployment methods for secure wireless access: one for small office/home office (SOHO) networks and one for small organizations.

Here at home I have the wireless on the 'outside' of my network but I am using WPA with preshared key.  I need to bring it inside the network but just haven't yet, mainly because I don't domain join this Tablet PC anyway....

It's mainly used for hotels, travel ...and .... for when the Evil Queen has to man the front door at Halloween.

I want to keep my system safe as possible

I don't want to use exchange because I want to keep my system as safe as possible.“

Heh.  This must be “good enough security“ tonight or something.

The poster on the Lockergnome posting site should understand something about Exchange.  He's thinking that having Exchange running is adding 'insecurity' when I would argue that if you don't install it and use it's power to clean, despam, and protect from viruses, and instead use POP accounts to pull in email directly inside your desktops you are not using the power of the server to better protect you. 

In my network I pull off just about all attachments and only let those attachments that I need for absolute business into the desktop.  Then I ensure that I have an Exchange aware antivirus and it cleans the email before it hits my desktop. 

Bottom line thinking that a part of an operating system not used will make you more secure may not be the right thing.  You need to look at the bigger picture. 

In this case, fully utilizing what you have, I think will go farther to help you be more secure.

Good enough security

What's enough security?  What's good enough security?  We got to talking about this in regards to a couple of blog posts and patching.  I was attempting to remotely patch my SBS box over remote web workplace and because the SMTP service got stuck taking down IISadmin, remote web workplace also got a little smooshed in the process.  We got to talking about remote patching and how you can do it safely and dependably.  A terminal services connection will give you the most consistent and dependable patching connection.  But given Terminal services historial issues [TSgrinder comes to mind] how can you defend a well known port of 3389?

Well one thing that you can do if you add the premium edition is ISA server.  With the addition of the premium firewall you can set it up so that the TS port only responds to you the consultant.  With Remote Web Workplace, the firm's employees really doesn't need access to that straight TS port do they?

But what else can you do to give good enough security?

Passwords/passphrases. 

Today I toured the open house of a hospital with a new treatment center.  And as we were walking through the computer rooms, me being the geek I am, I was looking at what systems they were running.  And there on the screen was ... tapes to the screen.... the user name and password.  And it was quite a sucky password.  I mean ... the whole idea behind urging folks to write down passwords in the first place is to ensure that you choose better ones.  The one I saw today, written down, taped to the screen certainly was not in this category 

A long administrator password helps hugely to better protect that Administrator account.  The human brain has a limit to what we remember.  There's a limit in our brains of how much we can process and remember. 

Good enough security means taking extra precautions.... like passwords.

Exchange 2003 sp2 success on my home server!

[UPDATE] - SEE THE POST IN THE SHAVLIK FORUM FOR THE ANSWER AND MORE WORKAROUNDS

http://forum.shavlik.com/viewtopic.php?t=2612

Bottom line.. Exchange patches suck.  I can't wait until the next version of Exchange and for the Monad era.  In the patching world, in my opinion, Exchange is the 'drag'.

The other day I blogged about an issue I had on my home test server.  And with the help of the SBS engineers, first in the tier one level and then via escalation, we got it figured out.

So let's recap what was happening in my system.

First off when I installed it on my Dell OEM test system, I had no issues.  But when I came and did it on my home test system, it gave me an error during the install of Active Sync:

Setup failed while installing sub-component Exchange ActiveSync with error code 0xC0070643 (please consult the installation logs for a detailed description).  You may cancel the installation or try the failed setup again.

And when you hit cancel it completed and then sent a Dr. Watson report.

The error message pointed to one file.. MSXML3.MSI and when we went to manually install that I got the next error message of:

A network error occurred while attempting to read from the file:  C:\Program Files\Exchsvr\bin\msxml3sp5.msi

So in working with the SBS escalation team [and by the way, you know you are in trouble when they conference call you in to the Engineer in charge of the case and he goes, “Susan, Susan Bradley?“...uh... yeah...]  and well, it happens to be one of the gang on the SBSPodcast that you just listened to last weekend.  :-)

So we started a series of investigations to figure out exactly what was going on.  Remember the server was still functional, I'm still in 'test mode' so we started this process of swapping emails and me sending log files back and following the instructions [command line stuff...yuck...thank goodness for cut and paste]

And finally in the last set of instructions to build them a debugging log file so they could see what the installer was getting stuck on, we found the answer:

Shavlik HfnetchkPro

You see on this system at home I had installed Shavlik, unlike the Dell OEM and unlike my real baby at the office where it's installed on my workstation.  And because the Shavlik had installed it's own patched version of MSXML3SP5.MSI in a file location, the installer for Exchange 2003 sp2 couldn't handle an installer location differently than what it was expecting.  [Well that's my take anyway].  So the SBS gang had me export out a reg key [backing it up first of course] and we tried the install again.  So first asked me if it had this reg key

[HKEY_LOCAL_MACHINE

  \SOFTWARE

    \Classes

      \Installer

         \Products

             \45D60EC31B272B44BA064E72E78CE04F]

Yes it did

If it exists, it should have a value of ProductName set to Microsoft XML Parser.

Yup, and it looking at it you can tell it was installed by Shavlik

If it exists, export and delete the key.  Then reapply Exchange 2003 SP 2 to see if it installs without producing the error regarding msxml3sp5.msi.

It did.

Now because the Gods of computers are with me tonight, of course my SMTP service got stuck and would not nicely stop [which of course hung the Patch reinstallation], so I think when I do this for real, I'm going to be manually stopping that SMTP service 'FIRST', just to be safe.

So for that other guy in the German newsgroup?  You have Shavlik on your box?

"with a second installation on another system I have now the error:  0xc0070643 with the Inst. of the Unterkomponente ActiveSync!?!?"
"bei einer zweiten Installation auf einem anderen System habe ich nun den   Fehler:   0xc0070643 bei der Inst. der Unterkomponente ActiveSync   !?!?"


The moral of this story?

This was a free call because it was an issue with a service pack but honestly... it was an issue caused by a third party software installed on my server.  My real baby at my office, I tend to keep that box lean and mean with a minimum of extra software so I would have never hit this issue.  I have seen others get hit by this issue, like the guy in the German group, so one of the reason why I didn't blow this off and just go “oh well, the box still works, I'll just let it go” was to help the next guy down the road.  This “is” my test box so I could take as long as I wanted to.  Service packs don't need to be installed during lunch [or while you are taking a shower even, geeze ;-)  Unlike Security patches, I can take the time to test them and to understand fully a snag I hit in a test environment.  While this is a real box, I could have done a similar test with a VServer or VPC image.  And now with Exchange 2003 sp2 on the box, that's now officially supported in a virtual environment as well.  So, I now know that this issue will not be one that I'll see on my real baby, and I can let a couple of folks know that pinged me about that blog post to have them check on their boxes for Shavlik as well.

Calling into Product Support Services means that the issue will now be documented, my SRX case will be filed and the next time someone hits this issue it will be known immediately and that person fixed right up.

So the next time you have an issue with a Service pack or a Security patch... call. 

 

How to troubleshoot Windows Update, Microsoft Update, and Windows Server Update Services installation issues

How to troubleshoot Windows Update, Microsoft Update, and Windows Server Update Services installation issues:
http://support.microsoft.com/default.aspx?scid=KB;EN-US;906602

For an excellent resource on WSUS, head on over to www.patchmanagement.org and sign up for the WSUS listserve over there.

Getting prompted for your Office 2003 CDroms?

I'm stealing this from a posting Dave Nickason did in the Public newsgroups

 

Questions have come up recently about being prompted for the Office CDs while patching with Microsoft Update or WSUS.  Since it's an obvious annoyance for a user or admin to be prompted for the CD while trying to work on something else, here's a way to avoid being prompted for the CDs.

 

Office 2003 has a feature called "Local Installation Source."  The last step in the Office install is to choose whether or not to remove the installation files.  If you allow the installer to leave the files, they are left on the workstation, typically in C:\MSOCache.  (On systems with more than one partition, the files may be cached elsewhere based on space considerations). The recommended practice would be to leave the files after installation, but you may have already installed Office and removed the files, or you may be dealing with an OEM install where the files were not cached.

 

If you allow the Office installer to create the Local Installation Source, that should keep you from needing the Office CDs for Detect and Repair, Demand Install (features set to install at first use), Maintenance Mode Setup (running a repair or adding features from Control Panel Add/Remove), and patch and SP installations.  See this KB:  http://support.microsoft.com/default.aspx?scid=kb;en-us;825933.

 

If for whatever reason Office has already been installed without caching the installation files, or if you want to change their location, the Office Resource Kit offers a free utility, aptly called Local Installation Source Tool.  When you download and run the tool, one option is Enable, which will create a new LIS for an existing Office install.  At least theoretically, running this tool should be the last time you're prompted for the Office 2003 CDs.  In addition to providing the CDs for Office, the LIS Tool will want them for any additional Office product installed on the PC, such as OneNote.

 

Get the Local Installation Source Tool from  http://www.microsoft.com/office/orkarchive/2003ddl.htm.  (Bookmark this page - it's where you get all the ORK tool downloads).

 

Local Installation Source FAQ:  http://support.microsoft.com/default.aspx?scid=kb;en-us;830168

The updated "how to get Quickbooks to run as non admin" how to

QuickBooks Community - Running QuickBooks 2005 as a Restricted User (Admin Rights FIX):
http://www.quickbooksgroup.com/webx?14@@.eeb323b/9

And yes it still needs these hacks for the 2006 version.

Remind me to send them a copy of the Nineteen Deadly Sins of Software, will ya?

 

To all of those who have asked me "have you downloaded Skype?"

To all who have emailed and asked “do you have Skype”... I have four little words for you today.

GO GET AN UPDATE.

Now you can show me a Skype security report all you want, but I'm still not convinced.  I still want Skype not inside my network, thanks.....

What's a best practice?

In the MVP world we have camps.  I swear we'd have cheerleaders even if we had a chance.  Football games possibly with the Windows team playing the Office team.  But instead we have blogs and newsgroup postings for our playing fields.  And there are times we lob volleys across the wall at one another.  One MVP will indicate the 'differences' between SBS's Sharepoint and “normal Windows” Sharepointfor example.

In a blog Dr. Tom posted today about a situation where someone got help in setting up a VERY unususal ISA configuration that entailed getting a normally corporate domained laptop out the door of another different domain, he says “The ISA firewall product has enough problems getting traction in the marketplace without having to deal with what looks like an enemy within. “ and the funny thing is, in the book “Protecting your Windows Network by Steve Riley, and the very gentleman with the unususal firewall setup that wrote that blog, they actually stated that ISA server was a very very GOOD firewall and even went so far as to say that even on a server it was layered on the Windows tcp/ip stack in a manner to be able to protect. The enemy here is certainly not within when in literature they are on record as praising it. 

I'm not sure if Dr. Tom has read the book, but he'd see that the authors actually praised ISA server and were certainly not dissing it. They even talk about how SBS 'might' just 'might' be more secure than larger firms because we'll have admins that don't mess around with the firewall and make unnecessary adjustments.

It gets back to my rants about 'best practices'.  Best for whom?  For you?  Does that checklist you are following really understand your firm?  The entry points into your network?  In this day and age where you can shove just about anything out the universal access port 80, I still argue that it's the awareness of the network that makes me safe.

I'm in charge of my network.  My sister's firm does some of those 'security best practices' and yet she comes home with more stories of security issues than in  my network.

...so I'm still out here saying ... how about we don't compare my network threat model with the Department of Defense threat model.  Mine is different from Dana's who is different from Chad's who is different from...well ..we are all just different.  And Security doesn't have a yes/no answer nor a checkbox.

A lot of it indeed is PEBAK based - problem exists between the chair and keyboard. 

It's me.  It's the decisions I make that are the biggest risk to my firm....but one of those decisions, being an aware Admin, that's one that I would argue that is better than a lot of so-called best practices and checklists.

P.S.  Make no mistake.  I CHOSE SBS.  I did it in 1998, I did it again in the 2000 era and once again in 2003.  A compromise to me is not accepted but not wanted, I'm making a choice of this platform as a result of a settlement.  A balance.

Someone posted the following about SBS and in particular about ISA on SBS ....

SBS is a security compromise by definition:
"Something accepted rather than wanted."
"something that somebody accepts because what was wanted is unattainable"

No, I chose SBS because it has things in it no other platform has and I do want it.  If given the same decision tree, the proper balance, I will choose it again.  If you define 'compromise' as what it is in reality, a balance.... then yes, indeed SBS “is” a security compromise.  But it's one that is CHOSEN because it IS a balance by businesses all over the world.  I didn't want to attain anything else.

Got an issue with your Windows update? Here's how to figure it out

Okay so you've gone to Windows Update or Microsoft Update and it grinds and grinds and then it fails.  So you go to a newsgroup or listserve and ask... It's broken, how do I fix it?  But you forgot the most important thing...up in the corner is a code number.  See that?  Make sure you tell someone that code number..or ...better yet... go find the answer yourself....for example, say we have the error code of 0x80072EE2.

Fire up Microsoft Update, and look in help and support.  Now click on troubleshooter, and in the search box put in that 0x80072EE2

And you'll find you get back this....

*Problem description*
This error may occur if your Internet connection or configuration is preventing access to the Update site.

A misconfigured Proxy/Firewall can cause this problem. Double-check the Proxy/Firewall settings.
Add the following urls to the exception list within your Firewall/Proxy:
http://*.update.microsoft.com
https://*.update.microsoft.com
http://download.windowsupdate.com
For help configuring Proxy/Firewall refer to documentation or contact the manufacturer

The KB article they point to is....You receive an "Error 0x80072EE2" error message, an "Error 0x80072EFD" error message, or an "Error 0x80072f76" error message if you try to use the Microsoft Windows Update Web site or the Microsoft Update Web site: http://support.microsoft.com/?kbid=836941

See?  That wasn't so hard now was it....

Why doesn't Microsoft say that?

“....why doesn't Microsoft say that?“

It was a question I was asked earlier this week in response to an email I sent to a journalist. 

...and you know what... I really don't know why someone from Microsoft in their PR department didn't just say what happened.  The truth.  But for some reason the truth, the facts didn't get out to the public.

And the sad thing is, the truth would have made the public more secure, would get rid of the fears, the doubts.  But because that message didn't get said, because the words weren't said, I think Security was affected.

Security is defined as Freedom from doubt, anxiety, or fear; confidence.  .

And in the WindowsUpdate newsgroups, some people had a lot of questions about a 'buggy” patch.  Even on non affected Windows XP machines.  Even one of my fellow MVPs emailed and asked if anyone had any links to information about a “buggy” patch.

But here's the thing that is amazing.... you see the patch wasn't buggy at all.  The bad effects of this patch that the press talked about was mostly as a result of Administrators who had made security settings, tightening to registry keys, called 'hardening'.  But here's the thing.... these settings are actually not recommended by Microsoft at all.  They really are not supported.  So anyone following these guidelines, knew, they understood that they had responsibility for their network. They knew they would need to test. 

So I can't understand why, when the press starting writing their stories about the effects of this patch why someone from Microsoft didn't just say the truth.  That it was the people chosing to set up their network this way that got the most affected.  Now I'm not saying that people that were not running Windows 2000 and did not adjust permissions didn't have patch issues, but I think all of their specifc issues got passed over by the headlines regarding this so-called 'buggy patch'. We lost the real story of what was happening with this patch because of the overwhelming press that got stuck on the issues with the patch that were inflicted by the Administrators themselves.

And all of this confusion could be done away with if the Public Relations of a company just said the truth of what happened.  Truth didn't get said.  People got confusion instead.

Sometimes I don't understand the world of marketing and Public relations.  In fact, sometimes when I'm faced with a hard slick sell, it turns me off.  Big time.  In fact, give me truth.  Tell me the warts of something, because if you don't I'll find them in the product.  And believe me, if you didn't tell me about the truth of a product, and I find out about it after I've bought that product, I'll feel like you didn't tell me the truth and never forget that.

I was talking today with another guy about a software product I have at my office.  Bread and butter, line of business application.  One that I moved from one to another a few years ago, a competing product.  When I was talking about the issues I had with it, and comparing to a competitive product, the gentlemen and I that were discussing these products were commenting that we couldn't beleive that both products hadn't done better things for the customer.  That they had been in the marketplace this long and neither one was perfect.  Both had software 'warts'. And if I had known about the software warts of each platform, rather than just getting the salesman 'speel', I think I would make the same decision I made, but I wouldn't feel ... well... slightly abused by the 'speel' I got from the Salesman assuring me the software was perfect.  But because no customer was in the role I was, truly comparing the two, no one had recently made the migration, I didn't get the real facts.  I got the slick ads. 

So here I am, in a software program that works, but isn't perfect.  And if the salesman had been more honest with me I wouldn't feel the way I do now.  “Sold“ to.  Owner of a product that doesn't quite work like it was advertised.

Trust is defined as Firm reliance on the integrity, ability, or character of a person or thing.

I don't understand why firms don't understand that the best way to build trust with me and my business is to be honest. If you want me to be a long term customer, don't sell to me, be honest with me.  I moved from that other Line of Business application because they kept promising and not delivering.  And jumped from one that kept under deliverying to another software that kept pushing back a release date to the point where the ship date missed an entire tax season.  We were told one thing, when the truth was another.  And while the salemen were on the phone lines assuring me that the product was shipping, when I called tech support on this product, they said “oh it won't ship until May“.

Why do we accept what we do from Salesmen?  Why do we accept the slick ads?  I've chatted with many a folk who buy a software product only to find that once they peel back the onion layers and the software doesn't work as advertised they feel like a bit abused.   Why is it that the human folly is that we need Madison Avenue to convince us to buy things we don't need?  Isn't the obvious example of this perfume?  It's fragrant, colored water that more is spent to package it, advertise it, than it does for the ingredients for the product itself.

Sorry if I'm rambling a bit tonight.  But several conversations this week have led to this rambling blog post.  Today at lunch with a good friend, the two of us were chatting that we're not sure the press or the public relations of a firm control the message anymore.  We agreed that in this day and age of blogs, newsgroups, communities and word of mouth, even the three major networks didn't control the message anymore.  All it takes is someone who will never forget a bad experience and will tell this in a public online forum such as this and there goes a dent in all that good public relations you've built up. 

I don't know, maybe I“m being naive here, but I think being honest and truthful goes a long way.  I thnk it builds the trust.  I'm not convinced we need all the slick packaging that we end up getting.  I think being honest to the business owner... building that trust... I think that's a stronger, more long term sale.  You might not see the immediate “Madison Avenue” benefit, but I think that honesty will reap a longer term relationship. 

A funny thing happened the other day to showcase how a bit of honesty changed a conversation. I was hanging out in Andy Goodman's MCP chat the other day and was using my usual online alias and at one point in time started chatting with a poster arguing strongly about the advantages of SBS 2003 over SBS 2000.  I said that it was obvious in the recent patches where Windows 2003 was not a readily vulnerable as Windows 2000 proved that it was time to get off that platform.  And at one point in time when the poster was challenging me, he said “what have you drunk too much Microsoft Koolaid or something?“ and it took me aback a bit.  There are times people think I choose Security too much.  But here's the funny thing, once I had 'outted' myself and told the chatter exactly who I was, he recognized me from the blog and his attitude changed.  He was listening to me, not as a “koolaid seller“ but as someone who had earned ...well hopefully anyway... a little respect.   I had changed the relationship by being honest with him of who I was. 

And speaking of chosing Security over Business is that I don't think we choose Security enough over business needs.  Because at the end of the day John Q. Business Owner doesn't want things blocking him from doing his job, his business.  He will find ways to go around that barrier if it stops him from doing his job.  So security better just work.  And it better be honest.  And the technology salesman shouldn't 'spin' the product promising that the product will do things it won't do.  And we'd better not have to buy more 'things' to get the products to work the way they are advertised in the slick magazine ads. 

Because if you aren't truthful with him, he'll remember.   

If you aren't truthful with me, I'll find out and not forget either.

...so coming back ...hopefully full circle.... to this rambling post of mind tonight that you've indulged me in tonight [well not that you had any choice in the matter... I was in a mood],

Say Micosoft?  How about just being honest and saying that you had a bunch of “Buggy Admins“ who forgot that at the end of the day the responsibility for their network is theirs, not yours.  And if they chose to move away from a supported position, then it was their job to test that patch.

At the end of the day, I'm the one who's in charge of my network...not Microsoft.

The buck stops here.

If you are wondering why Office 2003 sp2 is not coming down automatically on MU

The WSUS blog explains why....

In the previous update release of Office 2003 SP2, some AutoUpdate and Microsoft Update customers experienced installation failures, in most cases due to a damaged Local Installation Source, which in some cases is required for the SP2 installation.  Because user interaction is necessary to resolve this problem, we have decided not to distribute Office 2003 SP2 to users whose AutoUpdate client connects to Microsoft Update

A post for The "~'s" and the "V's" and all the rest.

There's a person I'm going to refer to as The “~”.  Now while I'm going to speak specifically about this one person... in reality he represents a type of a person. 

His job is to fix things.  Find things.  Get things to break.  Figure things out.  Analyze things.  Thus, he's the type of guy that would be installing Exchange 2003 Service pack 2 today.  Now.  In fact, I'm surprised he wasn't up at midnight installing it on some box somewhere.  And in fact if things go smoothly ... he might be a bit disappointed.  He and those like him actually like breaking things.   Because then they learn more about the thing they are breaking.

There's another type of person I'm going to blog about.  This person is the IT Pro.  The Consultant.  I'm going to call him The “V's“.  Now he's a bit like The “~”, but a smidge different.  You see he wants to figure things out, but he wants to ensure once he's installed something, understands it, it's reproducable in a solid manner to his clientele.  So he'll install Exchange 2003 sp2.  Document it.  And quite quickly in fact, but he's probably going to go through the dry run steps of a 'best practice for deploying Service Packs” checklist.

He'll make sure he's read the documentation, he'll make sure he's backed up the Exchange Store.  He'll understand that for his clients that depend on email, Service packs deployments on Exchange are upgrading a Jet database.  Thus he'll make sure he builds in a rollback strategy.  But he's going to to a dry run on a test machine and recreate as best as he can the steps and checklists he'll use for deploying this Service Pack.  He's then probably going to watch that box for a few days and monitor the log files and just make sure everything is as it should be.  And then he'll start rolling it out.  Mainly because his clientele are near the max of those 16 gig limits right now and they are busting at the seams.  And he'll read the documentation on how the default store goes up to 18 gigs but above that needs a manual registry adjustment.

He's also probably going to “triage“ this service pack and only deploy it to those clients who are near that 16 gig database limit.  The ones that need that registry edit.  You see he's probably already in the process of deploying SBS sp1 and he'll want to give is clients a bit of a breather on that for a bit before fully rolling this one out.

Then there's me.  And it's this personal view from my Patch Deployment Central.  It's this view that I post to this blog.  My role in my office is to not introduce risk.  My role is risk mitigator.  So I'm not going to be the one downloading the patch at midnight installing this on my box.  I'm waiting.  I'm going to first install it on my home server, again following the guidance of The “V's”, and I'm going to watch the log files.  I'm going to then pick a date in my office that it's a good time for me to deploy this.  In my office my traditional time for deployment is Friday night, after the office closes at 5 p.m.  I'm going to ensure I have a rollback plan.

And what if you don't have a home server to test this on?  What if you are a DIY admin and you only have your one SBS box?  Well, you can be rest assured of the following....

  • The “~'s“ have done it and are running just fine [well it will be as soon as he installs SBS]
  • The “V's“ have done it and are running just fine
  • The patch has been certified for SBS boxes by Mothership Redmond and Los Colinas [there is no need to wait for a SBS only service pack]
  • and soon I'll be doing it here

In my earlier post I talked about how one shouldn't patch at lunchtime.  There's a running joke that we are so confident in patching that we'll just blindly install patches before testing.  If you don't have a test machine, but only a real production one, just keep this in mind... follow the recommendations.  Have a backup.  Remember you have to have SBS sp1 on the box “before” applying this Service pack.  And honestly you really should consider a Service Pack like a near new operating system.  You don't have to be first.  You can wait for all those “~'s” and “V's”.      

Need some guidelines and ideas for Patch [and a bit of Service pack] testing?  Here's some things I've gathered up along the way...

  • Identify the operating system subject to testing.
  • Identify the service pack level.
  • Identify the hotfixes installed on your systems (if in addition to security fixes).
  • Identify critical third party applications.
  • Identify third party applications that have had patching historically.
  • Identify those files used in patches that may have causes issues in the past. Are the included in this current patch? Assign testing resources appropriately.
  • Study the bulletin to determine if you can uninstall the patch. If not, determine if additional resources for testing or imaging need to be in place before approving the patch.
  • Test the installation of the patch both manually and via your automated patch technology. Can you uninstall the patch using add/remove program or your patch tool?
  • Review the processes of your line of business applications. Are they performing as expected? Attempt to replicate a production environment using imaged data. Having an exact image provides the best testing bed.
  • Set up performance and monitoring tools to review your testing machines43 such as PerfMon, tools from Sysinternals and review all log files.
  • Confirm the installation of the patches via registry review or other means.
  • (OPTIONAL) Confirm the effectiveness of the patch using testing code.
  • Follow any additional procedures your situation requires.
  • Approve the patch for release.
  • PREPARE BACKUPS. [Oh yeah did I say prepare backups?]

The Infraguard Technology Risk checklist also includes the following:

  • When applying a patch to any system vulnerability, verify the integrity of, and test for the proper functioning of the patch
  • Verify that the patch will not negatively affect or alter other system configurations
  • Test patches on test beds before being released into the network
  • Backup your system before applying patches
  • Conduct another vulnerability test after you apply a patch
  • Keep a log file of any system changes and updates
  • Prioritize patches prioritized
  • Disseminate patch update information among the organization's local systems administrators Add timetables to patch potential vulnerabilities
  • Require that external partners deploy all non-critical patches within 30 days
  • Require that external partners deploy critical patches to servers and clients within 48 hours

So if you are one of “The “~'s“, go ahead, deploy it.  The rest of us mere mortals will type up a checklist and at least make sure we have a backup in place.

 

CCH PerForm Plus having issues with 05-052

Microsoft Security Bulletin MS05-052: Cumulative Security Update for Internet Explorer (896688):
http://www.microsoft.com/technet/security/Bulletin/MS05-052.mspx

So invariably several days 'after' applying the security patches that I find things.... CCH PerForm Plus is not functioning.  Remove the patch, it works.  Deploy the patch and it says it needs active X running so obviously those additional active X blockings in that security patch is affecting this program.

Calling CCH... will update the blog with the resolution.

This KB with some fixes doesn't appear to apply...

“Due to a recent Security patch, users of PerForm Plus.....” ... “please go to support.cch.com for further details“

Uh huh...they know about it

Issue

When clicking on a forms library link, CCH perform plus II does not launch.

Cause

A recent Microsoft security update (KB896688), obtained from the Microsoft Update site or automatically installed as part of the Windows Automatic Updates service, prevents CCH perform plus II from launching in certain configurations.

Resolution

This issue can be resolved by adding the CCH website to your Internet Explorer’s list of Trusted Sites.

Resolution Steps

  1. Launch Internet Explorer.
  2. Go to Tools > Internet Options.
  3. In the Internet Options window, click the Security tab..
  4. Click the green Trusted Sites icon to highlight it.
  5. Click the Sites button.  The Trusted Sites window displays.
  6. Uncheck the "Require server verification (https:) for all sites in this zone" checkbox.
  7. In the "Add this Web site to the zone:" field, type in "files.stf.com" and click the Add button.
  8. In the "Add this Web site to the zone:" field, type in "*.cch.com" and click the Add button.
  9. In the "Add this Web site to the zone:" field, type in "*.cchgroup.com" and click the Add button.
  10. Verify that files.stf.com, *.cch.com, and *.cchgroup.com show up in the "Web sites:" window below.
  11. Click OK to close the Trusted Sites window.
  12. Click Apply in the Internet Options window.
  13. Click OK to close the Internet Option window.
  14. Close Internet Explorer.
  15. Restart Internet Explorer and log into the CCH web site.
  16. Launch CCH perform plus II.

Planning for the Exchange 2003 sp2

Remember there is no need to be the first on the block with this.....

First off ensure you READ the release notes [and given right now that the notes point to the pre-release release notes, I'll probably wait for that to be updated first]

Looks like similar to last Exchange 2003 sp2, it needs another patch on the box first,

Important   Ensure that Hotfix 898060, " Installing security update MS05-019 or Windows Server 2003 Service Pack 1 may cause network connectivity between clients and servers to fail ," has been installed on your system. You can determine whether this hotfix is installed by running the Microsoft Exchange Server Best Practices Analyzer Tool, which checks for the hotfix being installed, and then reviewing the output log. If you do not run the Exchange Server Best Practices Analyzer, you must manually verify that Hotfix 898060 is installed on your system. If this hotfix is not on your system, you must install it now.

Then you MUST be on SBS's SP1 in order to install this

Important   Make sure that, if you are installing SP2 for Exchange Server 2003, you are running on either of the following operating systems: Microsoft Windows Server™ 2003 Service Pack 1 (SP1), or Microsoft Windows® 2000 Server Service Pack 4 (SP4). For information about an update rollup to Windows Server 2000 SP4, see " Update Rollup 1 for Windows 2000 SP4 and known issues ." For more system requirements for Exchange Server 2003 (Pre SP1 and SP2), see System Requirements for Exchange Server 2003 .

And lastly, early word is that the sp2 resets [again] the OWA page to the Exchange default of domain\user.

Since 99.99% of my gang just use RWW as their entry point anyway.... I think I'm going to leave it as domain\user.

And above all else... HAVE A BACKUP

But the best bet is to let us install this on our tester boxes and get the 'street view' first.

Disabling the XP sp2 firewall

DON'T.

Next blog post?  Okay....okay... I'll give you my reasons....

Okay let me explain why....well first let me give you why you shouldn't disable it.  Today in our world, your workstations are on that edge of the Internet just as much as your servers are.  And if they get infected by some bad gunk, the faster that bad thing will run though your network.  In any network we have a pretty gooey inner core, yes even in SBSland with out XP sp2 firewalls intact we leave a bit of goosh [file and printer sharing] ready and open.  But our SBSized XP SP2 does at least let our workstations help out as much as they can in the bad guy fight.  And given that many SBS workstations are running as local admin anyway, the applications that want access will, more often than not, build their own exceptions.

So... if you really want to shoot yourself in the foot.  Go ahead, lower your defense in depth.  Don't have your workstations part of a security strategy.  Don't do all that you can to protect client data. 

Okay so now that I've laid the guilt trip on ya.....

How to disable that group policy

Okay see this .....and in particular this view

 

See that “link enabled” that's checked there... all you have to do is unclick it and then force the update by at a command prompt typing in gpupdate /force at the server, and for XP machines, gpupdate /force as well.

Now.. if your policy isn't releasing we got some troubleshooting to do.

Step one...Let's see what's enforcing that policy...

At the workstation type gpresults >gp.txt  [review the additional settings here if you want to do this command remotely]

Now...can you see where that workstation is picking up on it's policies?

Some other troubleshooting steps are here...but start first with that gpresults.  See what's laying down that policy.

ETrust and the XP sp2 firewall

Greg posts that he's having trouble with two things regarding the XP sp2 firewall and SBS...

Here's part one to his solution.... Etrust.  Dave in our SBS group uses ETrust and he wrote.....

eTrust has a little utility that you can run on each workstation that adds the eTrust Local Scanner, Realtime Monitor, and RPC Server to the Windows Firewall exceptions.  It's easy enough to do that I haven't bothered to figure out the GPO.

eTrust pulls the signature updates from the admin server or the eTrust FTP site, so I believe (not 100% sure) that eTrust will update signatures without the firewall exceptions.  For sure you won't be able to use any centralized management or reporting without adding the exceptions.

Thanks Ron in the comments...he points to the solutions for E-trust!  Keep in mind that the file and printer sharing is automatically enabled with the XP sp2 firewall settings in SBS.

Sometimes it 'is' the last thing you try

So I have the big hunking HP Pavillion Harmon Kardon has the built in 10 key on the keyboard that we beancounters drool about, weighs about 9 pounds dripping wet, monster in for a checkup, installing an update to the Trend antivirus [and just realized this doesn't have Microsoft antispyware, shame on me] and what not and for the last two days I've been off and on trying to troubleshoot a problem with it.

You see about every 30 seconds on both the wired and the wireless connections I was trying it would fall 'off' the connection.  I always enable the network connection icon down in the system tray and I would see it drop the connection and then reenable the connection. 

I'm thinking viruses?  Spyware?  Nic drivers?  and trying to troubleshoot a device when it's falling off the Internet every 30 seconds isn't fun, you have to google msnsearch on another machine, find the drivers or software patches you need and then copy them over.  Needless to say I was just about stumped and about to call in the hardware gurus.  And flat out honestly, I'm a software gal.

So one last ditch effort I boot into safe mode to see if I can see if the nic drivers are acting up under safe mode and realize you can't enable the network icons in the system tray in safe mode.  So I reboot into normal windows and ...for whatever reason that escapes me now.... I hover over the far right icon which is the 2Wire network connection monitor for the Home DSL modem that this monster laptop normally connects to.  And again, maybe it was annoyance with icons or something...but I made the monitoring software temporarily exit the program.

Two days.  I've been scratching my head off and on for two days trying to figure out why this has been dropping off the wireless and the wired network at the office and it was the fact that the 2Wire wasn't able to phone home to it's DSL modem was why this laptop kept dropping off the Internet.

It is always the last thing you try isn't it?

Now given that we're about to insert in a Linksys or equivalent at home [where this monster normally parks itself] so that the DSL can be shared out with the Granddaughter on another computer [and not this one that I'm typing this blog post on to confirm with myself that the connection is solid], so that she doesn't mess with this clean, pristine laptop, I'll probably have to permanently disable that monitoring software of dubious reliability.

I'll also have to figure out the best way to protect Granddaughter.  I'll see what I can do with restricted user mode and the fact that when she visits...she wants to play games. And unfortunately game writers have yet to fully embrace the “Secure by Design, Secure by Default, Secure by Deployment” mantra.

Yup, sure enough... rock solid connection.  So exactly again ...why do I need a network connection monitoring program that 'causes' network connectivity issues when it's not connected to what it's wanting to be connected to?

You know this really isn't as widespread as you think

Headline reads Critical Windows patch may wreak PC havoc

Geeze Mr. Editor.....Excuse me but it's in one particular instance where the permissions are set down too tight.  Can the IT world not "Chicken Little" folks and getting them all riled up?

It's one issue with permissions ...come on folks..this isn't universal....In the WindowsUpdate newsgroup there's newbies in there freaking out over there Win machine running with full admin access thinking their PCs are going to flame out with this patch.

Can the headline writers be a bit more real world?

Critical Windows patch may wreak PC havoc

Patch to fix serious Windows flaws can lock users out of their computer,
prevent the Windows firewall from starting, block applications and cause
other trouble.

http://ct.zdnet.com.com/clicks?c=581185-2072731&brand=zdnet&ds=5&fs=0

And no, Indy... Admins had to adjust those permissions...not end users.  Let's understand EXACTLY how this issue is caused.  That's a customized permissions that was not set by end users.  I'm talking about the mis-information that this headline is leading folks in the consumer side into thinking that they will have a problem with this patch when it's a limited subset of computers.

This advisory is for admins.  It's not for the home user and yet they are the ones freaking out...

Need to rekick Windows updates?

Here's some pointers for getting Windows update to work if it's failing on you at the SBS box.

  • Stop the Automatic Updates service from services.mmc.
  • On the SBS, go to %systemroot% (typically Windows)\SoftwareDistribution
  • Delete the *contents* of the DataStore and Download folders.
  • Start the Automatic Updates service.
  • Run Windows Update (and switch to Microsoft Update in the process).

The items needed should be re-detected, re-downloaded, and installed.

Getting a DCOM 10016 right after reboot?

Checking the server I notice right after reboot last night [and I didn't spot it until the “6 a.m Hello I'm your server, here's how I'm doing, how are you?” email that I got this right after reboot....

Buried in all the 'oh my gawd you just rebooted me'  and the “oh I'm adding a printer that I don't have that you have because you are TSing into me [remind me to unclick that printer thing in my RDP to the server box, will ya?]“ freak out messages that you have to weed through and realize it's just my server reacting to Shavlik shutting down IIS and patching things was one that didn't make sense....


Event Type:    Error
Event Source:    DCOM
Event Category:    None
Event ID:    10016
Date:        10/14/2005
Time:        10:45:45 PM
User:        NT AUTHORITY\SYSTEM
Computer:    YOURSERVERNAMEHERE
Description:
The application-specific permission settings do not grant Local Launch permission for the COM Server application with CLSID
{9DA0E106-86CE-11D1-8699-00C04FB98036}
to the user NT AUTHORITY\SYSTEM SID (S-1-5-18).  This security permission can be modified using the Component Services administrative tool.

For more information, see Help and Support Center at
http://go.microsoft.com/fwlink/events.asp.


Hmmm.....what the heck is that?  I don't remember that as normal at all.... and I asked the gang and Wayne reminded me that Marina had spotted that after the Service Pack 1 install.

Sure enough...she did.  Follow the instructions and...hmmm.. yup something got a little wacked there.... my screens on my server don't look like hers at all.  I have no Admin or System user in that window at all.  I need to look at the computer at home as well.  See if I missed the clues there too that something happened.  Looks like it didn't hurt anything ...but you know us SBSers and our need for clean log files.

< Please note - it's been reported on SBS no sp, SBS with sp, and not after any particular patch that we can tell... so if you don't get it this go round... don't worry... and if you do... fix it right back up >

So you patched all your servers/computers... don't forget there's an rollup to MCE 2005 waiting for you at home

 Today, Microsoft announced the availability of a software update for Windows XP Media Center Edition 2005 that will enable consumers to access and enjoy their digital entertainment with greater ease. Microsoft also announced that to date, over 4 million Media Center PCs licenses have sold since the product launched in 2002 - more than 2 million alone have shipped since May 2005!

Available immediately via Windows Update download site, Update Rollup 2 for Windows XP Media Center Edition 2005 will provide several new features, including:

·         Xbox 360 Extender functionality. Customers can seamlessly access digital music, video, photos, and standard and high-definition television and movies on Media Center Edition 2005-based PCs through any Xbox 360 game console in the house..

·         Away Mode. Away Mode will bring the convenience, quiet performance and instant on/off functionality of consumer electronics to the Media Center PC.

·         DVD changer support. Media Center now offers integrated support for external DVD changers, enabling consumers to watch movies and manage DVD selections (up to 500) from the Media Center interface.

·         DVD-burning improvements. Updates to the Sonic DVD burning engine improve the performance and capabilities of DVD burning in Media Center. Now consumers can convert high-definition TV shows to standard definition and burn to a DVD all in one step.

·         Additional HDTV tuner support. Update Rollup 2 provides support for up to four TV tuners. Users will now be able to utilize two NTSC (analog) capture boards and two ATSC (digital) capture boards.

In addition to the new features, Microsoft announced a partnership with MTV Networks that will provide Windows XP Media Center Edition 2005 users access to content currently available on MTV Overdrive. Overdrive is MTV.com's new broadband video channel delivering the hottest video content to Media Center PCs. Overdrive provides access to live performances, over 10,000 archived music videos, artist interviews, never-before-seen footage of MTV shows, the latest news, movie trailers and more. This content will be made available immediately via Online Spotlight.

For more information on Update Rollup 2 for Windows XP Media Center Edition 2005 including a letter from Joe Belfiore, General Manager, Windows Media Center, please visit the Windows XP Media Center Edition Newsroom:

Post patching procedures

I'm in my PPP time now.   Post Patch Procedures... where I'm checking the server... sending email just to make sure all is okay and I also Microsoft update on the server to see that 'it' sees all patches are applied when Shavlik says they are and I notice that Microsoft update finally has Sharepoint SP2 [KB 887624] on the update screen.

Now this one is a bit interesting since it's DEMANDING to be installed all by itself.

And lets see if it needs a reboot shall we?  Others have already installed this and it's certified by Mothership Redmond for our boxes.

I do get a notification that it's shutting down the W3SVC service..but it's not asking for a reboot.

Hmmm...this has nothing to do with this latest round of patching... I've noticed the last couple of times I've rebooted my server that SQLAgent$SBSMonitoring service which is set to “Automatic” is not automagically starting like it should.  I need to call PSS on that and see what's up with that.  Right now I've been manually starting the service...but I need to figure out what's up with that.  Other than that... everything looks normal.

I'm patching are you?

Firing up my handy dandy Shavlik Netchk to patch those machines who have end users that I patch for... Member server has been patched and as soon as the last one goes home tonight I'll be patching the server.

Yes, even though the due date for tax returns is Monday, I am deploying patches tonight.  Why?

Because it's my normal patch window of opportunity for one.  If I have issues I know I can get myself back into a position where things are working over the weekend and I won't have that opportunity during the week, and....

for two... I'd rather...even though I am on way way more protected XP sp2 and Windows 2003 SP1, to be in the best defensive position I can be.

So right now I'm clicking and patching those workstations that need the patches...  I'll have to check the computers I have running as Limited users but I'm not expecting any major issues.... I've tested the patches already on several workstations.

Issues with 05-051/902400 and running as "Restricted User"?

Folks are finding that “Bypass Traverse Checking” needs to be enabled for Authenticated users on machines that are running in “least user privileges' mode that have this permission disabled.

KB 823659  and the Threats and countermeasures guide discusses this.

From the PatchManagement.org listserve....

Here is the response from MS tech person I just received in reference to the
issues we were having with some desktops and the 05-051/902400 patch.
Essentially, on some of the machines we locked things down to much in the
security policy causing the issue.

Here is the response:

--

According to MS tech rep:

The solution will be available at
http://support.microsoft.com/?id=909444,
and will be linked to from the MS05-051 bulletin - hopefully within the
hour.  Feel free to communicate the cacls solution to anyone you come across
until then. This is not a "known issue" or "problem" with the patch, but a
"complexity with the increased security provided by the patch when running
on systems where settings have been incorrectly changed from the default
settings".

P.S.  link is now live:

Various problems may occur after you install the Microsoft Security Bulletin MS05-051 for COM+ and MS DTC:
http://support.microsoft.com/?id=909444

Seeing two patches for 902400 in your WSUS console?

Torgeir reports that the two patches are for Windows XP sp1 and Windows XP sp2 that you might be seeing in your WSUS consoles needing approval. 

He says....

Hi,

The one with Update ID 8768e086-9d42-41df-8577-76f820c39364 is for
Windows XP SP1.

The one with Update ID e0a7fc7e-ff6e-4559-990b-4b4a01f0ad39 is for
Windows XP SP2.

If you have both WinXP SP1 and SP2 computers, you will need to approve
both.

I have informed Microsoft that the service pack requirement should be
added to the WSUS metadata to avoid confusion, and from the feedback
I got, hopefully this will happen in the near future.

Regards,
Torgeir

Torgeir posted this to the WSUS listserve [you can sign up at www.patchmanagement.org site]  902400 is MS05-051 that should be quickly patched to your Windows 2000 boxes [remember the threat to 2k3 and XP sp2 is much less].

Two SBSers reported ......

 "This morning four users reported that after booting up, their desktop PCs did not respond to ctrl+alt+del. They had to cold boot them, at which point everything worked normally. Nothing logged.

I'm thinking the Tuesday patches got applied by SUS yesterday without reboot, so these were the first startups after the patch applications."

Incidents.org reports the 'chatter' around Security bulletin 05-051 is getting louder

Got windows 2000 machines in your network?  Start patching them for 05-051...like NOW.

SANS - Internet Storm Center - Cooperative Cyber Threat Monitor And Alert System - Current Infosec News and Analysis:
http://isc.sans.org/diary.php?storyid=759

http://www.microsoft.com/technet/security/bulletin/MS05-051.mspx?pf=true

05-049 is only important, not critical [WSUS not quite reporting properly]

If you are WSUSing and doing so based on Criticality... 05-049 [kb 900725] is showing up on WSUS as critical and the bulletin says it's Important.

But honestly... patch anyway...since you are there WSUSing... if you've tested it and are ready for approval.  I'd say, go ahead.

Security Bulletin 05-051 - keep an eye on Windows 2000 and XP SP1 machines again

Intrusion Prevention, Vulnerability Assessment & Network Security:
http://www.eeye.com/html/company/press/PR20051011.html

"Eeye discovered the vulnerability and provided a cookbook to write an exploit as part of its advisory. Shouldn't take too long to see this exploited."  --
http://isc.sans.org/

Oh gee...thanks eEye for that one.  Like the business of the Exploiters needs any more head start.  I mean eEye.... come on...there are BUSINESSES now targeting us.  This isn't script kiddie games anymore.  Why do you need to give folks a road map?  Gentlemen... start our testing....

Microsoft Security Bulletin MS05-051: Vulnerabilities in MSDTC and COM+ Could Allow Remote Code Execution (902400):
http://www.microsoft.com/technet/security/Bulletin/MS05-051.mspx

*Could the vulnerability be exploited over the Internet? *
Yes, by anonymous users on Windows 2000 and Windows XP Service Pack 1. Firewall best practices and standard default firewall configurations can help protect against attacks that originate from the Internet. Microsoft has provided information about how you can help protect your PC. End users can visit the Protect Your PC Web site
<http://go.microsoft.com/fwlink/?LinkId=21169>. IT professionals can visit the Security Guidance Center Web site <http://go.microsoft.com/fwlink/?LinkId=21171>.

On Windows XP Service Pack 2, Windows Server 2003, and Windows Server 2003 Service Pack 1, an attacker must be able to log on to the specific system that is targeted for attack. An anonymous attacker cannot load and run a program remotely by using this vulnerability on these operating system versions
.

But remember this looks like the Zotob one...XP sp2 and Windows 2003 will be better protected from Windows 2000 and XP sp1 machines.

Patches this month

Microsoft Security Bulletin MS05-044 (Moderate)
Vulnerability in the Windows FTP Client Could Allow File Transfer
Location Tampering (905495)
http://www.microsoft.com/technet/security/Bulletin/MS05-044.mspx

Microsoft Security Bulletin MS05-045 (Moderate)
Vulnerability in Network Connection Manager Could Allow Denial of
Service (905414)
http://www.microsoft.com/technet/security/Bulletin/MS05-045.mspx

Microsoft Security Bulletin MS05-046 (Important)
Vulnerability in the Client Service for NetWare Could Allow Remote Code
Execution (899589)
http://www.microsoft.com/technet/security/Bulletin/MS05-046.mspx

Microsoft Security Bulletin MS05-047 (Important)
Vulnerability in Plug and Play Could Allow Remote Code Execution and
Local Elevation of Privilege (905749)
http://www.microsoft.com/technet/security/Bulletin/MS05-047.mspx

Microsoft Security Bulletin MS05-048 (Important)
Vulnerability in the Microsoft Collaboration Data Objects Could Allow
Remote Code Execution (907245)
http://www.microsoft.com/technet/security/Bulletin/MS05-048.mspx

Microsoft Security Bulletin MS05-049 (Important)
Vulnerabilities in Windows Shell Could Allow Remote Code Execution
(900725)
http://www.microsoft.com/technet/security/Bulletin/MS05-049.mspx

Microsoft Security Bulletin MS05-050 (Critical)
Vulnerability in DirectShow Could Allow Remote Code Execution (904706)
http://www.microsoft.com/technet/security/Bulletin/MS05-050.mspx

Microsoft Security Bulletin MS05-051 (Critical)
Vulnerabilities in MSDTC and COM+ Could Allow Remote Code Execution
(902400)
http://www.microsoft.com/technet/security/Bulletin/MS05-051.mspx

Microsoft Security Bulletin MS05-052 (Critical)
Cumulative Security Update for Internet Explorer (896688)
http://www.microsoft.com/technet/security/Bulletin/MS05-052.mspx

Updated Malicious Software Removal Tool
http://support.microsoft.com/?kbid=890830

I'm tired of following best practices

This all started on the WSUS patch management listserve where someone said “Oh you MUST install SQL on it's own box” and started us talking about how one firm, one person's 'best practice' didn't always fit for another firm.

I'm tired of big server land 'best practices' to be used to compare to my small network.  I mean...show me a big firm and I don't think they are any better than I am. 

But one thing that I think is for sure is that you can't use big server world's best practices to set “MY” best practices.  They don't compare.

Let's see some of the myths of best practices and see if they fly in my network....

  • Best practice number one - Never put IIS inside your network.  Okay if we follow this lovely one, we can't run WSUS or other such tools that actually help me to be more secure.  Folks that say this one are back in the IIS 4.0 days.  IIS 6.0 has proven to be solid. 
  • Best practice number two - always put SQL on it's own server.  Well in SBSland, the first thing we will do is violate our EULA.  Does it freak out the gurus to have all our services on one box?  Oh sure.  But excuse me?  Look around at what is happening in the virtual server world.  They just announced some changes to Virtual licensing going forward.  Does anyone else but me see that 4 servers on one physical server sounds kinda like what we do in SBSland?  We just don't have the fences between the children on the playground is all.
  • Best practice number three - Always put a firewall on an external device.  The problem with this one is that invariably the issues with firewalls is how they are set up and not necessarily where they are positioned in our space of SBAland.  Have you left the default password on it?  I also find that I patch the ISA one a heck of a lot more regularly and the monitoring report [even though I'm not 100% fond of it], makes me view it more.  A Linksys on the edge just doesn't give me the 'in your face' information I need.

so ...what other best practices do you think ...well....just aren't necessarily best?

The new phishing filter

When you install Office 2003 sp2 and the Junk filter update for this go 'round, you get a new box inside of Outlook 2003 that is automagically selected.  See that “Don't turn on links in messages that might connect to unsafe or fraudulent sites” box there?  That's prechecked for you.

Cool huh!

The new Office UI

Oooooh I just thought of something... what is that new Office UI going to do to my customized normal.dot drop down toolbar that allows my firm to be EXTREMELY effiicient in pulling up Word files that we use over and over again....

You do know how to add custom toolbars now don't you

Speaking of Office... it's patch Friday in my office and I'm patching Office 2003 up to service pack 2 which includes a anti-phishing toolbar now.

Manually doing it on this system before I deploy it through the office...ooh needs a reboot...when I come back I'll take a snapshot of the new anti-phishing option.

The vendor issue

Earlier today, David Litchfield wrote an open letter to Oracle users recommending that they get on the phone, send an email and demand better security response and an improvement in quality of their security patches.  Cesar on the SecureFocus list echo'd Mr. Litchfield's comments as well [you can read David's comments below Cesar's in the post].  Now most of us SBSers don't run Oracle, but as Mr. Litchfield points out.... our data is probably on such a database somewhere.

Dr. Jesper Johansson posts about a similar issue... vendor support of patches.  When a vendor puts us at risk like this .... it's unacceptable. 

And of course my favorite software that forces me to make insecure choices... Quickbooks which demands local admin rights.

Vendors know that they have us in a bind...upgrading and migrating to a new software is a pain in the rear.  But at the same time we HAVE to start waking up to the insecurities these vendors are placing at our doorsteps.  The decisions they are making on our behalf.  The risks they are forcing us to accept.

Mr. CEO... how about you lose $1 of your salary for every time you put my personal data at risk?  Maybe if it hurt you personally in the pocket book more you'd care and force your employees to read Secure Coding and the Deadly sins of Software

I have.

...and I don't even code anything....

Rememeber when Bill talked about antispyware at RSA?

There's an update... Steve Ballmer and Mike Nash announced that the corporate version of the Antispyware is being worked on and a beta will be out later this year.  The Swiss Security blog talks about it.

Cool!

 

 

Do you like the native ISA log files?

So I was talking to Dana about how I really ....uh... disliked...the native ISA logs and reporting and he being the coder that he thought of ways to fix the issue.

I think it's a cool idea personally!

Hey guys,

Recently Susan Bradley and I were talking about how we really dislike the ISA firewall logs, especially in how complex it is to really show what is going on in the box. We realize how difficult it may be to decipher the logs and really understand what sort of attacks are happening on your SBS box, if at all.

Instead of complaining, I thought I might do something about it... especially since I already have code doing some similar things for other logs on SBS for myself.

I was wondering if I could get some feedback from the group on how you feel about it. Instead of wasting bandwidth on this list, I was hoping many of you would go through a quick 7 question survey I put up on Zoomerang (
http://www.zoomerang.com/survey.zgi?p=WEB224P5CUPMJD). The survey will stay running for the next 7 days. I do hope you will participate.

Thanks a lot!

-- 
Regards,
Dana Epp
[Blog:
http://silverstr.ufies.org/blog/]

Patches next week

********************************************************************
Title: Microsoft Security Response Center Bulletin Notification
Issued: October 6, 2005
********************************************************************

Summary
=======
As part of the monthly security bulletin release cycle, Microsoft
provides advance notification to our customers on the number of new
security updates being released, the products affected, the aggregate
maximum severity and information about detection tools relevant to
the update. This is intended to help our customers plan for the
deployment of these security updates more effectively.

In addition, to help customers prioritize monthly security updates
with any non-security updates released on Microsoft Update, Windows
Update, Windows Server Update Services and Software Update Services
on the same day as the monthly security bulletins, we also provide:

. Information about the release of updated versions of the Microsoft
Windows Malicious Software Removal Tool.
. Information about the release of NON-SECURITY, High Priority
updates on Microsoft Update (MU), Windows Update (WU), Windows Server
Update Services (WSUS) and Software Update Services (SUS). Note that
this information will pertain ONLY to updates on Windows Update and
only about High Priority, non-security updates being released on the
same day as security updates. Information will NOT be provided about
Non-security updates released on other days.

On 11 October 2005 Microsoft is planning to release:

Security Updates

. 8 Microsoft Security Bulletins affecting Microsoft Windows. The
highest Maximum Severity rating for these is Critical. Some of these
updates will require a restart. These updates will be detectable
using the Microsoft Baseline Security Analyzer (MBSA) and the
Enterprise Scanning Tool (EST).

. 1 Microsoft Security Bulletin affecting Microsoft Windows and
Microsoft Exchange. The highest Maximum Severity rating for this is
Important. These updates will require a restart. These updates will
be detectable using the Microsoft Baseline Security Analyzer (MBSA).

Microsoft Windows Malicious Software Removal Tool

. Microsoft will release an updated version of the Microsoft Windows
Malicious Software Removal Tool on Windows Update, Microsoft Update,
Windows Server Update Services and the Download Center.
Note that this tool will NOT be distributed using Software Update
Services (SUS).

Non-security High Priority updates on MU, WU, WSUS and SUS

. Microsoft will release NO new NON-SECURITY High-Priority Updates
for Windows on Microsoft Update (MU), Windows Update (WU), Windows
Server Update Services (WSUS) and Software Update Services (SUS).
Although we do not anticipate any changes, the number of bulletins,
products affected, restart information and severities are subject to
change until released.

Microsoft will host a webcast next week to address customer questions
on these bulletins. For more information on this webcast please see
below:

. TechNet Webcast: Information about Microsoft's Security Bulletins
(Level 100)  
. Wednesday, 12 October 11:00 AM (GMT-08:00) Pacific Time (US &
Canada)

At this time no additional information on these bulletins such as
details regarding severity or details regarding the vulnerability
will be made available until 11 October 2005.
********************************************************************

Support:
========
Technical support is available from Microsoft Product Support
Services at 1-866-PC SAFETY (1-866-727-2338). There is no
charge for support calls associated with security updates.
International customers can get support from their local Microsoft
subsidiaries. Phone numbers for international support can be found
at:
http://support.microsoft.com/common/international.aspx

Additional Resources:
=====================
* Microsoft has created a free monthly e-mail newsletter containing
  valuable information to help you protect your network. This
  newsletter provides practical security tips, topical security
  guidance, useful resources and links, pointers to helpful
  community resources, and a forum for you to provide feedback
  and ask security-related questions.
  You can sign up for the newsletter at:

 
http://www.microsoft.com/technet/security/secnews/default.mspx

* Microsoft has created a free e-mail notification service that
  serves as a supplement to the Security Notification Service
  (this e-mail). The Microsoft Security Notification Service:
  Comprehensive Version. It provides timely notification of any
  minor changes or revisions to previously released Microsoft
  Security Bulletins and Security Advisories. This new service
  provides notifications that are written for IT professionals and
  contain technical information about the revisions to security
  bulletins. To register visit the following Web site:

 
http://www.microsoft.com/technet/security/bulletin/notify.mspx

* Protect your PC: Microsoft has provided information on how you
  can help protect your PC at the following locations:

 
http://www.microsoft.com/security/protect/

  If you receive an e-mail that claims to be distributing a
  Microsoft security update, it is a hoax that may be distributing a
  virus. Microsoft does not distribute security updates via e-mail.
  You can learn more about Microsoft's software distribution
  policies here:

http://www.microsoft.com/technet/security/topics/policy/swdist.mspx

Dr. Watson to the rescue

So tonight my Word blows up and a Dr. Watson asks me “would you like to send a report to Microsoft?“  Of COURSE I'll send a report to Microsoft!  Because more and more these days I'm getting a little link that says “follow me and I'll tell you why you blew up“ and sure 'nuff.... today's explosion says that the reason why I blew up is because I haven't updated this workstation at home with Office 2003 sp2!

Microsoft Online Crash Analysis - response:

Well looky there.

...and yeah... just don't tell Dana I haven't approved the WSUS updates on the home network will 'ya?

Also notice that Office SP's are now cumulative.  Cool, huh?!

Yes the bad things on the Internet "is" a big business

Too many times in small businesses we say “who would want me?”  “I'm not a target”.  But we are.  We have computing processing power that can be used by folks.  The Incidents.org web site has a post today about the 'business' of the skum on the Internet.

No longer is it the teenagers and script kiddies.  This is business.  This is war.  And each of us needs to remember that we can either be foot soldiers in the war against this skum.  Or helpers in the process.  One of the interesting stats I vaguely remember reading was the percentage of stuff bought off these web scams.  It was still a pretty high amount.

If we all do our part, we can put them all out of business.

 

It's an Acer TravelMate C110

I think I've singlehandedly sold three laptops this afternoon.  As I've sat here working on my laptop several people have stopped and asked what it is.

Acer Travelmate.

It's small and compact and really easy to travel with.  Now granted I should have travelled a bit more with it yesterday.... okay I have to out myself. You know how I said that I kept physical security of my laptop.... uh well... in sleep deprived weakened moment I left my laptop with a Microsoft employee and a Thwate notary.  Didn't lock the workstation.... didn't shut it off...just left it there with the two of them after I asked them to look after it....

Word of advice..never leave a laptop with two geeks .... instead of being “outted” for a stupid insecurity by Dana in front of an audience.... your computer will be used to send and email to a DL listserve 'outting' you for leaving it unlocked and insecure.

You'd think I'd learn....

I have a yellow Shield on my laptop today [Office 2003 sp2]

And since this is my laptop, and I'm on the road, I'm probably going to say “wait” and install later.

 Office 2003 Service Pack 2 provides the latest updates to Microsoft Office 2003.

Now I should 'fess up ...and fix up...the fact that I was running ... oh sorry Dana.... Local admin again because I was needing to adjust network connections so Steve and I could share my Aircard connection on the road.  And the RunAs just wasn't working.  We wonder if it was because I have a blank admin passoword.  Now why would I do that you say?  For one.... I put this laptop in my backpack and it goes with me everywhere so I ensure I have physical security of it, secondly a blank admin password means that the Admin account cannot be accessed over the Network.

So Dana... I'm flipping myself back to restricted user since today is registration day at the Summit.

Windows Sharepoint Services sp2 released

Bill reminds us that Windows Sharepoint Services sp2 has been released.

Now, keep in mind that ANY service pack for our parts is perfectly fine to put on a SBS box, but I personally am not at home and I won't be testing this yet. 

We do have some special customizations for Sharepoint, so if you'd rather one of us crazies in the newsgroup installed it first, triple checked to ensure that there are no issues with this SP2 on our SBS boxes, I would say you are a wise person.

Installing patches on SBS boxes is only fun for me the wacko SBS patcher.  It's really NOT fun at all if a patch affects the system,even if it's a minor annoyance.  It breaks the confidence of the client in your ability to be their outsourced CIO.  I know many consultants who, if they are traveling, or busy with other projects will wait on service packs like this Service pack.

If you've set up WSUS to pull down service packs and auto apply them, you are indeed a 'bleeding edger'.  Just remember that those of us who are more into control, we don't set up our servers to auto patch anything.

P.S.  I have no idea what will happen if you install Sharepoint SP2 and then attempt to install the SBS 2003 sp1 bundle.

 

Accepting risk

So sitting outside the Meteron in San Francisco where they have wireless network..... and here's what I had to agree with....

Acceptable Use Policy
  
This document provides a general description of this hot spot's policy on the Acceptable Use of this wireless public network.
 
Activities that adversely affect the ability of other people or systems to use this wireless network or the Internet are prohibited, including launching of denial of service attacks from your computer. Users of this wireless network shall not knowingly collect or solicit personal information from a minor or use this Service to harm a minor. A minor is defined as any person under the age of 18 years old.

Security Information and Liability Disclaimer

THIS SERVICE PROVIDER provides public wireless access to the internet.  Public wireless services are not inherently secure. Computer viruses, worms and other programs can damage the user's computer. Hackers may attempt to penetrate the user's computer and download information from the user's computer. Unprotected access to files on user's computer may be visible to hackers. Communications can be intercepted by equipment and software designed for that purpose. This network does not use WEP encryption. Operator of this hot spot strongly recommends that users of this wireless network take measures to ensure the security of their wireless connections, such as VPNs, encryption and personal firewalls.

This is a public wireless network. By connecting, you may be exposing yourself to privacy invasion, viruses, or other malicious programs. You are solely responsible for protecting your privacy and equipment from such programs and attacks. Metreon is not liable for damages arising from the public nature of the network.

Super G and Steve F and I were laughing ...who protects us from the minors?

SF and Internet access

Walking along the streets of San Francisco and seeing the Internet cafe's always brings up the issue of security and keystroke loggers.  Steve Foster suggested that you turn on the accessibility keyboard so that you aren't 'typing' in your password but using the mouse to enter in your password instead of a keystrokes.

I never thought of that one....

In my office, our policy is to not use Internet kiosks for access back to the corporate network.

<btw I titled this wireless first and I renamed it Internet access as wireless had nothing to do with the post... too much wind in the brain hanging off the edge of the Cable Car,,,what can I say>

PEAP, WPA and .....uh what?

From the mailbag the other day....

 

Susan,

 

Okay, so I'm pretty sure that WEP has been "dead" as a viable wireless security option for at least 3 years, right?  I mean, sure, there's plenty of home users using WEP or WPA because it's easy, but I think even in the SMB community, we're not advocating WEP, or even WPA anymore.

 

About 4 years ago I had a few clients fired-up about 802.11b; secured with 128-bit WEP keys. did a few implementations, and then interest seemed to dry-up in the SMB market that I served.  Well now, finally. in 2005 I'm starting to see some renewed interest.  Not just among the "let's replace our Ethernet infrastructure with wireless" crowd, but among customers who actually generate revenue.  

 

What I'm seeing that they want 1 of 2 things - sometimes both.

 

1)         Internet-only WLAN for use by guests/contractors/etc., where ease-of-use is paramount, but with the capability of accessing the corporate LAN for employees via some secured means.

2)         A "really-reliable" and "really-secure" wireless infrastructure to co-exist with the Ethernet infrastructure (everyone complains that the WLAN drops occasionally, but I have very little confidence that any solution will be notably "better").

 

(Granted, for the life of me, I can't figure out why everyone insists on sitting at their desks and using the WLAN, when they have an Ethernet port on the wall that they can plug into, but I digress.).

 

In working up a technical overview, I'm coming up with the options, and wanted to run them by you, and get your take.

 

Goal: WLAN for guests.

Option A: Build a solution with an open AP and some solution to redirect all traffic to a given gateway/registration web address.  Then offer a PPTP or IPSEC VPN tunnel into the company LAN for employees. 

Option B: Buy an out-of-the-box solution like a Sonicwall TZ170 which purports to support all that stuff. 

 

Goal: Secure, corporate LAN for SMB:

Option A: RADUIS backed 802.1x WLAN solution. Cons:  Need some infrastructure improvements (switches, services, etc), and owner buyoff on time commitment.

Option B:  WEP-enabled AP on the outside of the LAN; require VPN access through RRAS to access LAN.  Or, any other suggestions?

 

I haven't done anything with 802.1x yet for any SMB customers, so there's going to be a learning curve.  I'd really like to do this, because it would add value, and be a good learning experience, but I don't think I'm going to get owner-buyoff on this right now.  Have you done much with wireless lately, and if so, what's your take?

 


 

Uh.... Mr. Mailbag... I'm right behind you.  I don't have wireless on the “inside” of my networks either...they are still 'outside'.  Now they are running WPA these days and not WEP [as WEP should be shot dead], but I've yet to take the time to read the SBS Admin book [Charlie Russel/Jason Gerand] and go through their excellent guide on how to do that.  I'm not quite ready [nor truly have a need yet] at my office, but truly should do it here at home.  For example, poor Steve Foster who is staying here this week has no access to printers or anything else even though he's able to get to the Internet.

 

What I'd really like is like what we get to see when we go to Microsoft... smart card deployment that unless you have the magic card, you cannot get on their network period, and you REALLY can't get on their wireless.  Fire up the netstumbler and you can see the poor device go crazy with MSLAN way before you see the true campus off the freeway.  But they are just that...secured... and you can't get on them.

 

So Nick?  After I get back from my trip to the Mothership Redmond, I'll be cracking open that Russel/Gerand book myself.

 

I'll let you know how I go...

Got bit by the ActiveX/Spybot false positive bug?

Stealing this from the newsgroups from JJDavidson.....


If you've been getting errors from RWW/RDP recently, particularly "This portion of the Remote Web Workplace requires the Microsoft Remote Desktop ActiveX Control" or "An invalid server name was specified" you may have been hit by a false positive from an antispyware program, particularly Spybot S&D 1.4.  This affects the machine connecting to RDP, not the target machine.

 

Spybot set a registry entry to set the kill bit for the Microsoft RDP ActiveX control.  Although the latest Spybot updates no longer immunize against this control, it's apparently unable to undo the existing block, so you have to do it manually.  Some details are on the Spybot support forum here and here:

 

http://forums.net-integration.net/index.php?showtopic=32952

 

http://forums.net-integration.net/index.php?showtopic=32934

 

Disabling/uninstalling Spybot will NOT fix the problem!  Other antispyware programs may also have blocked RDP (AdAware has been mentioned), but the

following will fix any of them (at least temporarily).

 

To fix one machine, navigate to the following registry key and delete it:

 

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX

Compatibility\{7584C670-2274-4EFB-B00B-D6AABA6D3850}

 

To build a file to patch several machines, save the following as a .reg file.  Remove any unwanted line breaks (the file should be six lines long including comments).  Then merge it into the registry on machines attempting to connect to RDP.

 

REGEDIT4

; --------------------------------------------------------------------------

; The following code will remove the ActiveX Compatibility restriction on

; CLSID = {7584C670-2274-4EFB-B00B-D6AABA6D3850}

; Microsoft RDP Client Control (redist)

; --------------------------------------------------------------------------

[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{7584C670-2274-4EFB-B00B-D6AABA6D3850}]

I just LOVE Tom Liston's posts

Just a shout out for today's Incidents.org diary post.  I can always tell when Tom Liston is at the keyboard.

Love that man's posts.

You worried about passwords?

Got 98's in your network?  You do?  The you are running with LanMan hashes inside the network.  These hash values can be VERY easily sniffed and the password 'cracked' if you have access to the network.

But... read that again....

IF you have access to the network.  And that's the key... IF you have access to the network.  Physical access is probably the highest risk and that's why your biggest risk is from insiders most days not outsiders.  Remember it's law number 3 of the laws of computer security.  If someone has physical access to your computer, it's not your computer anymore.

Yeah, hash values can be remotely grabbed and taken offsite, but the risk of that in SBSland is rare in how we set up our network...and even then, I would argue that in SBSland that's not our biggest fear.  I don't think we spend enough time looking at how we set up the inside as gooshy as we do.

Check out Sysinternals AccessEnum tool.  Run it in a test network.  What level of access and permissions are we giving folks?  Is it too much?

.... hmmmm... I just thought of something... Steve Foster has physical access to my home network right now... and my laptop......

....hmmmm.... I might be in big trouble.....

WSUS and MU offering a fix and issues with KB 888619

If you have chosen to have WSUS offer up 'all patches but drivers' and you find that...

  • Exchange doesn't work
  • /remote doesn't work
  • /exchange doesn't work

You are not alone... Reboot your box and you should be okay [if you are NOT, ping me]

The value for the PR_ACCESS property that is returned from the DAV PROPFIND method is always read-only in Exchange Server 2003:
http://support.microsoft.com/default.aspx?scid=kb;en-us;888619

Looks like we got offered up that KB on WSUS that also hit the download site that is causing a bit of issues in SBSland.

Better yet, don't install it.  It's okay to install it but you may need to reopen Outlook.

Better yet, don't auto update on servers.  Desktops I have less issues with... servers...uh..no..I want to know what got applied when thank you very much.

 WSUS offering 888619: do NOT install!: 

I'm going to say that I think we're okay applying this...but I truly do wish they'd give us a heads up next time...


UPDATE:  Just applied it to Dell OEM and my real baby at the office and email is flowing just fine and /remote and /exchange functioning as well.  Interestingly enough the Dell OEM did NOT need rebooting but the Baby at the office [the real one] did.  We've seen very light [and I do me very light] issues so you might want to reboot the box and see if that fixes you up, if on the off chance you do see anything.

I do wish there was some sort of heads up email for WSUS and MU patches.  This was offered up on both WSUS and MU and sorry folks... I'd like to know ahead of time rather than the IM backchannel alert network that we have  to use these days.  Admins need patch planning ...not oh gee what came down on Microsoft update now ....detective work.  Tell me, inform me, RSS me, but let me know when you are going to be offering code up to my box, okay? 

Update 2 - Make sure if you had Outlook open that you close it and reopen it.  Mine wouldn't grab the new email until I did.

Figured I'd better do this before the MVP Summit

There.

Tablet.

Laptop.

LUAized.

Yeah I know... way too late...but about time.

Dana talks about the new LUA/UAP stuff in Vista [Steve Foster is at the PDC and says it's cool]

One down, one to go

Okay okay okay .....

Convert c: /FS:NTFS

Volume name is ACER

Now in NTFS format

Now to LUAize it...now here's the funny thing... this Tablet PC has had it's registry hacked already for Quickbooks [it was the standalone non domain machine I used to do the screen shots]

Okay okay okay.. I'm trying to distract you again.... redownloading Thunderbird and installing it correctly now.... gonna walk the walk ... I know my gang at the summit are gonna rag on me if I'm not.

If you are an app developer... have I got a forum for you....

If any dev type folk happen to be down in Los Angeles at the Professional Developers Conference... and if by any chance anyone from the Intuitive Accounting application program is down there... can you really do me a favor?

Can ya

And then join the Vista Technical forum on “Security for Applications in Windows Vista“.

Please notice that “I“ as a buyer of software posted the first post, so obviously you Devs from any Intuitive accounting software probably are still paryting down in Los Angeles for the next couple of days at the PDC.  I'll let you slack off for now, but I'll be watching to see if you start posting in there.

Security for Applications in Windows Vista - Microsoft Technical Forums:
http://forums.microsoft.com/msdn/ShowForum.aspx?ForumID=116

I'm working on getting your software buyers to care... can you work on caring as well?

Windows 2000 sp4 update 1 re-released today

** Please note... the “high priority, non security update“ is the re-release of the Windows 2000 sp4 update 1 with a V2 version.  That's an important release so if you thought you had it easy today with no patch testing... for you Win2k folks... guess again**

New Bulletins
Microsoft is not releasing any new Security Bulletins in September 2005.

Microsoft Windows Malicious Software Removal Tool
Microsoft is releasing an updated version of the Microsoft Windows
Malicious Software Removal Tool on Windows Server Update Services
(WSUS), Windows Update (WU) and the Download Center. Note that this tool
will NOT be distributed using Software Update Services (SUS).
Information on the Microsoft Windows Malicious Software Removal Tool can
be located here:
http://go.microsoft.com/fwlink/?LinkId=40573

High-Priority Non-Security Updates on Microsoft Update (MU), Windows
Update (WU), Windows Server Update Services (WSUS) and Software Update
Services (SUS)
Microsoft is today also making the following High-Priority NON-SECURITY
updates available on WU, MU, SUS and WSUS:

KB NUMBER TITLE Available via:
KB891861 Update Rollup 1 for Windows 2000 SP4 and known issues
WU, MU, SUS and WSUS

Microsoft will host a webcast to address customer questions on these
bulletins. For more information on this webcast please see below:

Information about Microsoft's September Security Bulletins

Wednesday, 14 September 11:00 AM (GMT-08:00) Pacific Time (US & Canada)

The on-demand version of the webcast will be available 24 hours after
the live webcast at this link:

Thank you,
Microsoft PSS Security Team

I'm 'outting' myself

At SMBNation, Dana outted me in front of the conference attendees and said he was going to post on his blog about it, but since he seems to be busy recovering from the Dilbert [which is very funny], I'll out myself.

My laptop is lazy.

Okay... I'm lazy.

It's running as an admin.  Yup you heard it here. My tablet PC which has hung off of wireless networks from the underbellies of the Internet in the Bellagio to hanging recently off of the probably even more infectious wireless access in the Microsoft Executive briefing center is an admin.

And it is because I'm a lazy bone to reload Thunderbird to get it to work like it should because I forgot and didn't install it under the admin profile, but under the Susan one.

And what can happen when I'm an Admin.

Tons.

At SMBnation a couple of folk were saying that they were still getting malware and they were installing the networks without admin rights...but when I questioned them more, what was happening was the really WERE running as Admin.  You see they were using Power user rights.

Yo folks.  You might as well run as Admin.  You really and truly don't gain much at all running with Power user rights.

But wait you say... I can't patch my machines for software updates.  Yes you can.  Shavlik will do it, you apply Admin credentials remotely for one.  WSUS *and* Microsoft update will both do it.  Set up the machines to patch at some ungodly hour automagically and tell the folks to leave their computers on. 

Now Vista is supposed to nicely temporarily save the stuff you stupidly left open on that computer and restart it for you.

Okay, okay I'm trying to distract you from the original topic.

Which is I'm introducing risk because I'M LAZY.

Okay Dana, before the MVP summit... so I don't get outted by Steve.... I'll be non-admin.

P.S.  want to know if someone is running as admin?  Click on the time/date in the corner.  If you can change it....you are an admin.

Be careful what you ask for

Charlie Anthe was asked in the presentation earlier “when will SBS 2003 support restricted user on the desktops”

... uh... folks.. it does.  Not by 'default“, but you CAN flip those users to restricted user mode.  It's up to you to make the choice, move the mountain, hack the registry hives and make the changes.

Making the user a Power user is NOT good enough. I guarantee you, you will still get malware.  But like I told a person once, I cannot, I will not push SBSland, nor Charlie, into forcing us to 'default' restricted user until we have better, blonder tools than filemon and regmon from Sysinternals.com to figure out what the persmissions need to be changed on crappy applications that faile to work under restricted user.

Remember the web site of www.threatcode.com

You make Charlie move that desktop to 'default' restricted user and you'll see how many crappy line of business applications you have and how hard it is to wack the registry.  I won't ask him to do that.  We're not ready yet. Until then YOU make the decision to do this the right way, not Microsoft.  Our applications are not ready for this, not enough of them.  And until they are, I can't ask Charlie to do that.

Revised - no new Security patches next Tuesday

 
********************************************************************
Title: REVISED: September 2005 Microsoft Security Response Center
       Bulletin Notification
Issued: September 9, 2005
********************************************************************

Summary
=======
Microsoft will not issue any new security updates on 13 September 
2005 as part of the September monthly bulletin release cycle. Based 
on customer feedback, Microsoft instituted a monthly security update 
release process on the second Tuesday of each month to provide 
customers with security guidance and updates on a predictable and 
manageable schedule. This update release process involves a 
significant testing focus to help ensure customers will receive 
updates that are of a high quality and Microsoft will not release an 
update until it meets those standards.  Occasionally, the testing 
process and our strict focus on quality can result in a month where 
no security updates are released, as is the case for 13 September 
2005.

In addition, to help customers prioritize monthly security updates 
with any non-security updates released on Microsoft Update, Windows 
Update, Windows Server Update Services and Software Update Services 
on the same day as the monthly security bulletins, we also provide:

 - Information about the release of updated versions of the 
Microsoft Windows Malicious Software Removal Tool.
 - Information about the release of NON-SECURITY, High Priority 
updates on Microsoft Update (MU), Windows Update (WU), Windows 
Server Update Services (WSUS) and Software Update Services (SUS). 
Note that this information will pertain ONLY to updates on Windows 
Update and only about High Priority, non-security updates being 
released on the same day as security updates. Information will NOT 
be provided about Non-security updates released on other days.

On 13 September 2005 Microsoft is planning to release:

Security Updates

 - No new security updates on 13 September as part of the September 
monthly bulletin release cycle. This represents a change in the 
information found in the Advance Notification on Thursday, September 
8, 2005. Late in the testing process, Microsoft encountered a 
quality issue that necessitated the update to go through additional 
testing and development before it is released. Microsoft is 
committed to only releasing high quality updates that fix the 
issue(s) in question, and therefore we feel it is in the best 
interest of our customers to not release this update until it 
undergoes further testing.

Microsoft Windows Malicious Software Removal Tool

 - Microsoft will release an updated version of the Microsoft 
Windows Malicious Software Removal Tool on Windows Update, Microsoft 
Update, Windows Server Update Services and the Download Center. 
Note that this tool will NOT be distributed using Software Update 
Services (SUS).

Non-security High Priority updates on MU, WU, WSUS and SUS
 - Microsoft will release one NON-SECURITY High-Priority Updates for 
Windows on Microsoft Update (MU), Windows Update (WU), Windows 
Server Update Services (WSUS) and Software Update Services (SUS).

Microsoft will still host a webcast next week to address customer 
questions. For more information on this webcast please see below:
 - TechNet Webcast: Information about Microsoft's September Security 
Bulletins (Level 100)   
 - Wednesday, 14 September 11:00 AM (GMT-08:00) Pacific Time (US & 
Canada) 
 - 
http://msevents.microsoft.com/CUI/WebCastEventDetails.aspx?EventID=1
032279532&EventCategory;=4&culture;=en-US&CountryCode;=US

One critical security patch next week

********************************************************************
Title: September 2005 Microsoft Security Response Center Bulletin
	Notification
Issued: September 8, 2005
********************************************************************

Summary
=======
As part of the monthly security bulletin release cycle, Microsoft 
provides advance notification to our customers on the number of new 
security updates being released, the products affected, the 
aggregate maximum severity and information about detection tools 
relevant to the update. This is intended to help our customers plan 
for the deployment of these security updates more effectively.

In addition, to help customers prioritize monthly security updates 
with any non-security updates released on Microsoft Update, Windows 
Update, Windows Server Update Services and Software Update Services 
on the same day as the monthly security bulletins, we also provide:
 - Information about the release of updated versions of the 
   Microsoft Windows Malicious Software Removal Tool.
 - Information about the release of NON-SECURITY, High Priority 
   updates on Microsoft Update (MU), Windows Update (WU), Windows 
   Server Update Services (WSUS) and Software Update Services (SUS). 
   Note that this information will pertain ONLY to updates on Windows
   Update and only about High Priority, non-security updates being 
   released on the same day as security updates. Information will NOT
   be provided about Non-security updates released on other days.

On 13 September 2005 Microsoft is planning to release:

Security Updates
 - One Microsoft Security Bulletin affecting Microsoft Windows. The 
highest Maximum Severity rating for this is critical. These updates 
may require a restart. These updates will be detectable using the 
Microsoft Baseline Security Analyzer (MBSA).

Microsoft Windows Malicious Software Removal Tool
 - Microsoft will release an updated version of the Microsoft 
Windows Malicious Software Removal Tool on Windows Update, Microsoft 
Update, Windows Server Update Services and the Download Center. 

Note that this tool will NOT be distributed using Software Update 
Services (SUS).

Non-security High Priority updates on MU, WU, WSUS and SUS
 - Microsoft will release one NON-SECURITY High-Priority Updates for 
Windows on Microsoft Update (MU), Windows Update (WU), Windows 
Server Update Services (WSUS) and Software Update Services (SUS).

Although we do not anticipate any changes, the number of bulletins, 
products affected, restart information and severities are subject to 
change until released. 

Microsoft will host a webcast next week to address customer 
questions on these bulletins. For more information on this webcast 
please see below:
 - TechNet Webcast: Information about Microsoft's [MONTH] Security 
Bulletins (Level 100)   
 - Wednesday, 14 September 11:00 AM (GMT-08:00) Pacific Time (US & 
Canada) 
http://msevents.microsoft.com/CUI/WebCastEventDetails.aspx?EventID=1
032279532&EventCategory=4&culture=en-US&CountryCode=US

At this time no additional information on these bulletins such as 
details regarding severity or details regarding the vulnerability 
will be made available until 13 September 2005.
********************************************************************

Support: 
========
Technical support is available from Microsoft Product Support 
Services at 1-866-PC SAFETY (1-866-727-2338). There is no 
charge for support calls associated with security updates. 
International customers can get support from their local Microsoft 
subsidiaries. Phone numbers for international support can be found
at: http://support.microsoft.com/common/international.aspx
 
Additional Resources:
=====================
* Microsoft has created a free monthly e-mail newsletter containing
  valuable information to help you protect your network. This
  newsletter provides practical security tips, topical security
  guidance, useful resources and links, pointers to helpful
  community resources, and a forum for you to provide feedback
  and ask security-related questions.
  You can sign up for the newsletter at:

  http://www.microsoft.com/technet/security/secnews/default.mspx

* Protect your PC: Microsoft has provided information on how you 
  can help protect your PC at the following locations: 

  http://www.microsoft.com/security/protect/

  If you receive an e-mail that claims to be distributing a 
  Microsoft security update, it is a hoax that may be distributing a 
  virus. Microsoft does not distribute security updates via e-mail. 
  You can learn more about Microsoft's software distribution 
  policies here: 

http://www.microsoft.com/technet/security/topics/policy/swdist.mspx

If your WSUS isn't WSUS'ing

A client computer cannot receive new updates from a Windows Server 2003 Service Pack 1-based WSUS server:
http://support.microsoft.com/?kbid=905422

Get Ouch!

Need a resource to give information to your clients about Security and Phishing and Life on the Internet?

Get OUCH!  It's the SANS newsletter aimed for non technical computer users:


OUCH! is SANS e-letter aimed at helping you protect your non-technical computer users form phishing and other malicious attacks on their computers.  Among this months' warnings are Katrina Hurricane Scams, new PayPal and banking phishing and several more.

The September issue of OUCH! is now delivered in an easier-to-read format that you can pick up at
http://www.sans.org/newsletters/ouch/issue/20050906.php

All previous issues of Ouch! may be found online at
http://www.sans.org/newsletters/ouch/

You have lots of options:
  -- You may copy it to your computers and email it to your users.
  -- You may tell your users to read it at the SANS site.
  -- You may post it at your site for faster delivery to your users.
  -- You may use selected parts if you don't want to send or post the whole thing.

If you have a moment, please let us know how you use OUCH! by emailing
ouch@sans.org.

Who can protect us from clicking?

I was earlier arguing with fellow MVP [aka the Naked one] Nick about what responsibility we have for end users.  He had a situation where folks were surfing for music lyrics and surfing and clicking and Aurora gunk was downloading right behind it.  He wanted it stopped [and rightly so].  But here's the problem I see.

Spyware is big business today.

Worms and viruses are mere conduits for getting spyware on the box.  When vulnerabilities go for $20,000 a pop, when virus/spyware writers are making six figures in a year, that's the reality of the world we live in.

Yet I still get beancounters that don't care that Quickbooks demands that they run their systems insecurely. 

It's we...the marketplace out here that has to care.  All of these software vendors are in business and they will only push security to the point at which the marketplace cares.

Right now my beancounter crowd as NO CLUE of what local admin rights are even about. 

We have to get 'us' the marketplace to care.  To push.  To say to everyone, I'm sorry you cannot code like that anymore.  I cannot run my machine like that.  You have to protect me better.

XP sp2 cannot do it.  Not by default.  They will not put resources into it.  Vista is the name of the game, Nick.

But it's us, now, that need to get our vendors on board.  They are the ones that are going to drag us down, not Microsoft.

Remember you cannot build on security afterwards, it has to be designed into the product.  We have to think about it ourselves first.

SCW, Exchange Best practices,  the XP shared computer toolkitl.   All of these are tools we have to help us.  In the home space the best tools are still Dropmyrights and not running as Admin.

“But I can't!“ We say, “my vendors won't let me!“.  So complain.  Get them to take action.  To stop setting your risk analysis. 

I mean when you get in a car, you buckle your seatbelt right?  You take precautions.  You got trained.  Where do we do ANY training whatsoever on our computers?  Even in my own office, I cannot depend on the end user understanding enough.  But maybe they should?  Maybe, just like with a car, there should be more training so that they can operate it safely?

Top ranked antivirus is?

So I'm doing some googling.... ummm.. I mean MSN Searching [note to the MSN Search folks...next time you name a product think of the potential for making the name of a product into a noun, verb or adjective  that ends up in the fabric of our language and name it accordingly].... on antivirus information to include in the chapter I'm writing on Desktop Security for SBS Unleashed and I come across a web site that has rankings of Antivirus products.

Does anyone else besides me find it funny that the antivirus software highest ranked is one for Macintosh?  I mean if you read the reports, Macintosh's that due to their reliance on and separation of Root/Admin from regular user has more built in protection mechanisms. 

I mean shouldn't a top ranked antivirus be one on Windows where all the viruses are? 

Maybe that's why it's ranked so high?  It doesn't have to work so hard? 

I still think [and am writing about it in the book] that we are way too re-active to viruses and not pro-active.  That means nly allowing in those attachments that you absolutely need for business.  Quarantine those attachments that are marginal.  And make sure you monitor and adjust and make changes when needed to what you accept, and what you don't accept as acceptable risks to your firm.

Need to change the password via OWA? And how do you set the 'change password' timeframe?

In the newsgroup someone asked how to allow people change their password via an OWA interface and you have to adjust some settings that are discussed here

You know what I want in a password policy?  More flexibility when the passwords are changed.  Right now if you set up a 'change passwords' it's measured in days.  Well I work in a cyclical industry that has due dates in certain times of the year.  So ..for example.. I try not to change passwords between January and April 15 and then I want to change them before the end of July but not around August 15.  And then around December.  See how I really want to have some sort of 'calendar' interface on my password policy and not change it “every 30 days” or “every 60 days”, but rather on THAT day. 

Yeah..  I know.. this is where the business/admin side of Susan butts heads with the paranoid Security Susan.  I want to change passwords for security purposes, but I also realize that it has to fit with the business flow cycle. 

And sometimes....changing passwords right before a key critical due date in the firm, just is not the right answer.

IE Add in Blocker - good idea..but ...

So I'm working on a chapter on Workstation Security for the SBS 2003 unleashed book and I'm showcasing fellow SBS MVP's knowledge base article about a really cool feature in XP sp2 and group policy where you can better protect the IE by only allowing certain Active X browser add ons...

The knowledge base article is here:

But like even in the XP sp2 firewall settings that we have where you can add your own program and port exceptions [see here], but it needs to be easier for the admin to add the exclusions. 

So the group policy setting it great in it's idea... for me.. not quite so great in deployment.  Supposedly you are supposed to be able to see those GUID information merely by lauching IE, than tools, then IE blocker, and then on the top of the window, right mouse click and enable ClassID.  But the problem is, I don't think I can copy and paste from there.  I don't know about you but typing in GUID codes is not exactly something I do for a daily fun and excitement.

So?  Do you know of any easier way to track down GUID codes for an Active X?  I googled and found this KB that states:

Determine the CLSID for the ActiveX control that you want to disable. If you are not sure of the CLSID for the control, contact the manufacturer.

 

...okay... so .... imagine me calling up .. oh.. I don't know... Intuit and asking them for their CLSID's for Active X?  Maybe I'll call up their help desk just to see if they'll know what I am talking about.

 

Feel free to ping me at sbradcpa-at-pacbell.net if you know of an easier way.  My googling is failing.... maybe I should MSN instead?

No I really haven't lost my mind..

So I'm googling for some info to get a 98 attached to a SBS 2003 box for ...what else... a beancounter.  A beancounter that SHOULD be signed up for the Microsoft's Accountant Network and not forcing his IT guy to jump through hoops as he'll be able to get Win XPs' and his 98 desktop won't SCREAM  “I don't care about the security of my data” to every client that walks by... so anyway I googled this...  and here's the funny thing... when I emailed it of to the person asking for it... it bounced back...

Your e-mail was rejected by an anti-spam content filter on gateway.  Reasons for rejection may be: obscene language, graphics, or spam-like characteristics.

You know... I think I quite agree ... having Windows 98 info inside of an email is obscene isn't it?  Especially in a SBS 2003 network... it just works soooooo nicely on XP... Remote Web Workplace... man you just do not know what you are missing out on when you don't have XP sp2 on that network....

Definitely I think I agree with the spam filter... definitely obscene to put a 98 on a SBS 2003 network.  It's like making an Indy 500 race car driver drive an... oh I don't know...an Edsel or something...

Make sure that you specify WINS as the internal ip address of the server.

Also, if using DHCP, enable the support for updating to DDNS, for all legacy clients,

by entering the DNS tab in the properites of the server.domain.local in the DHCP Console.

 

The supported client OS for SBS 2K3 is Windows 98, Windows 2K, Windows 2K3

and Windows XP Pro edition. Windows 95, Windows Millennium are not officially

supported in Windows 2003 (which includes SBS 2K3) environment  although

you may be able to join them into the domain

 

Please also note that although you can use a Windows 98 clients in the

domain, they won't have full functionality (won't have full functionality

of WSS/companyweb either due to not being able to use Office 2003,) and you

will have to manually configure clients networking  configure it to logon to the

2003 domain (you will not be able to join the Win98 clients to the domain

by using the "connectcomputer" web site).  In addition, there are many

other issues with legacy clients as mentioned in: 823659 Client, Service, and Program

Incompatibilities That May Occur When You -

.

It is also recommended that you install the updated DSclient (the one

included in the SBS 2K3 setup CD cannot be installed on 98 clients) on the 98 clients.

 

More detailed information can be found in the KB article below:

 

323466 Availability of the Directory Services Client Update for Windows 95

and http://support.microsoft.com/default.aspx?scid=kb;en-us;323455

 

226144 NetBIOS Domain Name Field Has a 15 Character Length Limitation -

http://support.microsoft.com/default.aspx?scid=kb;en-us;226144

After installing the updated DSclient on 98 clients (you may need to wait

for some time after the 9x clients' start until the computer lists are

synced,) I can then view and share the shared computers in 'Network

Neighborhood' ¨¤ Entire Network ¨¤

Heads up on Email pointing to website with Malware threat [Hurricane Katrina scam]

So this morning I get this email.... and the antenna goes up.... CLICK HERE it says for more info...yeah right.....so I asked some fellow Security MVPs to look at it and sure 'nuff....malware.  Variant of JS/ObjID.C trojan.

The ISC has just posted on this new malware threat
Katrina Malware
http://isc.sans.org/diary.php?date=2005-09-01 '

<How sick is our world that these malware writers have to play on our compassion for Hurricane victims?  Read this Washington Post article and see how Spyware isn't just pop ups anymore...this is BIG BUSINESS.  Sick big business as well.  To the folks behind this one....sick guys....really sick... you know how much small businesses are going to need geek/IT help in the coming months and all you guys can do is to code up stuff like this?  How about donating to the red cross?  How about volunteering to help a small business owner displaced by Katrina reset up MX records, A records?  How about doing something useful instead of this stuff?  Okay rant box off>

 -------- Original Message --------
Subject:     Re: x6 80 percent of our city underwater.
Date:     Thu, 1 Sep 2005 09:44:45 -0500
From:     Vesna Garmon
<garmonkuvesna@eoi.es>
Reply-To:     Vesna Garmon
<garmonkuvesna@eoi.es>
To:     Edie Prescott
<sbradcpa@pacbell.net>



Just before daybreak Tuesday, Katrina, now a tropical storm, was 35 miles
northeast of Tupelo, Miss., moving north-northeast with winds of 50 mph.
Forecasters at the National Hurricane Center said the amount of rainfall
has been adjusted downward Monday.

Mississippi Gov. Haley Barbour said Tuesday that Hurricane Katrina killed
as many as 80 people in his state and burst levees in Louisiana flooded New
Orleans
.

Read More..
http://malwareinfestedwebsite that I won't point to here

Need the tool to uninstall Norton?

Need the link to uninstall Norton... REALLY uninstall it?

Here it is.

So Quickbooks REALLY needs admin?

Got a call tonight about having Quickbooks go on a Terminal server and first off I should state... this is not supported by QB.  You are 'supposed' to buy QB Enterprise... that said..there's a link about QB on TS.  Remember to get Quickbooks to run without local admin or power user rights on the local XP machine [non LUA] you have to do some more tweakage.

Applications : QuickBooks

The official statement from Intuit is that running QuickBooks 2003 in a Terminal Server session is not supported. Read the details in Microsoft Terminal Server functionality for QuickBooks

Notwithstanding the above, users in the terminal services newsgroups have reported that you can make QuickBooks available in a TS environment, if you give the users some extra privileges. Here are the steps:

  • perform a normal installation of QuickBooks (in install mode!)
  • reboot
  • enter install mode again (change user /install), start QuickBooks and activate it by entering the registration code (this is a crucial step, and must be performed immediately following the reboot
  • go back to execute mode (change user /execute)
  • copy the %systemroot%\Intuit folder into each users %userprofile%\Windows folder
  • create a Quickbooks Users group
  • add your users to this group
  • give the group Full Control to HKEY_LOCAL_MACHINE\Software\Intuit\QuickBooksRegistration
  • give the group Full Control to HKEY_CLASSES_ROOT\.QPG
  • give the group Full Control to HKEY_CLASSES_ROOT\obja.obja
  • give the group Full Control to HKEY_CLASSES_ROOT\Quickbooks.application - QB Premier 2004 only?
  • give the group Modify rights to the %Program Files%\Intuit folder
  • give the group Modify rights to the %Program Files%\Common Files\Intuit folder

Printing issues

Make sure that clients use short names for their local printers if they need to print to a redirected local printer. Quickbooks cannot handle long printer names.
It's also important WHEN the driver was installed. Apparently QuickBooks only sees so many drivers in the registry, so if you installed 16 printer drivers and the 17th was the one you need auto-created, QuickBooks won't see it.

Misc. issues

  • 123869 - Message: "An ActiveX control on this page is not safe" or QuickBooks Centers are blank

Further reading:

  • 320185 - HOW TO: Use the CHANGE USER Command to Switch to Install Mode in Windows
  • 186498 - Terminal Server Application Integration Information

Disclaimer: I have no knowledge of the License Agreement for QuickBooks. You should check your License Agreement with Intuit to see if running QuickBooks on a Terminal Server is a violation or not.

Update

QuickBooks 2005 Enterprise Solutions does support Terminal Services! Check QuickBooks Enterprise Solutions: Features and Benefits for details.

After installation, follow these steps:

  1. Right-click on the QBES shortcut
  2. Chose properties
  3. Go to the Compatibility tab
  4. Put a checkmark in the box labeled "Allow Non-Administrators to Run This Program"
  5. Apply and save

And yes...it REALLY wants Admin unless you hack it...

If the worst occurs?

My city is about the same size as New Orleans.  And what if every man, woman, child, animal was ordered to leave.

Unbelievable... and think of all the SBSers in the area that are facing just that.

Gulf SMBs Flirting with Disaster:

Uh...That's us folks...we're SMBs out here too.

Some links for disaster recovery.. [not planning...but recovery] below....

 Getting back to business

Got any other resources for RECOVERY you want to share?

Do Domain Admins have to have access to EVERYTHING?

From the mailbag today comes a question about Sharepoint security....

We discovered that a domain administrator has access to all sharepoint sites created on an SBS server.  The issue here is when the execs in the company want to create a site to discuss business, financials, HR, etc., they probably need a domain admin to set it up.  That is obviously a problem if the domain admin or anyone in the domain admins group has access to such sensitive information.  I've not had a chance to look closely, but would this happen if the domain admins group had Administrator access to SQL and the Sharepoint site was SQL based?  Any insight is appreciated.

So knowing that Chad Gross wrote the Sharepoint chapter in the SBS Unleashed that does indeed talk about changing some of the default permissions of Sharepoint to 'tighten' them up a bit, I ran the question also by him.... and he said

[Captain Obvious mode]

Well domain admins have access to everything, so if you can't trust your domain admins, time to start looking for a replacement.

[/Captain Obvious mode]

He went on to say that he saw this as an HR issue, not a technology issue.  That you could have the same issue with Excel Spreadsheets in a shared folder.  That admin is GOD. 

It reminded me of the Blog post/article by Steve Riley which drives home the same thought... this isn't a technology problem...it's an HR problem here.  Once that you need policies in place, not tweaking ACLs for.

So.. the answer is... no... you are going to have to put policies in place so you 'can' trust that Admin.

WSUS on SBS

Overheard by an SBSer at a T2 presentation.

“It’s AWFUL! It rebooted all of a clients machines in the middle of the workday, including the SERVERS.”

Uh...folks... you SET the timing of the reboot, or you can let the end user manually download.  You 'chose' it to reboot in the settings that you selected. 

Read the instructions carefully..... and I have some pictures here.

...thanks to Happyfunboy for surviving a TS2 presentation without getting up and slugging a couple of folks....

How to sell to a Beancounter

There is one way to a Beancounter's heart. 

Free CPE.

So for all you SBSers out there that realize there is a potential to upgrade the Accounting industry and possibly get them off of Win9x and Word Perfect, here's the game plan for you:

In many areas of the Country there are local CPA chapters that are regional divisions of the larger State CPA Society.  These CPA Societies are the ones that can certify your presentation as CPE.  Do NOT make it 'sales-ishy', you must make it a learning experience.  Put a hook of Security in there.  Talk about how Gramm-Leach Bliley Act requires Financial Privacy.  Thus this weekend when I was watching the Hurricane coverage and they were showing ads for “Gotomypc” and the announcer was talking about how it was not problem getting the Firm's Financial Statement off of the Home PC without having to go home, boy was that a fun thought in my mind that if an employee would think nothing of leaving confidential client info on their home PC.

Contact that larger CPA society, and find the location of the local chapter.  See if they have a Technology committee that meets. Offer to do a presenation.  You do realize that for 4 years I ran the local Technology Committee here where I live before I became the State Technology Chair.  It was a fun gig because all these vendors would call and offer to present a program.  Write up an Outline, do 'death by Powerpoint' and plant the seed.  Remember how “I“ first got turned on to SBS?  In a CPE class.

Here are some ideas to help the Beancounter see the Advantage of a network

  • Centralized Storage - ensuring that all the data is in one spot ensures that it's fully backed up and properly secured.  Charlie Anthe showcased an upgrade that he did where every workstation was mapping drives to each other's local drives and that totally blasts the rule of only set up those rights and privileges you minimally need.  All that mapping means that there is data everywhere and it's not getting backed up.
  • Data never leaves the server - I purposely make the choice to NOT set up Outlook over Http.  Because I 'don't' want any offline data file storage on a laptop that may be stolen.  The fact that I can remote back in and never pull data off that server is wonderful in my book.
  • Security - Compare and contrast the security of Remote Web Workplace to PCAnywhere.  Because, yes, that is the app you are competing with.  Point out that PCAnywhere uses two static ports and that if that router gets reset, there goes your access.  Whenever a software program starts off with “We use a proprietary encryption algorithm“ run in the opposite direction as fast as you can.  Notice that by version 11.5, they finally junked that and are using AES 256 encryption.  Now class what does RDP include?  Oh just these standard RSA RC4 encryption thingys.  So your first question should be ...what version of PCAnywhere are your running because it looks to me like those older versions need to be junked and fast.
  • Multi-user means a network.  Now I'll be the first to admit that Microsoft has this problem too.  They build a package for 'multiuser' and we have to hack the package to get it on the server.  Come on gang.... a Network is just a workgroup with more toys.  All those mapping of drives from one system to another means that you've got major major goo and a major major eggshell network setup.  We can't set up this stuff like this anymore.  Especially not in a network for an industry that needs to realize that we have responsibiltiies to our clients to protect data.  SBS 2003 with XP sp2 puts firewalls on each computer only opening up those ports that are needed for operation and blocking all others.  It's called defense in depth.
  • Sign them up for the MPAN program [which btw offers free CPA and an alternative to Quickbooks in the new Small Business Accounting]
  • Oh and KILL OFF THOSE WINDOWS 98 WHILE YOU ARE AT IT

...do that and I'll stop yelling at them in the CPA listserves I'm in.

7 Computer security tips for Small Businesses...and I disagree with some of them

Infragard.net published this list of 7 tips for small businesses... but... I disagree with a couple....my corrections are in Red.

 

Seven Simple Computer Security Tips for Small Business and Home Computer Users

  • Use strong passwords passphrases. Choose passwords passphrases that are difficult or impossible to guess. Give different passwords to all accounts.
  • Make regular backups of critical data. Backups must be made at least once each day. Larger organizations should perform a full backup weekly and incremental backups every day. At least once a month the backup media should be verified.
  • Use virus protection software and anti-spyware software. That means three things: having it on your computer in the first place, checking daily having it set to automatically get for new virus signature updates, and then actually scanning all the files on your computer periodically [personally I don't do that one, it should 'catch them' as they come through].
  • Use a firewall as a gatekeeper between your computer and the Internet. Firewalls are usually software products. They are essential for those who keep their computers online through the popular DSL and cable modem connections but they are also valuable for those who still dial in.   Also install and utilize the additional security provided by the XP sp2 firewall enabled inside the network.
  • Do not keep computers online when not in use. Either shut them off or physically disconnect them from Internet connection. Leave them on so that they can be automatically patched when the WSUS is set to patch them, leave them on for remote access, and leave them on so your VAP/VAR can monitor them remotely. 
  • Do not open email attachments from strangers, regardless of how enticing the Subject Line or attachment may be. Be suspicious of any unexpected email attachment from someone you do know because it may have been sent without that person's knowledge from an infected machine. Use either your A/V or the built in SBS tool to strip off those attachments that have no business needs in the office.  Determine those file extensions that are needed for critical business purposes, block all others.
  • Regularly download security patches from your software vendors.  Sign up for security advisories and bulletins via RSS feeds.

So what about you?  Agree?  Disagree?

Do you have a plan?

So about this time a good friend of mine is starting a journey, packing up a spare disaster server and ensuring that it gets installed in a location far away from the path of a hurricane to keep his wife's business [and his] out of harms way.  As he put it, SBSmigration.com is moving a state to the west.  And I got to thinking about how much people are so concerned about redundancy in a SBS network and when you get right down to it, unless you plan for redundant power, or a location far far away from the location of the storm, worrying about an additional domain controller so that folks can 'log in' means diddly squat.

Planning.  Disaster planning.  Here I live enough away from earthquake zones, but still I rely on such vital things as Power.

So have you made YOUR disaster plan readiness yet?  And you can fully expect that when Jeff delivers his Disaster Planning presentation at SMBnation, this won't be a whitepaper on best practices.  No, this will be, unfortunately, a 'been there, lived through that' presentation.

Stay safe, and we will all be thinking of you and everyone else in the path of Katrina.

Step by Step for WSUS on SBS 2003

Download details: Step-by-Step for WSUS on SBS 2003

It's HERE!  The Step by Step for Windows Software Update Services on SBS 2003. 

SBSized and everything...

Service pack - revisits

First off, a REMINDER that if you happen to load up Windows 2003 SP1, and you are a SBSer, you aren't done yet... right in that “Windows 2003 SP1“ page it says:

Important

Taken from this page at the bottom.

Remember we aren't 'just' Windows 2003 sp1.  We're a Dagwood sandwich and we have parts.

Next if you are a Dell customer..remember to check the Dell Support site regularly (put in Service Tag then go to downloads and all downloads available for their server will be there). There is a recent Service Pack release which fixes a few problems is what I've heard.  I'll have to go check it out myself.  As an HP customer I get weekly emails of new fixes and releases [that's really cool, I like that]  Dell has the notification email too!

If you have an OEM installation of SBS 2003, you must use a special procedure to install WSUS

-------- Original Message --------

Subject: If you have an OEM installation of SBS 2003, you must use a special procedure to install WSUS

Date: Wed, 24 Aug 2005 17:13:33 -0700

From: Tim Elhajj (MSFT)

Newsgroups: microsoft.public.windows.server.sbs

 

There is a problem with installing WSUS on SBS 2003 and this message offers a work around to this problem.

 

 

BACKGROUND: Here is a description of the problem with OEM installation of SBS 2003:

 

 

During the SBS OEM mini setup the domain name is entered by the customer and added to the AD.  This property is set in the AD as lowercase.  During WSUS installation, the instance of WMSDE is set to case sensitive.  During the setup process an attempt is made to give access to a security account which fails because it can't find the account in the AD. The check is doing a case sensitive check (since the instance of WMSDE is set to case sensitive).Since the AD has the domain in lower case and the process is looking for an upper case entry, it fails. Example: Setup process is looking for

SJMPC\IWAM_DELL-OFV7446Y6N , but the AD shows sjmpc\IWAM_DELL-OFV7446Y6N ,since the instance is case sensitive, the install fails.

 

WORKAROUND: To work around this problem, use the following special procedures for downloading the WSUS installer file, extracting WMSDE from the WSUS installer file, installing WMSDE from the command line, and then

installing WSUS.

 

To download the WSUS installer to your server

 

1.   On the computer running Windows SBS, create a folder named WSUSFiles on the local hard disk.

 

2.   Read how to register to download the latest version of WSUSSetup.exe from the Microsoft Web site at http://go.microsoft.com/fwlink/?LinkId=51144.

 

3.   Answer all of the required questions on the Windows Server Update Services Registration Wizard Web page, and then click Continue.

 

4.   When the file download security warning appears, click Save.

 

5.   In the Save As dialog box, browse to the WSUSFiles folder, and then click Save.

 

 To prepare the WSUS database

 

1.   Extract the WSUS Setup files.

 

a.   Click Start, click Run, and then type C:\WSUSFiles\WSUSSetup.exe /X, where C: is the letter of your local hard disk.

 

b.   When prompted for a location to extract the files, select the WSUSFiles folder.

 

2.   Type the following command, where C: is the letter of your local hard disk, and then press Enter:

 

CD C:\WSUSFiles\wmsde

 

3.   Type the following command with consideration to the points listed below, and then press Enter:

 

Sqlrun03.msi InstanceName=WSUS BlankSAPwd=1 Reboot=ReallySuppress

DisableNetworkProtocols=1 DisableAgentStartup=1 DisableThrottle=1

 

* If you want to specify the drive letter where the database instance will be located, you must add the DataDir="Path" argument to the command line, where Path is the path to the target directory in the file system.

 

* The command line implies that your WSUS database will have a blank password. However, during the actual installation of WSUS, a randomly generated password is set. You do not need to specify a password.

 

* The command line is not case sensitive.

 

4.   Start the MSSQL$WSUS service. To do this, click Start, click Run, and then type Services.msc. Right-click MSSQL$WSUS, and then click Start. If the service is not listed, rerun the command in Step 4 of this procedure.

 

To install WSUS

 

1.   Click Start, click Run, and then type C:\WSUSFiles\WSUSSetup.exe, where C: is the letter of your local hard disk.

 

2.   On the Welcome page of the wizard, click Next.

 

3.   Read the terms of the license agreement carefully, click I accept the terms of the License Agreement, and then click Next.

 

4.   On the Select Update Source page, you can specify where the client computers get updates. If you select the Store updates locally check box, updates are stored on the server and you can select a location in the file system to store updates. If you do not store updates locally, the client computers connect to Microsoft Update to get approved updates. Keep the default option to store updates locally, either choose a location to store updates or accept the default location, and then click Next.

 

5.   On the Database Options page, keep the default options, and then click Next. Because you installed WMSDE in the previous procedure, changing the options on this page of the wizard has no effect.

 

6.   On the Web Site Selection page, specify a Web site for WSUS to use.This page also lists two important URLs based on this selection: the URL to which you will point WSUS client computers to get updates, and the URL for the WSUS console where you can configure WSUS. Keep the default option and click Next.

 

7.   On the Mirror Update Settings page, keep the default option and click Next. If you want to use multiple WSUS servers in a central management topology, see "Deploying Microsoft Windows Server Update Services."

 

8.   On the Ready to Install Windows Server Update Services page, review the selections, and then click Next.

 

9.   If the final page of the wizard confirms that WSUS installation was successfully completed, click Finish.

 

Note:  After you install WSUS, you can delete the C:\WSUSFiles folder However, do not delete the C:\WSUS folder, which is created when WSUS is installed. [Susan's note..or whereever you stuck the WSUS.  You may NOT want to place it on C: in case you are tight on space.]

No Rick we are not on track to have more patches than any other year

I'm in the presentation and the presenter says “we're on track to have more Security patches than any other year”

No, Rick, 2002 was a banner year with 72 patches and I think 2001 had more than that.  I'll have to check.

Rick... I know my patches... this is NOT a banner year for Security patches. 

Mothership Los Colinas is Blogging!!

This is SOOOOO cool!!!!

Mothership Los Colinas is blogging!

That's one of the places that make sure us SBSers stay safe and keep us out of trouble.

That's my nickname for Support Central for SBS.

This... is going to be a GREAT blog.

Who's responsible for the goo anyway?

Donna points to a recent survey that blame Microsoft for the worm....

But here's what I don't get... there was a workaround in there... Null session... and excuse me but I've read/heard about null sessions being a bad thing for HOW LONG now? 

Let's analyze this... YOU Mr. network person, YOU Mr. Businessowner let file and printer sharing goo traffic INSIDE your protected network and you allowed annoymous connections. Remember the workaround from the advisory? 

“If an administrator has disabled anonymous connections by changing the default setting of the RestrictAnonymous registry key to a value of 2, Windows 2000 systems would not be vulnerable remotely from anonymous users.” 

WE KNOW we cannot 'trust' our networks and yet we are doing NOTHING to secure than any better than if you had an entire fleet full of Win9x machines.  I mean you are pretty gooey and creamy in the middle there.

As far as not rolling out patches as soon as you can, I'm sorry I'm getting to the point where truly..when's the last time patching desktops broke something so badly you had to roll it back?  I'm not talking servers here.. I'm talking desktops.  Honestly when's the last time anything happened?  Maybe we need to zone ourselves... speed up those desktops that are obviously pretty gooey...and protect those servers better.

Isn't it better to have a small % chance of breaking something on the desktop ....than Disneyland not being able to sell tickets?

If you think your OS is good enough 'as is' ... and not willing to update to a platform of XP and 2k3 that were NOT hit by this ONE BIT, well then you have to make your network less gooey on the inside.

I mean don't we roll out antivirus signatures every hour on the hour?  How is that different?
------------------------------------
A web poll of more than 1,000 business PC users1, conducted by Sophos, has revealed that 35% of respondents blame Microsoft for the recent worm attacks against businesses across the globe, which exploit a newly discovered vulnerability in the software giant's code.

Systems administrators are also feeling the wrath, with 20% of respondents blaming them for not patching systems quickly enough. 45% hold the virus writers responsible for the 19 worms, which all take advantage of the same flaw.

"The majority of users believe that the virus writer has to take the ultimate blame for deliberately creating and unleashing this worm to wreak havoc on poorly protected businesses," said Graham Cluley, senior technology consultant at Sophos. "But what is most surprising is that so many people blame Microsoft for having the software flaw in the first place. Users' anger is perhaps understandable as Microsoft's security problems and their consequences are felt by businesses the world over. Many respondents appear to be incredibly frustrated by the constant need to roll-out emergency patches across their organizations."

http://www.sophos.com/virusinfo/articles/zotobpoll.html

Need remote access but don't have RWW?

The home machine.  You need to fix something on the owner's home machine.  It happens all the time doesn't it? 

The other day in the listserves someone was mentioning the program Logmein to do just that.  As they didn't have the ability to use remote web workplace or remote desktop.  And while it's a bit ..sorta like Gotomypc.com in that it blows through port 80 it actually does have some security features.

For one... it keeps track of the time on that remote machine.  An audit log.  And I'm a huge fan of an audit log.  ....but wait there's something else that audit log can do... it REMINDS you of the time you as a consultant took on that machine.  Why is this important?  Capturing billing time...that's what.

I mean when a program is reviewed in a Security magazine....

The wake for the printer is scheduled for...

Well we're investigating printers because well the clutch on the old one... isn't clutching.  And in looking at these lovely all in ones, many of them, heck practically all of them, do wireless networking now.  And of course my 'oh my gosh did Steve Riley check to see if these suckers have 802.1x, EAP and PEAP set up on these suckers' paranoia just kicked in.

I mean like.. so.. truly..what kind of security does this device support?  I've never wanted to set up something 'without' a firewall on a wireless connection.  Never felt the need, never felt the comfort. 

And certainly not without some guidance on the web before I buy it. 

I mean yeah I know ...sometimes the paranoia kicks in a bit too much.. but still it goes to show you that we need to think about this stuff everywhere.  The new copier/scanner at the office 'can' do wireless and it does have a bit of webserver capabilities.  Networking ...and the decisions about the security of it are everywhere.

SBS 2003 unleashed book on Amazon

I've been reviewing the upcoming SBS 2003 unleashed book by Eriq Neale [and other authors like Amy] and it's rare that I read a SBS book and go 'oh I didn't know that...'

I am on this one.

I 'just' finished [with wonderful help from Eriq] a chapter on Patching on SBS that's going to be included.  As you know I'm kinda a patch nutcase so in addition to 'how tos' there's information and resources on finding out about patching issues and ways to set up test networks in your clients.

MSRC blog talks about the IE vulnerability

Are you complex?

Signing up for an Office Live Meeting account the other day and I was faced with 'this' password selection as their policy:

Complexity requirements:

    * Must contain one or more numbers
    * Must contain one or more uppercase letters
    * Must contain one or more lowercase letters
    * Contain at least one of the following special characters:
      `~!@#$%^&*()_+-={}|[]\:";'<>?,./
    * Cannot contain the ID
    * Must be at least 8 characters in length
    * Cannot contain a space
    * Must begin and end with a number or letter

Okay...we need a number in our password... one Uppercase... one lowercase... one special character.... can't be the username.... no spaces [personally I like spaces and spaces are perfectly VALID parts of a password] and it has to begin AND end with a number or a letter [can't have one of those funky characters].

So... you use anything like that? 

You know how long that would take to crack?

...a long time....

A disturbance in the blogosphere [a good one]

There has been a recent disturbance in the force ... a good disturbance in the blogosphere ....

A very good one...

A new Blog joins the blogosphere

Enjoy and sign up... Dr. Jesper Johansson is blogging!

as Yoda would say... the force is strong with this one....

(I always use Newsgator inside of Outlook to keep track of my blog feeds..but bottom line get a feed reader to stay on top of your favorites... SUBSCRIBED!!!!)

What's the real risk?

Threats.

Risk.

Entry points.

We all have them.  But ... honestly.. I don't think we truly understand them well enough to be doing the proper things about them.  So many times I see people so worried about the outside wall, the firewall, the perimeter. 

Too often I see folks blindly refuse to look at SSL or RDP as oh, they are subject to Man in the Middle attacks so we just have to use this technology over there..without really understanding the REAL and TRUE risks to the network.  I talk about SMB signing and that's often touted as being able to deflect man in the middle attacks.. and where's the REAL risk of MITM attacks via smb?  With non Windows clients.  That's right, the main thing SMB signing deflects in man in the middle attacks done by non Windows workstations.

Okay...so how many non Windows workstations do I have in my full 100% Borg network?

Hm... do we remember?

Yes?

Yeah.. Zippo...nada...zilch.

So why do we worry about things over 'there' when because I'm having to still run a lot of desktops with local administrator, or hacking registry hives in a manner that even afterwards,  I'm not sure that opening up classes roots like I have to is the wisest thing in the world.  And yet we get so caught up in these threats ...that because either we don't get good enough information about them... or we don't understand them that we put our resources in the wrong place.

Today someone was saying that they didn't set up their clients with Remote Web Workplace because they didn't feel it was secure enough and never got an answer back from the sources they contacted at Microsoft regarding RWW [my question...uh..who did you talk to at Microsoft, because honestly even the Security bulletin on the RDP vulnerability didn't understand that SBS doesn't 'listen' on 4125.  The bulletin's “mitigation“ for SBS is not right at all.  That port never “listens“.  That's the beauty of it.  It waits for authentication]. 

Next the comment was made that SSL and RDP are both susceptible to Man in the Middle attacks....but with server based certificates they are not.  Okay...but in SBSland we have a self signed server certificate that you can add to the local certificate store on your computer.  So where's the Man in the Middle risk? 

Remember what happens during the installation of SBS 2003 sp1 if you don't export out those self signed certs and ISA 2004's wizard kicks in and builds new ones?  Remember how Outlook over http suddenly fails?

Remember the warnings from the SP1 premium notes?

  • To maintain the current authentication experience for your users, it is highly recommended that you save your existing certificate by exporting it before you begin to set up ISA Server 2004.
  • During the ISA Server installation process, you will need to indicate that you are creating a new certificate. Later, you will import your saved certificate in order to maintain your current authentication experience for your users.

So ... tell me... how much of a risk of Man in the Middle attacks over our Remote Web Workplace is there truly? In REALITY?

Truly ... I've never seen a MITM attack in the SBS newsgroups.  What is the true reality of that kind of attack happening?

Malware.. oh yeah.... SMTP auth attacks.. heavens yes... Stupid passwords... all the time... but MITM?

I guess what I“m saying is, one size of paranoia ...does not fit all.

We've got to stop following something just because it's the super duper high security right thing to do over there without looking to see if it's the RIGHT SECURITY thing to do over here. 

Read between the lines of what Dana is doing in this post.  He's not throwing stuff on his system just because he can, he sat down and made a risk analysis of what his concerns were, what his threats were, and what protection he felt was reasonable.  We'll actually be talking a bit about this at SMBnation where he and I will be presenting. 

I love the comment that several attendees of the SMB Technology Network session..they wanted real solutions that would deliver real value to their clients.  They didn't want to use scare tactics to sell anything and especially solutions that really didn't help the real risk.

So truly... what's your REAL risk for your clients?

Are you solving that?

Hope to see you there at SMBnation!

I'm a security news junkie [part two]

So in the mailbox tonight, I was asked...how did I sign up for the McAfee alerts on IM.

Step on, on the MSN IM, scroll down to the alert window and click on 'go to site'.  From there you'll want to click on 'additonal alerts'.  From there...see that McAfee icon?

Click there...sign into your passport to sign up...and voila.

Virus Alerts: Keep you up-to-date on important virus news. Subscription Alerts: Notify you when it's time to renew your subscription.

..okay if you want even MORE instant paranoia there's also the Terralert for $39.99

But Joe, they do!

Joe Wilcox talks about how this worm in reality shines the light on customers and patch management:

'The real spotlight should be on customers and patch management. If Microsoft doesn't provide tools these customers deem adequate to quickly deploy patches, then Microsoft competitors and partners should seize the opportunity to do so. Regardless, no one should delay patching systems once they are available. The risks are too great, as this week's limited, but high-profile infections demonstrate.'

Excuse me Joe?  What do you think Windows Update and Microsoft Update is?  What about WSUS?  And ..Joe? WSUS is a free download.  That's right Joe, even though I truly like Shavlik better, you CAN get a free patch tool from Microsoft NOW.

As little as I am, I've had a patch management tool for like... something like THREE YEARS now.  How come I got the cluestick via Shavlik so long ago and these companies haven't figured out you can automate this gunk?  I just don't get it.

I truly don't get it.  I rant all the time about making GUIs for me because I hate command line and scripting...but I as heck know for certain the power under the Engine.  It's Group Policy, it's scripting.  Heck it's even the upcoming Monad.  It's controlling the desktops and testing patches, deploying them, we have the tools and the power to do this.

So Joe...the tools are there...the partners are there... the community at patchmanagement.org is there....

Tell those firms to get on board and get the cluestick.

MS Advisory on IE and a kill bit

Microsoft Security Advisory (906267): A COM Object (Msdds.dll) Could Cause Internet Explorer to Unexpectedly Exit:
http://www.microsoft.com/technet/security/advisory/906267.mspx

So I'm hit on IM with that new Advsiory today and it says in part three:

Disable attempts to instantiate the Microsoft DDS Library Shape (Msdds.dll) control in Internet Explorer by setting the kill bit for the control

Warning If you use Registry Editor incorrectly, you may cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that you can solve problems that result from using Registry Editor incorrectly. Use Registry Editor at your own risk.

The CLSID for the Microsoft DDS Library Shape Control (Msdds.dll) COM object is EC444CB6-3E7E-4865-B1C3-0DE72EF39B3F.

For detailed steps about stopping a control from running in Internet Explorer, see Microsoft Knowledge Base Article 240797. Follow these steps and create a Compatibility Flags value in the registry to prevent the Microsoft DDS Library Shape Control (Msdds.dll) COM object from being instantiated in Internet Explorer.

Impact of Workaround: The Microsoft DDS Library Shape Control is not marked safe for scripting and is not intended to be instantiated in Internet Explorer. No adverse effects should occur as a result of this workaround.

Now I'm not big on manual stuff but http://isc.sans.org/diary.php?date=2005-08-18 has a GUI [ah yes, GUI] kill bit interface.

Now MIND YOU, I'M STILL NOT VULNERABLE so while I'm doing this just for grins [and to see if truly no adverse affects occur [none do] just merely under the 'if ya don't need it, get rid of it' rule, I still think this is a bit too much Chicken Little in one week.

Today on the download site an interesting document on IE Security.... truly that is not an oxymoron and there's good stuff to come in IE7.

Incidents.org reports 0-Day.. Rover says... what 0-Day?

So over on Incidents.org they are reporting a new 'zero day' IE vulnerability......

Yesterday, FrSIRT (aka K-otik) released a working 0-day exploit against a .Net component with is accessible remotely via Microsoft Internet Explorer.

Impact

The exploit will open a remote shell if you visit a malicious website. Other payloads are possible. The exploit will have all the privileges assigned to the user running Internet Explorer. We do not see any use of the exploit at this time, but consider widespread use imminent.

Am I Vulnerable ?

You are only vulnerable if you have "msdds.dll" installed on your system. By default, Windows will not install this DLL. See below for details. The DLL can be found in Program Files\Common Files\MicrosoftShared\MSDesigners7

The vulnerable version is: 7.0.9064.9112 . Later versions are not vulnerable (in particular 7.10.x)

 So I fired up ol' trusty Rover and on my XP sp2, with Office 2003 with Access 2000 runtime... and Rover says my version is 7.00.9466.  hmmm... let's see... 7.00.9466 versus 7.0.9064.. I think I'm just fine.

Do we see an interesting pattern to all these latest 'stuff' going on the web?  Do you see how being fully borg means that the issues are less, I'm not running screaming to the server, nor to the workstations.

Patching is easier... I'm more secure... the bad things have to work a heck of a lot harder to get me, they would have to use authentication methods that are harder to attack on... see what is going on here? 

I rant about Windows NT being dead... personally... I think Windows 2000 is on major life support and someone should pull the plug.  It's a 5 year old operating system that businesses just should not be deploying today.  Not in this environment.

Malicious Software Removal Tool updated to remove Worm

Malicious Software Removal Tool updated to remove Charlie Gibson's worm:
This Alert is to notify you that on 17 August 2005 the Microsoft Windows
Malicious Software Removal Tool has been updated with added detection
and cleaning capabilities for the following Malicious Software:

* Zotob.A
* Zotob.B
* Zotob.C
* Zotob.D
* Zotob.E
* Bobax.O
* Esbot.A
* Rbot.MA
* Rbot.MB
* Rbot.MC

The updated version of the Microsoft Windows Malicious Software Removal
Tool is available for download from the Download Center
at this
location

NOTE: This updated version is currently NOT available on Windows Update,
Microsoft Update or through Windows Server Update Services.

More information on the Microsoft Windows Malicious Software Removal
Tool is available here:
http://go.microsoft.com/fwlink/?LinkId=40573

Worm attack or maybe a wake up call on how we are setting up our networks?

This morning Charlie Gibson said his computer rebooted...a lot.  Because he was nailed by that worm going around.  Call me wacko..and granted I can say this snug as a bug on Windows 2003 and full XP sp2 borg where to attack me you had to authenticate to me which meant you'd get my 2x4 first.. so....here's all these folks talking about how massive networks were taken out and it just seems to be they just aren't zoning their risks properly.

If we know we have gooshiness inside... if we know that laptops would be a prime infector here... if we were told it looked like this was a worm.... I'm sorry but maybe Charlie Gibson's computer shouldn't be a concern to the people running the entire Network.

There are two statements in the Protecting your Windows Network by Johansson and Riley that I think we need to be reminded of...

“Less-sensitive systems may depend on more-sensitive systems”

More sensitive systems must never depend on less-sensitive systems”

I mean maybe Charlie Gibson..or someone at his firm needs to turn on Automatic updates or deploy WSUS or Shavlik.  I mean if SBSers can do it... why not a big company like ABC? Why can't our desktops get patches a lot quicker than we are doing it now?  Do we really have that much 'patch breakage' at the desktop level?  If we do... why?  What's the stupid line of business app that is breaking so much.... and if security patches make it break.... maybe ...just maybe... it's a program that isn't so great?

Just call me a Security news junkie

So today I received word that in addition to the way I'm getting Security advisories now [via the Comprehensive email], there are TWO NEW WAYS to get the Advisories.

There are now RSS feeds as well as via Instant Messenger!  Okay call me crazy but this is really cool.  I already get Security bulletins via IM now.... and I get McAfee's late breaking virus issues.... now I can add Security Advisories.  So you click on the Advisory page and then on the link to sign up for Instant Messenger....

And then you select those alerts you want......well.. you want them all... I do. And once you click submit.. there... instant security paranoia....

 

So what's a Security Advisory you ask?

Microsoft Security Advisories, a supplement to the Microsoft Security Bulletins, address security changes that may not require a security bulletin but that may still affect customers' overall security.

Bottom line they are a bit more pro-active... a bit more mitgationish... and just more good info to have.

And while you are signing up for RSS feeds.. don't forget to have the MSRC blog in your feed reader as well.

Like you didn't have enough fun before with patching

Adobe Acrobat 7.0.3 Professional and Standard update - multiple languages - Acrobat for Windows - Downloads:
http://www.adobe.com/support/downloads/detail.jsp?ftpID=2990
Adobe Reader 6.0.4 update - multiple languages - Adobe Reader for Windows - Downloads:
http://www.adobe.com/support/downloads/detail.jsp?ftpID=2988

You can update your product to version 6.0.4 in one of two ways:

(1) Update automatically using the update manager. Choose Help > and Check for updates. Select all updates and click the update button at the bottom left corner of the update manager screen.

2) Update manually and apply each update individually. If your current version is

Adobe Reader 6.0.3: Apply the Adobe Reader 6.0.4 update by downloading the file.

Adobe Reader 6.0.2: Apply the
Adobe Reader 6.0.3 patch and then apply the 6.0.4 update.

Adobe Reader 6.0.1: Apply the
Reader 6.0.2 update and then the Reader 6.0.3 update before updating to Reader 6.0.4.

Secunia - Advisories - Adobe Acrobat / Reader Plug-in Buffer Overflow Vulnerability:
http://secunia.com/advisories/16466/


A vulnerability has been reported in Adobe Reader and Adobe Acrobat, which potentially can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to an unspecified boundary error in the core application plug-in and can be exploited to cause a buffer overflow when a specially crafted file is opened.

Successful exploitation may allow execution of arbitrary code.

Okay so lemme get this straight... Adobe has a security vulnerability .. a buffer overflow.... and I either have to ask everyone to hit the update button [yeah right, that's gonna happen] or I have to deploy possibly three patches...and I'm not sure what version of 6 I have in the first place?

Yo?  Adobe?  Heard of rollup patches?

Microsoft Security Advisory Notification

 
********************************************************************
Title: Microsoft Security Advisory Notification
Issued: August 16, 2005
********************************************************************

Security Advisories Updated or Released Today
==============================================

* Security Advisory (899588) 

  - Title:    Vulnerability in Plug and Play Could Allow Remote Code
	 Execution and Elevation of Privilege (899588)

  - Reason For Update: August 16, 2005: Advisory has been updated 
    to document additional information about variations of 
    Worm:Win32/Zotob.A and additional information about the 
    ongoing investigation.

  - Advisory Web site: http://go.microsoft.com/fwlink/?LinkId=51237

  - Bulletin Web site: http://go.microsoft.com/fwlink/?LinkId=48900


Support:
========
Technical support resources can be found at:
http://go.microsoft.com/fwlink/?LinkId=21131

International customers can get support from their local Microsoft
subsidiaries. Phone numbers for international support can be found
at: http://support.microsoft.com/common/international.aspx

Additional Resources:
=====================
* Microsoft has created a free monthly e-mail newsletter containing
  valuable information to help you protect your network. This
  newsletter provides practical security tips, topical security
  guidance, useful resources and links, pointers to helpful
  community resources, and a forum for you to provide feedback
  and ask security-related questions.
  You can sign up for the newsletter at:

  http://www.microsoft.com/technet/security/secnews/default.mspx

* Microsoft has created a free e-mail notification service that
  serves as a supplement to the Security Notification Service
  (this e-mail). The Microsoft Security Notification Service: 
  Comprehensive Version. It provides timely notification of any 
  minor changes or revisions to previously released Microsoft 
  Security Bulletins and Security Advisories. This new service 
  provides notifications that are written for IT professionals and 
  contain technical information about the revisions to security 
  bulletins. To register visit the following Web site:

  http://www.microsoft.com/technet/security/bulletin/notify.mspx

* Protect your PC: Microsoft has provided information on how you
  can help protect your PC at the following locations:

  http://www.microsoft.com/security/protect/

  If you receive an e-mail that claims to be distributing a
  Microsoft security update, it is a hoax that may be distributing a
  virus. Microsoft does not distribute security updates through
  e-mail. You can learn more about Microsoft's software distribution
  policies here:
  
http://www.microsoft.com/technet/security/topics/policy/swdist.mspx

New variant of worm - batten down the hatches

Incidents.org  and the newsmedia [mainly because it appears they got nailed good] are reporting on a new variant of the Plug and Play worm.

Symantec Security Response - W32.Zotob.E:
http://securityresponse.symantec.com/avcenter/venc/data/w32.zotob.e.html

I'd like to copy part of the incidents.org web site and remind everyone....

Malware can only develop as fast as it is developing in this case because of extensive code sharing in the underground. The only way we can keep up with this development is by sharing information as efficiently. Being able to do so openly will make it only easier to do this sharing. Please join our effort, and share future observations with us. We will continue to turn them over quickly and make them available via out diaries for everybody to read and to learn from.

Update..just got hit on IM with this alert from McAfee

Do you charge?

With last weeks patches comes the question...do you charge for Security patches? For Service pack installation?

Many have set up 'managed' contracts where they are using the monthly management fee to include application of security patches. Some have placed in the managed contracts that they will include the application of Service packs in this monthly fee arrangement as well.

Now, the interesting thing about this is in SBS 2003 sp1, that SP process included not just 'traditional' service packs ...but also the application of ISA 2004. That's not a service pack..that's a new application. One, unfortunately that the business owner might not see a lot of benefit from..since it's an interface that you will use.

And there's the rub. I would argue that you need to charge for Service packs...but how do you make a business case for the application of something that may destabilize a network? It's not like we don't want to apply service packs and security patches...but it's that trip through the worm hole that scares us half to death because we are what we are.

Yes I know that I argue strongly that if you have a good backup that you shouldn't mind the application of a patch ..but the reality is... sometimes that business owner doesn't have the time, the resources, the budget..the whatever to deal with a patching issue. And while 99.9999% of the time I have no issues, the reality is, you need to be prepared just in case.

I say you charge for Service packs [especially this one] and not for security patches if you have a monthly plan. What do you do?  And how are you approaching your clients and 'selling them' on Service Pack 1?

But making the business case for patching and upgrading isn't always easy... I'll grant you that.

I personally know it's the right thing to do.  But for some folks... quantifying that and identifying it better than 'it's just the right thing to do to keep yourself better protected', well sometimes you have to make a stronger case than that.

My 'takeaways' of why you should apply this Service pack?

  • Data Execution Prevention on Server 2003
  • Right now while you are still in a bit of a 'sweet spot' of support, there will be a time that you won't be.  Target yourself for an application of this SP of when it makes the best sense for the client.
  • Gets them fully ready to go for WSUS
  • Gets them fully ready to go for having a geek phone like the Audiovox
  • Deploys the bulk of the latest and greatest fixes for Backup software
  • ISA 2004 is well... it's a 2004 product and not a 2000 product.  “Nuff said right there.
  • ..and last but not least...it's the right thing to do

Read, prep, prepare and we'll leave the light on for ya....

Updated advisory on 05-039

'If an administrator has disabled anonymous connections by changing the default setting of the RestrictAnonymous registry key to a value of 2, Windows 2000 systems would not be vulnerable remotely from anonymous users. However, because of a large application compatibility risk, we do not recommend customers enable this setting in production environments without first extensively testing the setting in their environment. For more information, search for RestrictAnonymous at the Microsoft Help and Support Web site.'

uh...how about just getting a patch tool like WSUS and patchin'?  Sounds like it might be the same amount of time?

********************************************************************
Title: Microsoft Security Advisory Notification
Issued: August 15, 2005
********************************************************************

Security Advisories Updated or Released Today
==============================================

* Security Advisory (899588)

  - Title:    Vulnerability in Plug and Play Could Allow Remote Code
Execution and Elevation of Privilege (899588)

  - Reason For Update: Advisory has been updated to document
    additional variants of Worm:Win32/Zotob.A. We have also updated
    the advisory to document information about the impact of the
    RestrictAnonymous registry key.

  - Advisory Web site:
http://go.microsoft.com/fwlink/?LinkId=51237

  - Bulletin Web site: http://go.microsoft.com/fwlink/?LinkId=48900


Support:
========
Technical support resources can be found at:
http://go.microsoft.com/fwlink/?LinkId=21131

International customers can get support from their local Microsoft
subsidiaries. Phone numbers for international support can be found
at:
http://support.microsoft.com/common/international.aspx

Additional Resources:
=====================
* Microsoft has created a free monthly e-mail newsletter containing
  valuable information to help you protect your network. This
  newsletter provides practical security tips, topical security
  guidance, useful resources and links, pointers to helpful
  community resources, and a forum for you to provide feedback
  and ask security-related questions.
  You can sign up for the newsletter at:

 
http://www.microsoft.com/technet/security/secnews/default.mspx

* Microsoft has created a free e-mail notification service that
  serves as a supplement to the Security Notification Service
  (this e-mail). The Microsoft Security Notification Service:
  Comprehensive Version. It provides timely notification of any
  minor changes or revisions to previously released Microsoft
  Security Bulletins and Security Advisories. This new service
  provides notifications that are written for IT professionals and
  contain technical information about the revisions to security
  bulletins. To register visit the following Web site:

 
http://www.microsoft.com/technet/security/bulletin/notify.mspx

* Protect your PC: Microsoft has provided information on how you
  can help protect your PC at the following locations:

 
http://www.microsoft.com/security/protect/

Worm:Win32/Zotob.A advisory

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

********************************************************************
Title: Microsoft Security Advisory Notification
Issued: August 14, 2005
********************************************************************

Security Advisories Updated or Released Today
==============================================

* Security Advisory (899588)

  - Title:    Vulnerability in Plug and Play Could Allow Remote Code
Execution and Elevation of Privilege (899588)

  - Reason For Update: Advisory has been updated to advise customers
    that Microsoft is actively analyzing and providing guidance on
    a malicious worm identified as the "Worm:Win32/Zotob.A".

  - Advisory Web site:
http://go.microsoft.com/fwlink/?LinkId=51237

  - Bulletin Web site: http://go.microsoft.com/fwlink/?LinkId=48900


Support:
========
Technical support resources can be found at:
http://go.microsoft.com/fwlink/?LinkId=21131

International customers can get support from their local Microsoft
subsidiaries. Phone numbers for international support can be found
at:
http://support.microsoft.com/common/international.aspx

Additional Resources:
=====================
* Microsoft has created a free monthly e-mail newsletter containing
  valuable information to help you protect your network. This
  newsletter provides practical security tips, topical security
  guidance, useful resources and links, pointers to helpful
  community resources, and a forum for you to provide feedback
  and ask security-related questions.
  You can sign up for the newsletter at:

 
http://www.microsoft.com/technet/security/secnews/default.mspx

* Microsoft has created a free e-mail notification service that
  serves as a supplement to the Security Notification Service
  (this e-mail). The Microsoft Security Notification Service:
  Comprehensive Version. It provides timely notification of any
  minor changes or revisions to previously released Microsoft
  Security Bulletins and Security Advisories. This new service
  provides notifications that are written for IT professionals and
  contain technical information about the revisions to security
  bulletins. To register visit the following Web site:

 
http://www.microsoft.com/technet/security/bulletin/notify.mspx

* Protect your PC: Microsoft has provided information on how you
  can help protect your PC at the following locations:

 
http://www.microsoft.com/security/protect/

  If you receive an e-mail that claims to be distributing a
  Microsoft security update, it is a hoax that may be distributing a
  virus. Microsoft does not distribute security updates through
  e-mail. You can learn more about Microsoft's software distribution
  policies here:
 
http://www.microsoft.com/technet/security/topics/policy/swdist.mspx

Seventeen percent, ten percent, 1.2 million

Seventeen percent, ten percent, 1.2 million... that's what is continuing to fund Spyware, Adware, Viruses and what not....

• Seventeen percent of our survey respondents weren’t using antivirus software.

• Ten percent of those with high-speed broadband access--prime targets for hackers--said they didn’t have firewall protection that would block online intruders. Nationally, that’s the equivalent of 3.6 million unprotected households.

• About 1.2 million online households helped keep spammers in business by purchasing a product or service advertised through spam.

Source:  Consumer Reports

MS05-039: Zotob.A Internet Worm -- In-the-wild

Fellow MVP Harry Waldron reports that first sightings of a virus/worm bundled up to take advantage of the recent security patches on Tuesday have been sighted:

MS05-039: Zotob.A Internet Worm -- In-the-wild:
http://msmvps.com/harrywaldron/archive/2005/08/14/62663.aspx

From the Fsecure write up....http://www.f-secure.com/weblog
"However, Zotob is not going to become another Sasser. First of all, it will not infect Windows XP SP2 machines. It also won't infect machines that have 445/TCP blocked at the firewall. As a result, majority of Windows boxes in the net won't be hit by it." 

More info...

MS05-039: Zotob.A Internet Worm
http://forums.mcafeehelp.com/viewtopic.php?t=52307

ISC information
http://isc.sans.org/diary.php?date=2005-08-14

Important facts so far from the ISC write up:

- Patch MS05-039 will protect you
- Windows XP SP2 and Windows 2003 can not be exploited by this worm, as the worm does not use a valid logon.
- Blocking port 445 will protect you (but watch for internal infected systems)
- The FTP server does not run on port 21. It appears to pick a random high port.


----------------------------------------------------------------------
                      FrSIRT / Security Alerts
----------------------------------------------------------------------
      The French Security Incident Response Team 24/24 & 7/7
----------------------------------------------------------------------
                         - 14 August 2005 -
----------------------------------------------------------------------

- A worm (Zotob.A) exploiting the MS05-039 flaw discovered in the wild

 Zotob.A is a worm that exploits the recent Plug-and-Play vulnerability
 (MS05-039) using TCP port 445. The worm targets only Windows 2000
 machines [...]

 
http://www.frsirt.com/english/advisories/20050814.ZotobA.php


SBSized translation:

Your Windows 2000 machines are most vulnerable.  While port 445 [a file and printer sharing port] is not open from the outside, it is fully open on the inside [inner goo].  Most SBS networks were not too typically nailed by Sasser and Blaster because at that time we were not doing a lot of remoting in.  I think we're doing a lot more.  Your remoting-in machines that you or your consultant do not monitor the patch status on are your weak spots.  I'm still not in panic mode... but then again... I'm fully patched via the use of Shavlik at the office and WSUS here at home so I can type this up all high and mighty and not care a twit. 

Want to be 'twit-carefree' like me?  Turn on that automatic updates on workstations.  Install WSUS.  Buy Shavlik.  Do something .....but get a tool so that patch Tuesday is actually the 'control thrill of the month' in your network.  I use it as my 'check my network day'.  Automate it.  Blonde it.  But get 'twit-carefree' like me about patching.

Where should your WSUS be installed?

Not on your member server if you are running Terminal Services on that member server....

ReadMe for Windows Server Update Services:

Issue 5: WSUS is not supported on servers running Terminal Services

For this Windows Server Update Services release, it is recommended that you do not install WSUS on a server running Terminal Services.

Well that settles that question we were discussing the other day..bottom line put WSUS on the SBS box if your second/member server is a TS box.


 

A revisit to a printer/scanner/copier

The other day I was freaking out setting up a Ricoh printer/scanner/copier because it needed for me to leave a password in it to gain access to the network.

Quite honestly I just don't like it.  I don't.  Call me wacko, but I just don't like to leave a password on a device that Shavlik can't patch.  But Susan?  What about that Audiovox Cell phone... it's got a password and you can't patch the cell phone with Shavlik!  Yes but in the near future, when Exchange 2003 sp2 comes out I can push a remote wipe to that device and 'kill' the domain info on it.  Now..the forensic side of me says, yes but, how good of a wipe of the memory?  As you well know that when people delete things it may not be deleted.  Yes, yes I know... but at least it is a process that I 'can' touch that device.

What kind of control do I have over a copier that has an IP address and that I don't even officially own.  When we spec'd it out from the vendor, they had a “network requirements' document they wanted us to fill out ...and on there they wanted email addresses and passwords.  I was like... I don't think so.....The other day someone was mentioning that a firm was getting attacked and they couldn't figure out where it was coming from inside the network.  Turns out it was the Apache web server inside the copier that the outside attacker was using to launch the inside attacks from.

Bottom line... that device isn't a copier/scanner/printer.  It's software ...just like any other piece of computing thing sitting in my office that boots up with a musical sound in the morning.  So I'm going to rank it for risk using that as the criteria.

Can I patch it with Shavlik?  Nope.  Do I then want a key to my kingdom on it?  Nope.  Are there future features in Exchange to give me security for the cell phone?  Yup.  You can go to the webcast that Eileen talks about from here.  Bottom line that password is coming off and we're going to be using more anonymous means for that copier to put it's pdfs up on the network.

So what's the security of RDP?

I was asked whether or not I would consider a straight 3389/Remote desktop connection into an XP box secure.

First off let's define what I define as 'secure'.  Remember I said that security had to include monitoring.  It has to include authentication.  So let's see if that XP workstation with a 3389 connection is 'secure'.  Remember that right now we have a Denial of Service issue with RDP too.

But there's something in that security bulletin that I disgree with... right now... if you ping a SBS 2003 box, or fire up netstat -ano, port 4125 isn't 'listening'.  It's in a closed state waiting to be turned on after someone authenticates on port 443.  So the 'workaround' that is listed here.... “ Note Windows Small Business Server 2003 uses a feature named Remote Web Workplace. This feature uses TCP port 4125 to listen for RDP connections. If you are using this feature, you should validate that this port is also blocked from the Internet in addition to port 3389.“  I don't think is necessary.  That's why I like the Security of RWW.  It has that gateway... then like I said before ... it's the LOGGING.  I purposely set up an additional 'hit me in the face of something bad happening' but the email that I get daily does the same thing too.

I would argue that unless you have something ...anything.. in front of that 3389 connection that is logging the ingress and egress...you don't have security.  If you are monitoring the ins and outs of that box... you don't have security.  Security isn't about setting the screws and walking away...it's about constantly checking that the settings are still okay and the doors and locks are still how they should be set.

Want to read more paranoia. buy this whitepaper on securing RDP for $19 from the Computer Society.

Gotta love that SQL command line...

So over on SeanDaniel.com's blog a post that made me chuckle... it's about the issue where the OEM Dell's and HP's can't get WSUS on the box using the wizard.  Leave it to the OEM preinstalls to be the troublemakers.  Remember this is JUST for instances where you are using the original 'as is' image and have not flattened it and reinstalled it.

So I had to laugh about the SQL command line in the post

Sqlrun03.msi INSTANCENAME=WSUS BLANKSAPWD=1 REBOOT=ReallySuppress DISABLENETWORKPROTOCOLS=1 DISABLEAGENTSTARTUP=1 DISABLETHROTTLE=1

Reboot = ReallySuppress made me laugh. 

Suppress isn't enough huh?  It has to be “ReallySuppress“. 

Like really I truly mean it suppress..no really... I mean it....

Okay ...so maybe it's just seems funny to me...

[remember I'm not a scripter... I'm a GUI gal]

WSUS not WSUSing?

If you are like me and Torrey ... on my test WSUS server at home, my workstation clients would NOT check in.

There are a couple of issues here and some resolutions....

On the WSUS blog it points to a patch you can get from Product support services for free.  But I found if you stuck in a group name into your Group Policy setup this did the trick just fine 'kick the workstations into checking in with the server.

Next I did not have to do the WSUS on SBS wiki edits and it worked just fine.

Check out this Powerpoint I did on WSUS for more info...see page 51 on “Client side targeting” and you'll see the setting I'm talking about.

Where's your monitoring?

....... this includes performing a risk analysis; implementing reasonable and appropriate security measures; and documenting and maintaining policies, procedures and other required documentation.

 

Compliance is not a one-time goal, it must be maintained. ......

 

.....The Security Rule does not specify minimum requirements for personal computer operating systems, but it does mandate requirements for information systems with electronic PHI. Therefore, as part of the information system, the security capabilities of the operating system may be used to comply with technical safeguards standards and implementation specifications such as audit controls, unique user identification, integrity, person or entity authentication, or transmission security.

 

HIPAA FAQs courtesy of Endhack.com

 


In my mind...security is about monitoring as much as it is about securing.  Someone asked me today if I felt the security of just the Remote Desktop Protocol to a WinXP desktop was secure enough if the XP was NOT behind a SBS box and all on it's own with access through port 3389.  I stopped and thought about why to me..it's not about the security per se... it's about the monitoring.

 

Right now on my SBS box everyone comes through one doorway.. Remote Web Workplace.  I have it set up so that if I mistype a password .. I get an email.  The SBS monitoring email checks the security log file and every morning I make sure that email tells me I'm in good shape.  It monitors 24/7/365 days a week.

 

..so if we have a Windows XP box...all by itself... port 3389 open... where's it's monitoring?  Where's that 'in your face' daily email that tells me 'go check that sucker out, something is up“.  It's not there is it?  Is the technology of RDP secure.  Yeah..secure enough.  Does it have enough security capabilities to provide me with the security that I believe it should have?  Good question.

 

I don't think you can have security unless you have monitoring in place...those safeguards in place...I think that auditing HAS to be in place and the ability to review what's going on that device to be there as well.

 

What do you think?

 

Hey when did Shavlik add that one?

Using my Netchk 5 and it has the option to reboot the server 'before' applying patches right in the deployment template options.... oh that's so cool.  So for those times you should make sure your server is rebooting as it should BEFORE applying the patch....very cool!

 

So now that the bad guys have released exploit code...now what?

So based on our last blog post we know that bad guys have put exploit code on the web... in fact one such place... is supposedly a 'trusted centre' and firms 'rely on it for proactive solutions'...yet they post vulnerability exploits..go figure... so anyway...

 

Let's review the information shall we? 

  • Windows 2000 systems are primarily at risk from this vulnerability. Windows 2000 customers who have installed the MS05-039 security update are not affected by this vulnerability.
  • While not the current target of this exploit code, it’s important to note that on Windows XP Service Pack 2 and Windows Server 2003 an attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely by anonymous users or by users who have standard user accounts on Windows XP Service Pack 2 or Windows Server 2003. However, the affected component is available remotely to users who have administrative permissions.
  • While not the current target of this exploit code, it’s important to note that on Windows XP Service Pack 1 an attacker must have valid logon credentials to try to exploit this vulnerability. The vulnerability could not be exploited remotely by anonymous users. However, the affected component is available remotely to users who have standard user accounts on Windows XP Service Pack 1. The existing exploit code is not designed to provide the authentication required to exploit this issue on these operating systems.
  • This issue does not affect Windows 98, Windows 98 SE, or Windows Millennium Edition.

..so you haven't had a chance to patch your SBS 2000 or your Windows 2000 workstations.... okay so what's the key mitigation for those machines if you can't yet patch?  Block port 139 and 445 at the firewall.  And boys and girls in SBSland do we have these ports open?  HECK NO.  If you did have a Windows 2000 box out there with these ports opened would you already be owned and serving up Britney Spears songs on the Internet so applying this patch probably wouldn't be your highest priority right now? Probably.  Most likely... my only question would be ... are you sure it's Britney or Jessica Simpson songs?  You may want to see if the latest from the Dukes of Hazzard movie is on that box yet.

 

So while I don't want to downplay this...is this just merely someone writing up the code?  Yes.  Is it floating around the Internet ready to pounce on our SBS 2000 boxes?  No.  In fact I'm more surprised that we haven't seen that Exchange 2000 MS05-021 vulnerability out and about that also nailed without needing authentication.  

 

Is it very interesting that the latest of these vulnerabilities issues are really affecting Windows 2000ish platforms a lot harder than 2003ish ones?  Oh yeah.  If you have anyone on SBS 4.5 is it about time that you sit them down and say  “SBS 2003 sp1 is out... it's time to shoot this puppy and put it out of it's misery?”  Yup ....it's time. 

 

I still like the Japanese Security bulletins the best.....

Exploit code released for Plug and Play Vulnerability

********************************************************************
Title: Microsoft Security Advisory Notification
Issued: August 11, 2005
********************************************************************

Security Advisories Updated or Released Today
==============================================

* Security Advisory (899588)

  - Title:    Vulnerability in Plug and Play Could Allow Remote Code
Execution and Elevation of Privilege (899588)

  - Reason For Update: Release of Exploit code targeting Windows 2000

  - Advisory Web site:
http://go.microsoft.com/fwlink/?LinkId=51237

  - Bulletin Web site: http://go.microsoft.com/fwlink/?LinkId=48900



Support:
========
Technical support resources can be found at:
http://go.microsoft.com/fwlink/?LinkId=21131

International customers can get support from their local Microsoft
subsidiaries. Phone numbers for international support can be found
at:
http://support.microsoft.com/common/international.aspx

Additional Resources:
=====================
* Microsoft has created a free monthly e-mail newsletter containing
  valuable information to help you protect your network. This
  newsletter provides practical security tips, topical security
  guidance, useful resources and links, pointers to helpful
  community resources, and a forum for you to provide feedback
  and ask security-related questions.
  You can sign up for the newsletter at:

 
http://www.microsoft.com/technet/security/secnews/default.mspx

* Microsoft has created a free e-mail notification service that
  serves as a supplement to the Security Notification Service
  (this e-mail). The Microsoft Security Notification Service:
  Comprehensive Version. It provides timely notification of any
  minor changes or revisions to previously released Microsoft
  Security Bulletins and Security Advisories. This new service
  provides notifications that are written for IT professionals and
  contain technical information about the revisions to security
  bulletins. To register visit the following Web site:

 
http://www.microsoft.com/technet/security/bulletin/notify.mspx

* Protect your PC: Microsoft has provided information on how you
  can help protect your PC at the following locations:

 
http://www.microsoft.com/security/protect/

So is "fill in the blank" HIPAA compliant?

One of the questions that get thrown to me every now and then is ... “is fill in the blank HIPAA compliant“.  That “fill in the blank” could be anything from an application...all the way to SBS itself.  The problem with a lot of documentation  is that it's not really SBSized.... so when I stumbled on this site... with the tale tell blue “Small Business Specialist” logo in the corner and called Brad.. as he and I said... the two of us....gushing both about SBS and why we like the SBS community.. we were 'preaching to the choir'.

Brad works to help small rural hospitals in Montana meet compliance and said that HIPAA is just about doing the right thing.  I ssooooo agree.  HIPAA, SOX, all of these regulartory 'pushes' to make us more compliant...it's just good business...and good security practices....I'm checking out his stuff now.. looks promising.  Ordered a kit in fact.  We chatted on the phone that you HAVE to have the policy in place.  You can't just put in the technology... you HAVE to have the policies..and they HAVE to be enforced equally for all.

Pretty cool that he was also Small Business Solution Partner of the year like that [oh yeah...that was built around SBS btw]

So if you need more Hipaa stuff try out this blog...

If you want to check out a bunch more ...really non SBSized..but still interesting nonetheless links on security, policy, and all sorts of things... here's this listing.

Oh.. and can SBS be HIPAA compliant?  Of course it can.  It all depends on who's driving the server... not the server itself....

So now we have a little too much security....but maybe not enough?

So setting up a color scanner/printer/copier and setting up the scan to smb/scan to ftp ...and I thought I'd be nice to myself and set the scan “to” to end up in the same folder that my other black and white scanner/printer/copier is scanning to... so step one I renamed the folder I was scanning the other stuff to [note to self, do not call a scan to folder the same name as the copier as invariably you'll get another copier by another vendor and want to scan to the same folder].  So after I renamed it, made sure everything was working on the old scanner, I went to the new one... so I'm trying to set up an address book...and dang... can we have a bit more step by step SBSized instructions please? 

Bottom line... somehow while setting the address book so end users could just press a button and scan to 'their' shared spot...I've ended up getting a master login and password to the scanner.  Now...do I know what login and password it wants as the login to this device?  Of course not.  Is is any of the usernames and passwords that I think it should be?  Of course not.  And of course right now I'm half BLIND in typing in info into the onscreen digital keyboard.

Dr. Jesper Johansson rolled over in his not yet entered into grave when I said I was setting up scan to FTP for the old Konica scanner/copier/printer... man I'm rolling over in MY not yet entered into grave setting up this copier.

To get the functionality that I KNOW I will need to have... I have to leave a password...an authentication means...an entry point...  to my network ON that device.  I can guarantee you right now that there is no way in God's green earth [or in the case of where I live... a little brown and dry these days with the summer heat] that I am going to get people to 'log' into this sucker.  So in order for it to scan what it needs to do...and shove it up to the network where I need it to go.... I will have to leave behind ...ON THIS DEVICE... a user that has right.  Now... what I WILL be doing after I figure out how to get myself full access back to that copier and finish setting up the buttons... is reviewing what rights that user has on my system.  I already have such a 'generic' user account because next to my Konica copier/scanner/printer is a flat screen monitor, a small keyboard, and one of those small form factor Dell machines so that as people scan, they can open up Adobe acrobat and check the process of the scanning.  I'm planning to do the same for this new color printer copier.  The real question is...I just used the standard 'SBS' normal user template and I probably need to triple check that the wizardized template is as locked down as it can be.  Like for example.. I need to give access from that user account to ONLY THAT one folder on the server.  There's no need for it to have the full rights and accesses that the rest of my users have at all.  Especially now that I'm hardcoding the dang thing into the operating panel of a copier on lease for heavens sake. 

Maybe that's something we all need to ask ourselves more of... for every user that we set up.... do they really need everything that we're setting up for them.  Lock such access accounts down...and in my network diagram.. I'll be putting a BIG RED X on that copier reminding myself that there's a username and password on that device.  In fact... if we aren't doing that already... on your network diagrams that you are building for your clients... make sure you include copiers/scanner/printers, phones, and anything else hanging off that network with a password.  Document EXACTLY all the devices, all the systems, all the locations where those passwords are stored. 

Remember that as you change the passwords ... they too need to be changed.  Don't forget to manually adjust your DSRM Administrator password too in the meantime until we get that DSrestore fix.

Well... I'm off to go see if I can hack my way into a Ricoh copier...

Oh and Vista/Longhorn ..whatever you guys up in Redmond are calling the next server... you guys thinking about making an uber uber lowered rights user account for such access like this?  If not... can ya think about it?


P.S.  Page 84 in the security reference book... login name for the Ricoh copier...lower case admin..no password... in case you accidentally do what I did...and yeah..we'll be changing that from the default and documenting that on our master password listing.......oh and.. I ..um.. found out I don't have to go blind... I can log in via IP and enter this stuff in the address book that way via a web browser.... you would think by now I'd be geeky enough to learn..wouldn't ya...

End users and screensavers

Recently at my own office I enabled the option to turn of a password protection on the screen when someone walked away for more than an hour.  Merely turning off the screen isn't good enough protection when working with client information.. I mean...duh... you are still logged in with access to that network.  Some folks really liked it and really wanted it, some people ...well let's just say I had to use the peer pressure from the ones that liked it.....it was funny because there was a recent thread on a Hipaa listserve about some of the flexibility you must build into a techology/people issue. 

You must protect Patient Identity Information.. and thusly you must set up the system so that when someone walks away from that system, it locks the access.  Hipaa final security rule (164.312(2)(iii)) requires automatic logoff....  Implement electronic procedures that terminate an electronic session after a predetermined time of inactivity ...and while it's a standard...it's an “addressable standard” and thus you can set the value for what is appropriate.  Some places you need less time to ensure that patient data is kept secure from prying eyes in public places, some places you need more time.  Make a compromise as to what works in your environment. 

Personally I think this is something that all of us that have sensitive information need to implement.  All I did on my network is enable it on group policy and made sure that it would be password protected.  I didn't even list a manditory screensaver at all.

P.S.  Looking for HIPAA resources?  I'll post more tonight..but the listserve I was referring to in the above post is the WEDI one at  http://subscribe.wedi.org - specifically the security workgroup list

Sometimes you decide not to be a geek

When I was setting up the server at the office, the HP that I have has an uber remote management feature... Integrated Lights Out.. you could even hook up a public IP address to it and truly reach out and touch that box remotely.  Even if it was turned off... as long as there was power to it... you could reach the box.  I looked at it and thought.. you know... if my box was truly that horked... I'd want to drive in the car and fix it at the office...

So when reading today's security alert regarding the issue, I found it funny as a workaround to this issue...

To eliminate this vulnerability until ILO version 1.81 becomes
available, unplug the power cord whenever the server is powered
down. This will prohibit the remote access exploit.

Kinda eliminates a lot of other problems too, now doesn't it?

 -------- Original Message --------
Subject:     [security bulletin] SSRT051005 rev.0 - HP ProLiant DL585 Servers Unauthorized Remote Access
Date:     Wed, 10 Aug 2005 10:11:38 -0700
From:    
security-alert@hp.com
To:    
bugtraq@securityfocus.com



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

HP SECURITY BULLETIN

HPSBMA01220     REVISION: 0

SSRT051005 rev.0 - HP ProLiant DL585 Servers Unauthorized Remote
                  Access

NOTICE:
The information in this Security Bulletin should be acted upon
as soon as possible.

INITIAL RELEASE:
09 August 2005

POTENTIAL SECURITY IMPACT:
Unauthorized remote access

SOURCE:

Hewlett-Packard Company
HP Software Security Response Team

VULNERABILITY SUMMARY:
A potential vulnerability has been identified with the HP ProLiant
DL585 server, where a remote unauthorized user may gain access to
the server controls, when the server is powered down.

REFERENCES:
None

SUPPORTED SOFTWARE VERSIONS*:  ONLY impacted versions are listed.
HP ProLiant DL585 Integrated Lights Out (ILO) firmware prior to
version 1.81

BACKGROUND:

RESOLUTION:

Until a new version of the Integrated Lights-Out firmware (version
1.81) for ProLiant DL585 servers is available, HP is providing the
following workaround:

To eliminate this vulnerability until ILO version 1.81 becomes
available, unplug the power cord whenever the server is powered
down. This will prohibit the remote access exploit.

This Bulletin will be updated when version 1.81 of the Integrated
Lights-Out (ILO) firmware becomes available.

BULLETIN REVISION HISTORY:
Initial release
   9 August 2005



SUPPORT: For further information, contact normal HP Services
support channel.

REPORT: To report a potential security vulnerability with any HP
supported product, send Email to:
security-alert@hp.com. It is
strongly recommended that security related information being
communicated to HP be encrypted using PGP, especially exploit
information. To obtain the security-alert PGP key please send an
e-mail message to
security-alert@hp.com with the Subject of
'get key' (no quotes).

SUBSCRIBE: To initiate a subscription to receive future HP
Security Bulletins via Email:

http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&
langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC

On the web page: ITRC security bulletins and patch sign-up
Under Step1: your IRTC security bulletins and patches
    - check ALL categories for which alerts are required and
      continue.
Under Step2: your IRTC operating systems
    - verify your operating system selections are checked and
      save.

To update an existing subscription:
http://h30046.www3.hp.com/subSignIn.php

Log in on the web page
 Subscriber's choice for Business: sign-in.
On the Web page:
Subscriber's Choice: your profile summary
  - use Edit Profile to update appropriate sections.

To review previously published Security Bulletins visit:
http://itrc.hp.com/service/cki/secBullArchive.do

* The Software Product Category that this Security Bulletin
 relates to is represented by the 5th and 6th characters of the
 Bulletin number:
   GN = HP General SW,
   MA = HP Management Agents,
   MI = Misc. 3rd party SW,
   MP = HP MPE/iX,
   NS = HP NonStop Servers,
   OV = HP OpenVMS,
   PI = HP Printing & Imaging,
   ST = HP Storage SW,
   TL = HP Trusted Linux,
   TU = HP Tru64 UNIX,
   UX = HP-UX,
   VV = HP Virtual Vault

System management and security procedures must be reviewed
frequently to maintain system integrity. HP is continually
reviewing and enhancing the security features of software products
to provide customers with current secure solutions.

"HP is broadly distributing this Security Bulletin in order to
bring to the attention of users of the affected HP products the
important security information contained in this Bulletin. HP
recommends that all users determine the applicability of this
information to their individual situations and take appropriate
action. HP does not warrant that this information is necessarily
accurate or complete for all user situations and, consequently, HP
will not be responsible for any damages resulting from user's use
or disregard of the information provided in this Bulletin. To the
extent permitted by law, HP disclaims all warranties, either
express or implied, including the warranties of merchantability
and fitness for a particular purpose, title and non-infringement."


(c)Copyright 2005 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or
editorial errors or omissions contained herein. The information
provided is provided "as is" without warranty of any kind. To the
extent permitted by law, neither HP nor its affiliates,
subcontractors or suppliers will be liable for incidental, special
or consequential damages including downtime cost; lost profits;
damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration.
The information in this document is subject to change without
notice. Hewlett-Packard Company and the names of Hewlett-Packard
products referenced herein are trademarks of Hewlett-Packard
Company in the United States and other countries. Other product
and company names mentioned herein may be trademarks of their
respective owners.

When patching this month.. a little reboot ahead of time is in order

This month, more than any other month, would be a good month to remember some of the wise moves in patching....

REBOOT YOUR SERVER

That's right I said reboot your server.. go over there and cycle it off and then back on.  If it reboots in a reasonable time frame you are good to go.  If, however, hours and hours later you are still standing there and if... right next to your server you have an APC device and if... you haven't signed up for their newsletters ...and if you haven't downloaded the Powerchute upgrade .... you could be stuck with a Grinding server.

Reboot, check your log files, and then apply the patches this month.

...so if I had a Windows 2000 machine right about now....

So in reading tonight's bulletins .... man if I had a vendor forcing me to stay on Windows 2000 service pack 3?  Right now I'd be screaming my little head off....one of them... the one on the Print Spooler issue.... if you can't patch because you are not on SP4 [which as of June 30, 2005 is the SP that they are supporting], I'm not sure you can add that registry edit to disallow annoyomous access to the print spooler pipes.  If you can't do that, can't patch... you can always disable the print spooler service....

uh.. you might want to decide what off the Internet you want to print first before you disable the service though....that kinda puts a crimp in you using your HP laserjet...

Dana and I were chatting tonight and he's already put the patches through his patch testing process whereby on VMware he pulls an image of his actual machine, patches it in testing before he deploys it on the real machine.  He uses a tool from Vmware for this that he gets from the VMware Technology Network subscription used for testing [hey... testing patches] and it will snap an image and virtualize a real machine.

...oh this sounds so cool... we might just have to make sure Dana chats about this up at SMBnation where he and I will be presenting...now mind you VMware testing is like testing the patches like I do on the machine here at home before deploying at the office... you won't catch any funky specific hardware stuff, but you will catch software related....

Oh I think I'm definitely going to buy this .... in my perfect world my SBS server would have a snap image-ability like this... something that would let me have a roll back feature so that no matter what the patches did to my box I'd be able to easily and quickly and ...without the sinking feeling of terror ... roll back.  While it's been a long time since anything bad has occurred.. it's one of those things that you just want to try to live your life without experiencing too many times...or at least have a real good plan of action.  I see a lot of people concerned about the fact that they can't truly have a duplicate spare server 'just in case'.  While I am legally allowed because of Software Assurance to have cold server rights, I've rather felt that I'd rather spend the money on good quality components than a duplicate device that couldn't be pulling an image 24/7. 

So ...you doing your patch testing?  Getting ready for deployment?  Read the next blog post for a reminder of some best practices....

Reports are that the IE patch has an invalid digital signature

Eric Schultze reports on the Patch Management listserve...

Please note that at least two of the IE patches for MS05-038 that are
currently available for download from Microsoft have invalid digital
signatures (XP SP2 and WS03 32 bit patches), and at least one patch is
not digitally signed (IE 5.01 SP4).

Right click and view properties for these patches once you've downloaded
them.  Select the digital signatures tab and click to view details.  The
GUI will then tell you if the signature is valid or not.

I'm guessing that Microsoft will re-post these patches shortly.

I've tested from two separate locations on the Internet with the same
results, though you're testing may vary.

--eric

So if you can't install those patches...that's why...hang loose....

Security bulletins today

Bulletin Summary:

http://www.microsoft.com/technet/security/Bulletin/ms05-Aug.mspx

Critical Bulletins:

Cumulative Security Update for Internet Explorer (896727)
http://www.microsoft.com/technet/security/Bulletin/ms05-038.mspx

Vulnerability in Plug and Play Could Allow Remote Code Execution and
Elevation of Privilege (899588)
http://www.microsoft.com/technet/security/Bulletin/ms05-039.mspx

Vulnerability in Print Spooler Service Could Allow Remote Code Execution
(896423)
http://www.microsoft.com/technet/security/Bulletin/ms05-043.mspx

Important Bulletins:

Vulnerability in Telephony Service Could Allow Remote Code Execution
(893756)
http://www.microsoft.com/technet/security/Bulletin/ms05-040.mspx

Moderate Bulletins:

Vulnerability in Remote Desktop Protocol Could Allow Denial of Service
(899591)
http://www.microsoft.com/technet/security/Bulletin/ms05-041.mspx

Vulnerabilities in Kerberos Could Allow Denial of Service, Information
Disclosure, and Spoofing (899587)
http://www.microsoft.com/technet/security/Bulletin/ms05-042.mspx

Re-Released Bulletins:

Vulnerabilities in Microsoft Word May Lead to Remote Code Execution
(890169)
http://www.microsoft.com/technet/security/Bulletin/ms05-023.mspx

Vulnerability in Microsoft Agent Could Allow Spoofing (890046)
(890169)
http://www.microsoft.com/technet/security/Bulletin/ms05-032.mspx


This represents our regularly scheduled monthly bulletin release (second
Tuesday of each month). Please note that Microsoft may release bulletins
out side of this schedule if we determine the need to do so.

If you have any questions regarding the patch or its implementation
after reading the above listed bulletin you should contact Product
Support Services in the United States at 1-866-PCSafety
(1-866-727-2338). International customers should contact their local
subsidiary.

Signing up for RSS

Looking to stay up to date on stuff like Security... stuff like Admin'ing networks?

Truly where a lot of great information lies in today is...right here.. in a blog.  It's another 'been there, done that' person like yourself, saying 'hey this worked for me'.

So what is a blog?  It's really nothing more than an easy way to post to a web page..but rather than G-O-I-N-G to the web page all the time, you use a newsreader to 'suck' in the posts so you can read them in a reader...now mind you... I still say that blogs work the best while you are online, because I personally know that I add links and what not and if you are stuck in an airplane without an internet connection...it's a little hard to follow a link...but anyway... so read this first... that's right...go follow the link... and when you are done..come back....

I'll just kinda hang around here until you are done...

la di dah....

Okay back?  Did you go get a newsreader?  You didn't?

Well go back and get one...and THEN come back here when you are ready to sign up for some blog feeds...

Good.. Okay now lets get you signed up for some RSS feeds.  If you are using something like Newsgator...whenever you see an orange XML [and for the record.. I disagree with Microsoft's page where they say when you see an  RSS icon you can click... they don't consistently do that and it's an XML icon anyway... geeze..what's with standards...I mean the IE7 team is getting on the bandwagon...anyway... when you see ...I guess ANY orange tag like that, right mouse click and see if you can 'subscribe in Newsgator” and voila ..that web page is now straight into a feed reader brought to you automagically so you don't have to go hunting for it....

Some of my fav's include....

  • The Master MVP blog - as this covers all sorts of things like Security from Donna, latest threats from Harry, X64 computing, and enough French culture from Christain to keep me entertained...
  • The rest of the Top Ten Useful Microsoft Blogs listed here...definitely the EHLO blog on Exchange, the MSRC blog on Security.
  • TechNet blogs [which are my fav over the MSDN ones..sorry] - http://blogs.technet.com/ all blogs here are more IT admin'y related
  • MSDN Blogs - http://blogs.msdn.com/ all the more “Dev'“ Related blogs are here
  • Dana's blog - http://silverstr.ufies.org/blog He and I will be presenting on SBS/hardening/security guides.. oh just paranoid stuff at SMBnation.com
  • SeanDaniel.com's blog - [yes poor guy is probably going to have to legally change his name to SeanDaniel.com with as much as I call him that]

Oh ... I cannot let this list go by without a major callout about this one....

http://www.thundermain.com/rss/

Go ahead and click on it... ugly isn't it?  It has to be my most powerful RSS feed that I have.  It has a simple job... it watches the Microsoft Download page and alerts me to new content.  That's it.  And yet, for a while there I had a couple of Microsoft employees wondering just how I was finding out about Security patches moments before they did up in Redmond...and it was all because of that feed.  It would hit my feed reader before they were getting it in their mailbox.

You probably have to manually copy and paste it into your feed reader, but if you do no others..do that ONE right there.

I have lots and lots more ...and should probably stick the master listing [called the OPML file] somewhere for people to look at but until then.... even though I've covered this topic before and others have shared their RSS feeds... I thought I'd remind people how easy it is to keep up to date with RSS.

Want resources to be more paranoid than you already are?

Someone was asking about Security vulnerability resources and I realized I probably hadn't blogged about this..now mind you this is includes information on both patched and unpatched vulnerabilties... oh... in case you are wanting to know..what's a security vulnerability?  An issue ...sometimes with software..sometimes with hardware that can have some sort of exploit... so if you are a Network admin or Security nutcase like I am, you'll want to keep an eye on these...

First and foremost ...in my opinion the BASIC thing that every IT Pro, Admin or Consultant should sign up for is the “Comprehensive version“ of the Technical Security Notifications over there on Microsoft's web site. There's also Security RSS feeds [and I'll review what RSS is in a sec on another blog post....]

Microsoft Security RSS feeds
Microsoft Technical Security Notifications:
http://www.microsoft.com/technet/security/bulletin/notify.mspx
You want the comprehensive version that gives you the heads up advanced notices and what not

Then here is the next MUST have in my book...the blog named the top number one most useful Microsoft blog:

MSRC blog
http://blogs.technet.com/msrc/

Now then the rest of this list includes information about patched and unpatched stuff [a patch is where there is a software patch that can fix the software bug]

Secunia http://secunia.com/  RSS feed on the right

This one can be .....well... a bit over the top to say the least.. a lot of flaming and what not...
Full Disclosure
https://lists.grok.org.uk/mailman/listinfo/full-disclosure

Daily Dave
https://lists.immunitysec.com/mailman/listinfo/dailydave

Metasploit RSS feed
http://www.metasploit.com/

OSVDB mailing list
http://www.osvdb.org/mailing-lists.php

NTbugtraq.... not quite as useful as it was
http://www.ntbugtraq.com/

SecuriTeam
http://www.securiteam.com/mailinglist.html

SecurityFocus Mailing Lists:
http://www.securityfocus.com/archive

So what about you?  What listserves or RSS feeds do you read/subscribe to so you can stay paranoid?

Hey, he's blogging again!!!

No, not him.... HIM!!!!

Mr. Auditing HIM!!!

Here and HERE!!

 

Asking the hard questions...do you Mr. Vendor, allow me to patch?

When someone emailed me about an accounting application that would not certify installing patches on servers past Security bulletin 04-012, a patch released last April, I felt it was time to open up a new section in the "Vendor Hall of Shame" for those vendors that will not go on record as supporting security patches in a reasonable time frame.

PATCHING:
http://www.threatcode.com/patching.htm

If you would like to make submissions, the nomination form is here:

NOMINATIONS:
http://www.threatcode.com/nominations.htm

...who's feels that it's time we start getting a list of those vendors that we need to be more aware of so we can make smarter software decisions.  If they won't support us patching..and we're small enough that we can't test appropriately.....then we need to know these constraints ahead of time so we can protect and defend and mitigate appropriately.

Maybe we need to look into IPsec for domain isolation?  Maybe that's one way around this issue?  The point is though that we need to know ahead of time what vendors patch support policy is so we can decide to patch without support, use other means to protect and not patch, stick that server on an isolated segment and just in general plan ahead.  Knowing this stuff ahead of time before we sign on the dotted line.... maybe it's something that even we in the small firms need to start asking about when we buy software on subscription.. something a bit more long term line of business like than a box from Office Depot.

We've taken it for granted that we can just patch and not have to worry about non supportability.. I think we need to start asking the tough questions....

  • Do you support restricted user?
  • Do you support security patches if done in a reasonable time?
  • Do you use a minimum of firewall ports?
  • Do you use the industry's latest and greatest accepted standards for secure coding when dealing with highly sensitive data? SSL in transmission, Encrypt in storage?

Just some questions to think about...

The bathroom

Where does Steve Riley say your Security guidance literature should be placed?

Yup... in the bathroom.  On the inside door of the ...well you know.

Captive audience.  Put posters on the wall where folks have to read it ..

From the mailbox today comes the story of not just 'any user'...but the worst kind...the 'arrogant and uneducated' user.  You know... the owner.  No matter what you say to them they will still fall for the phishing attack, the paypal email, the Chase bank offer.

The older computer user is indeed one of the most targeted...as well as the most needy...in fact, usability is also key to their needs.

But what the emailer was wanting was some basic business videos on security...hmmmm

I can find this stuff....

Network Security for ecommerce from Microsoft Small Business:

Small Business Security from Microsoft Small Business:

Computer Security from Microsoft Small Business:

Microsoft TechNet – Security SBS 2003 Network:

Securing Your Network: Identifying SMB Network Perimeters:

Securing Windows XP Professional Clients in a Windows Server Environment: 

US Chamber of Commerce pdf on security
 
US Chamber of Commerce web site on Security

http://alwaysuseprotection.com/

Always Use Protection for College students:
http://alwaysuseprotection.com/book/intro/collegebook.htm

But honestly ... I'll have to look around for web videos...

The vendors who set your security policy

I got an email today from a friend who was VERY rightfully concerned that a Vendor was setting patch policies for his network.  How can that be you ask?  Well it's called “support”.... you see they would not certify and support that customer on a server who patched 'past' Security bulletin 04-012 on Windows 2003 server...they hadn't even certified Service Pack 1 for Windows 2003. 

Yet they went on to say that they really recommended [and oh really so does Microsoft you know, that you wait for Service packs as they are more tested you know I mean we'll point to their article called “Why Serivce Packs are Better than Patches” to prove our point ].  In the mean time they are giving no guidance for exposure, mitigation...alternative ways to set up a network that you were blocked from patching. 

After I picked myself up off the floor on that one..let's see exactly what that server is exposed to shall we?

So let's see what we are exposing ourselves to shall we [and this won't include next Tuesday's critical patches...]

  • 05-037 - Jview Internet Explorer - Moderate [okay don't surf at server..but still]
  • 05-036 - Color module - critical
  • 05-033 - Telnet - Moderate
  • 05-032 - Agent - Low
  • 05-031 - Step by step training - Important
  • 05-030 - Outlook Express - Important
  • 05-028 - WebClient - Important
  • 05-027 - SMB - Critical
  • 05-026 - HTML help - Critical
  • 05-025 - Cumulative IE - Critical
  • 05-019 - TCP IE - Critical
  • 05-018 - Windows Kernel - Important
  • 05-016 - Windows Shell - Important
  • 05-015 - Hyperlink - Critical
  • 05-013 - DHTML - Critical
  • 05-012 - OLE and COM - Critical
  • 05-011 - SMB - Critical
  • 05-010 - License logging - Moderate
  • 05-009 - PNG - Critical
  • 05-008 - Windows Shell - Important
  • 05-004 - ASP.NET - Important
  • 05-003 - Indexing service - Important
  • 05-002 - Cursor and Icon - Critical
  • 05-001 - HTML help - Critcal
  • 04-045 - WINS - Important
  • 04-044 - Windows Kernel - Important
  • 04-043 - Hyperterminal - Important
  • 04-041 - Wordpad - Important
  • 04-037 - Windows Shell - Critical
  • 04-036 - NNTP - Critical
  • 04-035 - SMTP - Critical
  • 04-034 - Compressed folders - Critical

...okay.. I'm tired of keypunching...do you get the idea that there are just more than a few patches that accounting vendor are recommending that you not install on a server running that critical business application?

They point to this article as to why the program is regression tested and certified only with the generally available releases of service pack, and that if the customer is in urgent need to install these updates that they set up a test system to try it.  Oh for the record ....that article recommends service packs and then applying 'selected patches' based on your network based on your needs....it doesn't say ...oh only patch so far and then wait until your vendor says they've finally gotten around to certifying patches.  Which is the way we really should do it...only apply just enough 'code' to our systems as we need.  But certainly not 'oh stop at 04-012 and call it a day...

So here's the consultant/admin/you name it stuck between a rock and a hard place.  He or she either takes on the burden of software patch testing on their own...setting up a test network on their own, or they wait until the vendor certifies them. 

I'm sorry but the words “we won't support you if you patch the underlying system that our accounting application is installed on” is unforgivable.  Honestly I'd hate to see the patch level they run their machines at... I mean really if they take such a cavalier attitude about patching YOUR most critical business asset ...how seriously do they patch their network and their systems?

Look...according to that vendor..they shouldn't even be patching for 04-045 discussed in Robert Hensing's WINS hack.

So I guess the only advice we can do is to totally separate our accounting data from the rest of our networks..isolate it... segregate it...ensure that it's on it's own subnet, acl'd to smithereens and IPsec'd and sandboxed or something?  Certainly don't be as blase' about installing it as we have been me thinks.  Maybe that's what we should do is start going back to these vendors that won't support patching and demand that they give guidance for alternative ways to set up our networks such that the accounting software is totally isolated and thus protected and mitigated against?

You would think that the Accounting vendors would be embracing of security and all things surrounding it...

I guess not...

It's pretty sad when I look around and can point to a number of Accounting vendors that just absolutely don't get it ....

Spyware for the Server?

From the mailbag tonight comes the question...”What spyware protection and registry maintenance do you recommend for the SBS 2003 server?”

...uh..dude?  You surfing at that server so it needs spyware protection?  Don't.  Let's nip that right in the bud dude and stop doing that.  That is the absolute worst thing you can be doing is surfing at that server, logged in as domain administrator on your domain controller.  I don't put spyware protection on the server because I don't surf at the server... it's not getting in at the server...spyware comes from CLICKING end users on workstations.

In fact that's why there's that annoying Enhanced IE thingy on the server that you shouldn't remove.  That's the Michael Howard annoyance factor to make you want to go back to your own workstation.  Pretty darn effective isn't it?  But the point is when the threat modeling was done for the server they knew the worst thing would be to have an admin surf at a server.  Don't.  Don't need antispyware.  It's that simple.

Registry maintenance?  The last time I installed software directly ON the server... was... I don't know what it was.. it was so long ago...the only thing I install these days is security patches.  Only server applications that I've installed went on there ages ago as it was built and pretty much everything else is installed from a workstation pointing to the server so it's not going into a 'registry' per se.

Most will also say..don't defrag.  As long as you keep about 20% ish of your drives free NTFS will be just fine.

Bottom line... your server is ...just that .... your server....and really does the best when it's just left to be ....your server and doesn't need all the tweakage you may be doing on workstations.

Redact anyone?

 Download details: Office 2003 Add-in: Word Redaction:


Redaction is the careful editing of a document to remove confidential information.

The Microsoft Office Word 2003 Redaction Add-in makes it easy for you to mark sections of a document for redaction. You can then redact the document so that the sections you specified are blacked out. You can either print the redacted document or use it electronically.

Sensitive government documents, confidential legal documents, insurance contracts, and other sensitive documents are often redacted before being made available to the public. With the Word 2003 Redaction Add-in, users of Microsoft Office Word 2003 now have an effective, user-friendly tool to help them redact confidential text in Word documents.

When is Spyware...not spyware?

To me the 'description“ of Spyware stops at data collection.  Anything past that and we're not in Kansas any more.  The minute some software is on my machine merely watching cookies.. I would argue that's spyware.  Spyware that I probably agree to letting happen... I mean I took marketing in College and always think it's fun to answer those Marketing surveys so there's a tolerance level I have of what is tracked on my machine for 'research' purposes.  Furthermore, in my daily tasks, I need to rely on research materials for some of the investigations and examinations we perform so thus, I tend to cooperate with a certain level of 'marketingish research' because I know that some other researcher may find the data I give of interest.  However...you start talking keystroke loggers and remote control software and password crackers being dropped on systems, and ...whoa Nellie... I'm not calling that a “black end of the scale of Spyware“ that is gone to the Dark Lord of the Sith side of the scale and we're talking illegal side of the scale.

Per dictionary.com, Spied, or Spying is “to observe secretly without hostile intent“, ware is “software“.  Taken together it's “any software that covertly gathers information about a user while he/she navigates the Internet and transmits the information to an individual or company that uses it for marketing or other purposes“. 

I think really in that chart  on the Microsoft Antispyware site that talks about spyware...I would argue that sections one and two are spyware...anything past that and we're in the malware category...anything down in that black section and we're not in a good area at all.

Which kinda makes me wonder... why do I need Antispyware and Antivirus... why can't I have one software that's a DDT software.  DDT = Don't do that.  I mean why do we need two programs sucking resources when isn't it all the same kind of stuff?  It's code that I don't want to be doing what it thinks it wants to do on my system?

I don't know...maybe I'm just oversimplifying this or something...

Security Patch Tuesday heads up

********************************************************************
Title: August 2005 Microsoft Security Response Center Bulletin
Notification
Issued: August 04, 2005
********************************************************************

Summary
=======

As part of the monthly security bulletin release cycle, Microsoft
provides advance notification to our customers on the number of new
security updates being released, the products affected, the
aggregate maximum severity and information about detection tools
relevant to the update. This is intended to help our customers plan
for the deployment of these security updates more effectively.

In addition, to help customers prioritize monthly security updates
with any non-security updates released on Microsoft Update, Windows
Update, Windows Server Update Services and Software Update Services
on the same day as the monthly security bulletins, we also provide:

- Information about the release of updated versions of the
Microsoft Windows Malicious Software Removal Tool.
- Information about the release of NON-SECURITY, High Priority
updates on Microsoft Update (MU), Windows Update (WU), Windows
Server Update Services (WSUS) and Software Update Services (SUS).
Note that this information will pertain ONLY to updates on Windows
Update and only about High Priority, non-security updates being
released on the same day as security updates. Information will NOT
be provided about Non-security updates released on other days.

On 9 August 2005 Microsoft is planning to release:

Security Updates
- 6 Microsoft Security Bulletins affecting Microsoft Windows. The
highest Maximum Severity rating for these is Critical. These updates
will require a restart. These updates will be detectable using the
Microsoft Baseline Security Analyzer (MBSA).

Microsoft Windows Malicious Software Removal Tool

- Microsoft will release an updated version of the Microsoft
Windows Malicious Software Removal Tool on Windows Update, Microsoft
Update, Windows Server Update Services and the Download Center.
Note that this tool will NOT be distributed using Software Update
Services (SUS).

Non-security High Priority updates on MU, WU, WSUS and SUS

- Microsoft will release one NON-SECURITY High-Priority Update for
Microsoft Windows on Windows Update (WU), Microsoft Update (MU),
Software Update Services (SUS), and Windows Server Update Services
(WSUS).

Although we do not anticipate any changes, the number of bulletins,
products affected, restart information and severities are subject to
change until released.

Microsoft will host a webcast next week to address customer
questions on these bulletins. For more information on this webcast
please see below:

- TechNet Webcast: Information about Microsoft's August Security
Bulletins (Level 100)
  
- Wednesday, August 10, 2005 11:00 AM (GMT-08:00) Pacific Time (US
& Canada)
-
********************************************************************

Support:
========
Technical support is available from Microsoft Product Support
Services at 1-866-PC SAFETY (1-866-727-2338). There is no
charge for support calls associated with security updates.
International customers can get support from their local Microsoft
subsidiaries. Phone numbers for international support can be found
at:
http://support.microsoft.com/common/international.aspx

Additional Resources:
=====================
* Microsoft has created a free monthly e-mail newsletter containing
  valuable information to help you protect your network. This
  newsletter provides practical security tips, topical security
  guidance, useful resources and links, pointers to helpful
  community resources, and a forum for you to provide feedback
  and ask security-related questions.
  You can sign up for the newsletter at:

 
http://www.microsoft.com/technet/security/secnews/default.mspx

* Microsoft has created a free e-mail notification service that
  serves as a supplement to the Security Notification Service
  (this e-mail). The Microsoft Security Notification Service:
  Comprehensive Version. It provides timely notification of any
  minor changes or revisions to previously released Microsoft
  Security Bulletins and Security Advisories. This new service
  provides notifications that are written for IT professionals and
  contain technical information about the revisions to security
  bulletins. To register visit the following Web site:

 
http://www.microsoft.com/technet/security/bulletin/notify.mspx

* Protect your PC: Microsoft has provided information on how you
  can help protect your PC at the following locations:

 
http://www.microsoft.com/security/protect/

  If you receive an e-mail that claims to be distributing a
  Microsoft security update, it is a hoax that may be distributing a
  virus. Microsoft does not distribute security updates via e-mail.
  You can learn more about Microsoft's software distribution
  policies here:

http://www.microsoft.com/technet/security/topics/policy/swdist.mspx

I'm still waiting for my $1,000 from Bill Gates

Seriously... who do you see is the biggest threat to your network?

Got that person in mind?

I think it's my Mom, my Dad, my Sister, your brother, your Son, your Daughter.......

Who's your biggest threat to your network? 

Seriously..where's your biggest risk?

I think it's the person at home.

I think it's the person who doesn't know enough...who gets the bad advice from retail stores.... who doesn't use the right tools on their systems.... who hasn't been informed enough...and doesn't remember [or chooses to forget] the lessons Mom taught us that sometimes you get what you pay for... and that Bill Gates never promises you money in an email

I was having a bit of a philosophical argument last night on IM over how I believe that it's our responsibility to look out for each other on the web.  That the inability of that person over there to understand the basic foundations of updating their systems.... of adding antivirus and antispyware... it's a wacko community view I have.  That all of us have a responsiblity to keep each other safe.  A relative was over to the house last weekend and as she discussed her issues with her computer, I could tell that what she really needed was like an owner's manual... something to help her and guide her in better decisions about her comptuer.

Nice to see that the official de-bunker of stupid stuff on the web, Snopes.com has weekly update newsletters and Sans.org has their OUCH newsletter [the August 1st version is here] and blogs like the Security Mentor are out there..  But I think more is needed.  Much more.

A post on Steve Riley's blog about a new book they are planning hits on this...it's what happened to my relative... she has a laptop that she bought from a local retailer...she's had 9 BSOD's on the thing ...and each time she reloads Norton antivirus thinking it's spyware or malware...but ... I mean yeah...there are some malware's that do indeed cause BSOD's...but even in my office, I”ve never seen one in eons.... it's more likely to be a faulty driver.  So here she is thinking that she has a spyware problem, when I think she has a driver problem.

Time and time again I see when someone doesn't know where to turn for a straight answer they get bad advice.

I bought an OEM Dell system..was there any advice in there about such things like deciding risks ...for even a home machine?  Heck no.  I argued the other day that we almost needed a Security Configuration Wizard for a home system...one that would ask a bunch of questions and tweak things accordingly as each user...me...my Dad... my Sister...we all had different risk levels. 

The one area that I don't see emphasized much at all in many computer books is the whole concept of user rights on the machine.  This is one that even in SBSland we're starting to see.. just the other day someone asked if there was a SBS wizard to remove local administrator rights on each workstation.  Hey, now there's an idea!  So it's cool to see that they are planning a section on 'running with least privilege'.  I can only hope that when folks read it there...they will in turn be inspired to realize so many of their applications are setting the security level in their networks.

So I think when that book comes out... each one of us that does their own 'friends and family security network' needs to buy that one as a Christmas gift or stocking stufffer or something.

So Dr. J?  Steve?  Mr. Publisher?  Get cracking will ya?  Okay so maybe by Christmas is rushing it... how about .... by Valentine's Day so I can give them to my loved ones as a gift.  How's that?

Driving a Hummer

Grab a security book about server hardening and they will tell you early on to disable unnecessary services to reduce the attack surface of your system.

Okay cool...got my SBS box... got my admin tools, services icon fired up... okay .... what can I disable in here?

Default Services That Are Installed in Windows Small Business Server 2003:
http://support.microsoft.com/?kbid=829623

Hmmm... okay..Dr. J's book says to disable the “Porn” service..I mean the Messenger service...that one's done already......so...ummm...what else... shall we stop IIS?  Probably don't want to do that as Sharepoint, Exchange and a bunch of stuff will stop.  How about the Windows Firewall/Internet Connection Sharing...I mean that's disabled ...don't we WANT that one?  Actually no we don't... as that's an XP sp2ish kind of firewall that we don't need in SBSland because we have either the RRAS firewall or the ISA firewall. 

...so like aren't we so totally screwed because we have all this stuff running on the same box?  I mean isn't this totally unsafe by running all this stuff?

You drive a car, right?  Is it a Hummer?  Got like bullet proof protection?  Why not?  Why aren't you driving down the road in a vehicle that the Defense Department uses on a daily basis?  Maybe it's because you don't need a car that is built for the Defense Department?  Maybe it's because driving a Volvo with airbags is all you need to fit your needs of a safe car ...but a usable car.  Maybe you can add to that Volvo safe driving habits?  See where I'm heading here?  That all of us out here don't need to drive a hummer...don't want to drive one [you couldn't pay me to drive one].  They have their purpose..but not for our needs.

So while to be absolutely Department of Defense secure you'd need 12 servers [we counted up one day], the reality is that I'm more than happy driving my “Volvo“ of a server.  I would argue what keeps me safe is my selection of risks and understanding what I'm protecting on my server.  Just today in fact in the newsgroup was the question about hosting web sites on your SBS box...and while you can easily do this for your own business, you need to stop and ask yourself...what ELSE is on that box.  I purposely make a decision to close down port 80 on my SBS box...heck it wasn't until SBS 2003 that I even got confortable with port 443 open.  And Dana...he sets up his system so that everything authenticates first before hitting the SBS box.  You see how we've all taken the basic “Volvo” and sat down and decided based on the risks each of us are comfortable with what we will do? 

I was talking about Remote Web Workplace the other day and someone was asking “are you confortable with Remote Desktop being open to the web..and well..firstly it's really not... you have to authenticate on port 4125 first... because our port 3389 doesn't have to be open we don't see brute force attacks or account lockouts and as I told him, AT THIS TIME, I am quite reasonable to accept the risks.  That's not to say that a year from now or three years from now the actions and openings and risks that I am willing to do now won't be changed.

Right now the line in the sand I'm willing to accept..is right here.  It's driving a Volvo...and understanding that a Hummer... just isn't the right combination of protection and use.

Visio plug in for MBSA 2.0

 

This just in...

Based on the positive response we received to the first version of Visio 
Connector for MBSA, we have just released Visio Connector for MBSA 2.0.

This utility allows you to view the vulnerability assessment information 
generated by MBSA 2.0 on a Visio 2003 network diagram. You must have both 
Visio 2003 and MBSA 2.0 (or MBSA 1.2.1) for this connector to function.

You can learn more or download this free utility at
http://www.microsoft.com/technet/security/tools/mbsavisio.mspx.
Also check out this MVP web site for Visio!

Pave and Nuke

I have a workstation... it has malware on it... it got it from a clicking end user when they were a local administrator to that box.... because the annoying popups were so bad and the combo of XP sp2, Google toolbar, Trend antivirus, and Microsoft antispyware were not enough ..we took the box to where they only had restricted user rights...meaning they could no longer click and install.

So the last few days when it would boot up a file would freak out upon boot.. usually a dll...usually in the system32 directory.  So I knew I probably still had he critters left behind.  So I started looking at the machine.

First rule is to look for unusual services... didn't see any of those...so lets go to the next step where we look at the files causing the error.  ssayerxp.dll.  Hmmm...wonder what that is...and interesting...not on other machines in the office...nor Googlable.  Okay let's look at it's properties.

Now this is interesting... Digitally code signed with a Thwate Code certificate for NicTech Networks.  Remember how Peter Torr asked how could he trust Firefox since it wasn't digitally code signed?  So this IS code signed... so what does that prove other than I can now trust my malware?

So I called Microsoft Product Support Services and asked for a WOLF analysis done to ensure that the damage was limited to this box.  The good news it was [I'll be typing up a full article about that later] and this sucker is slated for nuking and paving.

That's right I said nuking and paving ...because even with all my tools, it wasn't until I put the workstation to Restricted Rights that the malware showed up enough for me to find it.

I don't trust the machine anymore.  Data is on my network anyway.  Backups are in place.

It's nuke time for that workstation.

..and 100% of Quickbooks users...

 http://blogs.technet.com/tonyso/archive/2005/08/01/408487.aspx


This article says that Microsoft's research indicates that 85% of corporate users and 97% of consumers are running their machines as administrators, according to Neil Charney, a director of product management at the software vendor. Charney said the company is hoping those percentages will decline as a result of the User Account Protection feature.
Read up on UAP here.


And I would argue 100% of Quickbooks users.....

www.threatcode.com  Get your vendors on the LUA/UAP wagon...and get them on it NOW...


..okay make that 99.99999% of Quickbooks users because I know a few that have indeed taken the time to wack the hives and gotten it to run a bit more in restricted user.

Dr. Tom, ISA, Amy and ...oh did I say there's a new forum for SBS and ISA?

On ISAServer.org, Dr. Tom Shinder opened up a ISA 2004 on SBS message board... wooohooo ...an SBSized place on ISAserver.org in addition to Amy's excellent articles.

Here are some other resources for ISA 2004 on SBS:

And while not SBSized... another good resource for ISA info is Tristan's blog

Pretty cool to have more and more resources for ISA 2004 on SBS 2003!


I have a secret...

Come here... psstt.... I have a secret.... I haven't used VPN in ages... I pretty much use Remote Web Workplace for all my access needs.  Personally I still would argue ...even with the Terminal Server Denial of Service advisory out there that I actually feel a bit safer with Remote Web Workplace than a full VPN connection.

Just like in Paul's post about Outlook over http, Remote Web Workplace is 'just the right amount of connectivity'.  Not too much, not too little.  It's extremely rare that I check the option to 'map drives' between my computer and the remote one.

Now if Bruce Schneier knew about Remote Web Workplace...would he consider it a 'security bypass'?  Not sure. 

Steve Riley [sorry to sound like a broken record on Steve Riley tonight] but he said in that series of webcasts I mentioned that sometimes you go through your environment and say “I'm not going to spend money on that because it's a risk I'm willing to take or will accept“...and then for this one over here you say “I am going to spend money on that one“.

And that's what's hard, isn't it?  Knowing just the right amount for your needs.  A network cannot be secure.  If it's secure..it's turned off an not working.  What you want is the balance between a healthy...protected network.

Aiming for security is probably something we should stop aiming for... aiming for a protected network...well that's another matter.

SANS webcast - Network Security for Small-Midsized Companies

Hey you know when Small business is making the inroads ..when SANS does a web cast specifically for Small and Medium businesses. Coming up this Wednesday...should be interesting.

 

First Wednesday Webcast: "Network Security for Small-Midsized Companies"Featuring: Johannes UllrichWednesday, August 03 at 1:00 PM EDT (1700 UTC) https://www.sans.org/webcasts/show.php?webcastid=9055

 

Now is that “small to mid sized companies” or “small mid-sized companies” I wonder?  One is from SBS land to Medium server land...the other is just middle sized companies...

 

We'll see.

Genuine Advantage Checker now required for manual downloads

Piracy-check mandatory for Windows add-ons

 

If you Windows Update or Microsoft Update manually these days, you need to download the Genuine Advantage file 'before' getting updates. 

 

I checked and Shavlik [and I presume other patch programs don't need to either] have to have this on your boxes to get patches from Shavlik.  Good.  Mess with my patching tool and my way to keep my network secure and I'd be a bit concerned.

 

Description of the Windows Genuine Advantage program

http://support.microsoft.com/default.aspx?scid=kb;en-us;892130

 

From the FAQs

 

Q: Do all Windows users need to validate, or is validation limited to particular versions of Windows?

A: Validation is required for all genuine Windows downloads on Microsoft Download Center and the Windows Update service for users of Windows XP and Windows 2000 (client, not server). Security updates are accessible to all users via Automatic Updates. Genuine Windows downloads are available, without validation, to customers running Windows 98, Windows ME, Windows Server 2003, and Windows NT 4.0 with Service Pack 3. Genuine Windows downloads are not available for older versions of Windows (Windows 95, Windows NT 4.0 with Service Pack 2 and earlier), and non-Microsoft operating systems.  

 

Q: Do security updates require validation?

A: Security updates are not part of WGA. Security updates can be installed using the Windows XP Automatic Updates feature, or downloaded from the Download Center

And according to this.. it's already been 'cracked'.  Nice.  Bottom line folks.. buy legal software and the rest of us won't have to suffer through this kind of stuff, okay?

The last law of security

Law #10: Technology is not a panacea

Technology can do some amazing things. Recent years have seen the development of ever-cheaper and more powerful hardware, software that harnesses the hardware to open new vistas for computer users, as well as advancements in cryptography and other sciences. It's tempting to believe that technology can deliver a risk-free world, if we just work hard enough. However, this is simply not realistic.

Perfect security requires a level of perfection that simply doesn't exist, and in fact isn't likely to ever exist. This is true for software as well as virtually all fields of human interest. Software development is an imperfect science, and all software has bugs. Some of them can be exploited to cause security breaches. That's just a fact of life. But even if software could be made perfect, it wouldn't solve the problem entirely. Most attacks involve, to one degree or another, some manipulation of human nature—this is usually referred to as social engineering. Raise the cost and difficulty of attacking security technology, and bad guys will respond by shifting their focus away from the technology and toward the human being at the console. It's vital that you understand your role in maintaining solid security, or you could become the chink in your own systems' armor.

The solution is to recognize two essential points. First, security consists of both technology and policy—that is, it's the combination of the technology and how it's used that ultimately determines how secure your systems are. Second, security is journey, not a destination—it isn't a problem that can be "solved" once and for all; it's a constant series of moves and countermoves between the good guys and the bad guys. The key is to ensure that you have good security awareness and exercise sound judgment. There are resources available to help you do this. The Microsoft Security website, for instance, has hundreds of white papers, best practices guides, checklists and tools, and we're developing more all the time. Combine great technology with sound judgment, and you'll have rock-solid security.


The last law of security is a perfect introduction to a new series of blog posts I'm going to be posting about my [notice the word MY] thoughts about the risks of SBS.  This is actually a lead up to two presentations that will be given at SMBnation [one by myself and Dana on how compliant is SBS, talking about checklists and comparing it to baselines and along the lines of his Security hardening presentation] and another presenter [and I'll put his name as soon as I can find it...I'm so blonde sometimes and searching isn't coming up with it] comparing SBS to 'the best practices'. 

While Dana will tell you that from a Security standpoint SBS sucks [bear with me... keep reading] as it breaks all the security laws in the book [all on the same location...no separation of services....and let's face it ... I have no doubt whatsoever that if someone from Blackhat wanted to specifically target a SBS box, they'd probably find a way in especially if you have Win98s in the mix or post it notes with the passwords stuck on the monitor], the reality is that the risks we take are very managable and very acceptable.  It's one of those things that you just have to say...what's your budget and where would you rather spend it on.  And honestly, I still feel that my budget and energy is better spent on the desktop [and now days other mobile devices] than the server.

Like take for example risks that I've historically faced that I consider to be one of my greatest in SBSland..that of physical security... we lost a desktop computer to a robbery and thanks to Dr. Jesper Johansson I didn't have a domain admin password on that system, and now take my recent risk where there is a user's password saved on an Audiovox phone.  In that case, that's an end user issue where if the device gets stolen, the first thing I'm doing is changing the password of his access.

As I'll talk about how SBS breaks all the rules, I'll also talk about why I think...especially for a small office, that in many cases those 'rules' of security are best broken [and I”ll explain why I think that too].  I still arguethat the best thing I can do is make my users aware, enable them to be paranoid, ensure they have the tools and knowledge they need to make the right decisions.

Stay tuned... for why breaking the rules is a good thing...

56 k anyone?

<disclosure -- I think anyone on dial up is insane and a glutton for punishment...but..>

From the mailbag today comes the question if you can connect an SBS box to the Internet using a dial up modem.  All he has used is a high speed connection.

Remember .... dial up was the way we 'used' to set up SBS and it's only been recently that we use broadband.  It's really no different.. you can use an internal or external modem device...and just run the wizard.  Just don't pick broadband.

Now, sir..let me sit you down a moment.  I don't think you can properly protect a computer...let ALONE a business network on dial up these days.  Patch Tuesday comes along and all of a sudden, even with WSUS in the mix, that network will want to yank down patches.

These days the following gets updated pretty much automagically in my office....or with my intervention..but the point is I'm yanking down stuff all the time...

  • Antivirus
  • Antispyware
  • Security patches
  • New programs
  • Updates to programs
  • Buying software online
  • And every blasted phone home to some third party vendor to update program will be firing up that Internet connection.

Not to mention, once you get them on email..people think nothing of sending huge files.

So Nicolas... I had no problem understanding your question...yes you can quite easily use a dial up modem in the server to offer up Internet access, but if you can... plant the seed that they should be on Broadband.  I don't think you can protect your network without it. 

After Windows 2000 update rollup 1 SP4 and if you have Sophos... are your machines slow to boot?

Advisory: Sophos Anti-Virus for Windows 2000/XP/2003 - conflict with Update Rollup 1 for Windows 2000 SP4

Customers using Sophos Anti-Virus for Windows 2000/XP/2003 version 5 may experience problems after updating to Microsoft Update Rollup 1 for Windows 2000 Service Pack 4 (SP4) - KB891861.

Once this update has been applied, computers can take up to 15 minutes to log on to the network.

Note: A separate knowledgebase article covers another slow startup issue.

What to do

Exclude the following file from on-access scanning:

  • C:\winnt\system32\mswsock.dll

Live logging in ISA is indeed cool

Tristan links to my post and now I'm linking to his.  Live logging is very cool.  Like he says it's in the Monitoring area, on the Logging tab - just set the Log Time field to Live, and hit Start (optionally filtering on some useful criteria)

I think SBS sets that to Live anyway?  Hit start and see the traffic.

I also found on the ISA server listserve a free tool to add a bit of GUI to that and there is also a time restrict tool that can be purchased.  There's also a Quarantine Security suite add on to ISA that adds quarantine functionaity.

"I haven't got the slightest friggen clue what you just said."

Sometimes you get the funniest things said to you.  It all started when someone asked how to stop spyware and even with Firefox and a firewall they were still being infected and overwhelmed.  And I told them in addition to the Microsoft Antispyware tool that they really needed to pushing to stop using local administrator and instead try to move to restricted user mode to better protect that computer.  That antispyware software wasn't enough, that we truly needed to stop running our computers with local administrator rights. 

I knew though that they will have line of business applications and thus won't easily be able to do this.  So I explained that they needed to urge their software vendors to better support 'restricted user'.  And as a result of my email .... the response that came back was.....

"I haven't got the slightest friggen clue what you just said."

Steve Riley says tonight that he and Dr. Jesper Johansson have an idea for a second book for home users [you do know about their first book don't you?  You should!], and there's a section in the outline that talks about “Running with least privilege”.   But already I can hear the poster that said that to me, read that outline and go ...... “I haven't got the slightest friggen clue what you just said."

And there's the rub.  Here it is a basic foundational rule in security... only give those rights that you absolutely must, and most of us haven't got a slightest friggen clue about what it's all about.  Aaron says “The security principle of “least privilege” is well understood:  Software should run with the smallest set of privileges needed to perform its tasks. “

Understood by whom?  Certainly not with the folks I hang around with.  Certainly not home users.  Certainly not buyers of software that haven't a clue that that Accounting application you just bought, that is a pain to make run as restricted user, is actually causing you, forcing you to run your system in a very insecure way.

Even in the Ebook/College notes for the Teen's guide to safe computing “Always use Protection”, I don't see where Dan talks about restricted user at all.

So here's to the day that I don't say the word “restricted user” and someone doesn't say ....."I haven't got the slightest friggen clue what you just said." 

In my view it can't be soon enough.

What's the best security tool you have?

Quick question...what's the hands down best security tool you have?  Think about it for a sec..... okay got it?

What is it?

Did you say your users?  Kevin Mitnik thinks that's what the answer is.  On a daily basis I get paypal, banking offers and tons of other 'phishing' sites that try to get me to take some action that I really shouldn't.  And some of them are done quite well. 

The suggestion is that you put posters on the bathroom door because you have a captive audience there.  Reminds me of the bathrooms in the ESPN Sports bar in Downtown Disney when I walked in... thought merely just the sound of the television was being piped in and ...well... looked up and saw a bank of TV screens.  Needless to say, you are a captive audience in there.

So do you have training?  Do you tell your end users when you are seeing bad things?  Do you remind them of Patch tuesday?  Do you include them in your 'awareness?'  You should.  They are just as much a part of your security onion layers and may indeed be the most important part.

Having issues with saving Word Docs to floppy disks after the application of Windows 2000 SP4 Update Rollup 1

Fellow MVPs have been reporting that after the application of the Windows 2000 service pack 4 update rollup they could not save anymore to floppy disks from Microsoft Word.

PC Review - KB891861 - Update rollup 1 for 2000 service pack 4 (specifically fastfat.sys) breaks ability to save Office docs to floppy#post6423226:
http://www.pcreview.co.uk/forums/showthread.php?p=6423226#post6423226

"Hi,
You should be able to contact Microsoft Technical Support and open a non-fee
support incident and request the hotfix from KB article 904368. Note that
the article 904368 is not yet published."

Actually that should read "you will be able to contact support and easily open a non fee support incident"

I called Product Support services and sure enough, there is an update to fastfat.sys file version 5.0.2195.7061 [yes, called, free call, got the patch, no hassle]

So if you are seeing this, call Product Support Services and get the hotfix.  It will be a free call to get this hotfix, and despite the comments that are always said... these hotfixes are not regression tested so make sure you have a backup, but honestly, I've never had issues in applying hotfixes.

Accepting Risk

Accepting risk.  You do it every day.  For those that are consultants you accept risk on behalf of your clients.  You click on EULAs, you download patches, you install stuff on a regular basis and you accept risk for your clients.  Sometimes you need to search for solutions for your clients.

When you are at your client's offices, where do you do this activity?  Do you do it at your client's server?  Do you ever find that Internet Explorer tool bar that pops up and prompts you to add web sites to the trusted zone an annoyance?  You probably do don't you?  But here's the thing... it's supposed to be annoying.  It's supposed to remind you that this isn't the place you should be surfing from.

Now I know you'll probably say “Oh, but I have a fully patched server so why should this be a concern?”  Because merely going to web site these days can end up with bad stuff on your machine.  “Oh, then I should use another browser!”  Not so fast as even other browsers can have vulnerable bits [java and what not] and be used as infectors.

So how can a fully patched machine get nailed?  Because of the lack of patching by the web servers you visit.  Earlier this year my own outsourced web site had a java trojan dropped on it because of the web site being intruded.  For a day if you had surfed to my web site you could have gotten your computer nailed.

Paperghost [fellow Security MVP] has a whitepaper on how this is done. Michael Howard talks about how "Running with an administrative account is dangerous to the health of your computer and your data." and inside the Windows 2003 server is says this:

Using servers for Internet browsing does not adhere to sound security practices because Internet browsing increases the exposure of your server to potential security attacks. Regardless of the browser you use, you should restrict browsing on your server.

To reduce the risk to your server of potential attacks from malicious Web-based content:

  • Do not use servers for browsing general Web content.
    Use client computers to download drivers, service packs, and so on.
  • Do not view sites that you cannot confirm are secure.
  • Use a limited user account instead of an administrator account for general Web browsing.
  • Use Group Policy to keep unauthorized users from making inappropriate changes to browser security settings.

Earlier this year the lack of patched DNS servers meant that DNS poisoning attacks could affect fully patched servers.  Again..see the pattern here of blended threats?  Having layers of security in place to ensure that stuff won't get you means that there's are indeed layers in place.

There have been many Internet Explorer patches that have not been as critical on Windows 2003 because of that Enhanced IE tool that is on that server.

So before you uninstall that Enhanced IE on that Windows 2003 server [and no I'm not telling you how to do this you'll have to google it yourself]   Just stop.  Think about the risk you are accepting.  Think about the risk you are accepting on behalf of your client?  Do you discuss your decision with your client?  Do you think about the data they have on that server, the laws they are regulated by?  Do you discuss this with your client?

The reason that is there to annoy you is that folks like Michael Howard sat down and said “what's the worst thing that can happen on that Windows 2003 server“ and the answer was... 'going to web sites while logged in as administrator'.  [watch the presentation on the Blackhat site and you'll see what I mean]

All I ask is that the next time you are annoyed by that Enhanced IE lockdown on that server, just think why it's supposed to be annoying.  There are bad things out there that we cannot control, so I would argue that you should leave the onion layers in place on the things you can control.

It's not 'just' your patch status that you should be worried about... it's the patch status of all the places you go to out there.

Control what you can.

Okay let's duke it out... One nic or two?

You heard me... we already had the Terminal server argument done to death..let's have the one nic or two religious argument.

I like two nics.  I like a separation from the internal and external network.  I like then having another small router on the outside for an additional onion layer.  I'm not a fan of a one nic, then external hardware firewall setup.  I can however, understand that folks consider this the more logical setup after coming from peer to peer.  I mean that's what they had in peer networks right?  Then you have all the confusion about this thingy called DNS and why does the router need to stop doing DNS and DHCP when it was doing it just fine before?

I've said it before on the blog that SBS and Active Directory [aka glue] works better when the SBS does the DHCP.  Why?  Because active directory would just logically handle services better on it's own platform than reaching out to ...say an external box.  The movement from peer to domain catches a lot of folks off guard because no longer do they point the DNS to the ISP's DNS but rather you now look inward and just use the ISP's DNS as forwarders in the Connect to Internet Wizard.  Changing from a setup that works...to one that is a bit of a hard one to get a handle on can be a hassle.

I'm going to go out on a limb here and say something controversial......[yeah, like that's a surprise]  I think the important thing is not necessarily one nic or two [even though I still would strongly argue for two nics and a RRAS+router or ISA+router], but rather that whatever firewall you pick that you monitor it and KNOW it.

One of the annoying things right now to me on ISA 2004 is that I'm not quite confortable with it and don't quite have the same level of knowledge of it as I did ISA 2000.  But I must say that what I like about it [and actually everything on SBS is in this category], because it is sitting on a box that I've turned on monitoring [or SBS's wizards have] and I've turned on it's reporting... I'm LOOKING at it.  People say that one of the problems with SBS is that 'it's all your eggs in one basket' but.... my view is that it's a basket that because of the monitoring tools... I'm looking at it a heck of a lot more than my member server.  If I had services and more redundancies, I don't have the monitoring in place on those redundant places [lord knows I don't on my member server which is something I need to fix].  I feel that BECAUSE it's all in one basket that I really pay attention to it much better than I would if it's services were strung out on several servers.  Call me crazy but I think... I feel... better about it because my 'attack surface' ...my 'threat model' is one that I monitor a lot more because of the SBS's monitoring emails that shove that data in my face.

In think the important thing isn't necessarily one nic or two...but rather the age old rule in protection your assets “KNOW THY SYSTEMS”.  If you don't know..don't patch..don't understand...don't monitor that firewall...don't watch the log files...... I don't think it matters a twit whether it's one nic or two.

So..let's have at is [and yes sorry I know the Captcha spam filter barfs a lot these days when you go to post back on the blog]...post your comments... one nic or two...and why do you choose that?  What is it about what you choose that makes it feel right to you?

I don't want to be anonymous...but I do demand that I'm secure

Law #9: Absolute anonymity isn't practical, in real life or on the Web

All human interaction involves exchanging data of some kind. If someone weaves enough of that data together, they can identify you. Think about all the information that a person can glean in just a short conversation with you. In one glance, they can gauge your height, weight, and approximate age. Your accent will probably tell them what country you're from, and may even tell them what region of the country. If you talk about anything other than the weather, you'll probably tell them something about your family, your interests, where you live, and what you do for a living. It doesn't take long for someone to collect enough information to figure out who you are. If you crave absolute anonymity, your best bet is to live in a cave and shun all human contact.

The same thing is true of the Internet. If you visit a website, the owner can, if he's sufficiently motivated, find out who you are. After all, the ones and zeroes that make up the Web session have to be able to find their way to the right place, and that place is your computer. There are a lot of measures you can take to disguise the bits, and the more of them you use, the more thoroughly the bits will be disguised. For instance, you could use network address translation to mask your actual IP address, subscribe to an anonymizing service that launders the bits by relaying them from one end of the ether to the other, use a different ISP account for different purposes, surf certain sites only from public kiosks, and so on. All of these make it more difficult to determine who you are, but none of them make it impossible. Do you know for certain who operates the anonymizing service? Maybe it's the same person who owns the website you just visited! Or what about that innocuous website you visited yesterday, that offered to mail you a free $10 off coupon? Maybe the owner is willing to share information with other website owners. If so, the second website owner may be able to correlate the information from the two sites and determine who you are.

Does this mean that privacy on the Web is a lost cause? Not at all. What it means is that the best way to protect your privacy on the Internet is the same as the way you protect your privacy in normal life—through your behavior. Read the privacy statements on the websites you visit, and only do business with ones whose practices you agree with. If you're worried about cookies, disable them. Most importantly, avoid indiscriminate Web surfing—recognize that just as most cities have a bad side of town that's best avoided, the Internet does too. But if it's complete and total anonymity you want, better start looking for that cave.


This article on the top 10 laws of security was written when privacy was an issue...today ...it's that programs will wiggle their way in when people do indiscriminate web surfing.  Just today in fact on a machine that has antispyware, a MVP approved host file, the person in the office buzzed me and asked about some weird IE behavior and some icons on her desktop.  When asked she said she didn't download anything...but she did ...she had to.... and obiviously through trickery from where she was surfing.  So we're LUAing that workstation tonight and doing Drop my rights on other workstations as needed.  When 87.5% of a survey say it's a big thing..it's a big thing.

I don't need to be anonymous on the web [lord knows I'm not...just google me] but I do demand that I am secure, and my workstations are as secure as they can be.

p.s.  I soooo disagree that you can filemon/regmon privileges info in 10 minutes or less...you go try to non admin Quickbooks and see how long it takes before you give up and just open up classesroot.

WSUS on OEM

Just to let a couple of folks from the mailbag know that we're still following the issue on getting WSUS installed on OEM preinstalled systems [see the comment section].  For now, still hang tight and don't use any of the workarounds or blog posting suggestions.

 

In the meantime you can check out Shavlik's offer as well:

 


 

Are you considering using a vendor’s free product such as Microsoft WSUS for your desktop patch management solution? Now you can get Shavlik NetChk(TM)Patch Basic for $1.99 a seat!  For a limited time, this great patch management product is available at a significant discount.  It offers features such as patch rollback, non-Microsoft product coverage and detailed reporting to show you patch status at a glance.  Try that with any manufacturer's free product!  Act soon as this offer expires on July 21, 2005.  For more information visit http://www.shavlik.com/1.99promo.asp  or contact a Shavlik Sales Representative at 1-800-690-6911 or email at sales@shavlik.com .

 

If you are looking for a full-featured patch management solution, try Shavlik HFNetChkPro(TM)Plus. This state-of-the-art solution offers expanded functionality including SQL Server support, distribution servers, increased scan speed, and Shavlik's new Web Report Server.  More information is available at: http://www.shavlik.com/hfnetchk-pro-plus.aspx .

 


 

hmmmm....it's a $1.99 a seat but you STILL can't buy in quantities less than 25.  <SIGH>.  One of these days we'll get Shavlik to be a bit more SBSized... in the meantime....

A little prevention to stop keyloggers

Tonight on ABC news they had an report on keyloggers.. except there was one major problem... all it did was scare people and not give any solutions.  At the SMB Technology network event two of the consultants on hand and I were talking about SB 1386 impact and they said they didn't like to scare clients without a real solution.  I was talking about how we can get out of identity theft identification if the files are encrypted and given that none of our accounting vendors will go on record as supporting it, it didn't really give them a solid solution.

However I did point out that for the time being what I love about Remote Web Workplaces is the fact that I set up remote access using only this [and not even Outlook over http] and I ensure that the data never leaves the server.  Thus I can layer on the paranoia thicker here and not worry so much about the laptops which is where most of the theft of such data occurs. 

Combine this with the mandate that NO ONE ever uses a kiosk computer [to ensure that you never meet up with a keylogger in the wild] and the solution is okay for now.. but I'll be pushing my vendors for more.

Still ... the program gave no real concrete 'how do you prevent keyloggers from getting on your own computer” and my best advice would be to watch what you download, have up to date a/v and anti spyware programs.

RDP Security Alert - should we be concerned?

Microsoft released a Security Advisory regarding a Denial of Service on Remote Desktop Protocol and for me, I'm not freaking out over this for a couple of reasons.

For one, it's 'just' a denial of service and I'd much rather have that than a “run code of attackers choice' which is slang for 'oh you are soooo owned'.

And for two, the port that this will primarily bang on is the TS ports of 3389 and not our Remote Web workplace ports of 4125 and 443.  So if you read that advisory and thought it might cause a concern for our remote web workplace, me.... I'm not worrying.  I honestly don't use port 3389 in my network.

Workaround:  Block port 3389 at the firewall

This port is used to initiate a connection with the affected component. Blocking it at the network perimeter firewall will help protect systems that are behind that firewall from attempts to exploit this vulnerability. Additionally, on Windows XP and Windows Server 2003, the Windows Firewall can help protect individual machines. By default, the Windows Firewall does not allow connections to this port.

Using MBSA 2.0 and can't scan your workstations?

If you can't remotely scan your XP sp2 workstations that have the firewall enabled in your SBS network, you will hit an issue:

 

" The use of DCOM for remote scanning through Windows Firewall on all versions of Windows XP may require a post-SP2 hotfix as described in Microsoft Knowledgebase article 895200, "Availability of the Windows XP COM+ Hotfix Rollup Package 9"."

You need to call Microsoft Product Support and get this FREE [yes I SAID FREE] hotfix to allow you to scan through the firewall on the XP sp2 workstations.

http://support.microsoft.com/default.aspx?scid=kb;en-us;895200

Thank you Mr. Ballmer

Microsoft/Claria Deal Dead
http://www.clickz.com/news/article.php/3519521
Microsoft has ended its acquisition talks with behavioral targeting firm Claria, ClickZ News has learned from a source close to the discussions. A Microsoft spokesperson later confirmed that report.

I had sent an email expressing my dismay over this rumored acquisition to Steveb@microsoft.com and I emailed him back today saying I owed him a hug. [yes, he answered my previous message]

Thank you Mr. Ballmer for proving that you do 'get' that security is also about trust.

Security bulletins today

 July 12, 2005
Today Microsoft released the following Security Bulletin(s).
Note:
www.microsoft.com/technet/security and www.microsoft.com/security
are authoritative in all matters concerning Microsoft Security
Bulletins! ANY e-mail, web board or newsgroup posting (including this
one) should be verified by visiting these sites for official
information. Microsoft never sends security or other updates as
attachments. These updates must be downloaded from the microsoft.com
download center or Windows Update. See the individual bulletins for
details.

Because some malicious messages attempt to masquerade as official
Microsoft security notices, it is recommended that you physically type
the URLs into your web browser and not click on the hyperlinks provided.

Bulletin Summary:

http://www.microsoft.com/technet/security/Bulletin/ms05-Jul.mspx
Critical Bulletins:

Vulnerability in Microsoft Word Could Allow Remote Code Execution
(903672)
http://www.microsoft.com/technet/security/Bulletin/ms05-035.mspx 
Vulnerability in Microsoft Color Management Module Could Allow Remote
Code Execution (901214)
http://www.microsoft.com/technet/security/Bulletin/ms05-036.mspx 
Vulnerability in JView Profiler Could Allow Remote Code Execution
(903235)
http://www.microsoft.com/technet/security/Bulletin/ms05-037.mspx
Re-Released Bulletins:

Vulnerability in Telnet Client Could Allow Information Disclosure
(896428)
http://www.microsoft.com/technet/security/Bulletin/ms05-033.mspx 
This represents our regularly scheduled monthly bulletin release (second
Tuesday of each month). Please note that Microsoft may release bulletins
out side of this schedule if we determine the need to do so.
If you have any questions regarding the patch or its implementation
after reading the above listed bulletin you should contact Product
Support Services in the United States at 1-866-PCSafety
(1-866-727-2338). International customers should contact their local
subsidiary.

We can't just service pack the users 'eh?

From reading the news reports...

Human Factors Overtake Technology as Leading Security Threat for Financial Institutions: Survey
Deloitte’s third annual Global Security Survey for financial institutions shows that the efforts of those committing fraud are focused on what they perceive to be the weakest link: the human factor. Phishing and pharming (luring people to disclose sensitive information by using bogus emails and websites) are two new security threats for this year. To read the report, visit
www.deloitte.com/dtt/research/0,1015,sid=1013&cid=85452,00.html.

Let's clarify that newsstory please?

Florida man arrested for unauthorized use of WiFi screams the headline....as I sheepishly ....not that I know anyone that did this mind you.....was updating a computer at some unnamed office and the wifi connection coming from gawd knows where was stronger than some connection that WPA on it...... uh... yeah.... so anyway.... so I'm reading this headline that says this guy got arrested for using someone else's WiFi..but there's a problem with this story.

1.  I've got another view of the same story and the word hack [and description of the guy's actions] are much more hinting that he might have been using airsnort or any other techniques to capture the WEP packets to then break the encryption.

2.  If you have set up an open access..for awhile there until it was fixed.... XP loved 'weaker' encrypted access points and the next thing you knew you were on someone elses.

Is the key elements here the act of breaking in [which I would argue it should be], using an open unprotected access point [which I would argue...if YOU don't want someone hanging off your connection, YOU have the responsbility to lock it up with a minimal protection scheme].  I would argue that the line isn't drawn when I hang off of someone's open access point, but rather if I do actions or tools to let me hang off of even the most lame of protection methods.

And while I'm at it, let's start the conversation on whether you enable or disable SSID broadcasting.  More often than not, disabling the SSID merely causes connections headaches for you and the tools that allow folks to see those supposely 'cloaked' SSIDS ...well let's just say that many a Star Trek episode would be 5 minutes in length if Captain Kirk had the same tool and the Romulans or Klingons or whomever did cloaking.

If your WAP is wide open should people not connect to it?  Is the act of someone connecting to an open WAP that they didn't get authorization to do so illegal?

I just gotta think there's more to this story than meets the eye.  I just think that at a minimum it's up to you the WAP owner to put the electronic equivalent of the sign on the door saying “no admittance“.  Otherwise I'm not convinced it's trespassing.

So what do you think?  

For anyone who's ever wanted to know how to troubleshoot Windows Update

How to read the Windowsupdate.log file:
http://support.microsoft.com/?kbid=902093

Manna from heaven... or Redmond anyway...

Patches next week

Please note that there are certain non security patches 
that will only come out with MU and WSUS.
********************************************************************
Title: July 2005 Microsoft Security Response Center Bulletin 
Notification
Issued: July 7, 2005
********************************************************************

Summary
=======
As part of the monthly security bulletin release cycle, Microsoft 
provides advance notification to our customers on the number of new 
security updates being released, the products affected, the 
aggregate maximum severity and information about detection tools 
relevant to the update. This is intended to help our customers plan 
for the deployment of these security updates more effectively.

In addition, to help customers prioritize monthly security updates 
with any non-security updates released on Microsoft Update, Windows 
Update, Windows Server Update Services and Software Update Services 
on the same day as the monthly security bulletins, we also provide:

- - Information about the release of updated versions of the Microsoft 
Windows Malicious Software Removal Tool.
 - Information about the release of NON-SECURITY, High Priority 
updates on Microsoft Update (MU), Windows Update (WU), Windows 
Server Update Services (WSUS) and Software Update Services (SUS). 
Note that this information will pertain ONLY to updates on Windows 
Update and only about High Priority, non-security updates being 
released on the same day as security updates. Information will NOT 
be provided about Non-security updates released on other days.

On 12 July 2005 Microsoft is planning to release:

Security Updates

 - 2 Microsoft Security Bulletins affecting Microsoft Windows. The 
greatest aggregate, maximum severity rating for these bulletin is 
Critical. Some of these updates will require a restart. These 
updates will be detectable using the Microsoft Baseline Security 
Analyzer (MBSA).
 - 1 Microsoft Security Bulletin affecting Microsoft Office. The 
greatest aggregate, maximum severity rating for this bulletin is 
Critical. These updates may require a restart. These updates will be 
detectable using the Microsoft Baseline Security Analyzer (MBSA).

Microsoft Windows Malicious Software Removal Tool
 - Microsoft will release an updated version of the Microsoft 
Windows Malicious Software Removal Tool on Windows Update, Microsoft 
Update, Windows Server Update Services and the Download Center. 
Note that this tool will NOT be distributed using Software Update 
Services (SUS).

Non-security High Priority updates on MU, WU, WSUS and SUS
 - Microsoft will release one NON-SECURITY High-Priority Updates for 
Microsoft Office on Microsoft Update (MU), and Windows Server Update 
Services (WSUS).
 - Microsoft will NOT release any NON-SECURITY High-Priority Updates 
for Windows on Windows Update (WU), or Software Update Services 
(SUS).


Although we do not anticipate any changes, the number of bulletins, 
products affected, restart information and severities are subject to 
change until released. 

Microsoft will host a webcast next week to address customer 
questions on these bulletins. For more information on this webcast 
please see below:

 - TechNet Webcast: Information about Microsoft's July Security 
Bulletins (Level 100)   
 - Wednesday, July 13, 2005 11:00 AM (GMT-08:00) Pacific Time (US & 
Canada) 
 - 
http://msevents.microsoft.com/CUI/WebCastEventDetails.aspx?EventID=1
032276892&EventCategory=4&culture=en-US&CountryCode=US

At this time no additional information on these bulletins such as 
details regarding severity or details regarding the vulnerability 
will be made available until 12 July 2005.


********************************************************************

Support: 
========
Technical support is available from Microsoft Product Support 
Services at 1-866-PC SAFETY (1-866-727-2338). There is no 
charge for support calls associated with security updates. 
International customers can get support from their local Microsoft 
subsidiaries. Phone numbers for international support can be found
at: http://support.microsoft.com/common/international.aspx
 
Additional Resources:
=====================
* Microsoft has created a free monthly e-mail newsletter containing
  valuable information to help you protect your network. This
  newsletter provides practical security tips, topical security
  guidance, useful resources and links, pointers to helpful
  community resources, and a forum for you to provide feedback
  and ask security-related questions.
  You can sign up for the newsletter at:

  http://www.microsoft.com/technet/security/secnews/default.mspx

* Microsoft has created a free e-mail notification service that
  serves as a supplement to the Security Notification Service
  (this e-mail). The Microsoft Security Notification Service: 
  Comprehensive Version. It provides timely notification of any 
  minor changes or revisions to previously released Microsoft 
  Security Bulletins and Security Advisories. This new service 
  provides notifications that are written for IT professionals and 
  contain technical information about the revisions to security 
  bulletins. To register visit the following Web site:

  http://www.microsoft.com/technet/security/bulletin/notify.mspx

* Protect your PC: Microsoft has provided information on how you 
  can help protect your PC at the following locations: 

  http://www.microsoft.com/security/protect/

  If you receive an e-mail that claims to be distributing a 
  Microsoft security update, it is a hoax that may be distributing a 
  virus. Microsoft does not distribute security updates via e-mail. 
  You can learn more about Microsoft's software distribution 
  policies here: 

http://www.microsoft.com/technet/security/topics/policy/swdist.mspx

Remember Windows update and Microsoft update are two different things

One thing I'm not sure people are still clear on is that there are two ways to update your computer these days.  The first is our old trusty Windows Update that “just” updates Windows.

Microsoft updates at this time will patch Windows 'and' Office 'and' Exchange [with more to come]

So don't miss out on the fun by patching MORE.  The only problem I've had is with software older than 2003 that needs the original CDrom.  It's a bit of a pain to dig up those older cdroms [one of the reasons why 2003 is so much easier to patch].

Protecting your assets

One of the guys in the office is heading off to the Philippines and while I've done my homework before sending it out to the big bad world [patching, firewall and what not] because the laptop is going so far... I'm kicking up the paranoia.  So I bought a “phone home” program to keep track of the laptop and if I need to track where it's connectiving from ... I can.

And in looking at this checklist, I've taken some procedures already.

1.  Backpack doing that one...
2.  Check .... not doing that
3.  Since it's not me, I'll warn the best I can...but can't guarantee he's as paranoid as I am
4.  Have pgp drive on there
5.  Again, see number 3
6.  See number 3
7.  Got the cable... and that's what I'm looking for
8.  Huh... didn't think of that one
9.  Again, see number 3

There's more paranoia on this checklist site as well.  I've got a dash of good end user information/security awareness going and just also signed him up for a Tmobile account so there will be no reason whatsoever to use a Kiosk computer that ...if he used it... I'd ... well let's just say I'd probably get as violent as I was thinking of getting violent the other day.

I do wish there was some way that I could back up my written policy against 'no kiosk access' with a technological policy enforcement.  You know some sort of MAC address filtering or something.  But I'm planning on changing the password when he gets back for good measure.

VOIP may be hot, but I'm still not Peer to Peering

What's hot these days?  Voice over Internet Protocol.  But that doesn't mean I like the way that VOIP is offering up services in all instances.  There are a couple of free [or near free] VOIP options that rely on the same technology as peer to peer technology...and well...let me just say that anythng that has the words 'peer to peer' ... I'd rather not have that technology in my network.  Oh sure folks can say that they've run it with Snort and examined the packet flow across that and they didn't see any traffic inside their network...but I'll think I'll pass.

I had an instance where I needed to talk to someone in the former Russian states and I chose to do a phone call than to set up a Peer to Peer VOIP.  I'm watching this TV show on Showtime that is talking about blowing through the myths and getting the real story [it's from Penn and Teller] and while you can tell me that you've done your homework that you aren't sharing much on your servers when you Peer to peer with VOIP, the possibility that you might is just not acceptable to me.

So if you are offering VOIP to your clients, talk about the risks, give you clients the real facts.  Some VOIP technologies don't rely on a peer to peer model that comes inside to your server.  Some handle the potential security issues much better.

Ask the hard questions.  Do your homework.  Your clients want you to.

P.S.  When I say...do your homework... I also mean read the EULAs

4.1 Permission to utilize Your computer. In order to receive the benefits provided by the Skype Software, You hereby grant permission for the Skype Software to utilize the processor and bandwidth of Your computer for the limited purpose of facilitating the communication between You and other Skype Software users.

4.2 Protection of Your computer (resources). You understand that the Skype Software will use its commercially reasonable efforts to protect the privacy and integrity of Your computer resources and Your communication, however, You acknowledge and agree that Skype cannot give any warranties in this respect.

http://www.skype.com/company/legal/eula/

...there are some VOIP setups that do not need to 'borrow' your computer processor power and there are some that don't go through your computer.

Some organizations ban it for that reason...therefore... do your homework so you can guide your client into making the right decisions.  For my firm, the risk is greater than the benefits for 'this' type of VOIP.

While at Windows Update, you can upgrade to Microsoft Update

While you are at Windows Update.... on the right hand side there a button to click to upgrade to Microsoft Update.

One click and you can opt in to the Microsoft update.

My WU isn't WUing

And the error is 0x80070002 and when I check on the help and support it says:  This error may occur if there is a content mismatch in the DataStore folder and it gives me the following information to fix it:

Resolutions
1. Delete the contents of the DataStore folder
  1. Stop the Automatic Updates service
    1. Click Start.
    2. Choose Run.
    3. In the Run box, type services.msc.
    4. Click OK.
    5. Right-click the Automatic Updates service.
    6. Click Stop.
    Stopping the service will take a moment.
  2. Delete the contents of the DataStore folder
    1. Click Start.
    2. Choose Run.
    3. In the Run box, type %windir%\SoftwareDistribution.
    4. Click OK.
    5. Open the DataStore folder.
    6. Delete all contents of the DataStore folder.
    7. Close the window.
  3. Start the Automatic Updates service
    1. Click Start.
    2. Choose Run.
    3. In the Run box, type services.msc.
    4. Click OK.
    5. Right-click the Automatic Updates service.
    6. Click Start.

Starting the service will take a moment

Don't forget there's a very good help file inside the Update mechanism.

I'd like a little auditing please?

One thing that I just recently ensured was reset up in my network at the office was Auditing.

Did you know that the default Win2k3 server with default audit events has 10 audit events per second?  With full privilege auditing turned on....generates 150,000 per second?  So what did I adjust on the default domain policy to ensure my workstations also were auditing like my server?

Audit account logon events - Success, Failure
Audit account management - Success
Audit directory service access - No Auditing
Audit logon events - Success
Audit object access - No Auditing
Audit policy change - Success
Audit privilege use - No Auditing
Audit process tracking - No Auditing
Audit system events - Success

Now then what are these truly doing?

  • Audit account logon - tracks a user logging on to or logging off from another computer.
  • Audit account management - audits if someone changes a password, user account is rename, etc.
  • Audit directory service access - is not audited mainly because on a domain controller this is kinda noisy and we tend to not use the data anyway.
  • Audit logon events - you would think this is like the first one...but it's not... but in SBSland I would argue it's really close as we tend to log onto the network all the time anyway, but keep this in mind - account logon events are generated where the account lives; logon events are generated where the logon attempt occurs.
  • Audit object access - this is the one that you might want to kick up to success ONLY if you need this info - this tracks who accessed a file, folder, etc. but again, only do this if you are going to look at this
  • Audit policy change - tracks who changed something, a change to a right
  • Audit privilege use - this is the noisy one that tracks every time you are using that right
  • Audit process tracking - audits the really detailed stuff like product activation and process exit
  • Audit system events - and lastly auditing start ups and shut downs

While it was doing this on my server, I just recently adjusted it so it would do this on my workstations in the office as well.

All of this info is from the Threats and Countermeasures document and more info about logging here.

So bottom line...turn it on...but UNDERSTAND what you are turning on.

The Cause and Effect

Remember my issue the other day where my app broke after 05-026?  While I fixed it, I glossed over a very important part of the discussion.  The acceptance of the risk I am taking in fixing it.

Yup, you heard that right, I made a decision to lower a setting to get something to work.

What did I lower?  The setting that allows local intranet applications to use those types of files.  You see I'm taking the risk that for where I am and what I do that malcious chm files will come from the InTERnet[outside] not the InTRAnet. 

I'm allowing the local InTRAnet zone to be able to still handle those files.

Remember this includes all network paths and any site on the 'bypass proxy setting' and given that I'm the only one that uses that bypass, I've kept that in mind that it's a threat vector from those sites.

Is it a risk?  Yup.  One that I've looked at and said I'll accept because I know I have other onion layers in place?  Yup.

Is it better than uninstalling the patch? 

Yup.

But it IS a risk nonetheless.

Is it one I'm ready to rip back out in a heartbeat if I hear that chm files might find another way to wiggle in? 

You betcha.  In a heartbeat.

Law number 8 .... are you up to date?

Law #8: An out of date virus scanner is only marginally better than no virus scanner at all

Virus scanners work by comparing the data on your computer against a collection of virus "signatures". Each signature is characteristic of a particular virus, and when the scanner finds data in a file, email, or elsewhere that matches the signature, it concludes that it's found a virus. However, a virus scanner can only scan for the viruses it knows about. It's vital that you keep your virus scanner's signature file up to date, as new viruses are created every day.

The problem actually goes a bit deeper than this, though. Typically, a new virus will do the greatest amount of damage during the early stages of its life, precisely because few people will be able to detect it. Once word gets around that a new virus is on the loose and people update their virus signatures, the spread of the virus falls off drastically. The key is to get ahead of the curve, and have updated signature files on your computer before the virus hits.

Virtually every maker of anti-virus software provides a way to get free updated signature files from their website. In fact, many have "push" services, in which they'll send notification every time a new signature file is released. Use these services. Also, keep the virus scanner itself—that is, the scanning software—updated as well. Virus writers periodically develop new techniques that require that the scanners change how they do their work.


We are up to Law number 8 of the 10 laws of security...and I'd slightly change this one to read “Antivirus as well as AntiSpyware”.  Now while I am a strong proponent of updating every hour on the hour, keep in mind that it was an hourly updating that nailed me one night when my antivirus vendor sent down an update that didn't do so well.  Fortunately those instances are few and far between but do remind us that we are introducing 'change' into our network on a regular basis.

These days I would add that you need to have an up to date antispyware program as well.  Watch any program so that they are updated when the system is online or will grab an update as they boot up.

I make sure that the Trend has a script to ensure all are updated.

You have found the Trend guide on Wayne's site haven't you?  One of the best up to date places for finding out about the latest nasties on the web is this blog.

So are YOU up to date?

MBSA 2.0 is released

This alert is to notify you of the release of Microsoft Baseline
Security Analyzer (MBSA) 2.0.

MBSA 2.0 offers an intuitive user interface and more informative dialogs
compared to previous versions. Using the new Windows Update Agent and
Microsoft Update catalog, MBSA 2.0 has automatically expanding product
support.

Users who primarily have:
- Windows 2000+ SP3 and later
- Office XP+ and later
- Exchange 2000+ and later
- SQL Server 2000 SP4+
- Other products supported by Microsoft Update

in their environment should switch to MBSA 2.0 today.

MBSA 2.0 is compatible with Microsoft Update (MU) and Windows Server
Update Services (WSUS) and the SMS Inventory Tool for Microsoft Update
(ITMU). MBSA 2.0 offers customers improved Windows component support,
expanded platform support for XP Embedded and 64-bit Windows, as well as
more consistent and less complex security update management experience.

For more information on MBSA, please see the MBSA home page located
here:
http://www.microsoft.com/technet/security/tools/mbsahome.mspx
More information on MBSA 2.0 can be found here:
http://www.microsoft.com/technet/security/tools/mbsa2/default.mspx

If you have any questions regarding this alert please contact your
Technical Account Manager or Application Development Consultant.

Thank you,
Microsoft PSS Security Team

Brand spanking new SBS 2003 sp1 box says it needs the following:

A brand spanking new SBS 2003 sp1 slipstreamed edition is already out date and needs the following patches after going to Microsoft Update

Burn them into a cdrom or USB stick to make it easier.

...get the idea that patching is now just a part of buiding a box?  Keep in mind that unlike in SBS 2000 days, we don't have the same risk as a Code Red type 'nailing as the box gets built'.  Furthermore I tend to put machines behind a small hardware firewall anyway.

Want some cool tools?

A couple of tools for the toolbag

Public beta of shared computer toolkit [think kiosks and what not]

And then a tool for IE called “dropmyrights“ that keeps the IE from running in Admin mode.  Since we can't get Quickbooks to run in restricted user...maybe we can get IE a bit more protected?

 

Hold on ... SUS isn't dead yet, was If you aren't WSUSing maybe you'd better

From Bink today comes the word that SUS 1.0 is going to be turned off soon, so if you are running SUS... this US Holiday weekend is probably a good time to start testing out WSUS.  Step by step instructions on migrating from SUS to WSUS are here and given that we never READ [including myself] use this weekend to start reading.

And bookmark this KB article to keep you alerted as to what comes down on WSUS/AU, etc.

In fact, patching will be the topic I discuss at the SMB Technology Network.  To be specific WSUS, Shavlik and Patching in general.

Then in September at SMB nation it will be on Security and Hardening with Dana.

Hope to see you in both places!

Update --- okay I should have read more than the headline...

http://www.microsoft.com/windowsserversystem/updateservices/evaluation/faqs.mspx

in the WSUS and SUS section:

Q. How long will Software Update Services (SUS) be supported by
Microsoft?
 
A. SUS will be supported through June 6, 2006. The documentation for SUS
will remain available on the web here.

Q. How long will SUS continue to receive new content from Windows
Update?
 
A. SUS will no longer receive new update content after June 6, 2006.

Q. Will I still be able to download SUS?

 
A. No. SUS will no longer be available after June 30, 2005.

Error 0x80072EE2

I was checking the Microsoft update here at the office and when I went to MU I kept getting Error 0x80072EE2.  Hmmmmm....so I googled and found:  You receive an "Error 0x80072EE2" or an "Error 0x80072EFD" error message if you try to use the Microsoft Windows Update Web site, the solution for which is in KB 836941: Making the MU site a trusted zone in IE fixed the issue and I can now use Microsoft Update [and for that matter auto updates was apparently broken as well and just now started working again after I put the link into the Trusted Zone.]

Check and make sure that check box indicating it's a trusted site is in place.

Update rollup for Windows 2000 sp4 released today [SBS 2000]

* Security Advisory (891861) 

  - Title:    Release of Update Rollup 1 for Windows 2000 Service
Pack 4 (SP4)
  - Web site: http://go.microsoft.com/fwlink/?LinkId=49772

Support:
========
Technical support resources can be found at:
http://go.microsoft.com/fwlink/?LinkId=21131

The knock at the door

Update - read Dana's view of the knock on the door

From the mailbag today comes the question...what do you do if you see traces of someone banging on your accounts?

Now here comes the controversy...some say they like account lockout as it shows when you are getting nailed...some like Steve Riley and Dr. Jesper Johansson in their book on Protecting your Windows network say that if you have the proper passwords...[great passwords are akin to great strong locks on your doors].... you can let them bang on those doors all you want because you are snug behind those locks.

So what should you do when you see the door rattling?

Ask yourself if your locks [i.e. your passwords] are good enough.  If they are...roll over and go back to. bed... because it would take them eons of time to break down the door if the lock is good enough.  If, however, you have your doubts... then you need to replace your current lock [password] with a better lock [passphrase].

P.S.  In SBSLand we DO know when folks are knocking on the door because of our monitoring email.  Anytime there is a login failure we see it in the emails.  I personally want my ISA server logs more 'in my face' and heck..even RSSable.

Alice and Bob brings us rule number 7 of the laws of Security

Law #7: Encrypted data is only as secure as the decryption key

Suppose you installed the biggest, strongest, most secure lock in the world on your front door, but you put the key under the front door mat. It wouldn't really matter how strong the lock is, would it? The critical factor would be the poor way the key was protected, because if a burglar could find it, he'd have everything he needed to open the lock. Encrypted data works the same way—no matter how strong the crypto algorithm is, the data is only as safe as the key that can decrypt it.

Many operating systems and cryptographic software products give you an option to store cryptographic keys on the computer. The advantage is convenience – you don't have to handle the key – but it comes at the cost of security. The keys are usually obfuscated (that is, hidden), and some of the obfuscation methods are quite good. But in the end, no matter how well-hidden the key is, if it's on the computer it can be found. It has to be – after all, the software can find it, so a sufficiently-motivated bad guy could find it, too. Whenever possible, use offline storage for keys. If the key is a word or phrase, memorize it. If not, export it to a floppy disk, make a backup copy, and store the copies in separate, secure locations. (All of you administrators out there who are using Syskey in "local storage" mode—you're going to reconfigure your server right this minute, right?)


I forgot to bring up Law number 7 in our discussion of Alice and Bob trying to email one another.... and it relates to our choices.  The choices of where that  decryption key is stored.  This reminds me of what we do with backups.  Placing the storage of the key...or a backup tape.....or whatever on the same site as the very thing you are trying to secure puts that 'thing' at risk.  You must make sure that you protect offsite the thing that is key to the security of your network.

Oh and can you make sure that where you keep that offsite storage location secure as well?  Because that location's security also affects your security as well.

Location...location...location.... remember... it's all about that security of the location.

Are you aware of these Security resources?

Are you aware of the following resouces from Microsoft Security?

MSRC blog  Microsoft Security Response Center Blog

Security bulletins on IM

Security advisories

Security advisory sign up - [included in comprehensive edition which also includes advance notification and updates to bulletin email]

Advance patch notification

Security bulletins on RSS 

Security newsletter

You are now....

The mission... should you decide to accept it ... is to beat up your vendors

Something to think about when you use your Windows 98 machine

When you or your clients use that Windows 98 machine..just think of this...

Windows 98...what was job one for that operating system?  Being a GUI platform for programs.

Was it a feature of that operating system to be a tool for the Internet?  I'd argue not.

Was it a feature that operating system to have security included?

Nope.

Think about that one the next time your client says 98 is 'good enough'.

Good enough for what?

Alice and Bob want to send secure emails.... oh and can they not be forwarded too?

A fellow MVP sent me an digitally signed email and asked if the email was encrypted.... but you see it wasn't.  Why not?  Because he didn't have 'my' digital certificate in his cert store.  You see when Alice want to send an encrypted email to Bob she must make sure that before she can encrypt the email between her and Bob that she has HIS digital certificate. It's not enough to have a Verisign email digital certificate, the person on the other end of the email transaction must have the certificiate as well.

So step number one for Alice is to purchase a digital certificate.  Step two is for Alice to send a digitally signed email to the person that you intend to encrypt email to [aka Bob].  Step three is to have Bob also buy a digital certificate and send a digitally signed email to Alice.  Once Alice and Bob have swapped these public keys, they can now send encrypted email to one another that can't be read in transit.  [it also won't show in your preview pane because it's encrypted]

Okay so now the email can't be forwarded on to anyone else right?  Uh...wrong.  To restrict forwarding, editing and what not, you'd need digital rights management [another server] to add to your network.  Even then, the last time I checked the license for the ability to do DRM outside the organization was pretty pricey.

....so...what do you think... yeah... like my fellow MVP said...not easy at all huh?

Encryption should be a lot more of a one button secure me now kind of process....and it's not.  Add to this the issue that I personally have with about 3 computers having my email, and you have to make sure my digital certificate is exported and moved to other computers.

Oh.... and encrypted instant messenger.... haven't thought of that one have you?  Those IM's you do are over the clear unless you encrypt it.  Here's one here for MSN if you'd like to try it out.

Blocking Spyware from the get go

A fellow SBSer who had a client workstation hit with Coolwebsearch reminded me of a way to prevent some of these things before they wiggle their way into your network.

A blocking hosts file that stops Malware.

What you say?  The hosts file?  Yup that thing we used to edit in Windows 98 can also be used to help prevent bad things from entering.

One excellent resource is on this page.  Merely replace your host file with this file and bad things will resolve to a blank page of 127.0.0.1

A bit of a sample of it is shown below:

#start of lines added by WinHelp2002
# [Misc Add-ons][A - Z]
127.0.0.1  acestats.com
127.0.0.1  www.acestats.com
127.0.0.1  www.activesearch.com #[Adware.ActiveSearch]
127.0.0.1  actualnames.com #[Parasite.ActualNames][Spyware.ActualNames]

MS Security advisory: Browser Windows Without Indications of Their Origins may be Used in Phishing Attempts

********************************************************************
Title: Microsoft Security Advisory Notification
Issued: June 21, 2005
********************************************************************

Security Advisory Updated or Released Today
==============================================

* Security Advisory (902333)
 - Title: Browser Windows Without Indications of Their Origins may be Used in Phishing Attempts

 - Web site:
http://go.microsoft.com/fwlink/?LinkId=49437



Support:
========
Technical support resources can be found at:
http://go.microsoft.com/fwlink/?LinkId=21131

International customers can get support from their local Microsoft
subsidiaries. Phone numbers for international support can be found
at:
http://support.microsoft.com/common/international.aspx

Additional Resources:
=====================
* Microsoft has created a free monthly e-mail newsletter containing
 valuable information to help you protect your network. This
 newsletter provides practical security tips, topical security
 guidance, useful resources and links, pointers to helpful
 community resources, and a forum for you to provide feedback
 and ask security-related questions.
 You can sign up for the newsletter at:

 
http://www.microsoft.com/technet/security/secnews/default.mspx

* Microsoft has created a free e-mail notification service that
 serves as a supplement to the Security Notification Service
 (this e-mail). The Microsoft Security Notification Service:  Comprehensive Version.

It provides timely notification of any  minor changes or revisions to previously released Microsoft  Security Bulletins and Security Advisories. This new service provides notifications that are written for IT professionals and  contain technical information about the revisions to security  bulletins. To register visit the following Web site:

 
http://www.microsoft.com/technet/security/bulletin/notify.mspx

* Protect your PC: Microsoft has provided information on how you
 can help protect your PC at the following locations:

 
http://www.microsoft.com/security/protect/

 If you receive an e-mail that claims to be distributing a
 Microsoft security update, it is a hoax that may be distributing a
 virus. Microsoft does not distribute security updates through
 e-mail. You can learn more about Microsoft's software distribution
 policies here:
 
http://www.microsoft.com/technet/security/topics/policy/swdist.mspx

What ports do I need?

From the mailbag today comes the question...what ports do I need?

And the question was asked if all these ports are needed to be forwarded from a hardware firewall to the nic of the server:

Small Business Server 2003
21:   FTP  (do we need port 20 for FTP data also?)
25:   Email
80:   Web
139:  License logging service [Note:  well not exactly what this is used for actually, this is one of your file and printing ports]
443:  Secure web
444:  Windows sharepoint intranet site
445:  License logging service
1723: VPN
3389: Terminal services
4125: Remote web access
 
And the answer is...heck no.  Only open up the bare minimum.
 
What's the minimum?
 
25 - ONLY if you use SMTP mail [full MX record the whole shebang]
443 - Secure web
444 - ONLY if you want Company web/sharepoint externally available
4125 - Remote Web access.
 
That's it.
 
You don't need port 21 unless you plan on hosting Lindsey Lohan's latest bootleg song on your server, you don't need 80 as remote web works perfectly over SSL, you NEVER EVER want to open up port 139 on your outside router [what license logging do you need to externally publish for heavens sake? Remember 137-139 is file and print sharing ports.... don't open them up to the outside folks], you can do VPN at 1723 but remember to also open up the PPTP passthrough [gre 47 protocol in geek speak], and I honestly don't feel a need to open up 3389 externally even though I have a TS member server as my TS sessions come though the Remote Web workplace.
 
You also don't have to open up port 110 externally.  That's only if someone is 'pop-ping' into you.  And quite frankly..that's what OWA and OMA and Outlook over http are all about.  Why do you want to POP when you can get email more securely?  Remember the best instructions for Outlook over http are right inside the Remote Web Workplace.
 
Update:  More resources here and here and here.

Do you trust your software?

You heard me... do you trust your software?  The very software that is supposed to protect you....how secure is it?  We've seen firewall software get targeted, antivirus software need fixing for security issues, honestly, how well do we know if the very software we buy to protect us it secure in and of itself? 

I got pointed to a Business Week article that also reminded me of a Churchill Club mp3 that talked about how virus writers are now sensing whether they are in a virtual machine or a physical machine and thus will react to the environment differently.  Thus you investigate using a virtual sandbox, but in the real physical machine world, it's a totally different beast.

Steve Riley may say that the Admins of the world are getting it.... but are the bad guys getting it a little too much too?

I'll keep plugging along...and you keep being paranoid and we'll both keep an eye on the blogs out here shall we?

TechNet blogs and FSecure are two of my fav's.

 

Drugs, Gambling, Loans and other such scum of the earth

For everything that is good...there is bad...a yin and a yang.  I have this blog here and today I was noticing in the feedback section [back in the admin section that I see] a bunch of spam posts that are being stuck on old blog posts.  And it reminded me of the PubSub feed that I have to look for blog posts for Small Business Server.  There's one problem with that PubSub feed...it shows the 'underbelly' of our Internet culture.

For every good blog post I find about SBS, I'll find 10 more that are not blogs at all but advertising for something else.

Obviously these sites have to be working otherwise someone wouldn't be taking the time and energy to script/post them.  Many of them are the free blog sites.  But here's what I guess I have a problem with... what reasonable person would follow these links?  If they use questionable business tactics, do you think they would be a reputable business to deal with?

Software buying is the same way.  If the price of the software is soooooo good.  It's too good.  It's probably not legal.  If if sounds too good to be true, it more often than not IS too good to be true.

We all pay the price for this stuff.  If some folks don't pay their fair share for software, the law abiding folks end up paying more. If people say 'oh don't worry... insurance will cover it”, we end up paying for it in higher insurance fees.  If someone says, “oh go ahead and just take the merchandise, the store makes tons of money”, we end up paying for it in higher prices for goods. 

We all ending paying for this in the long run.  Take 'free downloads' for example.  BitTorrent just went over to the dark side with the amount of malware they now have in their downloads.  So when your buddy says “oh go download it, it's for free” just remember what your Mom told you.....Nothing in life is for free and everything comes with a price... in this case Malware that you didn't want but that you clicked 'yes' because you thought you were getting good stuff.

I think we need a lot more end user education...don't you?

Rule of patching - don't panic

When you reboot your server and forgot that you have the USB based harddrive turned on and the server is set to 'boot from usb' .... word of advice...don't panic when after patching your server it sits there looking at you ...and at the usb harddrive....looking for a functional operating system.

Keep in mind that in many of the newer servers can boot from USB...so any usb harddrive...usb thumb drive...usb... well just usb anything may cause you to have a moment of life flashing in front of your eyes until you realize what you have done.

Turn off the harddrive or the boot from usb functionality, reboot your server, log back in, review the event logs that all is well.  

In general, a good sign of a good patch experience are

  • Services all starting up [no 'at least one service failed to start notification is always a good sign']
  • Event viewer looking as normal as SBS can look [we normally trip on our toes a bit but this is normal]
  • Normal connectivity, email, etc.

So...don't forget...don't panic.

 

 

It's Friday Night and it's PATCH NIGHT!!

That's right boys and girls!  It's the Friday after Patch Tuesday and you know what that means?  It's Patch Night!

Let's see if we are ready to go....

  • We've tested the patches already on the home server and everything was fine.
  • We've rolled them out on a few machines here in the office just to make sure everything was okay
  • We've reviewed the 'traffic' from both the Patch Management listserve and the WSUS listserves for any issues [to sign up for either Patch listserve see the Patch Management.org page]
  • We've reviewed the Newsgroups for dead bodies [this is my nickname for when we come into the newsgroup and see a server/workstation having issues]
  • We know that any issue with a Security patch is a FREE CALL to Microsoft Product support
  • We have a good backup [several in fact]

Now since this is a heavy patch month if we want to be really paranoid we can reboot the server to ensure everything is fully functional [but I rebooted it on Wednesday night because I was messin' around with installing so I'm in good shape there, but if you are paranoid [who me?] I can reboot it before I patch.

Hey...with my Shavlik, I'm even patching for Adobe patches!....You do know about the security issues with Adobe don't you?

You should!  Remember that any software can [and quite possibly does] have security issues. 

"I don't need the whistles and bells"

At a client's today, and a consultant came in with a laptop.  A Windows 2000 laptop.  Reminded me of two recent blog posts...one by Mary Jo Foley about how Windows 2000 is still used in about 1/2 of the business desktops, and another by Dana on how 2000 was the greatest security failure.  In my own CPA geek listserves, I still have folks saying that they are running Windows 98 and I say to them, 98?  You know how I hate 98s... I have no event viewer to help you, no database of events, nothin... and yet some in my gang says “they don't need all the whistles and bells”

Guess you don't need security?  Firewall? 

I like to listen to geek stuff on the drive and I was listening to Gartner's Talking Technology on CDrom and an interesting topic was on the future of IT Pros.  They made the point that you couldn't just be good at tech, but also communication, project management.  That it wasn't enough to have the training, you had to combine it with a broader base.  [Course I do have to disclose that I lost a great deal of respect for the presenter when she said that 'you can send someone to get trained on Oracle or NT”....and I thought to myself... gawd I HOPE you aren't sending someone to get trained in NT at this point in time when the operating system isn't supported anymore, it actually lowers the security in your network, I hope you aren't ensuring that folks in your firm get BETTER at installing it]

Do you understand how much easier it is that I only patch one kind of server operating system and one kind of workstation?  I only patch one kind of Office suite?  I only have to watch issues with the latest operating systems?  That I know that Microsoft can be counted on to ensure that their security patches work fine on their flagship products and thus while I've already done the test roll out at home, I can roll them out, especially the Internet Explorer patch to the desktops pretty quickly.

Sorry but I want the whistles and bells.  I want the integration with Office and Sharepoint...the security....the firewall that turns my workstations into part of the security fabric of my network [which reminds me I need to do a follow up post on my 'gator' issue which wasn't really gator at all]

I need whistles and bells. Especially security ones.

P.S.  Remember the view of where this post is coming from...the owner of the business who saves time not having to patch and defend umpteen operating systems and applications.  I am the business owner here who realized the value in making 'my' life easier.  Your customer needs to see the light as well.  It's actually costing him or her money in keeping around old platforms that are harder to fix, protect and defend.

Oh MY GAWD, they can download anything to "insert usb device here"

You know when paranoia starts coming into SBSland that it's becoming mainstream.  A few days ago in the newsgroup somone asked how to block USB devices so that people wouldn't download massive amounts of data. 

While you can set policies to deny the use of USB devices like.....how to disable the use of USB storage devices and how to make them read only and other third party solutions, the reality is there are many many ways that folks can get data out of your network that you need to be worried about.

Show me a small firm and we probably have lousy internal controls on just about anything.  We probobly don't permission and ACL our directories worth a darn to start with, but just brainstorm just a bit to see if we can think of how to get data out of a firm in addition to using USB drives.

  • You can email it.  [Attachments you know]
  • You can upload it to a ftp or web site.
  • You can put it on an IPod
  • You can xerox it
  • You can use your camera phone and take picture of it
  • You can burn it to cdrom
  • You can put it on a memory stick from a camera
  • You can stick it in your boots and walk out the door with it

Bottom line... if you HAVEN'T been thinking about ways that people can easily take data from your firm.... you aren't thinking hard enough.

There are watches, writing pens and other instruments that hold usb thumb drives.  Heck there's even a thumb drive on a Swiss army knife these days.

Remember to ensure that you have the right to inspect employees in your security policy.

So just think about your data will you?  There are more ways than you think to remove it from your firm.

Patches today

 June 14, 2005
Today Microsoft released the following Security Bulletin(s).

Note:
www.microsoft.com/technet/security and www.microsoft.com/security
are authoritative in all matters concerning Microsoft Security
Bulletins! ANY e-mail, web board or newsgroup posting (including this
one) should be verified by visiting these sites for official
information. Microsoft never sends security or other updates as
attachments. These updates must be downloaded from the microsoft.com
download center or Windows Update. See the individual bulletins for
details.

Because some malicious messages attempt to masquerade as official
Microsoft security notices, it is recommended that you physically type
the URLs into your web browser and not click on the hyperlinks provided.

Bulletin Summary:

http://www.microsoft.com/technet/security/Bulletin/ms05-Jun.mspx

Critical Bulletins:

Cumulative Security Update for Internet Explorer (883939)
http://www.microsoft.com/technet/security/Bulletin/ms05-025.mspx 

Vulnerability in HTML Help Could Allow Remote Code Execution (896358)
http://www.microsoft.com/technet/security/Bulletin/ms05-026.mspx 

Vulnerability in Server Message Block Could Allow Remote Code Execution
(896422)
http://www.microsoft.com/technet/security/Bulletin/ms05-027.mspx

Important Bulletins:

Vulnerability in Web Client Service Could Allow Remote Code Execution
(896426)
http://www.microsoft.com/technet/security/Bulletin/ms05-028.mspx 

Vulnerability in Outlook Web Access for Exchange Server 5.5 Could Allow
Cross-Site Scripting Attacks (895179)
http://www.microsoft.com/technet/security/Bulletin/ms05-029.mspx

Cumulative Security Update in Outlook Express (897715)
http://www.microsoft.com/technet/security/Bulletin/ms05-018.mspx

Cumulative Security Update in Outlook Express (897715)
http://www.microsoft.com/technet/security/Bulletin/ms05-030.mspx

Vulnerability in Step-by-Step Interactive Training Could Allow Remote
Code Execution (898458)
http://www.microsoft.com/technet/security/Bulletin/ms05-031.mspx

Moderate Bulletins:

Vulnerability in Microsoft Agent Could Allow Spoofing (890046)
http://www.microsoft.com/technet/security/Bulletin/ms05-032.mspx 

Vulnerability in Telnet Client Could Allow Information Disclosure
(896428)
http://www.microsoft.com/technet/security/Bulletin/ms05-033.mspx 

Cumulative Security Update for ISA Server 2000 (899753)
http://www.microsoft.com/technet/security/Bulletin/ms05-034.mspx 

Re-Released Bulletins:

SQL Server Installation Process May Leave Passwords on System (Q263968)
http://www.microsoft.com/technet/security/Bulletin/ms02-032.mspx 

ASP.NET Path Validation Vulnerability (887219)
http://www.microsoft.com/technet/security/Bulletin/ms05-004.mspx  

Vulnerabilities in TCP/IP Could Allow
 Remote Code Execution and Denial of Service (893066):
http://www.microsoft.com/technet/security/Bulletin/MS05-019.mspx?pf=true

This represents our regularly scheduled monthly bulletin release (second
Tuesday of each month). Please note that Microsoft may release bulletins
out side of this schedule if we determine the need to do so.

If you have any questions regarding the patch or its implementation
after reading the above listed bulletin you should contact Product
Support Services in the United States at 1-866-PCSafety
(1-866-727-2338). International customers should contact their local
subsidiary.

[whoops had 05-029 and the rerelease was 05-019]

What's your Tape Drive.... uh I mean hard drive.... rotation schedule?

I just started using Hard drives as backup media and while I will still plan on getting my Quad Sony fixed, let me just say that I'm not having to rush to get it fixed.

Reminds me that someone was asking what kind of rotation schedule I was planning and Chad was chatting about how they spec out 3 USB harddrives with 3 times the capacity of the server they are backing up.  This allows them to keep about 5 days of backups on one hardrive [as things will compress about 1.5 times] or about three weeks of data rotating on and off the system.  They normally keep the quarter end or year end via some other means [burn to DVD or other backup....which is what I think my Sony Quad will turn into...the spare old archive method], and when the files and Exchange grow enough they change the backups to 4 per week and get another drive to put in the rotation.

To be exact I'm getting 1.42 compression on the operating system drive, 1.73 compression on the Exchange, 1.78 compression on the member server data.  Keep that in mind when planning your backup strategy.  It needs to ensure that the drive rotation is just good enough to be the right amount when you need to restore data.

P.S.  Remember what I said.... you do the rotation that fits you.. for me I'm taking it off...but certainly I'm not running into the office and taking the backups that run Friday, Saturday and Sunday night offsite so I have to plan for three to be on that harddrive.

Right now I took home Thursday nights which was the first backup on the new system. 

As I said, set the number of drives and size according to what you want to rotate around.  I can use the same Ultrabac software to do both backup to tape and to drive [well when the stupid thing works...remember I just started backing up to drive because my tape drive failed and I need to get it fixed and need to send off the unit]  Given the choice between no tape backup and a harddrive backup.. I think you see why I did this.

Where's the other ones when not in use?  In a locked safe in the office behind the locked door of the server room.   Along with all my tapes and magazines that are suddenly useless to me because my tape drive is unusable right now.  The concern over the physical security of those drives is no different than the physical security of my tapes in those tape drive magazines.

How do you verify an archive backup?  No different than a live one... restore a file.  99.999% of the time we do not need even a quarter old data...but it's there...just in case.  Have I ever gone back to restore from a year old, or quarter old tape?  Nope.  Never needed to.  Do I test it so at least it reads the header off of it... used to...can't right now....remember my tape drive doesn't work right now...and getting a bunch of harddrives is a heck of a lot cheaper than a new Quad Sony, that's for sure.

 

Where should WSUS be installed?

From the newsgroup comes the question “Where should WSUS, the patch tool be installed?”

And it's perfectally fine and supported “on” the SBS 2003 server.  While it “can” be on a member server, it can't be on the desktop like my Shavlik HfnetchPro is.  [By the way ... I've lost my argument against Firefox on my desktops because Shavlik DOES now patch for Firefox], and I will still argue that Shavlik hands down is soooooooo much easier to set up, the fact is, bottom line, GET SOMETHING TO PATCH YOUR NETWORK WITH.

Yesterday I went to a friend's house and I put them on Microsoft Update and patched their unpatched Office XP.  Next Tuesday, not only will they get Windows patches, but any Office ones as well.

For us SBS boxes, even if you don't WSUS in your firm AT LEAST send your folks this link:  http://update.microsoft.com/microsoftupdate and have them do the opt in process.  Do it on your SBS servers.  At this time it will NOT download SBS 2003 sp1 [and especially not for premium folks as you need the cdroms], but at least it will be giving you more patches for that SBS box than we've had before.

At TechEd in Orlando, someone posted in the list of top ten ways to get your network in trouble, as presented by Dr. Jesper Johansson and Steve Riley that's in the back of their new book.  I'm stealing the list too:

1.  Don't patch anything.
2.  Run unhardened applications
3.  Use one admin account, everywhere (you should be using different admin accounts for every machine)
4.  Open lots of holes in your firewall
5.  Allow unrestricted internal traffic
6. Allow all outbound traffic
7. Don't harden servers
8. Re-use your passwords
9. Use high-level service accounts in multiple places
10. Assume everything is OK 
 
See that number 1?  That's what WSUS and Microsoft Update are all about.
 
The biggest issue with adding WSUS to SBS is setting the group policy to http://servername:8530
 
So?
 
You ready for Tuesday?
 
 

Law # 6 -- What can a domain administrator do?

This question came up in the newsgroup of an owner that was concerned that if the computers were left on at night that someone could 'break into them' if they knew the administrator passwords and do nasty stuff.... and well... while the probability of some blue haired hacker wanting to break into a SBS box might be a bit lower than 100%, the reality is that knowing the Administrator password... the DOMAIN adminstrator password means you have quite a lot of power.

So what can you do with the domain administrator password on a system?

Well for one you can reset all the passwords for all the users so no one can get in.

You can delete folders, files, logs, ..... just about anything...and what a coincidence... we are now up to Law number 6 in the 10 laws of security...how fortunate that it just happens to fit today's post topic:

Law #6: A computer is only as secure as the administrator is trustworthy

Every computer must have an administrator: someone who can install software, configure the operating system, add and manage user accounts, establish security policies, and handle all the other management tasks associated with keeping a computer up and running. By definition, these tasks require that he have control over the computer. This puts the administrator in a position of unequalled power. An untrustworthy administrator can negate every other security measure you've taken. He can change the permissions on the computer, modify the system security policies, install malicious software, add bogus users, or do any of a million other things. He can subvert virtually any protective measure in the operating system, because he controls it. Worst of all, he can cover his tracks. If you have an untrustworthy administrator, you have absolutely no security.

When hiring a system administrator, recognize the position of trust that administrators occupy, and only hire people who warrant that trust. Call his references, and ask them about his previous work record, especially with regard to any security incidents at previous employers. If appropriate for your organization, you may also consider taking a step that banks and other security-conscious companies do, and require that your administrators pass a complete background check at hiring time, and at periodic intervals afterward. Whatever criteria you select, apply them across the board. Don't give anyone administrative privileges on your network unless they've been vetted – and this includes temporary employees and contractors, too.

Next, take steps to help keep honest people honest. Use sign-in/sign-out sheets to track who's been in the server room. (You do have a server room with a locked door, right? If not, re-read Law #3). Implement a "two person" rule when installing or upgrading software. Diversify management tasks as much as possible, as a way of minimizing how much power any one administrator has. Also, don't use the Administrator account—instead, give each administrator a separate account with administrative privileges, so you can tell who's doing what. Finally, consider taking steps to make it more difficult for a rogue administrator to cover his tracks. For instance, store audit data on write-only media, or house System A's audit data on System B, and make sure that the two systems have different administrators. The more accountable your administrators are, the less likely you are to have problems.

That's right boys and girls... if you can't trust your Domain Administrator...bottom line you are screwed.  The Domain admin is the post powerful being on your network and especially so in SBSland where we typically are like small businesses where we don't separate out accounting and bookkeeping duties as well.  There are few checks and balances to ensure that duties are separated and reviewed.  Thus is it vitally important that the password for that Domain Administrator account be treated like it it's on a 'need to know basis'.

It does not need to be on a post it note under the keyboard, or stuck to the monitor.

It can be written down, it should be complex, it should be longer than 8 characters...but remember... if you have multiple people knowing this account, you've lost accountability to know who did what when.

Just remember the Domain admin is the most powerful person in your network.  Be sure you trust that person.

Who has your keys?

Yesterday we got new keys for the front door at the office.  And keys are like passwords, aren't they?  If you don't know who you've given the keys out to, you have no idea who has access.  The same is true for computers and routers and firewalls and ..well whatever.  If your software vendor must have an administrator account to work on your system, he's got the keys to your kingdom.

If you can't remember the password to your firewall, the kind people at Phonelit have provided a database of the default passwords of many hardware devices.  You may get lucky and your router still has the same password.  [You get the idea that you should quickly change the default password of your device if it IS on this list, don't you?]

For computers and other devices, remember the rule of physical security.  If we have access to it, we can reset it.

And while you can and should write down passwords to ensure you pick better, stronger ones.....just don't put them on a whiteboard in a room and then take a picture of them... probably not too good of an idea.....

Hmmm.... I don't think that's a BBQ....

So I'm driving home last night with the sunroof open and start smelling a really strong barbeque like smell.  Geeze... whatever they are BBQing with is pungent wood? As I keep on driving I notice that the BBQ smell isn't going away...in fact it's getting stronger...to the point where it's no longer a BBQ smell but more like a ...uh....oh...something has happened.

So I turn down a street to come home and realize that the left side of the street in front of me is filled with police and fire engines and the road is so smoky that we're all slowing down as it's almost a tule fog.  As I drive by the scene of the burning house [yes the occupants are just fine and got out safely as I heard on the news later that night], the thought flashes through my brain...what if that was MY house.  What would I grab first to save from the flames.  It was obvious that the house was going to be a total disaster as the house was totally engulfed in flames

Well first and foremost...after I'd grab my Sister and my Dog [and not necessarily in that order], what would you grab?

Computer?  Do you backup your home computers like you do your office? 

Do you have papers and documents that aren't in a lockbox but are still important in one spot?  Would you know who to call and what to do? Insurance policies? 

Family photos?  Nowdays many of our treasured irreplaceable family photos are on ...yup...harddrives.  Where's that backup? 

The CALCPA did a Disaster recovery planning document a bit back as well as put together a page with Disaster Recovery resources.

Review this list of items to best prevent fires and think about what you'd grab at your house.  How prepared are you?  We probably all should be a smidge more paranoid ...and not just about computer security.

P.S.  Bill makes a fab point in the comments... I'm worried about things...meanwhile I'm putting my life at risk.  Get the Dog and Sister outta there.  Forget the rest.

WSUS the really big news - revisited

Remember how Fred gave us the heads up about the REALLY BIG news on WSUS?

Here's the scoop.... if you remote into your client's server and approve the patches there, you do not need a Service Partner Agreement SPLA in place which can be had with a Hoster application and a Registered partner status.  If you want to HOST the patch console at your location, you'll need this SPLA agreement.

Either way, I would STRONGLY advise that you have a Maintainence Provider service contract in place before you offer this service.  It's extremely important that you understand that when you perform the patching YOU are accepting the EULAs on behalf of your client.  You are their agent.  Thus I would strongly recommend that you ensure that this “managed service' that you provide on patching, also includes the approrpriate legalese.

I'm not sure I would recommend taking on the duties of patch testing either.  Remember that Microsoft has a patch testing process and historically speaking Microsoft products work just fine with Microsoft patches.  When we have issues it's with the third party stuff.  So providing a 'patch testing' service to your clients may be a lot harder than you think.  There are licensing issues to think about....can you properly, legally, license a copy of the software to run in your test lab... for example... I can't give anyone else a copy of some of my line of business applications, they have to stay here inside the firm.  Then I would argue that you as the consultant cannot test like my users test programs for interaction and issues.

Patch testing doesn't take as long for me anymore, but I still manage the testing process.  Sometimes I look out for certain patches because I've had issues with particular files being patched in the past.  Sometimes I found out about issues from www.patchmanagement.org.  The bottom line, is that I feel if you want to offer a 'patch testing' service to your clients, just testing Office and Windows patch interaction in a virtual network is not, in my humble opinion, the smart way to test.  You are probably reinventing the wheel a bit there.  Test on out of life cycle products [or better yet...get RID of out of lifecycle products], but don't test on the 'flag ship' products, test the ones that are not the leading edge ones....or better yet...just make sure you have good backups/images and patch.  When you have a good backup... you can recover quite quickly should anything really bad happens..not that much does anyway these days.

Security Patches next week

As part of the monthly security bulletin release cycle, Microsoft
provides advance notification to our customers on the number of new
security updates being released, the products affected, the aggregate
maximum severity and information about detection tools relevant to the
update. This is intended to help our customers plan for the deployment
of these security updates more effectively.

In addition, to help customers prioritize monthly security updates with
any non-security updates released on Microsoft Update, Windows Update,
Windows Server Update Services and Software Update Services on the same
day as the monthly security bulletins, we also provide:
 - Information about the release of updated versions of the Microsoft
Windows Malicious Software Removal Tool.
 - Information about the release of NON-SECURITY, High Priority updates
on Microsoft Update (MU), Windows Update (WU), Windows Server Update
Services (WSUS) and Software Update Services (SUS). Note that this
information will pertain ONLY to updates on Windows Update and only
about High Priority, non-security updates being released on the same day
as security updates. Information will NOT be provided about Non-security
updates released on other days.

On 14 June 2005 the Microsoft Security Response Center is planning to
release:

Security Updates

 - 7 Microsoft Security Bulletins affecting Microsoft Windows. The
greatest aggregate, maximum severity rating for these security updates
is Critical. Some of these updates will require a restart. 5 of these
updates will be detectable using the Microsoft Baseline Security
Analyzer (MBSA), 2 of these updates will be detectable using the
Enterprise Scanning Tool (EST).

 - 1 Microsoft Security Bulletin affecting Microsoft Windows and
Microsoft Services for UNIX. The greatest aggregate, maximum severity
rating for these security updates is Moderate. These updates may require
a restart. These updates will be detectable using the Microsoft Baseline
Security Analyzer (MBSA) and using the Enterprise Scanning Tool (EST).

 - 1 Microsoft Security Bulletin affecting Microsoft Exchange. The
greatest aggregate, maximum severity rating for this security update is
Important. This update will not require a restart. This update will be
detectable using the Microsoft Baseline Security Analyzer (MBSA) and
using the Enterprise Scanning Tool (EST).

 - 1 Microsoft Security Bulletin affecting Microsoft Internet Security
and Acceleration (ISA) Server and Small Business Server. The greatest
aggregate, maximum severity rating for these security updates is
Moderate. These updates may require a restart. This update will be
detectable using the Enterprise Scanning Tool (EST).

Microsoft Windows Malicious Software Removal Tool

 - Microsoft will release an updated version of the Microsoft Windows
Malicious Software Removal Tool on Windows Update, Microsoft Update,
Windows Server Update Services and the Download Center. 
Note that this tool will NOT be distributed using Software Update
Services (SUS).

Non-security High Priority updates on MU, WU, WSUS and SUS

 - Microsoft will NOT release any NON-SECURITY High-Priority Updates for
Windows on Microsoft Update (MU), Windows Update (WU), Windows Server
Update Services (WSUS) and Software Update Services (SUS).

Although we do not anticipate any changes, the number of bulletins,
products affected, restart information and severities are subject to
change until released. 

Microsoft will host a webcast next week to address customer questions on
these bulletins. For more information on this webcast please see below:
 - TechNet Webcast: Information about Microsoft's June Security
Bulletins (Level 100)   
 - Wednesday, June 15, 2005 11:00 AM (GMT-08:00) Pacific Time (US &
Canada) 
 -
At this time no additional information on these bulletins such as
details regarding severity or details regarding the vulnerability will
be made available until 14 June 2005.

Thank you,
Microsoft PSS Security Team

Did we forget about Microsoft update?

In all the fun over WSUS, don't forget that another patch tool shipped this week... Microsoft Update

Instead of WUing ...you can now MU.

This was posted on the patchmanagement.org listserve:

Just go to http://update.microsoft.com/microsoftupdate and complete the
short opt-in process. You may need to update your client binaries, but
that doesn’t require any restart. Once you scan for updates, if you
haven’t installed the latest MSI 3.1 update or the latest BITS 2.0
update, you have to install those before you will be offered any other
updates.

If you want to go to the new V6 Windows Update site instead, the URL is
http://update.microsoft.com

Is WSUS supported on SBS 2003?

From the mailbag today comes the question....

Is WSUS supported on SBS 2003?  Was it tested by SBSers?

Heck yes.  We were specifically invited on the beta as a matter of fact.  Now keep in mind one issue that I personally had was that I had to add manual group entries on the clients to get it to 'wake up' and talk to the server and put in http://nameoftheserver:8530 to get the clients to 'check in' with the SBS/WSUS system.

But most definitely you can count on WSUS being SBS approved.

WSUS for the Var/Vap - the REALLY big news about WUS for Partners

Fred Pullen [yes, the TS2/SBSer Presenter Fred Pullen] has a blog entry about how the Var/Vap can provide WSUS services to their clientele:

Fred Pullen's Blog :: Partners & Patching & WSUS, Oh My!:
http://blog.fred.pullen.com/blog/_archives/2005/6/7/918069.html

VAPs/SPs must have a SPLA license
in order to provide approval of content delivery using Windows Server Update Services, as this is using a component of Windows in a hosted environment.

Now what is clear from this is that if you plan to be the offficial WSUSer for your clientele, ensure you have a service agreement in place.  You are clicking on EULAs on behalf of your client so you'll need to ensure that first and foremost the “i's“ are dotted and the “t's“ are crossed to ensure that you aren't giving an Attorney somewhere a heart attack.  And honestly, you should have a service agreement in place anyway.  That's just good business practices.

Oh and if you aren't a Microsoft partner?  Not even a mere registered Microsoft partner?  The foundational level of the Microsoft partner program that is a free sign up?  Why ever not?  See the benefits of being in touch with the community does for you?

<Hang tight...we're getting a clarification on this as you may not need the SLA agreement if you remote into the client to approve patches as as opposed to where you 'host' the approval console...stay tuned... more news later.  It still appears that you need to be a registered partner, which, in my NOT so humble opinion is what any consultant that touches SBSers should be anyway>

 

How do I open up ports for....

Today I got pinged to ask how to open up ports in the firewall, to which I gave the SBSer practically the third degree.  Why?  Because you anytime a vendor tells you “I need this port open” you need to stop and begin to think about a risk analysis.

First off you need to ask.. 'which way do I need the traffic to connect?'  If you are the originator of the traffic and you need to go do/get something at another computer, you don't typically need to open up a thing.  In a SBS 2003 network with a pop connector in/SMTP outbound setup, you actually do not need neither port 110, nor port 25 open at all.  The Pop connector will start the outbound connection and pull in the email, and the SMTP server will forward out the email with no issues.  It only when you... Mr. SBS Server... need to have something from the outside come inside is when you need to open something up.

The case in point was a fellow Accountant who needed to use PCAnywhere to remote 'into' a client's system.  So when I gave him the third degree, I asked him “what ports do you need open”.  The minute he said 5631-5632 I just KNEW it was PcAnywhere. But since typcially an accountant would be attaching TO another computer, he didn't have to open anything.  5631-5632 needs to be open on the machine you want to control.

Assuming the box on the other side was a SBS network, [which I should stop this post right here and tell you if you are PcAnywhere-ing INTO a SBS network why in the world are you not using Remote Web Workplace and if it's your old fashioned accountant who is asking for PCAnywhere access, tell them they need to get into the technology of today and tell them how cool RWW is]

Now then...where was I... oh yes... IF you needed to open up the PCAnywhere ports on someone insane enough to have a network that does not include SBS 2003, you would first check to see what they had between you and that desktop you needed to control.  If there is a router inbetween you and the two nic SBS, you need to 'forward' the ports to the internal NIC of the SBS, and THEN forward 'those' ports to the IP address inside the network.  For Standard, you open up the Routing and Remote Access program and add your ports there.  For ISA...well let's just say I'm still learning ISA 2004..it's in there somewhere.  I'll ask Amy :-)

Remember ONLY open up those ports that you absolutely must for business purposes.  Keep anything else closed and go to www.grc.com and us the Shields up test what others see about your network.  If you have a router between you and your SBS box, what ports MUST be open OR forwarded to the SBS box at a bare minimum?

  • If full SMTP email - port 25
  • If Remote Web workplace - port 443 [SSL port]
  • If Remote Web workplace - port 4125 [control port]
  • If you want Sharepoint open externally - port 444

That's really the bare minimum ports that need to be forwarded from the router.  VPN access to the box needs gre 47 protocol [this is not a port -- normally a PPTP passthrough setting will set this], and 1723 port, and Terminal server access for the admin needs 3389, but techically speaking you don't need TS nor VPN open if you don't want to.

Just don't forget to run the Connect to Internet wizard on the server to open up what you need on the inside, and then do the necessary port forwarding on the outside.

Read any good audit logs lately?


This guide is designed to help organizations plan a security monitoring and attack detection system based on Windows Security Event logs. It highlights how to interpret the events and which events indicate the possibility that an attack is in progress.

FINALLY!

It's not on the web yet, but the word from the WSUS Wiki is that WSUS 'rtm'd'

wsus - Status of WSUS Product:
http://www.wsuswiki.com/WSUSProjectStatus

It's about time folks.

 

Can't be at TechEd?

Can't be at TechEd, Microsoft's geek fest?  Order the DVDs for US$195 or watch the live webcasts.  Hmmm..... I'm not sure I'm willing to get up at 6 a.m. for Steve though.

Ordered!

Microwave Potatoes

Me being the insane person that I am can see security issues in everything... so I'm in the grocery store yesterday and Dole is selling Microwave ready russet potatoes.  Already shrinked wrapped, prewashed potatoes that all you need to do is peel off the label and stick in the microwave and nuke.... and I'm thinking to myself.. okay folks... how HARD can it be to microwave a potato?  I mean like how detailed of instructions do you need?

Take potato... stick under faucet, wash, wrap in plastic... I mean do we have such a society these days that we have to have pre-prepared potatos because the end consumers of potatoes don't have enough grey matter to handle water and nuking them? 

Out in my SBS newsgroups there are some folks that are looking at the OneCare offering as big bad monopolistic Microsoft to come into the small biz space and take over.  I say that it will free us up from cleaning up the messes and instead solve real problems.  Right now my CPA gang in SBSland want to know better how to use Outlook and Exchange.. I think they'd rather be paying the business consultants for how to's in email managment than cleaning up about.blank.

Me, I'm glad I can be Tuesday morning quarterback, because I wouldn't want to be in Microsoft's shoes.  They need to get 'potatoes" out fast enough to satisfy the larger admins, but then there's those folks that need a prewashed potato because they have no admin to keep their computers safe.

Are we sane?

Listening to a security mp3 on the flight home and Eric Cole was talking about patching.  And he says the more critical the box is, the less services you want to run on it.  And yet, what do we do in SBSland, we put everything in one spot.  Is it no wonder that when we have a big service pack it’s like painting a big fat target on our boxes and wondering why some of us who have customized our boxes have had issues? 

 

If at all possible…break a system down into core functionality, he says.. and what do we do?  We put EVERYTHING on one spot.  When we patch, we risk it all.  We put all our cards on the table and roll the dice.  While we argue that there are single points of failure everywhere [case in point, the single point of failure on this laptop is the fact that it's dependent on the one battery], and while I would argue that for 99.99% of the time we are just fine, it's that one time that you are analyzing the risk of change.

 

Putting a patch on a system could de-stablize it.  And yet every month we risk de-stablization of the box, don't we with our patching?

 

Less services that are running, the less things you have to patch, says Eric.  Is is any wonder then, that the service pack we have is what it is?  Big.

 

I'm still not convinced that we are too much insane down here in SBSland, as I'm still willing to accept risk because the benefits of SBSland are still too great, as in our ease of wizards, our community and support we have.  But conversely, as in my fellow CPA was complaining about, he's being pushed by the line of business applications that he has that push him to have about 10 servers for about 25 employees. 

 

Maybe we're just a tad insane for putting what we do all on one box, and maybe we need to do more virtualization in the future, but I'd argue that our vendors are just as insane for pushing to have their own separate box. 

 

Maybe there's a happy medium out there?

 

Oh and Eric says.... Rebooting isn’t that bad… on the Unix platform if you don’t reboot soon after, and later there is an issue, you’ll never identify that patch you did with the issue.  Thus rebooting after a patch is a way to ensure you've identified a cause for any effect due to patching.

 

Something to think about anyway about that argument against rebooting.

The eggshell

There are times when us SBSers are like cockroaches...we are just EVERYWHERE.  So I'm listening to geek webcasts  which are way more useful than talk radio anyway and someone in the audience chides Steve Riley [and SBS for that matter] for default loading the client desktop into local administrator.  Wizard, wizard, click click and there you are as local admin.  And while... I guess you can beat up SBS for that... I'll show you my stupid line of business applications that force me into local administrator whether I like it or not.  I would argue at this time, the average small business is not ready for running without administrator rights without a lot of guidance from a savvy IT consultant.  

In the meantime, as consultants, as consumers of software, we need to seriously start yelling our heads off each time an application we use won't run with restricted user rights. 

I do need to correct Mr. Riley for one point he made, the default is INDEED to have SBS 2003 'enable' the XP sp2 firewall on the local machines and this helps our machines join with the ISA 2004 server in a 'fortress' inside the network as well as the outside firewall. 

Now many have asked ...”why do I need a firewall on the inside of the firm when I already have __fill_in_the_blank___ firewall on the outside?  I'm protected just fine from the bad stuff out there.

Ah..but that's the problem.  The bad stuff isn't just out there anymore..it's in here.  In the wintertime, when you know you will go out into subzero degree temperature [not that I know what that is living in California as I do, but I can imagine], I don't think you just put on a parka and nothing else.  No it's the silk longjohns and then it's the leggings, and then the parka, and then the hat, and the scarf and even feet and hand warmers if need be.  It's layers to protect you.

Okay so let's move over to that workstation in your office.  Without the firewall helping it to protect itself, it's just sitting there all ooooshy and gooshy just waiting to talk to anyone and everyone wanting to to talk to it.  Our networks have been built up like eggshells, with hard outer protection and nothing on the inside at all.  And we can't do it that way anymore.  It's not working.  And I can stand here and tell you that I have the firewalls on the inside of my network and I do not notice any annoyance at all.

Try it with the layers left on.  Add your own program exceptions.  But try it.  You might find like I do, it's no bother at all. 

 

Microsoft security advisory for TCP/IP

This alert is to notify you of the release of Microsoft Security
Advisory (899480).

Microsoft is aware of a new vulnerability report affecting TCP/IP, a
network component of Microsoft Windows.

Microsoft is not aware of any attacks attempting to use the reported
vulnerability and have no reports of customer impact at this time.

Changes made during the development of Windows XP Service Pack 2,
Windows Server 2003 Service Pack 1, and the MS05-019 security update
eliminated this vulnerability.
If you have installed any of these updates, these updates already help
protect you from this vulnerability and no additional action is
required.

Because this vulnerability does not reproduce on systems that are fully
updated, no additional security update is required; therefore, it would
not be appropriate to update the previously released security bulletin.

This Microsoft Security Advisory is located at this location:
http://www.microsoft.com/technet/security/advisory/899480.mspx
Microsoft Security Advisories are located at this location:
http://www.microsoft.com/technet/security/advisory/default.mspx
If you have any questions regarding this alert please contact your
Technical Account Manager or Application Development Consultant.

Thank you,
Microsoft PSS Security Team


Bottom line..if you have Window Updated... no worries.


 

Can't be at TechEd? Got an Internet connection?

Kewlamundo!!!!  While I can't be at TechEd in Orlando this year, I do have the ability to see some of the sessions right from my own computer!

Let's see there's Dr. Jesper Johansson and the Security Configuration Wizard...there's Steve Riley on Security Policies.....there's Mark Russinovich on Malware.... there's Corey Hynes on WSUS [still Shavlik is wayyyyyyyyyyyyyyyyyy easier] ... oh be still my beating heart!!!

Aaron Margosis on tricks to running Windows with least privilege!!!

I've died and gone to heaven.  The rest of the TechEd Simulcasts are here but ... as you can tell... I'm kind of partial to the security based ones.

Security Configuration Wizard is cool...but...

Amy reminds us that the SCW is really cool, but SBS is pretty tweaked as it is all by itself, so you really don't want to run it on your system.

What you CAN do to harden your system is to KILL OFF ANY REMAINING WINDOWS 98 YOU MAY HAVE ON THE FACE OF THE PLANET.

.... okay now that I've gotten that out of my system...just a reminder too that as of June 30, you'll need to be on Windows 2000 sp4.  So if you have any vendors that won't support SP4.... you might want to have a nice heart to heart with them....and ...oh... consider a new vendor maybe?

Sprechen Sie Deutsches?

Wenn Sie eine Menge deutsche email heute erhalten haben, nicht sicher, wenn sie am Sober.Q liegt, das varient ist, oder nicht aber geben Sie acht.  Vor einige Plätze blockieren Reißverschlußakten [ mich habe einer langen Zeit ]

Which means....[well hopefully it means courtesy of Google translations]

If you've been getting a lot of German emails today, not sure if it's due to the Sober.Q varient or not but be careful.  Some places are blocking zip files [I have a long time ago]

Incidents.org is reporting this along with fellow Internet-ers.  Remember that SBS has the ability to natively block attachments EVEN WITHOUT your antivirus.  Remember if you don't need the file..block it.  And yes, it does appear to be due to the Sober.Q varient.

And hey Sean?  Another RSS feed for Viruses from Kaspersky!

Restricting Remote Web Workplace

Want a little extra security for Remote Web Workplace?  From the mailbag today comes the question ”Can you please advise whether there is any way of blocking access to certain SBS 2003 Users for RWW?“ and the answer is... sure... what do you want to block?

First off, there are tweaks you can do to block certain options inside Remote Web Workplace... don't want to offer to map drives?  Chad has the information to adjust that off.

You are probably looking for this tweak that you can block who has access to RWW.

Add this regkey to exclude certain workstations from showing up on the RWW.

hklm\software\microsoft\SmallBusinessServer\RemoteUserPortal\ExcludeList

The regkey is a string and it consists of a comma delimited list of
computers you want excluded.

Example:
joecomp1,janecomp1,jackcomp1

Finally, want to totally remove the links [which I wouldn't recommend...but...

For administrator:
1. Open Registry Editor.
2. Navigate to
HKLM\Software\Microsoft\SmallB­usinessServer\RemoteUserPortal­\AdminLinks.
3. In the right pane:
Set ServerTS=0 to prevent Access Server Desktops
Set ClientTS=0 to prevent Access Client Desktops

For users:
1. Open Registry Editor.
2. Navigate to
HKLM\Software\Microsoft\SmallB­usinessServer\RemoteUserPortal­\KWLinks.
3. In the right pane:
Set TS=0 to prevent Access my computer at work
Set AppTS=0 to prevent Access my company's application-sharing server

[Note] If you run CEICW again after configure the registry, the original
settings will be restored. Then, you must configure the settings again.

Shavlik made me vaklempt

Got an email saying that Shavlik updated their XML for patches on Friday and buried in the updates are.... sniff..sniff... SBS ones are included now...  I just pinged Shavlik to update from the version 4 to version 5... kewlamundo!


 

Shavlik Technologies has released updated XML files for Shavlik HFNetChkPro 5.

 

XML data version = 1.1.2.440  Last modified on 5/13/2005

 

This update includes the following changes:

 

Added 13 new non security patches to the WUScan XML file.  These patches can be scanned and deployed using the WUScan template in Shavlik HFNetChkPro 5 and Shavlik NetChk Patch.  Alternatively, you may create a custom scan template and choose 'Non-security Patches' from the PatchTypes tab.

 

Added the following:

MSWU-004

MSWU-005

MSWU-006

MSWU-008

MSWU-009

MSWU-010

MSWU-011

MSWU-012

MSWU-013

MSWU-014

MSWU-015

MSWU-016

MSWU-017

(there is no MSWU-007 at this time)

 

Details of all 16 MSWU patches listed below:

 

MSWU-001 892313

Updates for Windows Media Player 9 Series and for Windows Media Player 10

Applies to: WMP9 and WMP10

In certain situations, certain types of Windows Media Digital Rights Management (WMDRM)-protected content may cause Windows Media Player to redirect a user to a Web page to acquire a license without prior warning. This redirect may occur even if a user has cleared the Acquire licenses automatically for protected content check box on the Privacy tab of the Options dialog box.

 

MSWU-002 842773

BITS 2.0 and WinHTTP 5.1

Applies to: Win2K, XP, WS03, SBS03

An update package that includes BITS 2.0 and WinHTTP 5.1 is now available for Microsoft Windows Server 2003, for Microsoft Windows XP, and for Microsoft Windows 2000. This package updates BITS to version 2.0 and updates WinHTTP 5.1. These updates help guarantee an optimal download experience when you use future versions of the Automatic Update service, of Microsoft Windows Update, and of other programs that rely on BITS to transfer files by using idle network bandwidth.

 

MSWU-003 893803

Windows Installer 3.1

Applies to: Win2K, XP, WS03, SBS03

(Microsoft has removed this patch from their download center.  When Microsoft has updated this patch, we will update our XML files to include this file for download.

 

MSWU-004 884020

Update for Windows XP Service Pack 2 (KB884020)

Applies to: XP SP2

On a computer that is running Microsoft Windows XP with Service Pack 2 (SP2), programs that connect to IP addresses that are in the loopback address range may not work as you expect. For example, you may receive an error message that says that you cannot establish a connection. This problem occurs if the program connects to a loopback address other than 127.0.0.1. Windows XP Service Pack 2 (SP2) prevents connections to all IP addresses that are in the loopback address range except for 127.0.0.1.

 

MSWU-005 886185

Critical Update for Windows Firewall 'My Network (subnet) only' scoping in Windows XP Service Pack 2

Applies to: XP SP2

After you set up Windows Firewall in Microsoft Windows XP Service Pack 2 (SP2), you may discover that anyone on the Internet can access resources on your computer when you use a dial-up connection to connect to the Internet. For example, after creating an exception in Windows Firewall for File and Printer Sharing, you may discover that anyone can access shared files and printers.

 

MSWU-006

Wi-Fi Protected Access 2 (WPA2)/Wireless Provisioning Services Information Element update for Windows XP Service Pack 2

Applies to: XP SP2

The Wi-Fi Protected Access 2 (WPA2)/Wireless Provisioning Services Information Element (WPS IE) Update for computers that are running Microsoft Windows XP with Service Pack 2 (SP2) is available. This update enhances the Windows XP wireless client software with support for the new Wi-Fi Alliance certification for wireless security. The update also makes it easier to connect to secure public spaces that are equipped with wireless Internet access. These locations are otherwise known as Wi-Fi hotspots.

 

MSWU-008 887222

RPC Filter Update for Windows Server 2003 Service Pack 1

Applies to: ISA 2000 SP2 (will install on both Win2K and WS03 ISA SP2 systems)

Windows Server 2003 Service Pack 1 makes significant changes to the Remote Procedure Call (RPC) service with the addition of registry keys, including the ability to enable users to modify the behavior of all RPC interfaces on the system, and eliminate remote anonymous access to RPC interfaces on the system (with some exceptions). New RPC features are not supported by ISA Server’s RPC filter and such RPC traffic fails through ISA Server. This update fixes these RPC issues in ISA Server 2000.

 

MSWU-009 887742

You receive the Stop error "Stop 0x05" in Windows XP Service Pack 2

Applies to: XP SP2

A computer that is running Microsoft Windows XP Service Pack 2 (SP2) unexpectedly stops with the error message 'Stop 0x05 (INVALID_PROCESS_ATTACH_ATTEMPT) '.

 

MSWU-010 826942

Update for Microsoft Windows XP: KB826942

Applies to: XP SP1

This update provides support for Wireless Protected Access, a new standards-based wireless security solution developed by the Wi-Fi Alliance. WPA is intended to replace the existing Wired Equivalent Privacy (WEP) standard, offering much more robust methods of encryption and authentication and resulting in a new level of protection for customers taking advantage of the wireless features of Windows XP.

 

MSWU-011 885222

Update for Windows XP (KB885222)

Applies to: XP SP2

After you install Windows XP Service Pack 2, some 1394 devices (such as digital cameras that use S400 speed) may not perform as expected. Install this update to help prevent this issue.

 

MSWU-012 872769

Update for Windows Small Business Server 2003: KB 872769

Applies to: SBS03

By default, the Windows Firewall, that Windows XP Service Pack 2 (SP2) includes, is disabled by a Group Policy setting in all Windows Small Business Server 2003 networks. To enable the Windows Firewall on computers running Windows XP SP2, install this QFE on the computer running Windows Small Business Server 2003.

(this patch cannot be uninstalled)

 

MSWU-013 832880

Critical Update for Windows Small Business Server 2003 (KB832880)

Applies to: SBS03

This critical update corrects the issue 'Installation of intranet component and browsing to http://companyweb fail in Windows Small Business Server 2003' (KB 832880). Installations and upgrades performed after November 24, 2003 may be affected by this issue.

 

MSWU-014 835734

Update for Windows Small Business Server 2003: KB 835734

Applies to: SBS03

There is a problem with how the POP3 connector processes certain messages downloaded from a POP3 server. This problem could result in the POP3 connector accidentally re-sending certain messages to recipients who are not part of the SBS server e-mail domain. This may happen only in the cases where the POP3 connector is used to download mail from an external POP account. Customers using Exchange to host their mail internally will not experience this problem. This update resolves this issue. All SBS customers are encouraged to install this update.

 

MSWU-015 833992

Hotfix for Windows Small Business Server 2003: KB 833992

Applies to: SBS03

This download address a particular way mail downloads can fail when using the POP3 connector in Small Business Server 2003. This issue causes the process IMBDOWNL.EXE to be hung with the CPU utilization at 25, 50 or 100%. A warning with event ID 1067 will be recorded by the POP3 server in the event log when this error occurs.

 

MSWU-016 842933

String Truncation Error Message When Editing GPOs: KB842933

Applies to: Win2K, XP, WS03, SBS03

When you try to modify or to view Group Policy objects (GPOs) on a computer that is running Microsoft Windows Server 2003, Microsoft Windows XP Professional with Service Pack 1 (SP1), or Microsoft Windows 2000, you may receive an error message that is similar to the following: The following entry in the [strings] section is too long and has been truncated. Some text may be displayed after this error message, and this text varies in different scenarios. Additionally, if you click OK in the error message window, a similar error message may be repeated. Each error message that is repeated has different text that is displayed after the error message.

 

MSWU-017 831664

Windows Small Business Server 2003: KB 831664

Applies to: SBS03

When you configure a backup by using the Server Management console in Microsoft Windows Small Business Server (SBS) 2003, the backup operation may be unsuccessful, and you may receive the following error message in the backup log when the backup starts: The requested media failed to mount. The operation was aborted. The backup destination may also be set to "miniQIC" instead of to the actual tape drive, and you may not be able to change this selection.

 

 

- The Shavlik XML Team

 

The password is......

True Story.

Private school recently implemented/installed new computers and gave them passwords for security so only those authorized Teachers could get into the computers.  In the Auditorium/Cafeteria there is a computer attached to a projector and one of the Teachers needed to get into the system and said to the Principal, “hey I need to get into this system

There in the filled Auditorium/Cafeteria with children in the room... the Principal loudly said across the room for all to hear....

The password is .....”

And now everyone in the room knew the password.

So simple really... it's something that should be private.  And yet so quickly it's lost it's value.  Once it's known by all, it's auditability, it's accountability, all of it's value is gone.

Passwords are a foundation of our Computer security and yet just today...when I asked someone to think of a password for an online research site, he hemmed and hawed and couldn't think of a solid password.  You know we keep saying that our Software vendors need to learn secure coding techniques...maybe WE need to go to “password” classes.

Eric's blog the other day had a story about passwords and security and how little it was valued.

Passwords 101.  In my mind we can't teach it soon enough...to all of us out here.

Law # 4.... only let in ....what you trust

Law #4: If you allow a bad guy to upload programs to your website, it's not your website any more

This is basically Law #1 in reverse. In that scenario, the bad guy tricks his victim into downloading a harmful program onto his computer and running it. In this one, the bad guy uploads a harmful program to a computer and runs it himself. Although this scenario is a danger anytime you allow strangers to connect to your computer, websites are involved in the overwhelming majority of these cases. Many people who operate websites are too hospitable for their own good, and allow visitors to upload programs to the site and run them. As we've seen above, unpleasant things can happen if a bad guy's program can run on your computer.

If you run a website, you need to limit what visitors can do. You should only allow a program on your site if you wrote it yourself, or if you trust the developer who wrote it. But that may not be enough. If your website is one of several hosted on a shared server, you need to be extra careful. If a bad guy can compromise one of the other sites on the server, it's possible he could extend his control to the server itself, in which he could control all of the sites on it—including yours. If you're on a shared server, it's important to find out what the server administrator's policies are. (By the way, before opening your site to the public, make sure you've followed the security checklists for IIS 4.0 and IIS 5.0).


Boy did I know about this one in many ways... in SBS land where we had IIS 5 we got nailed by Code Red/Nimda because we didn't keep our systems up to date on patches.  We had 'bad code' uploaded to our web sites because we didn't patch.  Obviously IIS6.0 has been solid as a rock. 

Then I personally saw it on my www.sbslinks.com site because it was a shared site and bad code meant to hijack web browsers was put on my externally hosted web site.  Boy did I feel weird about that. 

On SBS 2003 we actually recommend that you don't host a public web site on your server and instead just leave it for authenticated access like Remote Web Workplace.  Why?  Because you want to limit what visitors can do and only allow people you trust on that box.  It's not that you can't do it per se...just that with external web hosting so cheap...why not reduce risk?

That brings up another concept that I need to bubble up that was discussed in the newsgroup... the person wanted to limit the port 80/443 to only OWA so that folks from public kiosk-y computers could have access.  In this day and age of smart phones and relatively cheap laptops, you should NEVER let anyone log in from a device that you cannot trust.  To me there is no more untrusted device than a kiosk computer.

Think trust... and only let in...what you trust.

Geek web casts -- what more can a gal want?

Just received word that the ITshowcase has gone live!  This is really cool and really educational.

Click and view the web cast.. they are really cool!

Dr. Jesper Johansson and Steve Riley [who will be coming out with a book very soon] are both featured in this.

What a diff a day makes.... 05-019 will be re-released in June

Well just yesterday I was saying Microsoft released a patch of a security patch and today they announce that they will re-release 05-019 entirely.


This Alert is to notify you of revisions that have been made to
Microsoft Security Bulletin MS05-019.

Specifically, the bulletin has been revised to advise customers that we
plan to re-release the MS05-019 security update in June, 2005.

Until the re-release of this security update is available, customers
experiencing the symptoms described in Microsoft Knowledge Base Article
898060 should follow the documented instructions to address this issue. 

If you are not experiencing this network connectivity issue we recommend
that you install the currently available security update to help protect
against the vulnerabilities described in this security bulletin.

As a reminder, the Knowledge Base Article can be found here:
http://support.microsoft.com/kb/898060

Microsoft Security Bulletin MS05-019 can be found here:
http://www.microsoft.com/technet/security/Bulletin/MS05-019.mspx

The Master Knowledge Base Article for MS05-019 references the KB
article. The Master Knowledge Base Article for MS05-019 is located here:
http://support.microsoft.com/kb/893066

If you have any questions regarding this alert please contact your
Technical Account Manager or Application Development Consultant.

Thank you,
Microsoft PSS Security Team

New update to 898060 [tcp/ip and vpn issues anyone?]

This Alert is to notify you of the availability of an updated hotfix for
Microsoft Knowledge Base article 898060 and provide information around this
updated hotfix.

The alert is also to provide you with information and answers to a
number of questions that have been raised since the publication of the Knowledge Base
article on 23 April 2005.

As a reminder, the Knowledge Base Article can be found here:

http://support.microsoft.com/kb/898060

The Master Knowledge Base Article for MS05-019 references this article. The
Master Knowledge Base Article for MS05-019 is located here:

http://support.microsoft.com/kb/893066

1. Why was 898060 re-released?

As of 6 May 2005, as part of the ongoing code maintenance and working with
customers, versions of the 898060 hotfix have been released for Windows
2000, Windows XP and Windows Server 2003.

These updated hotfixes were updated to address very limited situations
where the original hotfix may not have successfully resolved all issues. These
updated hotfixes contain changes to address only those circumstance.

In addition, the updated hotfix for Windows Server 2003 SP1 also contains a
change to address an issue experienced only when running Internet Security
Systems' (ISS) products.


2. I deployed the earlier versions of the hotfix, and I am no longer
experiencing symptoms detailed in 898060, do I need to deploy the updated
versions?

No. Customers who have deployed the hotfix already and are no longer
experiencing the symptoms detailed in 898060 need not take any action
and do not need to deploy the new versions.

However, customers who have deployed the Windows Server 2003 SP1 version of
the hotfix available prior to 6 May 2005 and are no longer experiencing the
symptoms detailed in 898060 BUT are experiencing issues with ISS' products
should test and deploy the updated version of the hotfix.


3. I deployed the earlier versions of the hotfix, and I am STILL
experiencing symptoms detailed in 898060, do I need to deploy the updated
version?

Yes. Customers who have deployed the versions of the hotfixes made
available PRIOR to 6 May 2005 and are STILL experiencing the symptoms detailed in
898060 should test and deploy the latest versions of the hotfix.

4. I haven't deployed any version of the hotfix, and I am experiencing
symptoms detailed in 898060, what should I do?

Customers who experience the issue outlined in 898060 and have not deployed
the hotfixs should deploy the latest versions of the hotfixes.

5. How can I identify if I have the latest version of 898060?
Microsoft Knowledge base article 898060 is being updated to reflect the
file version information for the latest versions of the hotfixes.


6. Why was 898060 released?
Microsoft Knowledge Base Article 898060 was released to address issues
encountered in a very specific and limited situation where disruptions in
network connectivity may be experienced after the installation of either
security update MS05-019 or Microsoft Windows Server 2003 Service Pack 1
(SP1).


7. When would these issues likely be encountered?
These issues would arise primarily in WAN and LAN configurations and
scenarios where routers and data-link level protocols that have different
Maximum Transmission Units (MTUs) are used across the network.


8. What were the issues encountered?
When these issues would arise, customers would report any one or more of
the following:

- Inability to connect to terminal servers or to file share access.

- Failure of domain controller replication across WAN links.

- Microsoft Exchange servers cannot connect to domain controllers.


9. What causes these issues?
These issues occur because the code incorrectly increments the number of
host routes on the computer when it modifies the MTU size of a host route.

The maximum number of host routes is controlled by the Registry Value in
MaxIcmpHostRoutes and the default number of host routes is 1,000.

Because the code incorrectly increments the number of host, the number of
host routes eventually reaches the maximum value. After the maximum
value is reached, the ICMP packets are ignored creating the symptoms associated with
this issue.

10. What is Microsoft's recommendation on whether I should apply 898060?
Microsoft's official recommendation is that you should apply 898060 only if
you encounter these issues. This recommendation is detailed in the KB
article 898060.


11. Is there any way for me to proactively tell if I'll need 898060?

This specific issue will manifest only in networking conditions are true,
specifically, if different MTU's are set in the environment. Because of
this, the only way to know proactively if you might encounter this issue is
to determine if you use different MTU's in your environment or not.


12. It sounds like when I would need 898060 I wouldn't have network
connectivity. If that's the case, I won't be able to deploy the hotfix
898060. Should I just go ahead and deploy it proactively?
While we test hotfixes as thoroughly as possible, by their nature they are
not subject to the same testing as a security update, like MS05-019.
Because of this, it is possible for a hotfix to have issues that have not
yet been identified and thus hotfixes have a greater inherent stability
risk than a broadly released update.

Microsoft's standard recommendation for hotfixes is that you only apply the
hotfix when the problem it was developed to address is encountered. This is
because in this circumstance, the risk of the potential for problems
related to the hotfix is clearly outweighed by the immediate risk of the issue
encountered.

While Microsoft does not recommend applying hotfixes proactively when the
issue it was designed to address is not present, customers should perform
their own risk assessment based on their specific circumstances to
determine the most appropriate course of action for them.

For some customers, the risk of possible problems related to the hotfix may
be outweighed by the risk of the occurrence of those problems the hotfix
was designed to address. These customers may determine that the most
appropriate course of action is to deploy the hotfix proactively.


13. Can I just deploy 898060 and not deploy MS05-019?

No, when deploying the hotfix Microsoft recommends that you first deploy
MS05-019 and then the hotfix.


14. Can I use SUS to deploy 898060?

No. Because hotfixes are not distributed via Windows Update, it cannot be
deployed using SUS.


15. Can I use SMS to deploy 898060?

Yes, you can use SMS to deploy 898060. However, you will have to manually
build the deployment package for this. Because this is not detected by any
security update scanning engine, you cannot use any of the automated
deployment tools with this update.


16. Can I use MBSA to detect that will need 898060?

No. MBSA can detect systems that require MS05-019 but cannot detect systems
that require 898060.



17. Can MBSA tell me when the hotfix has been applied?

Once the hotfix 898060 has been applied, when MBSA is run, it will raise a
warning that a file version was found to be greater than expected.



18. Can I use qfecheck (KB 282784) to confirm that 898060 has been
installed?

Yes, you can use qfecheck to confirm that 898060 has been installed.



19. How is Microsoft making 898060 (including the re-released versions)
available to customers?

Currently, the hotfix is available as a private hotfix. Customers can
obtain this by contacting Microsoft Product Support Services. The call to obtain
the hotfix is no-charge.



20. Will Microsoft re-release MS05-019?

Currently, there are no plans at this time to re-release MS05-019. However,
Microsoft is constantly evaluating the situation based on customer request,
feedback and experiences.


Thank you,

Microsoft PSS Security Team

Those new Security Advisories

Security Advisories Updated or Released Today
==============================================

* Security Advisory (892313)

  - Title:    Default Setting in Windows Media Player
              Digital Rights Management Could Allow a User
              to Open a Web Page Without Requesting
              Permission

  - Web site:
http://go.microsoft.com/fwlink/?LinkId=47490

* Security Advisory (842851)

  - Title:    Clarification of the tar pit feature provided for
              Exchange Server 2003 in Windows Server 2003 Service
              Pack 1

  - Web site:
http://go.microsoft.com/fwlink/?LinkId=47491

<SBSized info ...remember this “tarpit“ is SBS approved already and will be included in SBS 2003 sp1>

Support:
========
Technical support resources can be found at:
http://go.microsoft.com/fwlink/?LinkId=21131

International customers can get support from their local Microsoft
subsidiaries. Phone numbers for international support can be found
at:
http://support.microsoft.com/common/international.aspx

Additional Resources:
=====================
* Microsoft has created a free monthly e-mail newsletter containing
  valuable information to help you protect your network. This
  newsletter provides practical security tips, topical security
  guidance, useful resources and links, pointers to helpful
  community resources, and a forum for you to provide feedback
  and ask security-related questions.
  You can sign up for the newsletter at:

 
http://www.microsoft.com/technet/security/secnews/default.mspx

* Microsoft has created a free e-mail notification service that
  serves as a supplement to the Security Notification Service
  (this e-mail). It provides timely notification of any minor
  changes or revisions to previously released Microsoft Security
  Bulletins. This service provides notifications that are
  written for IT professionals and contain technical information
  about the security advisories and security bulletins.
  Visit
http://www.microsoft.com to subscribe to this service:

  - Click on Subscribe at the top of the page.
  - This will direct you via Passport to the Subscription center.
  - Under Newsletter Subscriptions you can sign up for the
    "Microsoft Security Notification Service: Comprehensive Version".

* Protect your PC: Microsoft has provided information on how you
  can help protect your PC at the following locations:

 
http://www.microsoft.com/security/protect/

  If you receive an e-mail that claims to be distributing a
  Microsoft security update, it is a hoax that may be distributing a
  virus. Microsoft does not distribute security updates through
  e-mail. You can learn more about Microsoft's software distribution
  policies here:
 
http://www.microsoft.com/technet/security/topics/policy/swdist.mspx

I got Security Alerts! Do you?

Today as my IM window popped up saying I got a Microsoft security alert, I got one on my cell phone as well.

Cool!  Huh!  I can now be immediately paranoid!  You can sign up for these here!  All of the ways you can get informed are listed on this page.

Today's Security Bulletin - only Windows 2000

Today's Security bulletin only affects Windows 2000 machines and is fixing the previously unpatched vulnerability that was disclosed by Greymagic.

Since I'm reading Japanese security bulletins from now on, let's again revisit the page and see if we get a better view of the issue from there:

So?  What do you think?  Does that make it clearer?

Bulletin Summary:

http://www.microsoft.com/technet/security/Bulletin/ms05-may.mspx

Important Bulletins:

Vulnerability in Web View Could Allow Remote Code Execution (894320)
http://www.microsoft.com/technet/security/Bulletin/ms05-024.mspx

I'm in search of a "Secure Me Now" button, got one?

So many times, especially with our small offices we look for a checklist, a secure me now button, and quite frankly just isn't such a cookie cutter thing you can do these days.

What you really should be doing instead is identifying what the 'really bad thing' that could happen in a network and designing protection around that.....but ..it can't be the worst really bad thing now can it?  It has to be a reasonable bad thing.

What's the first thing you need to do?  Sit down with your client and identify what needs to be protected.....typically in heathcare it's patient information.  In California it's identity information.  Now start to think of ways to reasonably protect that information.  Many times, it's just not with technology, it's with people as well.

Much of the steps with HIPAA are policy, ensuring that you are compliant with the people side of the equation.

So think about it.... are you looking for a “secure me now button“ or truly thinking about the best ways to protect stuff that needs protection.

Sometimes a checklist won't give you the big picture.  Stand back.  Where's your risks?

P.S. if you are looking for a “secure me now button“, you might take a look at some of the resources here.  There isn't a button there, but there is a lot of interesting links nonetheless.

 

Wanna do something cool with Internet Explorer?

<update - for a properly aligned version of that IE settings shown below check out Steve Friedl's page>

One of the things you can do with Internet Explorer that's really cool is control stuff.  You know...stuff.  Active X stuff.  So let's get a few foundations so you know what I'm talking about.  Start first by reading this KB article on how to manage add-ons.  Do you get the idea that you can deny bad stuff and then allow good stuff?

So how do you know what is the “good stuff”?  Nick put together a list in a kb and fellow MVP Neo has put together a list of some of them here as an ADM [see below]

I'll do some screen shots this weekend to show you how this all works.  It's pretty cool!


;  Internet Explorer Administrator Approved Security Settings

CLASS USER

CATEGORY "Custom Settings"
CATEGORY "Internet Explorer"
CATEGORY "Administrator Approved Controls"

  KEYNAME "Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\AllowedControls"

 POLICY "Microsoft Corporation"

          PART "ActiveX Plugin Control" CHECKBOX
            VALUENAME "{06DD38D3-D187-11CF-A80D-00C04FD74AD8}"
  VALUEON  NUMERIC 0
  VALUEOFF NUMERIC 1
          END PART

          PART "Certificate Enrollment Control" CHECKBOX
            VALUENAME "{127698e4-e730-4e5c-a2b1-21490a70c8a1}"
  VALUEON  NUMERIC 0
  VALUEOFF NUMERIC 1
          END PART

          PART "DHTML Safe Edit Control" CHECKBOX
            VALUENAME "{2D360201-FFF5-11d1-8D03-00A0C959BC0A}"
              VALUEON NUMERIC 0
              VALUEOFF NUMERIC 1

          ACTIONLISTON
              VALUENAME "{8D91090E-B955-11D1-ADC5-006008A5848C}" VALUE NUMERIC 0
          END ACTIONLISTON

          ACTIONLISTOFF
              VALUENAME "{8D91090E-B955-11D1-ADC5-006008A5848C}" VALUE NUMERIC 1
          END ACTIONLISTOFF

          END PART

          PART "DLC Control (File Transfer Manager)" CHECKBOX
            VALUENAME "{82774781-8F4E-11D1-AB1C-0000F8773BF0}"
  VALUEON  NUMERIC 0
  VALUEOFF NUMERIC 1
          END PART

          PART "Microsoft Office Control" CHECKBOX
            VALUENAME "{4453D895-F2A1-4A38-A285-1EF9BD3F6D5D}"
  VALUEON  NUMERIC 0
  VALUEOFF NUMERIC 1
          END PART

          PART "MSDN TreeView Control" CHECKBOX
            VALUENAME "{59CC0C20-679B-11D2-88BD-0800361A1803}"
  VALUEON  NUMERIC 0
  VALUEOFF NUMERIC 1
          END PART

          PART "Remote Data Service" CHECKBOX
            VALUENAME "{BD96C556-65A3-11D0-983A-00C04FC29E33}"
              VALUEON NUMERIC 0
              VALUEOFF NUMERIC 1

          ACTIONLISTON
              VALUENAME "{BD96C556-65A3-11D0-983A-00C04FC29E36}" VALUE NUMERIC 0
          END ACTIONLISTON

          ACTIONLISTOFF
              VALUENAME "{BD96C556-65A3-11D0-983A-00C04FC29E36}" VALUE NUMERIC 1
          END ACTIONLISTOFF

          END PART

          PART "Remote Desktop Web Control" CHECKBOX
            VALUENAME "{7584c670-2274-4efb-b00b-d6aaba6d3850}"
              VALUEON NUMERIC 0
              VALUEOFF NUMERIC 1

          ACTIONLISTON
              VALUENAME "{9059f30f-4eb1-4bd2-9fdc-36f43a218f4a}" VALUE NUMERIC 0
          END ACTIONLISTON

          ACTIONLISTOFF
              VALUENAME "{9059f30f-4eb1-4bd2-9fdc-36f43a218f4a}" VALUE NUMERIC 1
          END ACTIONLISTOFF

          END PART

          PART "Scripting Dictionary" CHECKBOX
            VALUENAME "{EE09B103-97E0-11CF-978F-00A02463E06F}"
  VALUEON  NUMERIC 0
  VALUEOFF NUMERIC 1
          END PART

          PART "Tabular Data Control" CHECKBOX
            VALUENAME "{333C7BC4-460F-11D0-BC04-0080C7055A83}"
  VALUEON  NUMERIC 0
  VALUEOFF NUMERIC 1
          END PART

          PART "XML Support Libraries" CHECKBOX
            VALUENAME "{550dda30-0541-11d2-9ca9-0060b0ec3d39}"
              VALUEON NUMERIC 0
              VALUEOFF NUMERIC 1

          ACTIONLISTON
              VALUENAME "{2933BF90-7B36-11d2-B20E-00C04F983E60}" VALUE NUMERIC 0
              VALUENAME "{ED8C108E-4349-11D2-91A4-00C04F7969E8}" VALUE NUMERIC 0
              VALUENAME "{CFC399AF-D876-11d0-9C10-00C04FC99C8E}" VALUE NUMERIC 0
              VALUENAME "{F6D90F16-9C73-11D3-B32E-00C04F990BB4}" VALUE NUMERIC 0
              VALUENAME "{F6D90F11-9C73-11D3-B32E-00C04F990BB4}" VALUE NUMERIC 0
          END ACTIONLISTON

          ACTIONLISTOFF
              VALUENAME "{2933BF90-7B36-11d2-B20E-00C04F983E60}" VALUE NUMERIC 1
              VALUENAME "{ED8C108E-4349-11D2-91A4-00C04F7969E8}" VALUE NUMERIC 1
              VALUENAME "{CFC399AF-D876-11d0-9C10-00C04FC99C8E}" VALUE NUMERIC 1
              VALUENAME "{F6D90F16-9C73-11D3-B32E-00C04F990BB4}" VALUE NUMERIC 1
              VALUENAME "{F6D90F11-9C73-11D3-B32E-00C04F990BB4}" VALUE NUMERIC 1
          END ACTIONLISTOFF

          END PART

          PART "Windows and Office Update Controls" CHECKBOX
            VALUENAME "{3E68E405-C6DE-49FF-83AE-41EE9F4C36CE}"
              VALUEON NUMERIC 0
              VALUEOFF NUMERIC 1

          ACTIONLISTON
              VALUENAME "{9F1C11AA-197B-4942-BA54-47A8489BB47F}" VALUE NUMERIC 0
              VALUENAME "{6414512B-B978-451D-A0D8-FCFDF33E833C}" VALUE NUMERIC 0
          END ACTIONLISTON

          ACTIONLISTOFF
              VALUENAME "{9F1C11AA-197B-4942-BA54-47A8489BB47F}" VALUE NUMERIC 1
              VALUENAME "{6414512B-B978-451D-A0D8-FCFDF33E833C}" VALUE NUMERIC 1
          END ACTIONLISTOFF

          END PART

   PART "Windows Genuine Advantage Control" CHECKBOX
    VALUENAME "{17492023-C23A-453E-A040-C7C580BBF700}"
      VALUEON  NUMERIC 0
      VALUEOFF NUMERIC 1
  END PART

 END POLICY

POLICY "Sun Microsystems"
  PART "Java" CHECKBOX
    VALUENAME "{8AD9C840-044E-11D1-B3E9-00805F499D93}"
      VALUEON  NUMERIC 0
      VALUEOFF NUMERIC 1
  END PART
END POLICY

 POLICY "Macromedia"

          PART "Flash and Shockwave players" CHECKBOX
            VALUENAME "{166B1BCA-3F9C-11CF-8075-444553540000}"
              VALUEON NUMERIC 0
              VALUEOFF NUMERIC 1

          ACTIONLISTON
              VALUENAME "{D27CDB6E-AE6D-11cf-96B8-444553540000}" VALUE NUMERIC 0
          END ACTIONLISTON

          ACTIONLISTOFF
              VALUENAME "{D27CDB6E-AE6D-11cf-96B8-444553540000}" VALUE NUMERIC 1
          END ACTIONLISTOFF

          END PART

 END POLICY

 POLICY "Adobe"

          PART "Acrobat Reader" CHECKBOX
            VALUENAME "{CA8A9780-280D-11CF-A24D-444553540000}"
              VALUEON NUMERIC 0
              VALUEOFF NUMERIC 1

          ACTIONLISTON
              VALUENAME "{B801CA65-A1FC-11D0-85AD-444553540000}" VALUE NUMERIC 0
          END ACTIONLISTON

          ACTIONLISTOFF
              VALUENAME "{B801CA65-A1FC-11D0-85AD-444553540000}" VALUE NUMERIC 1
          END ACTIONLISTOFF

          END PART

 END POLICY

END CATEGORY
END CATEGORY
END CATEGORY

Security patch [no plural] next week

 As part of the monthly security bulletin release cycle, Microsoft
provides advance notification to our customers on the number of new
security updates being released, the products affected, the aggregate
maximum severity and information about detection tools relevant to the
update. This is intended to help our customers plan for the deployment
of these security updates more effectively.

In addition, to help customers prioritize monthly security updates with
any non-security updates released on Windows Update on the same day as
the monthly security bulletins, we also provide:

- Information about the release of updated versions of the Microsoft
Windows Malicious Software Removal Tool.

- Information about the release of NON-SECURITY, High Priority updates
on Windows Update (WU) and Software Update Services(SUS). Note that this
information will pertain ONLY to updates on Windows Update and only
about High Priority, non-security updates being released on the same day
as security updates. Information will NOT be provided about Non-security
updates released on other days.

On 10 May 2005 the Microsoft Security Response Center is planning to
release:

Security Updates
- 1 Microsoft Security Bulletin affecting Microsoft Windows. The
greatest aggregate, maximum severity rating for these security updates
is Important. This update will not require a restart. This update will
be detectable using the Microsoft Baseline Security Analyzer (MBSA).

Microsoft Windows Malicious Software Removal Tool

- Microsoft will release an updated version of the Microsoft Windows
Malicious Software Removal Tool on Windows Update and the Download
Center.
Note that this tool will NOT be distributed using Software Update
Services (SUS).

Non-security High Priority updates on WU and SUS

- Microsoft will NOT release any NON-SECURITY High-Priority Updates for
Windows on the Windows Update site

Although we do not anticipate any changes, the number of bulletins,
products affected, restart information and severities are subject to
change until released.
Microsoft will host a webcast next week to address customer questions on
these bulletins. For more information on this webcast please see below:

- TechNet Webcast: Information about Microsoft's May Security Bulletins
(Level 100)   - Wednesday, May 11, 2005 11:00 AM (GMT-08:00) Pacific Time (US &
Canada) -
http://msevents.microsoft.com/CUI/EventDetail.aspx?EventID=1032273403&Culture=en-US

At this time no additional information on these bulletins such as
details regarding severity or details regarding the vulnerability will
be made available until 10 May 2005.
Thank you,
Microsoft PSS Security Team

The buzz on nothing new

I hate to be a “me too” but two of the guys in Australia who went to the Asian MVP summit came back and said a presentation on Rootkits scared them.  And while Rootkits [which is software that is no different than trojans or backdoors but typically silently hides on your system] is something bad there's comments from folks [including a few MS'ers I know] that this isn't really anything new and it's something the on the ball admin could see happening.  Like Harlan says..they still have to get ON your system. And how do they do that?  You click [admin rights] or you don't patch [unpatched vulns].

The on the ball admin watching his traffic logs and firewall logs should spot this activity.  Now mind you, we probably don't do this in SBSland like we should, but the point is, this isn't 'more bad' than the next 'bad thing', it's just another 'bad thing'.  What we need to take away from this is better protection so that the 'bad thing' won't get on there in the first place.  And that's where LUA... aka least privilege user account ... comes into play.

I was pinged the other day asking about the impact on software vendors and least user privilege in Longhorn and here's the annoying .... really annoying... thing I constantly jump up and down about here on the blog.  This LUA isn't anything new either.  We COULD do it now if our stupid vendors would just code so they get the “Made for XP logo”. 

But here's the kicker....they don't... they don't have to... because we don't care.  When you go to Office Depot to buy software are you even thinking about it's security features when you flip the empty box over?  Of course you aren't.  You want it to pay your payroll, or recap your sales, or widget your widgets.  You could care less about whether it runs in the least amount of privileges to therefore keep you safe.

Tonight I went to a NT user group meeting in Fresno where a patch/inventory/software deployment vendor and the funny thing is while their software was very interesting, it was basically a GUI interface over WMI scripting and what not.  I mean it was cool, but at the same time I was thinking...hey... we can do that with what we have...it's really not that new... it's just we don't know we can do it. 

Anyway, I'll still harp that I think the emphasis we have is still too much on patching and hardening servers and not enough on protecting workstations.  I honestly don't think I've met a non-wacko SBSer who has deployed the XP sp2 firewall inside their network...yet here I am down here with it running just fine.

Dear people at MarketingPromote.com

Thank you for your 2,334 2,435 emails you have sent over the last couple of weeks regarding your direct mailing service, offshore web hosting, or whatever else you are trying to get me to use.  You are sending these 2,435 2,522 emails to my poor @pacbell account that I leave unfiltered to truly see what stuff is coming in out there.

It was funny because the other day when I was dealing with Trend, one of the guys at the office said “Oh yes, it's definitely much worse, I'm getting viruses in my mailbox all the time”.... and for a moment I scrunched up my eyebrow and said “you are getting viruses in your email”?  What he meant was that he was getting spam in his email and my combo of Trend's emanager and Outlook spam filter was obviously losing the battle again.  He equated viruses and spam together and did not see the distinction between them.

A recent survey said we're just taking it more for granted now.

So what are you using for Spam?

Exchange IMF?  Something else?

Oh and thank you MarketingPromote... I really needed 2,632 offers from you... I don't think I got the first 2,631 of them.

Law # 3, if I have it, it's MINE

Law #3: If a bad guy has unrestricted physical access to your computer, it's not your computer anymore

Oh, the things a bad guy can do if he can lay his hands on your computer! Here's a sampling, going from Stone Age to Space Age:

He could mount the ultimate low-tech denial of service attack, and smash your computer with a sledgehammer.

He could unplug the computer, haul it out of your building, and hold it for ransom.

He could boot the computer from a floppy disk, and reformat your hard drive. But wait, you say, I've configured the BIOS on my computer to prompt for a password when I turn the power on. No problem – if he can open the case and get his hands on the system hardware, he could just replace the BIOS chips. (Actually, there are even easier ways).

He could remove the hard drive from your computer, install it into his computer, and read it.

He could make a duplicate of your hard drive and take it back his lair. Once there, he'd have all the time in the world to conduct brute-force attacks, such as trying every possible logon password. Programs are available to automate this and, given enough time, it's almost certain that he would succeed. Once that happens, Laws #1 and #2 above apply.

He could replace your keyboard with one that contains a radio transmitter. He could then monitor everything you type, including your password.

Always make sure that a computer is physically protected in a way that's consistent with its value—and remember that the value of a computer includes not only the value of the hardware itself, but the value of the data on it, and the value of the access to your network that a bad guy could gain. At a minimum, business-critical computers like domain controllers, database servers, and print/file servers should always be in a locked room that only people charged with administration and maintenance can access. But you may want to consider protecting other computers as well, and potentially using additional protective measures.

If you travel with a laptop, it's absolutely critical that you protect it. The same features that make laptops great to travel with – small size, light weight, and so forth—also make them easy to steal. There are a variety of locks and alarms available for laptops, and some models let you remove the hard drive and carry it with you. You also can use features like the Encrypting File System in Microsoft Windows® 2000 to mitigate the damage if someone succeeded in stealing the computer. But the only way you can know with 100% certainty that your data is safe and the hardware hasn't been tampered with is to keep the laptop on your person at all times while traveling.


I'm definitely one sick puppy, because hands down this is my favorite law of security.  Why?  Because it's amazing that this law number three still shocks people even today.  Just a few weeks ago in fact a consultant had a 'falling out' with a client and had held off on handing over the administrator password and was planning to do a 'payment in full' for 'password' swap.  Well he also had a monitoring service on that box and all of a sudden got paged that something had been loaded to the machine, it had been rebooted, and suddenly he didn't have Administrator access to the box anymore.  He came into the newsgroup asking if there was something about SBS that make it more vulnerable to this kind of attack. 

Hardly dude, any computer is vulnerable to law #3.

It's called, if I have access to that server or computer, it's MINE totally MINE, and there's nothing that you as the remote administrator can do about it.  This is a foundational law of security that physical security trumps everything. 

Take for example the other day when I totally forgot the admin password for my Tablet PC.  No worries, boot using the reset password cdrom and voila... I reset the admin password with no issues whatsoever.  For servers, this is a bit trickier as you can't just use that Linux based boot disk, but there are other utilities out there that can do the job as well. 

Look as well at that story about the backup tapes containing data on 600,000 Time Warner employees has been lost.  Now I would argue that the tape backup software should have natively supported encryption, but nonetheless they've now got a mess on their hands because they lost physicall access to that tape media and someone else possibly has it.

Bottom line.... as I said earlier, there is no computer in the world that is immune from Law #3.

So do your clients just trust you?

I was a bit surprised the other day in the newsgroup when someone asked about the upcoming SBS 2003 sp1 because they had to 'sell' their bosses on the service pack.  Whoa.  I guess I'm wacko because applying a service pack doesn't have to be sold to me at all, it's just something that's done.  Now I do decide “when” to do it, but for me, you don't have to 'sell me' on whether it should be done or not, it's just done.

I can understand if you wait because your line of business applications don't support it yet, but if you have a customer that doesn't see the value in service packs, think of the things in this one that Javier pointed out on his blog.

The Center for Internet Security describes Service packs as follows:  Microsoft periodically distributes large updates to its operating systems in the form of Service Packs as often as once every few months, or less frequently. Service Packs include all major and minor fixes up to the date of the service pack, and are extensively tested by Microsoft prior to release.

For the SBS consultant who is the outsourced CIO, the clients 'trust them' to apply the Service pack as appropriate to the timing for that client.  For others, you may have to 'sell' that client on why a service pack is the right thing to do.  Windows 2003 sp1 layers on similar kind of protections that was placed in XP sp2.  Just a few of the things that caught my eye

  • Data Execution Prevention - even if you don't have the hardware that supports this, the software DEP will be there checking to ensure that something isn't trying to throw off a buffer overflow
  • Internet Explorer changes to harden this more.
  • Tarpit for SMTP [SeanDaniel.com talked about this on his blog]

I would make a terrible marketing person... because I just can't imagine having to 'sell' a service pack.  It's just something you do, the way you ensure your system is in tip top shape and properly protected.  For a long time the joke was when the first service pack came out for the product was when you should buy and install the product.  I personally don't feel that way.  I may not install a service pack the first day, but sooner or later, it's installed.  There is only a question of 'when', not 'if'. 

So ..... do you have to 'sell' service packs to your clients?

June 15th Chat on SBS 2003 sp1

SBS: Shiny and New with SP1
Small Business Server, Microsoft's all-in-one solution for small businesses, is getting its first service pack. Changes to an all-in-one system can be risky, especially since SBS is targeted towards businesses without full-time IT Staff to fix things if they go wrong. Windows IT Pro author Michael Otey has run SBS SP1 through its paces and will answer your questions about SBS SP1 deployment, features, and fixes. Come find out why you should consider installing SBS SP1 and what you need to do to help your business or your customers plan deployment.


Hello ...hold the phone...”why you should consider'?  Consider?  Whoa...as Yoda would say ..there is no Try ...there is only Do

Yo, folks... there is no 'consider installing it' when it comes to this important of a service pack... You DO it.  The only consideration here is WHEN...not IF...but WHEN.

In about 30 minutes I'm upgrading the ROM here to be ready for SP1... so remember.... DO IT not “consider it”.  In fairness though... it should be TESTED on a non production system first before you apply it.  Don't have a non production box?  Wait and have the community shake out any issues first and we'll guide you through it.

Paranoia

Sometimes it's funny how people react to things.  There was a recent set of stories of how the next version of Windows would have a 'black box' feature to aid in gathering data of system crashes and what not. 

In some circles you would think Microsoft has a division that just can't wait to read what stuff we have on the computers.  Just take some of these comments:

My initial impression is that in the health care industry this will be a violation of the HIPAA security rules.” and “I've heard a lot of discussion on Microsoft's privacy issues. I was an avid Windows XP user, using it for personal web hosting and gaming. But discussions like this BlackBox and Palladium have gotten me spooked

And yet, do many of you realize that as of right now, if this is a privacy issue to you later, it is a privacy issue now...and better yet, do you realize what benefit it is?

First off there is a setting, a registry edit that you can do to turn this off if you are that paranoid and concerned.  Furthermore, when the crash dump occurs, say no and don't send it.

HKLM\Software\Microsoft \DrWatson \CreateCrashDump is the registry key if you want to disable it...but wait... keep reading...

But do you realize the benefit of these dumps?  Case in point is SBS.  Last April we saw our SBS boxes blue screen and send a dump off to Microsoft, it ended up being a virus engine update that they knew BECAUSE of the crash dumps.  They knew within minutes while the rest of us were totally guessing.  Charlie Anthe has posted before of all the items that have been identified because of crash dumps.

You can take a look at this link http://oca.microsoft.com/en/Response.asp?SID=896 and see what kind of things have been found with the online crash report.  Change that SID number in fact and you'll see the kinds of things that have been found.  The Data collection policy is posted on the web site.

As it says on the site “When collecting information, it is possible for personal or confidential information to be present in the report. For instance, a snapshot of memory may include your name, part of a document you were working on, or data you recently submitted to a Web site. It is also possible for personal information to be included in a log file, a portion of the registry, or other product specific files needed to determine the cause of the problem. If you are concerned that the report may contain personal or confidential information, please do not send the report.”

Bottom line if you have a concern about the black box technology in Longhorn, you should have a security concern now.  The technology is not increasing, it's just enhancing what's already there.  It's like the concept of the SBS community.  Peer sharing so we can all benefit.

Now how about taking some if this paranoia against our line of business vendors can't do least user privilege coding, eh?

Law number 2 - get ready for LUA folks

Law #2: If a bad guy can alter the operating system on your computer, it's not your computer anymore

In the end, an operating system is just a series of ones and zeroes that, when interpreted by the processor, cause the computer to do certain things. Change the ones and zeroes, and it will do something different. Where are the ones and zeroes stored? Why, on the computer, right along with everything else! They're just files, and if other people who use the computer are permitted to change those files, it's "game over".

To understand why, consider that operating system files are among the most trusted ones on the computer, and they generally run with system-level privileges. That is, they can do absolutely anything. Among other things, they're trusted to manage user accounts, handle password changes, and enforce the rules governing who can do what on the computer. If a bad guy can change them, the now-untrustworthy files will do his bidding, and there's no limit to what he can do. He can steal passwords, make himself an administrator on the computer, or add entirely new functions to the operating system. To prevent this type of attack, make sure that the system files (and the registry, for that matter) are well protected. (The security checklists on the Microsoft Security website will help you do this).


There are a couple of things that are in the near future and one that we majorly need to get on the backs of our application vendors on that are touched by Security Law number 2.  This law says that if you don't protect your system registry, you may not have a good system.

Well guess what class...what do most of us do to our system registry?  We leave it wide open to be messed with all the time.  Show of hands... how many [including myself as I've got a couple of desktops that I haven't fully done this to] are running with full rights to that desktop?  We leave our registries wide open for attack.  I'll be the first to admit it's not easy running with least privilege user rights...what we have to do to classesroot to get Quickbooks to run in LUA is insane. 

So we don't even do ANYTHING to help even get close to protecting ourselves on law number 2, we leave ourselves wide open from the get go. And this is something we need our vendors to help out on.  My Threatcode site is back on the air and we truly need to get these vendors ready for Longhorn and LUA.

The stuff you think about when shopping for a copier

So I've had a couple of vendors in to discuss copiers and scanners today and one of the ways the copiers can now connect is via SMB and of course the first thing that goes through my mind is SMB signing.  I've asked the copier vendors to get back to be on their requirements for smb signing because honestly I'd like to leave it on.  The Windows networking article here talks about the benefits of SMB signing and honestly I don't notice any performance hit in my network.

But it is interesting to think about... when attaching devices to your network, think about what insecurity they might be introducing as well.  They too are a device with software and may need updates.

I flattened a box tonight

It wasn't my workstation...but rather than of my hairdressers.  I was cleaning it up for her.  And even with Norton Antivirus and Microsoft's Antispyware I only  had about 3 minutes after bootup before 57 Internet Explorer Windows popped up ...mind you this was with the machine “not” on the Internet.  Oh and it had about.blank on there as well.  So what did I do with it?

I booted it long enough to get the necessary documents off [which fortunately didn' take that long] and then I booted it from a Windows XP cdrom, removed the partition, repartioned it and had it totally wipe the harddrive and reformat.  Now I'm putting programs back on.

Oh, and I'm doing something else too... I'm making the daughter and son's account into limited user mode and not giving them administrator rights.  You see that's how this computer got into this mess.  Even with Norton up to date... even though Microsoft antispyware was on the machine [which in fairness this was added later in a last ditch effort to clean the box, unfortunately it was unsuccessful], and even while I was getting the data off, the spyware cleaner was attempting to block stuff but it just couldn't do it. 

Now this system has XP sp2 on it with the firewall enabled and the auto updates turned on.  Antivirus is on, Anti Spyware is on.... and now I'm sending it back off to hopefully stay safe and secure.

Law Number 1 - Would you eat that Sandwich?

I'm going to remind folks of the 10 laws of security....this came up because someone in the newsgroup asked if there was a weakness in SBS because someone reset the admin password [but that's to be covered in Law # 3 so stay tuned for that]

First up is:

Law #1: If a bad guy can persuade you to run his program on your computer, it's not your computer anymore

It's an unfortunate fact of computer science: when a computer program runs, it will do what it's programmed to do, even if it's programmed to be harmful. When you choose to run a program, you are making a decision to turn over control of your computer to it. Once a program is running, it can do anything, up to the limits of what you yourself can do on the computer. It could monitor your keystrokes and send them to a website. It could open every document on the computer, and change the word "will" to "won't" in all of them. It could send rude emails to all your friends. It could install a virus. It could create a "back door" that lets someone remotely control your computer. It could dial up an ISP in Katmandu. Or it could just reformat your hard drive.

That's why it's important to never run, or even download, a program from an untrusted source—and by "source," I mean the person who wrote it, not the person who gave it to you. There's a nice analogy between running a program and eating a sandwich. If a stranger walked up to you and handed you a sandwich, would you eat it? Probably not. How about if your best friend gave you a sandwich? Maybe you would, maybe you wouldn't—it depends on whether she made it or found it lying in the street. Apply the same critical thought to a program that you would to a sandwich, and you'll usually be safe.


My sister is wising up a bit, but for awhile there she would go out to websites looking for Disney screensavers and icons and just click...well it ended up that she got more than she bargained for..spyware that I ended up cleaning up.....why?  Because she failed to follow rule #1.  She let someone persuade her into running their bad stuff on her machine. 

Now most of us would say, well that was a blonde thing to do, but keep in mind this is EXACTLY how most malware and junk gets on your system.  You click YES.  And when you give that program permssion, you've given up your machine to that bad guy. 

So what's the remedy for this?  Only say yes on those items that you know where the software came from, you trust the vendor of the application. 

Like the law says... if you didn't make that sandwich and don't know who did... would YOU eat it? The same is true for software.  And especially for anything that comes free.  If it sounds too good to be true, it always is, isn't it?

hmmm... why am I all of a sudden in the mood for a toasted cheese sandwich.....

Patch Information

A couple of links on patch management

First off is the recording of the Patch Webcast [where I only coughed once] and the second is a blog post regarding patch resources.

And of course don't forget my fav... www.patchmanagement.org!

Trend Pattern File 2.594 may cause high CPI utilization [is your system pegging the CPU at 100%?]

Pattern File 2.594.00 may cause high CPU utilization
http://www.trendmicro.com/en/support/pattern594/overview.htm

From the bulletin:

Why did this happen?

To protect its customers against the growing threat of the WORM_RBOT family, Trend Micro enhanced the decompression ability of its Pattern File by supporting 3 new heuristic patterns, including UltraProtect decompression, in OPR 2.594.00.

Due to an isolated anomaly in the engineering, development and pattern release process, the UltraProtect decompression may, in certain circumstances, cause some systems to experience high CPU power consumption. This can lead to system instability when this specific file type is scanned using Pattern File 2.594.00.


Hmmm... you know what I want to see though?  Something that says "we've put in place "this" to ensure that this anomaly doesn't happen again. 

This was definitely a world wide event as I got a link on a Japanese blog, Martin Roesler posted to the Full Disclosure list, and some newspapers in Japan had to resort to fax machines and it's reported in Incidents.org.

About 3:35 PDT in my office, the receptionist buzzed me saying her machine just 'went wacko' and when I went to look at it, it was totally unresponsive.  When I went to do a hard reboot and restart, it was totally grinding on 'applying computer settings'.  A few minutes later another co-worker walked by the front desk to tell me that he couldn't get to network and that's when I knew something was up.  I think fortunately because I have two processors, the server was still a bit responsive as I could get to the event logs and could see no unusual activity.  Knowing that the other 'change' introduced into my system is always antivirus, knowing that about a week before the dat file update on my workstation had ground my machine to a halt, I just for whatever reason, wondered if Trend had done something.  So I got into the virus dat update log files and sure enough, could determine that the timing of the update matched up with the 'event'.  The next step I did is something kinda weird...but it definitely came in handy.  I purposely have a wireless connection that goes around my server.  I set up a laptop, logged into IM and immediately looked at the folks that were online in my IM listing.  Chad's online!  I pinged him and asked if his server was doing anything wacko and he confirmed that he was right in the middle of attempting to get his server back into a responsive condition.  Bingo.  I'm not alone.  Then I checked with Super G.  About that time Michael C pinged me on IM to ask and sure enough he was seeing it too.  About that time Chad said that the SBS2k list was starting to report issue. 

I'm relaying this story only to showcase how understanding what changes might be occuring to your system [virus updates], what community resources you have [newsgroups and listserves], and access to the Internet in case of emergencies helps.

How to run Quickbooks under user mode

I finally got around to documenting the needed changes to get Quickbooks running under usermode.

Quickbooks in usermode for Stand alone machines

Quickbooks in usermode using Group policy

The process is basically that you use tools like Filemon, Regmon and Inctrl5 to identify those 'sticking' places in the file permissions and registry.  Now you have to open them up.

Unfortunately you have to open up ClassesRoot unless you want to spend the rest of your life wacking the heck out of that thing since Intuit uses guid keys in that section.  If you want to see the printout of regmon's report on Quickbooks [this is the Enterprise version being attempted to be run in user mode] you can see this spreadsheet here.

Steve Friedl helped to distill that down to basically two file permissions and two reg keys:

  • HKEY_LOCAL_MACHINE\Software\Intuit
  • HKEY_CLASSES_ROOT

  • C:\Program Files\Intuit

  • C:\Program Files\Common Files\Intuit

I personally think it shouldn't be as hard as this to run in user mode around Quickbooks.  A consultant emailed me that they had installed QB Enterprise version and their customer didn't want to run with the Salesmen with local Admininstrator rights on their computers [bravo for a company wanting to ensure their desktops are part of the security fabric of their network] and when the Consultant contacted Intuit, Intuit's support said the “fix” to not run with local adminstrator rights was to:

 

 “connect a member server to the SBS system. Then put QB's data there, with no Active Directory running on the member server. “

 

Yup, you heard that right... they suggested a member server with 'no AD' as the fix for running without administrator rights. 

 

First off, why in the world would you not want a server or a workstation stuck firmly in active directory, to ensure you have control of that server, and secondly, how in the world do they think that installing this on a member server is going to solve the desktop issue of permissions and user rights?

 

I love this KB article where it says the issue of user mode is a top support issue and don't you worry your little head because you are only making them 'standard users' [aka power users... you know...that category of users that the security folks call “admin lite”].  You remember that lovely KB article that I love to point out that says: A member of the Power Users group may be able to gain additional rights and permissions on your computer, and may be able to gain complete administrative credentials. A member of the Power Users group may also be able to expose your computer to other security risks, such as running a virus or running a Trojan horse program.

 

Remember what it says at the bottom? 

  • Do not use the Power User group.
  • Deploy certified Microsoft Windows 2000 or Microsoft Windows Server 2003 programs in your enterprise.  Programs that are certified for Windows 2000 or Windows Server 2003 are written to avoid requiring unnecessary access or administrator-level credentials.     

That's right class, that Quickbooks Enterprise 2005 program is not certified to run on Windows 2000 in the year 2005.  Maybe it's going to take legislation over Personal Identity Information before vendors 'get security', because honestly, it's accounting applications that seemingly are the worst.

 

One more note... due to how QB is 'all over' the ClassesRoot tree, if you want to have a QB that will allow auto updates you either have to open up ClassesRoot or spend the rest of your life editing that registry.  Bottom line folks, Quickbooks, in my opinion, is written in an insecure manner.  But until WE the marketplace start demanding that they change it, it will continue to be done in this manner.

 


 

Oh and I have to fess up on two blonde things I did.  In order to do the screen shots for the standalone PC I wanted to do it on a 'virgin laptop' so I took my tablet PC and flipped my normal operating account into user mode.  Then I proceeded to somehow forget the 'real' Administrator's password.  Oh yeah.. cute, huh!  Not to fear though, I just downloaded the reset cdrom burned in the iso image to make a bootable cdrom, booted from the cdrom and reset the password.  Now for the other blonde thing I did.  Notice this how-to isn't on the www.threatcode.com web site?  Yeah... while I have the domain parked, I forgot to renew the site with webhost4life.  Oh well, it will be back online probably Monday when their accounting department opens back up.  

Trend dat file cleanup - clean up info after the Freeze Up

Thanks to Karen Christain for this info:

For problem XP boxes:
Logon to the WXP box in Safe Mode.
Manually delete LPT$VPN.594 (C:\Program Files\Trend Micro\OfficeScan
Client.

The 594 pattern update came down from Trend Micro at about 3:36PM PST.
This update has negatively impacted Windows XP Pro desktops. It did not
negatively effect W2K Pro or SBS2K3. If you already have 594 and the
system cannot get to the Internet or appears to have hung you will want
to do the following:

Open OfficeScan Management Console
Updates
Server Update
Change update from Hourly to Daily or Weekly
Save
Rollback
Rollback Server and Clients
Select

Also: If you have the pccsrv.exe line in the SBS Login Script, REM it out.

If the client is locked up a hard reset may be required.

Trend dat file 594 - FREEZEUP

>>>TREND A/V FREEZE UP OF WORKSTATIONS AND SERVERS<<<

Just a major heads up .. SBSers around the world are reporting that dat file 594 just did a major freeze up on all servers/all workstations.

We have many machines affected.  Roll back to the 592 dat file.

Per Technical Support of TREND 596 will be out around 6:30 p.m.

To roll back:

Go into the OfficeScan console | Updates | Rollback.  Click 'Rollback' button for Virus
pattern file.

Issues with VPN and FTP revisited

I've been talking about the issues with Security patch 05-019 [KB 893066 tcp/ip] and VPN and FTP and wanted to make sure everyone understood that when you are seeing issues, DON'T uninstall ALL the April patches, you should ONLY uninstall the ONE patch. 

Removing all of the April patches is not the appropriate action and not the way to go. 

If you MUST, remove the patch and then hang tight for a fix.

If you CAN, leave the patch and use the workaround.

The main thing is don't merely remove all of the April patches as you need the others on there are they are not causing issues. 

 

MTU anyone?

Last night I posted about some possible issues with Security patch MS05-019 [KB 893066] and here's a follow up you 'might' want to try.

First off..remember to call into Microsoft Product Support Services so you can make sure to get the latest info, but here's a possible workaround for the Win2k3 machines having issues with FTP:  You might want to try this with VPN issues as well.

Again, I have not seen this issue in my network.

First off go find KB 120642 for more details.  We're going to be setting the MTU value and this is a per adapter setting so you will need to change the parameter on each interface.  With KB893066 in place and not uninstalled, set the MTU on the clients AND the server to 1400 and see if the problem resolves.

 Key: /Adapter Name// /\Parameters\Tcpip

**Note **In Windows 2000 and later this value is under the following key:

Key: Tcpip\Parameters\Interfaces\ /ID for Adapter /

Value Type: REG_DWORD Number
Valid Range: 68 - /the MTU of the underlying network /
Default: 0xFFFFFFFF
Description: This parameter overrides the default Maximum Transmission Unit (MTU) for a network interface. The MTU is the maximum packet size in bytes that the transport will transmit over the underlying network. The size includes the transport header. Note that an IP datagram may span multiple packets. Values larger than the default for the underlying network will result in the transport using the network default MTU. Values smaller than 68 will result in the tranport using an MTU of 68.

UPDATE a hotfix has now been released for this, call Microsoft Product Support Services for this FREE HOTFIX:

Network connectivity between clients and servers may not work after the installation of security update MS05-019 or Windows Server 2003 Service Pack 1:
http://support.microsoft.com/default.aspx?scid=898060

Security bulletin 05-019, KB 893066 and VPN issues

Beginning to see some reports of VPN issues with 05-019/KB 893066.  I personally am not experiencing these issues here but it may be due to your router and what not.

Jerry Bryant from Microsoft reminds us that issues with a security patch are a free call in his blog posting of today.  That if you don't call, the issues will not be resolved.  Therefore it's vital that if you experience issues with a security patch to call in.


-----Original Message-----
From: Windows NTBugtraq Mailing List
[mailto:NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM] On Behalf Of Darryl J Roberts
Sent: Tuesday, April 19, 2005 7:11 PM
To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
Subject: MS05-019 Breaks VPN

After installing the update in Microsoft Security Bulletin MS05-019 on
two servers at a customer site, we are no longer able to connect via VPN
to terminal services on those servers. (Other servers that did not have
the security bulletins from last Tuesday installed can connect via VPN.)

After many hours over two days working with Microsoft Product Support
Services, we discovered that forcing the MTU size down allowed the
client to connect to terminal services. Today Microsoft PSS reported
the they have confirmed that there is a problem with ICMP messages being
incorrectly discarded (other have opened PSS cases about this issue).
This could be why the MTU size is not being set correctly.

There will be an update to the patch in MS05-019, but as of this time,
that update is not available. A Microsoft KB article is being written
and has been assigned the number KB898060, but as to this time, that
article is not publicly available.

I will be uninstalling the update for Security Bulletin MS05-019 from
our customers servers this evening and waiting for the corrected patch
before reinstalling it.

--
Darryl J. Roberts, MCSE, MCP+I, CompTIA CTT+, CSSA
Software Engineering Unlimited, IT Professional Services Consultancy
Ventura, CA, USA

Heads up folks - proof of concept released for MS05-021 Exchange patch

Evgeny Pinchuk apparently is under the impression that we need further reason to patch so he released to several security lists a proof of concept for the MS 05-021 Exchange security patch.  Remember while in SBS 2003 we are not as concerned, it IS a concern for SBS 2000 boxes as we don't have any protection between us and the bad guys if port 25 is open.  Put this patch on your critical list.

Remember for Exchange 2000 you will need:

  • Exchange 2000 sp3
  • Exchange 2000 sp3 post rollup pack
  • and then the patch
  • Just a reminder...your patch tool may need a patch

    If you are having issues with Shavlik's HfnetchkPro with the .NET patch and trying to offer up Windows 2003 sp1 when it shouldn't, I forgot to patch my patch tool.  At the office I applied this patch http://hfnetchk.shavlik.com/downloads/shavlik_skb588b.exe but here at home and at first I couldn't figure out why the patch tool/scan verifier I was using here wasn't matching the office and then it dawned on me... I hadn't patched my patch.

    One problem solved...now wish me luck in getting WSUS to see my workstations.

    Mariette had some troubleshooting suggestions:

    Did you run a wuauclt.exe /detectnow on the client? If you have done
    that and this did not work can you do the following:

    - Unjoin the workstation from the Lan
    - Delete the computer account in AD users and computers
    - Delete the computer within WSUS
    - Join the workstation with the Lan the old fashion way (not
    connectcomputer)
    - Run wuauclt.exe /detectnow on the client

    If this works can you try the following:

    - Unjoin the workstation from the Lan
    - Delete the computer account in AD users and computers
    - Delete the computer within WSUS
    - Create a computer account using the SBS wizard
    - Join the computer using the SBS way (connect computer wizard)

    Wish me luck in getting WSUS working here at home.  Right now all it's doing is reinforcing how much I like Shavlik...I'd be done and patched by now rather than trying to get one web site seeing two computers.  Oh well... keeps me out of trouble.

    Sometimes patching is annoying

    So I have this one workstation that just will not install the .NET sp1 patch no matter what I do.... I've Shavlik'd, I've opened up ISA server to all/all/all to ensure that's not the problem and in looking at the Windows Update log file...... what?  You don't know what that is?

    C:\windows Look for a file called Windows Update.log

    Open that sucker up and if you've been having issues with a patch not installing, look for the error messages inside...see that code “0x80070643“?  When I google on that phrase I hit a knowledge base article that is a good Windows Update troubleshooter article:

    You receive error message 0x80070643 when you try to install updates for Windows XP from the Windows Update Web site:
    http://support.microsoft.com/?kbid=836937

    So if you have a patch that just won't... open up that log file and see what's going on with it.

    17:06:29-0700 1 182 101 {AFCFDECF-2B9F-4881-8CFE-F56ED0DD81AF} 100 80070643 WindowsUpdate Failure Content Install Installation Failure: Windows failed to install the following update with error 0x80070643: Microsoft .NET Framework 1.1 Service Pack 1.
    2005-04-18 17:06:39-0700  968 c54c ISusInternal API failed CClientCallRecorder::DisconnectCall with error 0x8024000c
    2005-04-18 17:06:39-0700 2260 c3a4 ISusInternal::DisconnectCall failed, hr=8024000C

    I'll admit..finally getting back to WSUS

    I'm finally getting back to WSUS and finding some things in the instructions I don't get.  If I follow the WSUS wiki instructions for SBS:  

    WSUS on SBS:
    http://wsus.editme.com/WSUSonSBS

    It says:  

    This means the SelfUpdate and ClientWebService vroots are denied access and the clients do not selfupdate. To grant access to the clients to selfupdate, complete the following steps on the default Web site, and the SelfUpdate and ClientwebService Vroots:
    • Click Properties, click Directory Security, click IP address and domain name restrictions, and then click Edit.
    • Check Granted Access, and then click Add.
    • Select Group of Computers, and then add the IP address subnet mask. (This would allow all your clients within this IP range or subnet mask update from the server).

    If I do exactly that... the server IP address is in the “deny” box and I block myself from WSUS.  Huh?  That doesn't make any sense?

    Also it's unclear that when you add the workstations to the group policy you have to make sure you add http://servername:8530

    ....man is my Shavlik HfnetchkPro way blonder than this.  Click, patch, done.  But even still I was having issues last Friday on two workstations that didn't want to get the .NET patch down and from the Windows Update log file it was apparent it was due to ISA and egress filtering again.  You know about ISA and the V5 WU right?

    You experience problems when you access the Windows Update Version 5 Web site through a server that is running ISA Server:

    Oh well... someday it will be easier.  Microsoft Update is in beta... MBSA beta.... like I keep saying folks..patience...patience....

    In the meantime I'll be talking about patching on Wednesday in a webcast for “Wednesdays on the Web“  Hope to see you there!  Hopefully by then I can figure out WSUS.

    From now on I'm reading Japanese Security bulletins

    Steve Riley has said in presentations that in Japan their security bulletins are much clearer because they use cartoons.

    And he's totally right...check it out.  Go to the Microsoft Japan Security bulletin page and click on the right hand side hyperlinked bulletin and you'll see what he's talking about.

    Here are graphical representations of the bulletins from last week:


    MS 05-016 - Windows Shell


    MS 05-017 Message queuing


    MS 05-018 Kernel


    MS 05-019 TCP/IP


    MS 05-020 Internet Explorer


    MS 05-021 - Exchange


    MS 05-022 MSN Messenger


    MS 05-023 Word


    Just remember after you patch you'll look like this:


    Any questions?

    Start patching!

    [sorry Sean for all the pictures in this post]

    Do we protect you? I think not.

    "I have lost confidence (if I actually ever had it) in the ability of companies to keep pii secure"

    This thought of “is this a secure way to transmit things“ came to mind today when my managing partner today was mentioning that Attorneys really use email these days...and then he asked “Is that as secure as faxing?”. [With of course the thought being that a direct to direct telephone transfer is probably a smidge more secure than a plain text email sent and bounced through ISPs, routers and what not].  Here's the thing... it 'can' be.  If we would all set up digital signatures and swap public certificates so we could encrypt the email....but we don't.  Why?  Why hasn't this caught on?  Especially in the financial industry?   And why is it that every time I attempt to even try to sign emails digitally, clients call me up going “what is this?”  The day someone asks ME for my digital email certification, I may fall over in a faint.

    I'm sitting here tonight, trying to look at a faxed schedule and wondering if it's a '5' or an '8' I'm looking at.  The reality is that old fashioned analog may be more secure [faxing] the reality is that it's terrible as a readable media.  Just last weekend in fact I took a bunch of origianal documents of listings of checks, scanned them into a tif file and used an OCR program to convert that listing into numbers that we could use.  Because the numbers were clear and crisp, they could easily be scanned and covered into digital documents.  Faxing doesn't do this.

    Tonight I was going over the process to take an Adobe PDF file and add encryption and password protection so it could be emailed to the client.  While we could fax it, the chances were better that the person on the other end had a computer, email and the free adobe reader program. 

    In today's Senate Judiciary hearings, Choicepoint's CIO said “ We support independent oversight and increased accountability for those who handle sensitive personal data, including public record data;"

    So should we all...all of us who handle your confidential records.  I was opening up a tax file tonight [my own] and couldn't remember the password I put on it to protect it [rats, oh well] and wondered what the raw datafile looked like in note pad when it was password protected. 

    Guess what?

    I could still read the tale-tell marks of a three-two-four number in the notepad that screamed Social Security number.  You do know there are forensic programs than can grep on that three-two-four sequence as it's the traditional number pattern?  And there it was, still in plain view in a notepaid file in the tax prep program that the office uses.

    Bet that makes you feel like the Tax industry keeps your records nice and safe, doesn't it?

    Dear Mr. Aitel

    I sent an email tonight...one that won't do any good other than to make me feel better......

    Mr. Aitel is Dave Aitel from ImmunitySec who's firm has already released a proof of concept for yesterday's security bulletin MS 05-017 [message queuing] and in the email to his “Daily Dave“ listserve he taunts Mark Dowd and Ben Layer of ISS X-Force to release the exploit for Exchange [MS 05-021]

    For us in SBS 2000 land this one is a real concern....as we have the port open and we're a bullseye for this one.... remember when you go to apply this you will need [if you don't have the prerequisites already]

    Pardon me while I go off to email Kathryn Quigley, Public Relations Manager for ISS to tell her to tell Mark and Ben to “don't you dare“ release a proof of concept for this.  Not until we've had a chance to patch out here.  It amazes me the lack of responsibility toward businesses that this post from Mr. Aitel showcases.

    Remember for SBS 2003 it is NOT the same concern and thus not the same urgency.  On the 2000 platform an annoymous connection can 'nail' the mail port with this crafted 'verb' but on 2003 it would only be exploitable from authenticated connections [and folks, if some bad guy has authenticated on your SBS 2003...you have way way bigger problems...trust me...like sucky passwords..you know?] 

    Bottom line folks...let's patch up those SBS 2000 boxes shall we?  Let's not give Mr. Aitel the last laugh.

     -------- Original Message --------
    Subject:     Let's not egg them on...
    Date:     Wed, 13 Apr 2005 22:26:11 -0700
    From:     Susan Bradley, CPA aka Ebitz - SBS Rocks [MVP]

    To:     dave@immunitysec.com


    "[Dailydave] mqsvc fun:
    https://www.immunitysec.com/pipermail/dailydave/2005-April/001719.html

    So Immunity released our exploit for mqsvc in CANVAS. It's only rated "Important" but I think it's neat anyways. Next up, I guess Exchange (go Mark Dowd and Ben Layer) and TCPIP.SYS. (go Neel Mehta!) "

    How about let's not.....

    Excuse ME dude...down here in SBS 2000 land where we're still waiting for WSUS to come out can you give us some damn time to muster our troups down here to patch ...come on dude.... these are folks that won't be migrating to Linux [not for awhile anyway] ...and you don't sell your services to us and guess what dude...our port 25 is hanging open on those suckers.....

    This isn't a laughing matter or a race dude... these are small businesses that your firm doesn't sell to, nor are you out in the newsgroups helping folks to patch....you aren't hurting Microsoft ...you are hurting customers of Microsoft... how about NOT egging these folks on and give us community folks time to patch huh?

    As a security firm.... I cannot understand how you can not think of the impact on businesses and the economy here.   If you think this gets you more credibility as a professional firm... it doesn't in my book anyway.

    Yeah yeah... I'm putting my head in the sand that this stuff isn't out there already...but you know what...you don't have to put the gas can and matches out there for a worm to be built.

    To all other vendors/researchers....whatever ...that are building this POCs...just think about that business impact will you?  Consider that...please?

    Sincerely,
    Susan, community member for SBS newsgroups
    and Patcher

    Handicapping the bulletins tonight

    For those of you who may not be aware, I do the Patch Watch section of the Windows Secrets newsletter [in the paid version] and Brian Livingston has a very unique way of doing the 'paid' version.  It's whatever you want to pay.  Now that's a “Pay it forward” concept if I ever heard one, isn't it? 

    So in reviewing the patches and the action on the patch management community, there are two in particular that we in SBSland need to really watch out for because they are the HARDEST to patch for.

    That one is a concern because if you don't have a tool like Shavlik, you won't necessarily get the patch.  WSUS is still in beta and you have to manually go to Office Update.  A icky word document [and how could we get this?  what else via email] can nail a desktop.  Hopefully the A/V writers will have something to help soon.

    Next is the one that SBS 2000 boxes running with SMTP mail [you know you've set it up with MX records and all that] really really need to be aware of:

    Someone banging on our port 25 with some bad crafted 'gunk' could nail our boxes.  Exchange 2003 doesn't have this same issue...it can only be attacked from another Exchange box [which ..obviously we don't have here], but 2000 boxes are a concern.  And as of right now, again we don't have a patch tool that will scan for this. 

    I cannot stress ENOUGH that Windows Updates is NOT enough to patch our boxes.  You must manually install that Exchange patch on your Small Business Server systems.

    Test the patch on your test systems, and if you don't have a test system, hang off for a few days, we'll tell you want we seen in the community.  Don't forget on April 20th I'll be doing a patch webcast and will specifically talk about what I look for in bulletins to evaluate risk and deployment issues and will use these April bulletins as examples.  See you then!

    Security patches out today

     April 12, 2005
    Today Microsoft released the following Security Bulletin(s).
    Note:
    www.microsoft.com/technet/security and www.microsoft.com/security
    are authoritative in all matters concerning Microsoft Security
    Bulletins! ANY e-mail, web board or newsgroup posting (including this
    one) should be verified by visiting these sites for official
    information. Microsoft never sends security or other updates as
    attachments. These updates must be downloaded from the microsoft.com
    download center or Windows Update. See the individual bulletins for
    details.

    Because some malicious messages attempt to masquerade as official
    Microsoft security notices, it is recommended that you physically type
    the URLs into your web browser and not click on the hyperlinks provided.

    Bulletin Summary:

    http://www.microsoft.com/technet/security/Bulletin/ms05-apr.mspx


    Critical Bulletins:

    Vulnerabilities in TCP/IP Could Allow Remote Code Execution and Denial
    of Service (893066)
    http://www.microsoft.com/technet/security/Bulletin/ms05-019.mspx 
    Cumulative Security Update for Internet Explorer (890923)
    http://www.microsoft.com/technet/security/Bulletin/ms05-020.mspx
    Vulnerability in Exchange Server Could Allow Remote Code Execution
    (894549)
    http://www.microsoft.com/technet/security/Bulletin/ms05-021.mspx
    Vulnerability in MSN Messenger Could Lead to Remote Code Execution
    (896597)
    http://www.microsoft.com/technet/security/Bulletin/ms05-022.mspx
    Vulnerabilities in Microsoft Word May Lead to Remote Code Execution
    (890169)
    http://www.microsoft.com/technet/security/Bulletin/ms05-023.mspx

    Important Bulletins:

    Vulnerability in Windows Shell that Could Allow Remote Code Execution
    (893086)
    http://www.microsoft.com/technet/security/Bulletin/ms05-016.mspx 
    Vulnerability in Message Queuing Could Allow Code Execution (892944)
    http://www.microsoft.com/technet/security/Bulletin/ms05-017.mspx
    Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege and
    Denial of Service (890859)
    http://www.microsoft.com/technet/security/Bulletin/ms05-018.mspx
    This represents our regularly scheduled monthly bulletin release (second
    Tuesday of each month). Please note that Microsoft may release bulletins
    out side of this schedule if we determine the need to do so. If you have
    any questions regarding the patch or its implementation after reading
    the above listed bulletin you should contact Product Support Services in
    the United States at 1-866-PCSafety (1-866-727-2338). International
    customers should contact their local subsidiary.

    If you are on XP sp1 you won't wake up with XP sp2 tomorrow

    Dear Microsoft/WagEd/whomever was in charge of your communication on the 'expiring blocking mechanism of 4/12/2005”:

    Next time, can you try to do a better job of communicating than you did?

    Your article here totally is confusing, misleading and quite frankly scares people.

    Conversely Paul Thurott's article here gives the facts:

    “However--and this is the most important point--Automatic Updates won't automatically install SP2 at that time. Instead, you must first agree to the End User License Agreement (EULA) before SP2 will install via Automatic Updates. If you decline the EULA, SP2 won't install. End of controversy.”

    For those folks who also say that they'd love to install it but their vendors won't support it yet, do me a favor and send them this link:

    Windows Application Compatibility Toolkit

    The Application Compatibility Toolkit (ACT) 4.0 was designed to help IT Professionals minimize the risks associated with changes to the operating system and to deploy Windows XP SP2 quickly so they can realize the value of the investments Microsoft has made in securing the desktop from threats such as viruses, worms, and spyware.

    Remember what has been said before about XP sp2 -- this is a WIN for the Security guys.  So get your vendors [who obviously don't seem to be into security now, are they?] to help you get your desktops be part of your security protection system.

    April 12 should not be a day of concern for you, rather it should be the day you put your vendors on notice that it's time for them to pick up the ball.  I can understand if you can't find the vendor anymore, but folks, if you have a vendor that is on the record for not supporting SP2, that vendor needs to get a clue.  They need to help you, help us out here get more secure.

    XP sp2.  If you don't have it installed.  Do it.

    If it's because of vendor support, start pressuring them.

    It's time.

    So how do you handle patch day?

    Next Tuesday is patch Tuesday.

    Okay ...you folks reading the blog BETTER know what Patch Tuesday is.  It's the day that patches come out...security patches.  Microsoft Security patches to be exact. 

    We already know there are indeed bulletins this month, some critical, some need a reboot.  So how do you handle Patch Tuesday?  Or even get prepared for a Service pack installation?  Want to know how I do it?

    April 20, I'll be doing a webcast on Patch Management for the SBS world. [right now that title doesn't say anything but trust me... that's my event].  And what will I be talking about?

    • How to read a bulletin
    • Risk ratings
    • How to set up a testing environment
    • Key clues to look for in security bulletins that may warrant additional review [hint what I'm going to point out here is key files and what they've historically meant in prior patches]
    • Deployment strategies
    • Making sure you can roll back
    • Resources for 'ooops that wasn't so good'
    • And community resources for patching [where to get good information]

    I will be talking about WSUS and other patch tools as well as talking about getting ready for SBS 2003 sp1.  Like for example one thing that Dell customers using Dell Open Manage 4.3 and earlier should be aware of is that you will need to wait for the release of Dell Open Manage 4.4 before you deploy SP1:

    Dell OpenManage version 4.4 is the first version that supports SP1. Make sure you upgrade your OpenManage to version 4.4 before installing SP1. Dell plans to release version 4.4 in late May 2005.

    So join me on April 20th for some discussions on “Handling Patch day”.

    DNS, poisoning, pharming attacks and the SBS impact [part one - background information]

    If you are a fan of www.incidents.org like I am you've been wondering if you should be worried about all this DNS cache poisoning aka Pharming that's been going one.  As they state in today's entry:

    http://isc.sans.org/diary.php?date=2005-04-07

    (Note: Windows systems are not protected even with their magic registry entry IF they trust an upstream dns system that doesn't clear additional dns records from the answer to the query and site the article. - upgrade to the right SP on W2K
    - not forward to vulnerable windows DNS caches
    - not forward to pre-BIND9 bind DNS caches

    If you know anything at all about how SBS is set up in our default wizardized mode, we set up DNS forwarders.  Okay, so I know I have my DNS set up to Pacbell's DNS forwarders:

    So of course the first question I am asking myself is ...okay..what version of either Microsoft DNS or BIND does Pacbell run?  I “AM” an SBSer that forwards to their DNS.  I emailed their tech support last night... [okay yeah that's a vain hope that I'll get an authoritative answer..still waiting on an answer].  So in asking the real gurus like Andrea “ObiWan“ Zenobi, Microsoft MVP in Windows Server and Networking, he did a check on a server at Pacbell and found that the server at 206.13.28.11 is running BIND 8 not BIND 9. 


    dig pacbell.net NS

    ;; QUESTION SECTION:

    ;pacbell.net.                   IN      NS

     

    ;; ANSWER SECTION:

    pacbell.net.            69218   IN      NS      ns1.pbi.net.

    pacbell.net.            69218   IN      NS      ns2.pbi.net.

     

    ;; ADDITIONAL SECTION:

    ns1.pbi.net.            84814   IN      A       206.13.28.11

    ns2.pbi.net.            69218   IN      A       206.13.29.11

     

    using http://www.rfc.se/fpdns/  to fingerprint the two nameservers above

     

    fpdns.pl 206.13.28.11

    fingerprint (206.13.28.11, 206.13.28.11): BIND 8.2.2-P3 -- 8.3.0-T2A

     

    fpdns.pl 206.13.29.11

    fingerprint (206.13.29.11, 206.13.29.11): BIND 8.3.0-RC1 -- 8.4.4


     

    Hmmmm, that sure looks like a pre BIND9 to me, doesn't it to you?  Okay so now that I know that I'm forwarding to a ISP that uses probably a BIND version that does not automatically protect me by scrubbing it's DNS before it transfers them back down to me, [unlike the default configuration of Microsoft DNS servers after Windows 2000 SP3], not knowing if PacBell's computer tech team is as wacko on patching as I am, I'm starting to do a bit more investigation.

     

    Note If a DNS server has been configured to forward resolution requests to another server, establishing a child-parent relationship, the child DNS server could still be vulnerable to DNS cache pollution attacks performed against a parent DNS server if that server is not performing DNS cache pollution protection. By default, Microsoft DNS servers, using Windows 2000 Service Pack 3 or later, acting as a parent in a child-parent relationship will fully perform cache pollution protection. Therefore, make sure that all DNS servers in an organization have DNS cache pollution protection enabled.

     

    The reality is... I'm a “child server” here dependent on the “parent”, in this case, my ISP, to be this scrubber.  I don't know about you, but if I can't vouch for the patch status of 'those servers' like I can my own, we're going to be making changes in how DNS is set up in my SBS box.

     

    The IT-ISAC paper on DNS Cache poisoning that I just got today says the problem was multi pronged [with my comments added]. 

    “There were four broad categories of affected systems:

    • Unpatched Symantec Firewalls - Classic DNS cache poisoning through use of appended bogus answer records in unsolicited DNS replies.  Solution:  Patch
    • Older versions of DNS servers running Windows NT or Windows 2000 prior to SP3 [hello people again PATCH].  KB 316786 has details on how to protect older systems.
    • Unix and Windows systems simply compromised... remember class how we clean a compromised system?  Remember why we patch?
    • Up to date Windows DNS servers were poisoned in spite of having the latest patches - this final category [they said in the sheet] was the most troubling since there was no known mechanism for the poisoning.

    One of the incidents research that fit into category four revealed that the DNS server was configured with a “forwarder“ (a designated system to which DNS requests are forwarded).  This is a normal practice in tightening down adn marshalling DNS in larger enterprises where all DNS is channeled through larger DNS servers for caching and traffic control.  In this case, the designated target forwarder was an unpatched Symantec firewall.“

    Remember also that's “our“ default recommended way in SBSland is to do forwarders.

    First off, remember that you do not need those entries in there in the first place.  They were used at a time when we had slow connections and needed to rely on such things, now we can just let root hints take their place.  So the first thing you can do if you are a paranoid Chicken Little like I am and don't trust your Telephone company's operating systems, is to rerun the Connect to Internet Wizard and remove those forwarders.

     

    There's one more step I'm planning on doing [first on the test server at home before doing it here] Obiwan also has a suggestion to move from Roothints to Slave-Root mode.  Stay tuned for Part 2 of “DNS, Poisoning, pharming attacks and SBS impact“ coming to a blog near you.

     

    RFC 2136 and RFC 2870 talk about DNS along with a bunch of RFCs here.  Along with  - Windows DNS http://support.microsoft.com/?kbid=323380 and 

    - BIND DNS http://www.cymru.com/Documents/secure-bind-template.html and an oldie but goodie here:  http://www.securityfocus.com/guest/17905

    Troj_Small.AFG alert out there today

    The newsgroup today had reports of this Trojan file... a browser helper object... being reported on systems.  And at first we were wondering if it was a false alarm... but it appears to not be one.

    Now I'm not saying I'm perfect here at the office but I do try to be proactive, and if you'll notice I don't have too many tips and tidbits about cleaning up malware [other than I personally would be having a heart attack and flattening the system because I wouldn't personally trust it anymore].  Besides all of the critical data isn't on the desktop....remember?  It's on the server in SBSland anyway.

    But here are some clean up information that may be of help:


    Courtesy of MVP Bob Celrelli:  http://www.onecomputerguy.com/ie_tips.htm#winsock_fix

     

    If no Internet application like IE, Outlook Express or other browsers are

    working, it may be due to corrupted Winsock registry entries.  First make

    sure you can connect to the Internet.  Ping a web site by name (e.g. ping

    www.yahoo.com) If you get a response back, then you can connect to the

    Internet.

     

    The basic steps are to:

     

    Delete the corrupted Winsock registry entries Import clean ones Reboot the

    computer

     

    For Win98:

     

    Remove the old registry entries - Download Registry Entry

    http://www.onecomputerguy.com/reg/xp_del_winsock.reg

    Import the correct registry entries - Download Registry Entry

    http://www.onecomputerguy.com/reg/win98_winsock.reg

     

    For WindowsXP:

     

    Remove the old registry entries - Download Reg file

    http://www.onecomputerguy.com/reg/xp_del_winsock.reg

    Import the correct registry entries - Download Reg file

    http://www.onecomputerguy.com/reg/xp_winsock.reg

     

    For Windows2000

     

    Remove the old registry entries - Download Reg file

    http://www.onecomputerguy.com/reg/xp_del_winsock.reg

    Import the correct registry entries - Download Reg file

    http://www.onecomputerguy.com/reg/winsock_2k.reg

    For Windows ME

    http://www.onecomputerguy.com/ie_tips.htm#winsock_fix

    From MVP Jim Byrd:
     
    #########IMPORTANT#########
    Before you try to remove spyware using any of
    the programs below, download
    both a copy of LSPFIX here:  
    <http://www.cexx.org/lspfix.htm>
     
    AND a copy of Winsockfix for W95, W98, and ME
    http://www.tacktech.com/pub/winsockfix/WinsockFix.zip
    Directions here:  
    <http://www.tacktech.com/display.cfm?ttid=257>
     
    or here for Win2k/XP
     <http://files.webattack.com/localdl834/WinsockxpFix.exe>
    Info and download here:
    <http://www.spychecker.com/program/winsockxpfix.html>
    Directions here:  
    <http://www.iup.edu/house/resnet/winfix.shtm>
     
    The process of removing certain malware may kill 
    your internet connection.
    If this should occur, these programs, 
    LSPFIX and WINSOCKFIX, will enable you
    to regain your connection.
     
    NOTE: It is reported that in XP SP2, the Run command
     
    netsh winsock reset
     
    will fix this problem without the need for 
    these programs. (You can also try
    this if you're on XP SP1. There has also 
    been one, as yet unconfirmed,
    report that this also works there.) Also, 
    one MS technician suggested the
    following sequence:
     
    netsh int reset all
    ipconfig /flushdns
     
    See also:  for additional XPSP2
     
    <http://windowsxp.mvps.org/winsock.htm>
    info/approaches using the netsh command.
    #########IMPORTANT#########

    Don't forget to try out the Microsoft Anti Spyware beta. 
    I've been very pleased with it here on the machines 
    in the office...and I didn't get any Troj_Small.afg's today.

    Operation Small Business Server Service Pack 1

    Windows 2003 Service Pack 1

    Note: If you use Microsoft Windows Small Business Server, we recommend that you wait to install this service pack until Service Pack 1 for Windows SBS is released later in 2005. For more information, see Windows Small Business Server 2003 and Windows Server 2003 SP1 Known Issues.


    Okay troups.

    There change in our future.  A service pack heading our way within 60 days.  It's been amazing to me how people on listserves are applying in and in various successes and failures.  Of course the ones with issues are the ones that post...but what's amazing to me is that many say that “They don't have time to call Microsoft to deal with the issues caused by the Service pack”.  Well then...why did you install it if you didn't have the time to deal with the issues.

    Folks this is CHANGE.  And to handle CHANGE you need to plan.

    First.

    Reboot your server.

    You heard me... reboot it.  Everything okay? Good.  Now you can think about applying the SP.  If you can't reboot with no issues, then applying a service pack isn't going to help.

    Next.

    Have a way to get out to the Internet no matter what

    There's a reason that my wireless access is separate from the SBS server because I need a way to get information and data from the Internet should something happen.  Always leave yourself a good back door.

    Next.

    Backup.

    You are going to be changing a lot of bits and bytes... Hello?  You had better have a backup ...you know...system state the whole shebang.

    Fully back up your servers. Your backup should include all data and configuration information that is necessary for that computer to function. It is important to perform a backup of configuration information for servers, especially those that provide network infrastructure, such as Dynamic Host Configuration Protocol (DHCP). When you perform the backup, be sure to include the boot and system partitions and the System State. Another way to back up configuration information is to create a backup set for Automated System Recovery.

    Next

    Test.

    Don't just roll it out on a production server the day SBS 2003 comes out.  [I“m amazed at how folks in SBSland just downloaded that sucker on day one...granted the folks at Microsoft dogfooded it to death but you COULD NOT have had done a backup before you started applying that service pack.  Then, either try it on a test server first [again for MS partners, sign up for that action pack for this very purpose] or watch the newsgroups where we'll let you know if there's some overriding issue.  But do understand that by the time they reach release ...they have been through a level of testing on a variety of SBS machines up at Redmond.  Remember too, this is a SBS service pack so it truly has been tested on SBS boxes.

    Next.

    Drivers and third party stuff.

    More often than not, your issues [if any] will be caused by drivers and what not.  When I rolled out XP sp2 throughout the office, two computers with digital video cards were my problem children.  I had to boot into safe mode and roll the driver back to the SP1 version and all was well.  Be prepared for finding drivers.  I know at home on my test box, merely applying the Windows 2003 sp1 lost my ancient scsi card that I use to attach an old HP surestor tape drive, thus I need to track down a driver for that before I install it for real at home.  But it's drivers and third party software that more often than not are your issues.  This is why even testing on a VMware doesn't fully capture any issues because sometimes it's specific to your hardware.  As a consultant, this is where standardization on hardware helps you out as you can follow the patterns [if any] that show up.

    Next.

    Don't panic.

    Windows patches come off.  This one does.  Now granted in SBSland it messes a bit with faxing ...but it's totally fixable.  And YOU DO have a backup anyway...right? So don't panic and set aside enough time that 'if' issues arise you can deal with it.  Don't start doing this when you have a short window of time.  Be prepared to call Microsoft support either through customer service at 1-866-PCSafety or through Microsoft partner portal, and get help.  Many times Service pack installation issue calls are a free call.

    Lastly.

    Don't have the server autoupdate

    Not for this, this one is too big and some parts of it [especially the Premium version] will need cdrom media for the ISA 2004 part of the installation [remember this will be available for shipping, media, handling charges for owners of SBS 2003 premium boxes], so if you are using Automatic updates and allowing the server to auto reboot....well....stop doing that.  You truly want to only install things when YOU want to...not second Tuesday of a month.  At this time all I know is that normal Windows 2003 sp1 will be coming down via autoupdate in July.  I've not heard the plan of attack of how “Operation SBS sp1“ will unfold but if Automatic updates is in any way part of the action plan... please don't use that as your main install vehicle...not for this one, it's too important. 

    You really and truly want to install this SP exactly 'when' you want it, preferably...

    • ....after a reboot
    • ....with a backup Internet access
    • ....after a backup [with system state]
    • ....after a test
    • ....with needed drivers
    • ....and being calm about it.

    So how about it troups?  Are we about ready?  Within 60 days, Operation SBS sp1 will begin!

    Home computers

      No, I'm not talking about XP Home computers.. I'm talking about 'home computers.   Tom in the mailbox asks if I work on home computers and what do I do when a clients asks you to?  Tom says he used to do it on the side but is getting tired of it.

    They are pretty gunked up aren't they Tom?  And yet they won't let you do what you really need to do which is flatten those boxes and start over because they really don't have a good backup strategy for home systems.

    I know that I do indeed support home computers of the folks here at the office... of my neighbors....of my clients......but it does indeed get a little annoying when you can't truly do to those machines what you want to do. 

    I know that while I count the 'physical' computers here at the office, I also count the computers at home of the people that work in the office under my supervision as well.  Their 'health' affects my network's health.  In my mind, at this time with the Remote Web Workplace, my major concern is someone not following my firms policy and using a kiosk computer to log in.  I've set passwords appropriately, my issue is more of a people one.  I mandate that they must use firm equipment when making a remote connection or only a home computer that I've handed them antivirus and what not on the machine.  While my 2x4 security device works well, there will come a day that I'd like to have some better technology enforcing how folks log in rather than a piece of Douglas Fir.

    On another note, I personally haven't used the VPN connection into the office in such a long time I'm thinking of closing off the connection.  A VPN connection back into an office from a home computer can be and has been a major risk if the machine tunneling in was infected with worms and viruses.  Remember too of the added benefit in the RWW connection isn't making a drive connection between my computer and that of the office, the VPN split tunnel effect that is a concern isn't going on.

    Remember your big issues with Home computers discussed in a how Microsoft does remote access are....

    • Unmanaged and infected remote devices put corporate resources at risk
    • Viruses, trojans, worms
    • Home users machines are a frequent hacker target

    So many times in SBSland the question comes up when a VPN connection is made from home that they can't surf the Internet.  But you need to understand what is going on.  You are bridging back from that potentially infected machine into your network.

    Think of those home machines you've cleaned up.... you really want 'that' on your network?

    So.....how many 'home' computers...not XP Home computers.... do you support?

    Hey Mikey! There's information about the Service Pack 1 on SBS!

    Now Mikey, remember our previous lesson of why you don't want to be first in applying these service packs.  Even though [as has been pointed out] that they have been 'dog-fooded' to death by Microsoft, it's still better if in SBSland that you do that first download not on your production server....at lunchtime...middle of the day...middle of the week.....well .....you get the idea. That's just not the time to be going first...or second... as the case may be.

    Today on the Microsoft site is the 'known issues' that were discussed in the newsgroups the other day.  Mikey...you should AT LEAST wait for this kind of stuff to be released before trying it you know.


    Windows Small Business Server 2003 and Windows Server 2003 sp1 Known Issues

    This document covers the top known issues you may encounter when installing Windows Server 2003 Service Pack 1 on Windows Small Business Server 2003.


    I also found another hotfix that 'if” we were stupid enough to apply SP1 to our SBS 2003 premium boxes today we'd probably be needing for ISA 2000.  BUT the good news is ..we totally DON'T need this because we're getting ISA 2004 when SBS 2003 sp1 comes our and ISA 2004 is not affected by this.

    See Mickey, why you need to just hold your horses and wait until 'our' service pack comes out?

    We've even gotten some requests about ISA 2004 in the newsgroups.  It will be interesting to see if more people jump on the lovin' ISA bandwagon when 2004 comes out for us.  Remember if you already have Standard, all you need is that Standard to Premium upgrade SKU of T75-00140 which gives you 'both' ISA and SQL.  You also do not have to have Software assurance [but ...I would argue that SA is still a good thing nonetheless...remember I'll automagically get the media sent to me while you 'normal' types will be going online and ordering a cdrom...shipping, handling, docking fees, etc...etc...]  ISA gives you a lot more ability to control and report on Internet access.

    So Mikey?  Just be patient just a little bit longer!

    To the Windows Update team

    First off... I have to say I'm sorry to you guys and gals for jumping on you guys over the last couple of days and a huge thank you.  Consider yourselves kinda the punching bag folks for my frustrations with patching in SBSland.  Like I've said before I know there's a lot of movement and change regarding patch management and well, you guys kinda bear the brunt of a lot of my frustrations and you guys and gals don't deserve it. 

    Thank you to the Windows Update team for proving that Microsoft is agile and responsive.  Thanks to whomever for removing the offering up of the SP1 patch to SBS 2003 boxes on Windows update.

    I think there are still lessons to be learned in SBSland from this experience:

    Being the first on your block to install a patch is just plain dumb.

    I'm sorry but it is.

    You know ...just because you go to Windows update on the DAY that a service pack releases doesn't mean that you should install it.  Look at us....there are some issues [granted no blue screen of death and if you didn't need to change the RRAS or change the IP address of the server or uninstall it and see the fax issue, you'd probably never see these issues], but you don't have to install this the first day it comes down.  WAIT for those of us that have test boxes to let you know that it's okay.  Wait for the communication to come out.  That patch was WAY to freshly baked to be installing it on SBS boxes.  That's what the SBS patch community is all about... you let someone else go first. 

    You remember the Life cereal commercial...'I'm not eating.... you eat it.....I'm not going to eat it.....let's get Mikey to try it”.  Let the SBS community out here 'be Mikey” for you and let you know if the patch is okay to put it on your box.

    When we say “hey our boxes like it!“ then you can go ahead and install it on your systems.  If you have a test network at home, install it there first and even then, still look at the community for feedback.  One that I hang around is on the listserve at patchmanagement.org

    Just remember..if you don't hear us say:

    Don't install it on your SBS box.

    That was then, this is now...and a thanks

    This was yesterday when Windows update offered up Service Pack 1 to SBS 2003 boxes:


    This is today when it doesn't:

    [And I have to 'out' myself.... I left off .NET sp1 for now because of a few wacko hotfixes I've seen and didn't want to mess with the .NET service pack ..... as I hate Service packs as you can tell and planning to apply it after busy season is over at the office...so yes...I'm missing a service pack on purpose because I hate them]

     


    And just to confirm this is my member server where Windows 2003 sp1 is indeed still offered up:

     


    Thank you for your quick action gang... and one blog hug to all the folks that scrambled to take action on our concerns.  For a big company...you showed you had a bit of agility in you today.

    And if you installed it, and then uninstalled it to find that Fax services now does not work try this:

    After you remove WS SP1, Change registry value
    HKLM\software\Microsoft\windows\Currentversion\Telephony\Country List
    \CountryListVersion to 0.
    Then, reboot (you must reboot, restart fax does not work) and and re-run the
    Fax Configuration Wizard from the Fax Snap-in.

    SBS 2003, WU, AU and SUS

     I'm stealing a post from Les Connor from the newsgroups:


    There are three cases here that must be addressed separately.

     

    1. SBS server with Automatic Updates enabled, automatic

    download only, or install also.

     

    - Windows Server 2003 SP1 will not be automatically

    downloaded, or installed, until July.

    - Action: No action required.

     

    2. Manually run Windows Update from the SBS Server.

    (this is not the same as Automatic Update). Windows Server Sp1

    will be shown as a critical update.

     

    - Action - do not select the SP to be installed.


     UPDATE - 4/2/2005 - Windows update no longer offers up SP1 to SBS boxes.   Thank you Microsoft for responding to our concerns.  Thank you for your quick action and response.


     

    3. SUS installed, with SBS as an SUS client. If the Windows

    Server SP1 has been approved in SUS, *and* the SBS

    is an SUS client - then the SP1 will available to the SBS.

    Whether it is installed automatically or not to the

    SBS will depend on your specific GP settings for SUS.

     

    - Action: Best practice is to *not* have the SBS as an

    SUS client. Your SUS policy should apply to workstations

    only, not servers. But if your SBS *is*

    an SUS client, then see the next action.

     

    - Action: Best practice is to *not* have SUS configured

     for automatic approval of updates. All updates should

    be approved manually. You may elect *not* to approve

    WS 2k3 SP1, then it won't be available to your SBS.

     

    Update SUS is also getting the configuration change.

    You may need to resync your SUS to 'get this“

     

    So you see, WU, AU, and SUS are all slightly different

    technologies, and the configurations also allow for

    variations in how the update technology in use

    will react in relation to WS2k3 SP1.


    UPDATE - 4/2/2005 - Windows update no longer offers up SP1 to SBS boxes.   Thank you Microsoft for responding to our concerns. 


    Windows 2003 SP1, SBS 2003 and Automatic updates

    Dan emails “ I'm concerned that it has not been made clear that Server 2003 SP1 will be installed if Automatic Updates is enabled on SBS 2003. At least, this is what I read in the newsgroup. I fear that many SBS implementations are configured this way.”

    Dan, I purposely turned on Automatic Updates on my SBS 2003 server at home [the one that I test stuff on] and no automatic update came down.  So I can state that the statement that was sent to me earlier that said AU delivery would not occur until July is a true statement.  Don't worry..just like news reports on XP sp2 that supposedly will be blasting down on April 12th...NOTHING will happen.

    Therefore to the community out here....know that at this time, it is still offered on Windows update, but it will NOT be offered up on Automatic updates.


     UPDATE - 4/2/2005 - Windows update no longer offers up SP1 to SBS boxes.   Thank you Microsoft for responding to our concerns.  Thank you for your very quick action and response.  If you've already installed it.. leave it on .... as the only issues are with the RRAS wizard and Change IP wizard.  If you haven't installed SP1 ..no problem.... just wait until the SBS unique sp1 comes out.  As is shown below it will be shortly.


     This Alert is to make you aware that Windows Server 2003 Service Pack 1
    (SP1) today reached Release to Manufacturing, and is now available to
    customers for download.

    Customers will be interested in Windows Server 2003 SP1 as regards
    security for the following reasons:

    - Windows Server 2003 Service Pack 1 is a unique service pack that
    provides customers with significant security enhancements and
    reliability and performance improvements.
    - Building on a comprehensive collection of critical updates, Service
    Pack 1 addresses additional core security issues by providing customers
    with a reduced attack surface, better protected system services with
    stronger default settings, and reduced privileges.
    - With Windows Server 2003 Service Pack 1, the development team took
    the time to treat the root cause of many security issues, not just the
    symptoms. This service pack is very significant and should help address
    certain classes of exploits.

    In addition, Microsoft is announcing that Windows Small Business Server
    2003 Service Pack 1 will also be available to customers within 60 days.


    Note: Customers who have Automatic Updates enabled with automatic
    download should be aware that Windows Server 2003 SP1 will be made
    available through Automatic Updates (AU) as a High Priority update in
    July 2005. More information about SP1's availability through AU will be
    made available closer to this deadline.

    Customers can obtain Windows Server 2003 SP1 at this location:

    If you have any questions regarding this alert please contact your
    Technical Account Manager or Application Development Consultant.

    Thank you,
    Microsoft PSS Security Team

    My apologies.

    I'm an SBSer.  And I feel that I represent the SBS community to Microsoft.

    I feel like I've let the community down today.

    I didn't represent you well enough to the Windows Update team.  I didn't understand the impact of the 'normal' Windows 2003 service pack 1 was on our SBS boxes.  I didn't follow the beta closely enough to fully understand that it would have impact.  I didn't understand that a Service pack that has impact on our SBS boxes would be offered up to us top of the window in Windows Update today.

    I let you down.  For that I apologize.

    Going forward I'm going to make it my personal goal to ensure that the patching goals at Microsoft include a goal that if a service pack of any kind adversely affects us that it will be blocked in Windows Update and will not be offered up to you if you go to Windows Update[Update... the Service pack is no longer on Windows update -- Thank you Microsoft for being VERY agile and responsive]

    Someone asked today how to set up a test network if all they had was a production one and you can [if you are a Microsoft partner...see why you want to be a Microsoft partner] get a subscription to the “Action pack” which is a bundle of software that would be perfect for a 'test' network.  But if you don't have the time for that ask in the communities about how the patch is working on systems.  We'll tell you.

    This one should not be installed on SBS.


    UPDATE - 4/2/2005 - Windows update no longer offers up SP1 to SBS boxes.   Thank you Microsoft for responding to our concerns. 


    From Sean Daniel, Windows Small Business Server

    There has been quite a few questions regarding Windows Server 2003
    SP1 and it's support on Windows Small Business Server 2003: I hope
    this post will clear up any of the confusion here.  If you have
    immediate questions, please feel free to follow up in the public
    Microsoft Newsgroup at: microsoft.public.windows.server.sbs I will
    attempt to answer your questions as best I can.

    Windows Server 2003 SP1 is supported on Windows Small Business
    Server 2003, but there are some known integration issues that are
    resolved in the Small Business Server SP1 (available within the next
    60 days).  With the Windows Server SP1 installed, you may encounter
    the known issues and our recommendation is to:
    a)      Be patient with the issue and wait for Windows Small
    Business Server 2003 SP1
    b)      Un-install Windows Server 2003 SP1, and wait for Windows
    Small Business Server 2003 SP1, which includes Windows Server SP1

    Furthermore, a KB Article will be written to further address these
    issues, I will post it to the public newsgroup when it is available.

    In the mean time here is the short list of the known issues:
    -      Remote Access Wizard hangs when creating the connection
    manager package
    -      Small Business Server Change IP tool will fail
    o      Change IP tool will continue to fail after un-install of WS SP1
    o      Workaround: Remove WS SP1, disable DHCP, re-run CEICW
    -      Power Users retain SharePoint Administration privileges even
    after the role is changed to Reader
    -      Re-Install of Exchange fails
    -      Re-Install of Intranet component fails
    -      Fax Services won't start and the Fax Configuration Wizard
    cannot be run after un-installing Windows Server SP1
    -      DHCP service may not start after a restore

    Please let me know if you have any further questions

     

    Here's how to install a Service pack

    Here are Susan's suggested items on how to install a service pack on SBS 2003

    • You don't install it on a production system, middle of the day during lunch time
    • You don't install it before a weekend
    • You don't install it before testing it yourself
    • You don't install it before waiting for feedback from others [Community ...check with the community before installing it]
    • You don't install it when it's Windows 2003 sp1 and we should wait for SBS 2003 sp1


    UPDATE - 4/2/2005 - Windows update no longer offers up SP1 to SBS boxes.   Thank you Microsoft for responding to our concerns. 


    Coming Soon: Windows Small Business Server 2003 Service Pack 1

    Published: March 29, 2005

    The worldwide rollout of Windows Small Business Server 2003 Service Pack 1 (SP1) will occur in the next few months. Visit this page in the next 60 days to download Windows Small Business Server 2003 SP1.

    Experience the Enhancements to Windows Small Business Server 2003 Service Pack 1

    Windows Small Business Server 2003 SP1 will improve on the security, performance, collaboration, and productivity benefits built into Windows Small Business Server 2003.

    Windows Small Business Server 2003 SP1 will be comprised of the latest service packs and updates for Windows Small Business Server 2003 and its product components, including:

    Microsoft Windows Server 2003 SP1

    Microsoft Windows SharePoint Services SP1

    Microsoft Exchange Server 2003 SP1

    Microsoft Office Outlook 2003 SP1

    Microsoft Windows XP SP2

    Microsoft SQL Server 2000 SP4 (Premium Edition only)

    Microsoft Internet and Security Acceleration (ISA) Server 2004 (Premium Edition only)

    Also included are built-in and customized integration capabilities to ensure a smooth installation experience. Windows Small Business Server 2003 SP1 will be available in 18 languages: English, German, Japanese, French, Spanish, Italian, Chinese (Simplified), Chinese (Traditional), Korean, Dutch, Polish, Swedish, Portuguese, Brazilian, Hungarian, Czech, Russian, and Turkish.

    5717D53E-DD6D-4d1e-8A1F-C7BE620F65AA

    5717D53E-DD6D-4d1e-8A1F-C7BE620F65AA

    Don't know what that is? 

    That's the unique SBS 2003 GUID code for the SBS suite.  Do a search in the registry and you'll find it in a couple of places.

    I'm sure you know you have SBS 2003.  You are an SBSer right?  But right now Windows Update doesn't know you are a SBS box.  It thinks you are a Windows 2003 box.  The good news is that it's not coming down on Autoupdate [thank goodness for that], but the bad news is if you run Windows Update on a SBS box it will indicate that you need this.  You don't.  Also watch out for SUS and make sure that the service pack isn't approved.


    UPDATE - 4/2/2005 - Windows update no longer offers up SP1 to SBS boxes.   Thank you Microsoft for responding to our concerns.  And sorry too to the WU team.. I know you know what SBS is but you know us gals in the heat of the moment..stuff pops out.  Thank you for your quick action and response.


    Let me say this loudly

    IF YOU ARE RUNNING SBS 2003 WAIT FOR OUR SBS 2003 SP1  - don't install this when it shows up on Windows update like this:

    Again, do not install this patch from Windows Update.


    UPDATE - 4/2/2005 - Windows update no longer offers up SP1 to SBS boxes.   Thank you Microsoft for responding to our concerns. 


    Note: Customers who have Automatic Updates enabled with automatic
    download should be aware that Windows Server 2003 SP1 will be made
    available through Automatic Updates (AU) as a High Priority update in
    July 2005.

    Windows 2003 SP1 RTMs...ours is still in the oven

    For those of you running 'normal' Windows 2003, you can start testing on the SP 1 as it just 'RTM'd....

    For those of us on SBS 2003 remember

    In addition, Microsoft is announcing that Windows Small Business Server 2003 Service Pack 1 will also be available to customers within 60 days.

    I'm putting that in Bold and in Color because I missed reading it the first time.  [ummm...sorry Jerry!... I tell ya going blind]

    So folks... ours isn't ready yet.  Hang tight just a little longer.


    Download details: Windows Server 2003 Service Pack 1:

    Install Microsoft Windows Server 2003 Service Pack 1 (SP1) to help secure your server and to better defend against hackers. Windows Server 2003 SP1 enhances security infrastructure by providing new security tools such as Security Configuration Wizard, which helps secure your server for role-based operations, improves defense-in-depth with Data Execution Protection, and provides a safe and secure first-boot scenario with Post-setup Security Update Wizard. Windows Server 2003 SP1 assists IT professionals in securing their server infrastructure and provides enhanced manageability and control for Windows Server 2003 users.

    Which includes
    Security Configuration Wizard for Windows Server 2003:
    This is actually a cool tool but we don't need to run it on our SBS 2003 boxes as we're very well tweaked just as we are right now.  Again for those on normal server, take a look at it. 

    How to Shutdown

    Ever notice how there's like four or five ways to do the same thing?

    I posted about my Remote Web Workplace experience and wanted to know if there was a way to remotely shut down.  Matt posted in the comments "shutdown.exe" but there's a couple more.

    Handy Andy said Start> run> “shutdown -r“

    For one, once I have that Control-Alt-End which is the remote desktop equivalent of Control-Alt-Delete [the infamous three fingered salute -- no relationship to David just happen to share the same name]...bingo, I have a button there that says "shutdown". 

    Duh.

    Then Chad and Marina said, click on Start and Windows Security and sure 'nuff in a RDP session, Windows Security...which is the shortcut to the screen that gives you task manager, shut down, log off, etc. is right there. [Which is of course the same solution pointed out to me by Dave in the post that started this whole exercise in the first place  -- that once you RDP into a session either via RWW or onto a server, that the Windows Security shortcut is right there, just a mouse click away]

    Learn something new every day!

    Sniffin' a bit of a password tonight

    Russ in the newsgroup picked up a new SBS client and they didn't write down the POP connector password.  He asked “Anyone know of password programs that unhide password in 2003?  All I can find are the ones for XP?”

    As Russ found out it wasn't even that hard.  Load up a little Ethereal program, sniff the tcp/ip packets and that password will travel from the server to the pop box at the ISP in clear text.  You see a 'elho' command and then the lovely phrase 'password' and it's pretty obvious what the password is. 

    Remember, physical access means the ultimate lack of security.  With physical access I can even reset the local admin password [only do this on desktops, not on the server]


    http://www.microsoft.com/technet/archive/community/columns/security/essays/10imlaws.mspx

    Law #3: If a bad guy has unrestricted physical access to your computer, it's not your computer anymore

    "A wireless internet has been found in range"

    A couple of times, clients have come into the office and we've needed to get data off of their laptops.  So they've turned them on and we typically these days use usb thumb drives to pull the data off.  And each time a 'newer' computer is turned on, one that has wireless automagically enabled, it 'finds' the wireless access point at the office.

    Is it an open, unprotected by WAP access?  Nope.

    Could it be?  Yup.

    Why?  Because I purposely put it in a place that would first and foremost give me a secondary backup to high speed access when taking down the server [Rule of Susan, always ensure you have a connection to the newsgroups or IM].  So it's on the outside of my SBS network hanging off another port in the 4 port dsl modem/switch.  It handles it's own DHCP and does not interfere with the DHCP of the SBS since its hanging off of the DSL modem/switch.

    It hands out addresses in a range that doesn't match the internal address of the network.  I do all this because we don't really need 'true' wireless at the office to the internal network and I'm not yet ready to see if SBS can handle PEAP [I think it can...don't tell Jason or Charlie I need to re-read the chapter on wireless in SBS in the SBS 2003 Admin's book because I can't remember it.

    If you run cat 5e/cat 6 wiring in your office, you can pretty much be certain that it's a bit easy to know where it starts and where your 'physical access points' end.  The RJ45 connection in the wall.  Now at Micrsoft where physical security of a 'campus' means they have tons of wiretaps, so they use IPsec [more on this in the next blog post] to protect those physical taps [remember don't use 802.1x to secure wired connections]

    But where's the physical access limitation of a 'wireless' connection.  Yup it's as large as you are broadcasting.  Remember I've said before to check and make sure how others see you by visiting grc.com and seeing what ports you have hope are the ones you expect to have open? 

    Don't forget to do the same with your wireless connection.  Take a laptop that is enabled for wireless... walk your perimeter.  How far do you broadcast?

    SecCast anyone?

    Oh this is too geeky... Security Topics and a Podcast all in one

    ThePodcastNetwork :: The Gadget Show » Blog Archive » The Gadget Show #5:
    http://www.thepodcastnetwork.com/gadget/2005/03/23/the-gadget-show-5/

    This is so cool.  They have Robert Hensing and have Dr. Jesper Johansson's info on passwords,

    hmmm...maybe it needs to be called a SecCast rather than a Podcast?

    Issues with KB 891711 [MS 05-002 on 98/98SE and ME]

    This just in from the Microsoft Security Response Center:

     

    Microsoft has received reports about issues with KB891711 on Windows 98,
    Windows 98 SE and Windows ME.  At this point, we have been able to
    confirm these reports and are currently working on a resolution.  
    
    Please note that by uninstalling the current update, the machine will
    return to a vulnerable state.  At this point, we are currently not aware
    of customer's being exploited by way of the vulnerability fixed in
    MS05-002 on Windows 98, Windows 98 SE and Windows ME.  If you need
    additional assistance regarding this update, please contact +1 (866)
    PCSAFETY. When calling, please indicate that you are having issues with
    a security update.

    Folks remember that an issue with a Security patch is a FREE call.
    I cannot stress enough how important it is to get feedback to PSS when stuff like this occurs.

    The Green versus the Blue

    A bit of background first from Steve Riley:

    "Therefore, we admit we broke our promise and we added features to a service pack, but we did it because we believed it was absolutely necessary to improve the resiliency of the operating system to live in the hostile network that we have now that designers of software and even software as recent as Windows XP never really imagined that the Internet would become the hostile place that it is right now. And it's more imperative to software designers than ever before that they build in features that can increase the resiliency and security management, for example, so that it's easier to configure and maintain."

    "The perimeter is, for all practical purposes, almost gone. Every machine is becoming its own perimeter."

    "Moving the security decisions from the edge to the host, it's almost as if the host is now the edge."


    Friends, Romans, Countrymen, Geeks, Blogreaders lend me your ears...or eyes as the case may be.....

    XP home does not have the same security features as XP pro.  Specifically it is lacking these two that I think are very important ones:

    Encrypting File System - protects sensitive data in files that are stored on disk using the NTFS file system.

    Access Control – restrict access to selected files, applications, and other resources.

    In this day and age where Aunt Nellie's system is apt to be turned into a attacking bot, where the home PC has PII [personal identity information] on it [credit cards, bank accounts and what not], where identify theft, phishing, etc etc is a daily occurance, I think the home machine needs as much protection as our most vulnerable web facing machines.  Therefore, why is there an operating system 'built for Home", ready for peer to peer networking, that has less security features than XP Pro?

    Shouldn't the needs of a home machine, less controlled and protected than a XP pro behind ISA server [preferably in SBSland as well] not be identical to pro...or perhaps [gasp] even exceed a pro machine in its security needs?

    If I have personal information on that box, I want encryption.  If I have junior on my same system doing who knows what, I want the ability to add security permissions and what not to files of a level possibly more paranoid than I do at work.

    Why is there an assumption that Aunt Nellie at home needs less security than Uncle Bob at the office? 

    Shouldn't all desktops be protected in the same manner?  Why is there [other than for stupid marketing and pricing decisions] the need for two client systems anyway.  Aren't the security needs of us all the same?

    We in SBSland don't like the Green box because it means that we have to talk the owner into upgrading to the Blue box.  [remember XP homes cannot join a domain].  But heck I don't like XP Homes for their lack of security features.

    As we go into Longhorn...how about ONE BOX.  One Security model...one set of tools and tweaks and protections and ....just one protection level.

    I'm not talking about versions like Tablet and Media center and what not...but just don't have a version at home that cannot have the same security features as an Office version.

    So Steve Ballmer or Bill Gates or whoever is in charge of making the decision of the client/desktop operating system.  Consider that Home machines need just as much security IF NOT MORE these days than office machines.  Don't make this a marketing decision...make the choice of ONE operating system a security one. 

    Just say NO to the Green Box.

    Oh Shoot! No...wait! It's okay!

    One of the guys at my office was sort of at his desk today.  But not exactly.  You see he was actually in Arizona for a meeting but using Remote Web Workplace in the hotel room.  He needed a document to answer a question and it was a credit card statement.  So I told him on Instant messenger to hang on that I would email it to him [we have Live Communication Server 2003.. because of Software Assurance on SBS 2000]  So I go to our Konica scanner, scan it in and email it to him.

    OH SHOOT!  I just sent a credit card statement with personal identity information over an unprotected email channel.  Dang and as much as I harp on people at the office about this, look what I just did.  No password, encryption nothing!  OH SHOOT!

    OH WAIT!  No, I didn't.  I sent it to the internal email box at the office.  He's remoting in via RWW.  It never left the office boundaries.  I didn't send anything unencrypted. 

    Remember, RWW protects the session over SSL [Class let's review the Tristan blog link again for the technology going on in RWW]

    But you know what though... “IF” I was dumb enough to send email like this, why isn't the whole setting up of encrypted email easier than this?  Why isn't encrypted email just done as a normal process?

    The Financial Crypto blog talks about digitally signed email and how folks just didn't understand what digitally signed email was all about.  Heck they aren't even talking about encryption..merely digitally signed email.

    “The biggest result to my mind is that users simply didn't as a body understand what the signed emails were all about.

    I personally have sent out signed emails and gotten questions from clients.  So given that digital signatures are the first step towards establishing encryption...why isn't our Exchange server just set up for this...with a wizard?

    Why doesn't external instant messenging have encryption [I mean ..it's pretty sad when AOL supports encryption natively and for my MSN IM I have to use a third party SIMP program]

    So what do you think?  Should there be some sort of wizardized encrypted email setup.  As we go forward protected email should be just a normal thing...not a “what did you send me?”

    We're movin' on up!

    Okay American TV show reference... you remember the show called “The Jeffersons” where the theme song was “We're movin' on up....yeah we're movin' on up...to the Eastside.... to a De-Lux apartment in the sky-hi-hi”.....

     Got the song stuck in your brain yet?

    Reading the blogs tonight, I see that Ward Ralston on the Windows Server Blog is announcing in the next month some new Product and Program Managers to talk about ....... yup... Small Business Server.  Hey ...pretty cool huh... we're in there with 'normal' server folks, eh?

    Now...what we need to do is get the same sort of community/buzz/backing whatever around ISA server 2004.  Now you ISA folks would probably say you do already and for the most part you do indeed.  But .... I have to tell you a true story.  Just today a tech journalist asked me “What's the name of the Firewall product?”....um...yeah... you see the problem here.  He knew the names of Exchange, Sharepoint, Live Communication Server, SQL Server and what not, but couldn't remember the name of the Firewall product.  Yeah.. it's ISA server.  Internet Security and Acceleration Server to be exact.

    As I said earlier, Amy was absolutely appalled at the lack of knowledge about ISA server.  Folks... we have no excuse.

    ISA server has an interactive training web site set up to help you learn ISA server.

    ISAserver.org has an RSS feed   If you have Newsgator, right mouse click and add that subscription to your newsgater.

    There are ISA server blogs:

    ISA server books from the Dr. Tom.  You know... he probably has an ISA server protecting every computer device he owns, that's how much he knows about it.

    Jim Harrison and the ISATools.org site.

    See how strong the ISA Server community is out there and folks... ISA 2004 will be coming on SBS 2003 premium.  Just had a poster in the newsgroup asking about buying ISA Server for their SBS 2003 standard and ..dude... get premium.  You'll get both ISA 2004 AND SQL server 2000.

    So why do we not understand it, take the time to learn it, out here in SBSland with all these resources?  I don't get it? 

    Now I'll be the first to admit when I set up SBS 2000 ages ago I set it up with all/all/all and then realized that wasn't too bright and throttled it back.  Now days if I get stuck on some web site [some of the VOIPs are like this] I'll just temporarily open up ISA and then shut it back down when I'm done. 

    But I'm really looking forward to having ISA 'in the house' once SBS 2003 sp1 comes out.

    And Amy?  Just keep pluggin' because I think more and more folks will realize that ISA Server rocks just like SBS does.

    Why do I suddenly get this vision of shirts with SBS 2003 logos on the front with “Protected by ISA Server 2004” on the back.  Leather jackets even.  Biker ones.  Ooohh...cool huh?!

    Patching on the SBS 4.5 box

    Please be aware that as of December 31, 2004, there are no support for the SBS 4.5 platform, I can't remember a dang thing about it and the newsgroup is about dead.

    Technet Webcasts has a presentation on “Threat mitigation for 98 and NT” for those that are unlucky enough to be stuck on those platforms.

    Phil in the newsgroups reports that patch 05-010 wacked off the licenses in the NT platform and wanted to know the best way to proceed.  Here's my suggestions:

    1. Uninstall the patch
    2. Now go into Control panel, or whereever the services is in the NT platform, disable and SHUT OFF the license logging service

    With the license logging service OFF you will not be vulnerable to the security vulnerability that is addressed by 05-010 [KB885834]. 

    Bottom line Phil, just shut the dang thing off.

    Yes, you will technically be, slightly be, partially be in violation of some yellowed old EULA someplace that said we couldn't turn of the license logging service, but tough.  Who cares.  Your bigger issue is that you are on an unsupported, no longer patched platform.  I ran my 4.5 without the license logging service on, heck I had license logging turned off on SBS 2000 because for several months Veritas and Microsoft kept fighting over the licenses until that got fixed in Windows 2000 sp2 and I lived to tell about it.  SBS 2003 they've got our SBcore service tied to License logging so we can't turn it off.  The good news is that I was watching that patch real closely and have seen NO issues on the SBS 2003, nor SBS 2000 platforms.  There's so few SBS 4.5's left that even care about patching that you may be our only report out here. 

    While I commend you for still caring about that SBS 4.5 platform... stop patching it Phil.  Even if they do release patches on the rare occasion in the future [if they think you as the platform attacked will also hurt others], I'd be looking in the section of the bulletins that talk about 'mitigation'.

    In every bulletin there is a mitgation section, a place that talks about what to do in case there isn't a way to patch.  You, sir need to start reading that section.  Under “General information“, then under “vulnerability details“ then under the description of the vulnerability is the section “Mitigating factors“.  Start watching that section from now on.

    The good news is that Microsoft is putting some of their best folks on to more things like that.  Robert [Mr. Incident] Hensing has moved over to this 'mitigation' information section of Microsoft.  Look for more info from folks like him.

    Phil, please, if you can, try to look at your budget and get on a platform that didn't make me cross my fingers and toes, and squint with one eye each time I rebooted that sucker, a platform that isn't built for today's environment, heck you can't do the 'tarpit' stuff on Exchange, you can't do hardly any hardening stuff that we take for granted these days.  You certainly can't run the patching program you need for your desktops of WSUS on it.

    And speaking of operating systems that has seen better days...Window 98 machines have no event viewer, and when they Blue Screen we hardly have anything to go on.  Make your life easier... put those NTs and 98's out of their misery. 

    Show me a firm that is a vital, growing firm and they more than likely take a bit of their annual budget for technology.  I don't know your personal situation, don't know if its because of Line of Business applications that force you to stay on NT4, don't know if it's because you are a non for profit [and other than some EU places that don't sell SBS this way] that you don't know that you can get SBS 2003 VERY reasonably priced through Techsoup.org or Softwareone.com

    So if you are on NT platform.... stop patchingStart mitigation and start saving your pennies.  Don't do it even if you have the patches.  Start mitigation plans.  Spend your time and energy instead finding the funds, finding whatever is keeping you from upgrading.

    You have a server that can't be patched anymore so watch that webcast and try to focus your area on putting walls and protection on desktops so they don't 'infect' the server.  You still running with Local admin rights on the desktop?  See what you can do to lock down your end users so you can protect that server better.

    Bottom line Phil...save your time and money and don't patch anymore....not on the NT 4 box anyway. 

    Sharpen that pencil if it's a budget problem.... tell the owner of the business to cut back on a martini or two.... if it's line of business software... work with that vendor and tell them to start supporting the harsh world we live in today. 

    If worse comes to worse, isolate yourself and ensure that you have no Internet access.  Cut the RJ45 connection if need be.  If you can't get on a platform that can handle today's risks, then you need to isolate that machine away from the risks.

    Mitigation. Protection are the words for the NT platform.

    Because you can't patch anymore.


    Disabling the License Logging service helps prevent the possibility of a remote attack. Customers that have disabled this service would be at a reduced risk to attack from this vulnerability. See the “Workarounds” section for instructions that describe how to disable this service. By default, affected operating systems other than Windows Server 2003 have the License Logging service startup type set to Automatic instead of Disabled.

    Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed.

    Microsoft has tested the following workarounds. While these workarounds will not correct the underlying vulnerability, they help block known attack vectors. When a workaround reduces functionality, it is identified in the following section.

    Disable the License Logging service

    Disabling the License Logging service will help protect from remote attempts to exploit this vulnerability.

    Note Do not perform this procedure on Small Business Server 2000 or Windows Small Business Server 2003. These operating system versions require the License Logging service. These operating system versions may fail to function correctly if the License Logging service is disabled.

    You can disable the License Logging service services by following these steps:

    1.

    Click Start, and then click Control Panel (or point to Settings, and then click Control Panel).

    2.

    Double-click Administrative Tools.

    3.

    Double-click Services.

    4.

    Double-click License Logging Service.

    5.

    In the Startup type list, click Disabled.

    6.

    Click Stop, and then click OK.

     

    The light at the end of the tunnel

    Push, shove, pull, come on...you can do it!  Come on!  Just a bit more... you are almost there!

    Don't mind me, I'm just standing on the sidelines giving support to Microsoft's patching program.  Two milestones today in fact.  First our Server based patching solution [WSUS now as it's called] just hit release candidate today.  RC status means that we can smell the cooking coming from the oven and we should start getting the hot mits out ready for taking it out when it's done.

    It is still beta, but it's getting closer.  And while it's best of course on SBS 2003 because SBS2003 is better than SBS2000, I think that WSUS can go on SBS 2000 as well since all it needs is msde and heck... back on SBS 2000 everyone had SQL 2000.

    The next thing that started beta today was the Microsoft update.  Right now this is more of a closed beta, but it's again another step in the 'one stop for patching'

    Even the new stuff in the 'patch engine' is cool to see.  Okay... I'm weird... I need a life.

    So SBSers... hang tight a little bit longer.... this is step one on our road to what we need in SBSland.  This won't push down our specific SBS patches but will go a LONG way to helping us stay nice and snug.

    Do we truly want to be secure? I don't think we truly do.

    "Only this mode is available because Windows Small Business Server 2003 always runs on a domain controller, and if you run Terminal Server on a domain controller, you may risk the safety of the server and the safety of your organization's sensitive data."

    The Terminal Server component is not available in the Windows Components Wizard in Windows Small Business Server 2003:   http://support.microsoft.com/default.aspx?scid=kb;en-us;828056&Product=sbserv2003


    There are time I wonder if we truly do want security around here.  Oh sure we say we do, we argue that Microsoft needs to be more secure, but when it really comes down to it, do we?  I mean do we really?  Do we really and truly want to embrace security, evaluate the risks and be more secure?  SBS 2000 did a dumb stupid thing that never should have been done in the first place.  It allowed people to set it up with Terminal server in application mode on a domain controller.  When Microsoft made the Security push for SBS 2003 there were two things that the security folks at Microsoft just couldn't let it do anymore.  The first was modem sharing.  The second was TS in application mode.  So off they went.  Good riddance in my book.  The things that we thought were secure before are not secure now.

    But it amazes me that I get emails from folks holding off on installing XP sp2 because they've heard it blocks attachments that 'normal' people want and it makes their email unusuable.  I get folks asking for pictures back in Outlook 2003.  I get folks asking to stop the annoying 'Outlook would like to access your address book, is this okay?“.  People say they want security...but do they?  I mean do we really and truly want it?

    Take least privilege for example.  When working right you would have to give admin credentials to those times that you need something working in an admin like mode, downloading approved software for example.  But even in the latest SuSe desktop, there's a little box to 'remember the admin password' so the user isn't bothered anymore by the prompting.

    And then there's the blog post on here that even to this day gets postings and followups.  The Terminal Server in application mode post.  The one where many consultants there say that they 'can' make TS secure and I'm there screeching like an emotional banshee saying “Are you insane?“

    Now you could argue that the platform of SBS 2003 breaks the 'best practices' anyway so why should be we so concerned about TS anyway.  And I would say that I hope that someday natively in the program each compartment of SBS, each application would be 'sandboxed' so that they wouldn't affect the other parts.  Now I'm sure Dana would probably say that sticking applications as we do on the server [like Sharepoint and what not] opens us up for risk too.  I'll agree.  But all of you that are arguing so hard that you can do what it takes to secure a server even if it's TS in app mode have missed a few points.

    Security

    First and foremost, let's review what “I” had to do to my member server to set it up in TS mode. 

    • I had to take off the Michael Howard “Secure by default” Enhanced IE lock down that blocks active X and what not.  Surfing at a server in this day and age of malware is totally insane.  Robert Hensing's even talked about domain controllers being nailed by trojans with the admin surfing at the server.  What's the way to clean up a trojan?  Flatten it. Yeah, like I really want to do that to my server.
    • I had to turn on themes so the desktops would look like XP.  Okay minor thing, right?  But nonetheless it introduces another service that might introduce a vulnerability. [yeah like I also want to let people use a hacked UItheme on my DC]
    • I'm allowing users to log into the domain controller and use it as if it were a workstation.  The last thing I want is end users downloading anything willy nilly on my domain controller. 
    • Remember I live in SB1386/AB1950 country, better known as 'notification' territory out here, where if something happens to my server I'm licking stamps and sending out postcards saying “Hi there, we've had a slight problem here“.  If I have a “Hensincident” [aka Robert Hensing], you'd better have the electrical paddles out giving my heart an electronic shock because I'm having a heart attack for certain. 
    • Do I think that allowing TS in application mode should be allowed on 'normal' Windows 2003 Server if it were a domain controller?  Heck no, and if I were in charge of the universe there would be a code block on that too.  Make a server a domain controller and TS in app mode should be code blocked out.  I think it's pretty obvious that when the choice comes between business and security ...guess which one is going to win.

    Scalability

    • We already have a lot of stuff going on that server box.  As you know I already had to throttle my SBSmonitoring instance and Exchange is already used to doing what it wants with memory and now you are going to hang how many folks off of that domain controller and have them use it?  The best desktop experience for that end user is on a member server doing those functions.  Read the scaling document on TS.  I don't really want to start yanking memory away from my DC functions.

     

    Knowledge Workers

    Data Entry Workers

    Memory per user (MB)

    9.5

    3.5

    System Memory (MB)

    128

    Total Memory

    System + (# of Users x Memory per User)

    Consultants out there?  Please listen to me.  You are guiding your customers here.  They depend and rely on your expertise and your guidance.  They trust you to recommend a solution that not only is secure but legal and supported.  Wanting to run Terminal server in application mode on a SBS box endangers your customer, your client.  It's not a good business reason to do this when you can add a second server/member server with only the cost of the Operating system [remember the cals for that box are covered by the SBS box].  Then for the TS Cals, which you will need anyway, any XP Pro you had in the office prior to 4/23/2003 have a redeemable TS cal.

    Put users on a member server where they belong.  Scale this right and those owners and users will have a good computing experience.  If you need one or two remote sessions, buy a couple of desktops.  And hey, if you bought the SBS on Open licensing and/or SA, remember that even though I hate XP homes, you can buy XP homes, then get Open licenses for XP Pro and kick them up.

    Scale it the right way.

    Secure it the right way.

    Your customers trust you.

    Microsoft is stepping up to the plate.

    Will you?

    Hey Charlie! They got updated again!

    Dear Charlie:

    I regret to inform you that those two lovely SMB files that I nearly drove you crazy tracking for about 6 months have been updated again.  You remember, the ones that started us recommending wacking off SMB signing in the first place?  They were patched in Security bulletin 05-011 and then folks indicated that they saw issues in certain circumstances.  Today I found a KB with a new version of those files.  KB 895900 has just be released with new versions of those files that I drove you crazy about.  Looks like Mrxsmb.sys got the redo this time.

    You cannot save a file from your Windows XP-based computer to a shared folder on a file server:
    http://support.microsoft.com/?kbid=895900

    Now mind you, these days I'm going on record as not needing to, nor doing the 'wacking off' of SMB signing like I used to. 

    As usual thanks for putting up with me bothering you.

    Susan


    Figured this time I'd just blog my bothering him rather than bothering him directly.  Not to mention given the fact that 'I“ haven't seen any issues with this patch and beleive me, I've been watching this one closely due to the fact that it was affecting files that had caused me grief before.

    Bottom line, I have not seen any file issues in my firm [full XP sp2, SBS 2003, SMB signing left 'at' defaults, nothing wacked off here], thus I would NOT recommend that you call for and install this hotfix unless you are personally seeing an issue.  I have not seen this issue in SBSland.

    From what I have seen this has been seen on “Snap Servers” and peer to peer networks.   Now, mind you, I'm not sure I'd call 95/98's 'servers', so if you are using one of those in the 'server' position...how about you install a REAL server instead?  Peer to peer is 'okay' but these days where the fun is at is in a SERVER like SBS.

    Cookies, spyware and I'd like a glass of milk with that please?

    I was answering a question in the newsgroup on how the Microsoft Antispyware [still beta but extremely stable] went through an egress filtering firewall whereas I gave up on trying to get Adaware through the firewall.  The the poster asked if the Microsoft antispyware tracked/blocked cookies.  And the Microsoft anti spyware product found that end users got too confused with too many things asking the end user for action.   This is the same issue with the outbound prompting of the firewall in XP sp2.  People will just say “yes“ to something that they don't truly understand.  Thus it's actually better if the software makes certain assumptions for the end user.

    Maybe I've had too much Mountain Dew flavored Microsoft Koolaid or something, but I just don't see 'cookies' as this huge threat that people see them as.  Many times they are quite helpful in that they remember settings in a web site, localities, and they certainly don't hi-jack browsers, install trojans or any other annoying software.  Microsoft's anti spyware in this beta took the position that cookies [the non malicious ones] are okay and you won't be warned about them.  To me that's just fine.

    The Spynet.com page has some links for more information about how spyware is identified and labelled.  Many cookies are not 'bad' at all.  The ones that 'cross over' are indeed labelled as spyware and blocked.

    But take my fav tech help site of Eventid.net.  I need that cookie in there to let me easily and quickly as a subscriber [and TRUST ME you want to be a subscriber] to launch from there to Microsoft and Google Groups and what not.  It makes it very easy to navigate that helpful site.

    So to me cookies aren't a problem.

    I like cookies... I'd prefer the chocolate chip kind personally, with a glass of cold milk too, but I'll take cookies.  The computer kind are just find to me and actually help me on the web sites that I need to work.

    ummm....and while we're on the topic of Chocolate Chip Cookies....shall I also 'out' myself about another quirk that I have?  I like cookie dough.  Yup, raw chocolate chip cookie dough.  That might explain a few things about me, eh?  My vices are Mountain Dew and cookie dough.

    Graphically document how insecure you truly are!

    Now you can graphically document how insecure your network truly is!

    Okay just kidding...another of the ...oooh haven't tried but this looks interesting categories.  Visio + MBSA = Interesting!

    Microsoft Office Visio 2003 Connector for the Microsoft Baseline Security Analyzer (MBSA):
    http://www.microsoft.com/technet/security/tools/mbsavisio.mspx

    Securing your network has just gotten easier. The Visio Connector for MBSA lets you view the results of a Microsoft Baseline Security Analyzer scan in a clear, comprehensive Microsoft Office Visio 2003 network diagram. You must have both Visio 2003 and the Microsoft Baseline Security Analyzer — a free security tool from Microsoft — for this connector to function.

    The Server and Domain Isolation Using IPsec and Group Policy is available on TechNet

    Just got notified about this posted to the Download site!


    Isolating Network Resources to Better Protect Against Rogue Machines, Infections and Information Theft

    ·         How does one restrict sensitive traffic to specific machines within the network?

    ·         What happens if a new virus or worm reaches your network and your desktops become infected?

    By utilizing capability built into Windows XP and Windows Server, you can easily implement a logical isolation strategy. This strategy can help to better protect your domains, servers and desktops, from these threats.

    The Microsoft Solutions for Security (MSS) team has released the Server and Domain Isolation Using IPsec and Group Policy. This is Microsoft's first guidance for the selection of appropriate IPsec components and the first thoroughly documented prescription of how to implement. 

    This solution demonstrates how IPsec transport mode can be leveraged as one of the best means currently available to protect corporate networks. This protection can minimize losses due to information theft, compromise of credentials, and administrative costs. This solution also clearly contrasts IPsec transport mode from the more widely known IPsec tunnel mode, one of the prevalent VPN technologies today.

    The Server and Domain Isolation Using IPsec and Group Policy is available on TechNet

    Patching anyone?

    From the mailbag today comes the question.... how do you let workstations automatic update and still be restricted user at the same time.

    Answer.....

    You can't.  Not that I've found anyway.

    Ah, great there Susan, you are the one advocating restricted user and now it makes me MORE insecure?  Ah, no.  There's a way around this.  Several options in fact.

    You see there's this thing called SUS and soon to be WUS or MUS or whatever the marketing folks decided this week to call the current and future centralized patching tool.  As long as you set the updates to automatically install at a certain time, the machine is turned on, the patches will deploy [you'll have to check the event log files or scan the machines with MBSA to confirm the install.

    Right now SUS is fully supported, WUS is in beta.  My strong guess is that sucker will be shipping before July of 2005 come h-e-double toothpick or high water.  [Spell it out, my mother taught me never to swear...not on blogs anyway they get caught by my Trend e-manager filters, I lose more Rory blog posts  and get the 'Removed by Exchange content scanning service' notifications to know that those filters cross over from my inbox into my newsgator folders ] 

    Why you ask?  Because if I were in Steve Ballmer's shoes I wouldn't be going back in front of a crowd of Microsoft partners at the WorldWide Partner conference another year without something ready.  He first announced it when SBS 2003 was launched in New Orleans in October of 2003.  Now that that very vocal rant is out of the way, you are probably asking what the other method is....

    Shavlik.  My FAVORITE once a month control thrill is my Shavlik Patch tool.  With it on my desktop I can insert the domain credentials and remotely patch ALL workstations in my office.  As long as those machines are merely turned on, they are patched.  I even deployed my XP sp2 in this manner and only had one 'gotcha'.  [Nvideo digital video card driver, rolled it back to the SP1 version and all was well]

    With these tools you don't have to have local admin rights on the desktop, and in fact can patch remotely.

    But....But... I was "stealth" before and now I'm not?

    From the mailbag comes today a question about ports open and what not:

    Joe had a peer to peer network before and on the Grc.com web site was fully 'stealth'.  Now that he has a network he is listing ports 80 and 25 open.  Closed is port 21.  He was used to having everything “stealth” before and now it's slighly freaking him out that ports are open.  He's concerned about being an open relay and all that.

    First off Joe, a couple of things.  “Stealth“ is a GRC.com terminology and it doesn't mean that you weren't out there on the internet not able to be nailed before and now you have a server sitting out there on the Internet with a bulls eye.  Like anything in life there's a bit of things that you have to do in order to 'do business'.  If you want mail coming in via SMTP with gives you the ability to be the most flexible in spam filtering with IMF and what not, port 25 must be open.  If you are using POP, while you then don't need either port 25 or port 110 open, know that with the SBS 2003 pop connector it CANNOT go less than a every 15 minute pull. [And please, please, please, please... make sure you patch your server!!]

    We normally say just to be a smidge more paranoid that you can easily close up port 80 and then just train your employees to type in https://yourdomainname.com/remote and get to the Remote Web Workplace.  While in SBS 2000 we were [heck I was] quite the nervous Nellie around IIS 5, IIS6 has been extremely solid.  While they are already working on IIS7,  I've personally been very very pleased with IIS6 and the fact that while I've been putting down my Mountain Dew and dashing off to the Shavlik to patch Internet Explorer these days, I've been quite pleased with IIS 6's track record.

    Joe was also concerned about being a mail relayer and remember that OUT OF THE BOX SBS 2003 is not a mail relayer when you use SMTP  [unfortunately I cannot say the same for SBS 2003 when using an unpatched POP connector setup....for POP see the comment and link about how we indeed are a mail relayer when using POP and cc'ing a large email]

    There are some things you 'can' do to tighten yourself up a bit especially when you are using full SMTP mail...

    Mark O'Shea had a couple of articles on security in SBS 2003 and I had a prior post about the ports needed for SBS.

    Remember to only open up those minimal ports you need for 'doing' business.  If you are using POP and you want external remote access you can get away with merely ports 443 and 4125 open through your router/firewall.  443 is the port you need for secure web access to the Remote Web workplace web site, 4125 is the 'control' port.  Remember that port 4125, while needing to be 'poked' through your firewall, is a dynamic port that 'only' opens up after you authenticate on your system.

    And I hate to sound like a broken record here but PASSWORDs, I cannot stress how important that password are in any firm.  Chose them wisely, and make the Administrator account passwords a 'passphrase'.

    Oh and one last thing....that Pop connector patch?  It ISN'T on Windows update because unfortunately SBS is a bit of an oddball.  We're not just the Server OS ,we're just about the entire product line of Microsoft on one box and at the present time, patches that don't have to do with the base operating system won't come down on Windows Update. 

    Now personally, I don't quite understand out Sharepoint patches are on Windows update, but our pop patch is not, nor do I understand how our SBS 2003 QFE that enabled the controlling of the firewall is on Windows update and not our pop patch, but at the present time, that's unfortunately the way the WU....WU's. 

    I cannot stress enough to all those consultants out in SBSland ...if all you use to update your system is Windows Update, you still have an unpatched box.  In the near future SBS 2003 will be getting SP1 which will include all these fixes, but in the time being, click on www.microsoft.com/sbs and then click on downloads.

    And Joe?  I hope I see you in the Communities of SBS!  Welcome to SBSland!

    What to do in case of.... and "The effect of the PIX"

    So the menadering contents of this blog post all started when Steven Banks asked me what should a person do if their IP address was spoofed.  So I asked my security guru buddies of the various steps one should take if something happened and one of the comments that “Mr. ISA” Dr. Tom said was that there was an hypnotic effect that a Cisco PIX had on people.  You know..the glazed look in the eye and the chanting....“Oh, I must be safe, I have a PIX

    It's true isn't it?  So many times I hear people want to take ISA off of our domain controller because 'oh it's not safe' but I'll bet those same folks have local administrator rights and Windows 98 machines in their offices.  You could have a firewall that is built like Fort Knox and as long as “Joey” can surf out to “Malware-R-Us” and has the rights to download and you don't have software restrictions or other limitations in place, neither that “ISA on our domain controller' or a Cisco PIX will help one bit.  For all those folks that want ISA off of our domain controller... go take those workstations in those offices, kill off Windows 98, and move to restricted user on the desktop.  Once you have THAT in place, then we'll talk about taking ISA off of our domain controller.  In fact in the upcoming book by Dr. Jesper Johansson and Steve Riley, there's a chapter and a section that talks about ISA server and it's risk on a domain controller and how it rides low in the TCP/IP stack.  When I read the sentence in the preview of the book I could have hugged them.

    Stick a natting router on the outside for good measure just to thin down the ISA logs on the inbound side and this [ISA on our DC] is not the security issue that TS in application mode is.  Sorry but me wacking off the Enhanced IE lockdown and letting stupid users work and surf on my domain controller as if it were a workstation is just a lot more insecure no matter how much you think that you as a consultant know better and can lock it down.  With the nasty malware on the web today?  Get real folks.

    You know what freaks out a lot of SBSers right now?  SMTP auth attack pings on our port 25.  Guess what folks, if we move from RRAS to ISA server to Cisco PIX, you will STILL have those same port pings on port 25.  The port opening is still there no matter what firewall you have.

    A hole is still a hole.  And if the firewall you have [whatever brand] has the hole open, you have a risk no matter what the name of the firewall is.

    Without further ado..here's what to do if something happens:

    • I have spam and I want it stopped!

    Invest in a good antispam filter, but the best protection is to invest in a solution that gives you negligible or non existent false positives, easy administration, and little to no interaction on the end user side.  [Like Gavin says the IMF still needs work]

    • I'm getting port scans and I want it stopped!

    Port scans will happen. Solutions range from the drastic (impractical) measure of disconnecting your systems from the internet, through investing in a Firewall solution that can detect and drop the probes. If you are a targeted victim, then your option is to trace back to the source(s) and chase them all the way to their upstream provider and get it to stop. Tedious, but there really isn’t much you can do.  Now this is going to start up a conversation from folks in SBSland I'm sure... but unless you want to have someone track down and report to each ISP an abuse report, this is life on the lnternet.  Personally I think at some point in time, Exchange will need/will get some sort of proxying something in front of it so that we don't have our port 25's quite so exposed.

    • Help!  I think I'm a mail relayer!

    First off know that SBS 2003 is not a mail relayer.  Well... okay in full disclosure... if we haven't patched for the POP mail issue .... we turn ourselves into one pretty efficient mail spammer. I joked one time that the folks that think we can't handle everything on one box should realize just how efficient we are ... 3 boxes sent out 6 million pieces of email... not bad for 3 little SBS boxes... that's definitely doing more with less!  Seriously, I cannot stress enough how important ...and how all of us should just routinely think of second Tuesday as patch day.  We can suffer from NDR attacks so you may want to tarpit your box as well.

    • Help, my email address/IP address is being spoofed!

    While you have open up the email and possibly track back the sender, your best solution is like the above, a good antispam solution.

    • Help, I can tell from the  speed of the attack attempts in my log files that some 'person' not a bot is attacking me!

    When a 'bot' hits an open port and you see the effects in your security logs [yes, this is why we have 'em to know what is going on out there], you'll see it 'bang on the port' in a very rapid succession.  If it's a very slow methodical attack... then it's probably 'not' a bot.  That's when in SBSland you should gather up all the log files, IIS, ISA, security events and start tracking back to see who is hitting you.  Look up the attacker in the Whois database and contact the ISP's abuse department [normally in the IP record]

    • Help I think I'm really screwed, I opened up annoymous FTP and now can't delete files...or... someone downloaded Kazaa and now my internet connection is still blinking....or... I've got a really sinking feeling something is wrong with my server and I've been hacked!

    First .. don't panic.  I've seen people on security listserves think they've got backdoors and rootkits because their Word documents are entering words by themselves and it turns out the voice recognition part of Word was turned on.  Most of the time in SBSland we're 'roadkill' out here.  We get nailed because of our stupidity of not setting something up right... which is WHY I love the wizards...especially in ISA server.  Unlike the Cisco PIX, SBS helps you set up the firewall correctly.  Most issues with the firewall are from misconfigurations.  Next, if you truly have done something stupid and you want it investigated, Call PSS and ask for their Security investigations.  Robert Hensing talked about it on his blog.  Again, one of the VERY important parts of the investigation is log files.  So again... those PIX fans out there... looked at your log files lately there? 


    Just remember....have a plan and DON'T panic!

     

    SMB signing... in or out?

    Last month's security bulletin 05-011, Windows SMB client transaction response handling vulnerability holds a special place in my heart...why you say?  Because I personally probably drove SBS Release Manager Charlie Anthe crazy over a several month period tracking two files:

    • Mrxsmb.sys
    • Rdbss.sys  

    Back on the SBS 2000 platform, back when Windows XP sp1 first came out and then shortly thereafter Windows 2000 sp3, I first met up with those two files.  Due to issues we had with Word and Excel files locking up, I had to adjust off [I call it wacking off] SMB signing on my SBS 2000.  Now on the SBS 2003 platform with XP sp2 I have not needed to do this.

    So why is this blast from the past bubbling up again?  eEye's 'workaround' for Windows NT machines that do not have a patch for 05-011, SMB is to enable and require SMB signing.  Now in SBSland if you are still running SBS 4.5 [meaning Windows NT] I'm going to be mean to you and say while I can understand that budget can be tight, but please, push the pencil lead and get off that platform.  If you are a not for profit, check out the NFP pricing at Techsoup and Softwareone

    What we are finding is that more often than not these days, slow 'fill in the blank' is due to a couple of things:

    • Incorrectly set up DNS so that the XP machines are not pointing to the internal IP address of the server [use DHCP]
    • Drivers and NIC card settings as explained by Chad
    • And getting updated bios for those computers [Jim Behning had this yesterday, updated the bios and the speed connecting to a web enabled SQL database increased..go figure

    So I would say in SBSland these days... don't knee jerk disable that SMB signing anymore...check around for other reasons.

    And if you are on SBS 4.5...still?  Push that pencil lead and find the budget.  Upgrade, migrate, get off that platform.  It's served it's purpose and done it's duty.

    [please note not all worldwide locations receive NFP pricing.... call your local Microsoft office and ask [..uhhh ...or complain as the case may be]  Beancounters and Attorneys definintely put a damper on things being universal in SBSland that's for sure]


    P.S.  Hey Charlie!  Those two files changed again! [just had to drive him crazy one more time...this time via a blog rather than via email  ;-)  ]

    A Haircut, a manicure and a computer

    Tonight was the night for my own 'patch maintenance', haircut and nails.  You know us high maintenance gals.  But tonight I also picked up a bit of maintenance of another sort.  My manicurist brought in her computer for me to take with me and fix.  In chatting with her she has a family member that uses Bear Share and Kazaa to download music on the family computer.  Given that news reports have said that these peer to peer file sharing/music sharing platforms are notorious for spyware and malware, it's no wonder her machine is near impossible [if not impossible] to use. 

    So it's here at home where I already plan to probably replace the harddrive [so we can retain some photos and what not on the drive], and format and start over if need be. 

    I'll first isolate it from my network ensuring that it won't be anywhere near my network, and then I'll give it a quick try to clean it, but honestly, I'm totally ready to put in a new harddrive [so I can hang on to the data from the old one], flatten and start over.  I recommended that she use the Microsoft anti spyware beta, which worked for a bit, but it soon lost the war.

    As I was chatting with my hairdresser and my manicurist, they both talked about the same thing...what I take for granted and understand... is confusing to them.  Something pops up in the right hand corner saying to scan something, and they really don't know if that 'thing' that is prompting them to download this, update that, scan whatever is a good thing or a bad thing.  They don't care about patch Tuesday...they just want it handled.  They don't want spam, nor popups, nor malware.  They don't want confusing interfaces, just things 'handled'.

    It's hard to say where the blame best lies.... the spammers and phishers and spyware folks that entice us or Microsoft's operating system for being too open and willing to download software because even in Windows XP, it acts like Windows 98.  It amazes me that in the year 2005 we're still all paying the price for having our desktops run like Windows 98.  Yeah let's lay blame on Microsoft for painting us into this corner...but lets also blame ourselves for letting our vendors that provide us with software to not be held to the fire as well. 

    Chicken and the Egg, which came first? 

    Restricted user and vendors that won't support it?

    How about we ask all computer vendors [and not just Microsoft] to step up to the plate and help fight this mess we're all in?

    So what's an 'up to date' server anyway?

    So what makes up an up to date SBS 2003 server 'at this time' [pre Windows 2003 sp1, anyway?

    The process is

    • Visit Windows update and get all the patches from there
    • Visit www.microsoft.com/sbs click on downloads and install the patches from there

    When you do that you will end up with a box that is

    • Windows 2003 RTM 
    • Exchange 2003 sp1
    • Sharepoint 2003 sp1
    • ISA Server 2000
    • SQL Server 2000 sp3

    I do notice a couple of problems on the download page

    1. ISA server 2000 sp2 is not listed for premium customers to install.
    2. Sharepoint sp1 is listed and that comes down via Windows update

    After our SBS 2003 sp1 we'll get Windows 2003 sp1 and ISA 2004 sp1.

    Can we clear up a few misconceptions over Service packs on SBS?

    Over on CRN is an article on SBS sp1 that just doesn't ''quite" get it right and I'd like to specifically comment on a couple of items listed:

    • One new feature in SBS SP1 will help partners with the client issue: The client setup feature in SBS SP1 will support Windows XP SP2, Microsoft said.

    Not quite following what this sentence is referring to?  You can set up XP SP2 machines now with no sweat you just add your connectcomputer web site to the trusted zone and all works wonderfully, if that's what this sentence is all about?

    • Microsoft, Redmond, Wash., said partners should use the enhanced Configuration Wizard in SBS 2003 SP1, and not attempt to use the Security Configuration Wizard in Windows Server 2003 SP1. Doing so would remove some of the "glue" that integrates the server components in SBS 2003, causing server crashes and other headaches, Microsoft said.

    ...huh?  ....um... as far as I know we don't 'have' a 'enhanced configuration wizard in SBS 2003 sp1' versus the normal Windows 2003 sp1 'security configuration wizard'.  Mind you I purposely installed Windows 2003 sp1 and ran the SCW [you know the one we really shouldn't run on our box and chose the defaults] on the server that I'm now typing via this blog and as you can see... my server isn't crashing.  It didn't DO anything worth running the wizard for... it shut off IPsec services which now makes an alert email to be sent to me daily and it truly didn't harden anything, but it certainly isn't causing server crashes.  Honestly SBS 2003 is pretty darn well tweaked as it can be for running what it does.  It's my understanding that the icon for the SCW just won't be on the desktop and in the readme file ... you know the thing we never read... it will say we're pretty tweaked, hardened and secured already [well, if we kill on Windows 98s we would be anyway] and we don't need to run the SCW. 

    • Most partners are aware of the "do not install" rule for Windows Server 2003 SP1 on SBS, said Jason Harrison, president of Harrison Technology Consulting, Nashville, N.C. Harrison explained that individual Service Packs available for Exchange, SQL and ISA may not work well with SBS management tools.

    Huh?  On my PRODUCTION [yes that's Production with a P] real live server a the office I've installed Exchange 2003 sp1, ISA 2000 sp2, Sharepoint SP1 and obviously during the install of SQL, SP3.  Now because 'this' install is a bundle of ISA 2004 and what not, that's why they are recommending that we wait for 'OUR' SBS 2003 sp1, but as I stated, I installed Windows 2003 sp1 RC on this testing machine at home.  My management tools are just fine. 

    We are normal parts.  Let me repeat that.... SBS 2003 is made up of normal parts of Windows, Exchange, SQL, ISA, Sharepoint, etc. and normally you can install any Service pack for a 'part' to us.  Do not get the idea that individual service packs are not supported on a SBS box.  In fact if you merely Windows update, you get Sharepoint SP1.  In fact last month's patches included a patch that you HAD to be on Sharepoint SP1 before it installed. 

    For this time only because of the bundle with ISA 2004 for premium, because of it being so close to being shipped out to 'normal' Windows 2003 sp1, we're saying 'wait for 'our' Service pack'. However, do not think that you cannot install the normal service packs of the 'parts' of SBS ON SBS.

    The best thing to harden a SBS network is to upgrade every last one of your Windows 98 machines to Windows XP sp2.  I know that my life is truly easier being all borg.  I only have to worry about patching Windows xp sp2 and Office 2003 at my office and thus my 'radar' for watching for potential issues is very focused.  I can understand folks that use LOB apps that can't run on the new stuff, but for other folks... honestly, you'll make your out of pocket costs back in the lack of rebooting of that Win98 platform and gain of productivity.

    Bottom line folks, and you are talkin' to a veteran of testing patches on SBS boxes and patchin' SBS boxes and ensuring that they are kept in working condition and kept well patched, there isn't a service pack for a 'part' of SBS that I haven't installed on my office network.  I've never waited for a 'specific' SBS service pack.  I'm only doing it this time for the Windows service pack part because 'ours' will come out in close alignment with the Windows 2003 sp1, and we're specifically getting ISA 2004 [for premium customers] with 'our' SBS 2003 sp1.

    So what's the security of Remote Web Workplace?

    A poster in the newsgroup asked about the comparison of the security of Remote Web Workplace with and without ISA [Standard versus Premium].  But you see, both of them have the HOLE open.  So from a standpoint of looking at it from a 'which one has a safer hole open', the answer is neither.

    P A S S W O R D S

    That right now is probably the biggest weakness in Remote Web Workplace, in my opinion.

    Both rely on users AND administrators picking GOOD passwords. 

    And furthermore, don't think 'passwords' think passphrases.  Are those passwords using blanks, funky characters and what not?  Remember our lessons from Dr. Jesper Johansson, here and soon to be here.  


    1.  Remember that port 4125 ONLY opens up on the SBS 2003 standard and premium versions AFTER the person authenticates on the system.  Thus while you 'can' change it from 4125 to something else inside of RRAS interface. the port is not open 24/7 and listening.

    2.  Remember too you 'can' have a fully functioning Remote Web Workplace with only a port 443 open all the time.  You can close down port 80.

    3.  What does ISA give you that RRAS does not?  Monitoring and logging ..a LOT more monitoring and logging.  If the port is open on either the Standard or the Premium the same risk of openings are there.  However, with ISA your 'who, what, where, when, why' is dramatically increased.

    4.  Right now I have not seen Remote Web Workplace 'auth' attacks and instead what we see is SMTP auth attacks.  If you have ports statically open like port 25 for mail, we are indeed seeing 'attacks' on these ports, especially on the administrator port.  You "can" if you like for a level of extra paranoia, follow the guidance in the first 'to do item' in the SBS 2003 and rename [including the description] of the admin account, setup a 'new' admin account and use that instead for admin access.  Personally I've not done that, I've just ensured that I have nice strong passwords on all accounts.

    5.  Last but not least in full disclosure we do have 'google' parts but this only occurs if you've been stupid and opened up the ENTIRE web site.  ONLY open those pages that you need and close up what you don't. 

    Okay so maybe I had just a little to do with the topic in David's column

     David Coursey today has a column who's topic is near and dear to my heart.

    Restricted user...least privileged user...LUA ....whatever you want to call it.

    Today in David's column he talks about how 'Least privilege can be the best'.  And while there are those that will say LUA or restricted user is not the 100% panacea for all that ails us as you can still be infected by worms and things even if you are running as user and the 'infector' has the ability to 'increase it's rights' or 'attack a service that then uses that as a means to enter the system, the reality is that at least today, it very much helps in ensuring that at least the end user doesn't do something dumb and click and download something.

    Steve Friedl is working on hacking a registry to get Quickbooks to fully operate as a least privilege user and he and I were chatting about how it was weird that I was able to do it one way at home, and practically had to hack up the entire classesroot at the office to get it to work.  He's banging his head on the same problem.  And while there is blame to Microsoft, there is just as much blame to the vendors, and quite frankly, last but not least, blame to us.

    Shame on us for putting up with this.

    Shame on us for not making this a 'feature' that we want to see in our applications.  The AICPA released today a document for a “Privacy Incident Response plan“.  Basically it's a document that if you lose your laptop, data gets hacked, whatever, this is a guideline of 'what to do'. 

    I'd like to add one major important thing to the FRONT of this document...which is... check with your vendors that do a reasonable measure of helping you protect your data from the get-go.

    Supporting both least privilege and encryption of all sensitive data fields would go a long way to help us out here not HAVE to inform those parties affected by a Privacy Incident in the first place. 

    Things to do next Tuesday

    So for all those within earshot of this blog...listen up.  You've got a free day next Tuesday as there is no Security patching to do.  Now you 'could' go outside and enjoy the [insert whatever weather you get in your region] or you could be a real geek and do one of three things....

    • You could be an absolute maniac and walk the streets of your city in search of SBS boxes that are unpatched for the POP connector patch that turns them into spamming machines.  Now then keep in mind that you just might be arrested for screaming at the top of your lungs “Do you have a SBS box“, so if you want to pass on this suggestion, I'll understand.  But if you happen to meet up with an SBSer, do try to mention in passing that they should visit the www.microsoft.com/sbs page, click on downloads and GET THEMSELVES PATCHED.  When someone comes to the newsgroup and says 'I'm fully patched', you'd better truly be 'fully patched.'
    • Next, you could take your day to make sure a XP sp1 machine is ready to go for XP sp2.  The press is making a big deal that come April 12th the XP sp2 patch is coming down, like it or not, but here's the scoop, you have to have automatic updates turned on and you STILL have to click through a EULA so all my beancounters that are worrying that XP sp2 will install just as they are attempting to finish tax returns have nothing to fear.  The wise thing to do is just install it now anyway [like WHAT were you waiting for anyway?]  A nice guide is located here.
    • Last but not least, you can take the day to make your computer 'genuine'.  This is a process where you go through an ActiveX page and make sure your system has a geniune license.  Yeah yeah I know that you did buy it, but in places of this world, that isn't always the case.  So can you take the time on patch Tuesday to confirm your box.  Remember you will ONLY get the MS antispyware when it comes out if you have been deemed 'genuine'.   I found that when I was on a system that had a volume license or retail box product key installed it went through without a hitch and 'found me legal'.  For OEM operating system, this wasn't the case and I had to do a bit more proving of who I was.  I clicked on the genuine page and it asked me for a Product key code.  Now, here's the problem...the code on a Dell Tower is ON THE FLOOR, upside down.  I crawled on the floor, wrote down what I thought it was and got the key wrong.  On that page there was a “alternative ways to validate“ link [trust me... right hand side..keep looking] I clicked, and entered that I had a Dell, bought from Dell, it made me enter a “captcha“ confirmation [like in the blog comments section] and voila.  I'm genuine. 

    Now, here's the problem I see.... I don't think they are kicking up the communication on that last one enough.  Let me restate that.... Volume license folks and Retail box folks go through just fine, is OEMers are slowed down by a bit of an annoying entry method. 

    If anyone out there is Microsoft land is listening, I'd really start a communication process on the OEM genuine process.  I think a lot of folks that buy through the OEM channel are going to be a bit miffed that they have to 'prove' that it's their machine.  I know that I wasn't too keen on crawling on the floor and will definitely use the 'alternative method' on my systems that are OEM.

    On the Microsoft Genuine page it says “The validation process determines if you have activated your copy of Windows. If you have not activated Windows, you will be asked to enter the 25-character Product Key printed on the Certificate of Authenticity (COA) you received with your PC or software purchase. If you have already activated Windows, the validation process will sense that the PC has been activated, and will not request Product Key entry.”  I'm sorry but that's just dead wrong in my book in the OEM experience.  Two out of Two OEM computers that I've tested wanted the product key code.  I'm assuming because the OEM 'activated' my machine and not officially me...but none the less...

    ....and sorry one more rant for the evening before I go to bed... the word 'richer'.  There are over 11,500 uses of the word 'richer', and over 81,600 uses of the word 'rich' on the Microsoft.com web site.  I'm actually surprised about that number.  I thought it would be higher.  When we finally get the OS with the horns... can we find some other word to describe things other than 'richer' and 'rich'?  Just start thinking about a new descriptive word please?

    Next Tuesday...no patches

    No patches next Tuesday

    [but if you are still on Firefox 1.0 remember there is an update to fix some security issues and both browsers still have security issues] 

    ********************************************************************
    Title: March 2005 Microsoft Security Response Center Bulletin 
    Notification
    Issued: March 3, 2005
    ********************************************************************
    
    Summary
    =======
    
    As part of the monthly security bulletin release cycle, Microsoft 
    provides advance notification to our customers on the number of 
    security updates being released and the products affected. This is 
    intended to help our customers plan for the deployment of these 
    security updates more effectively. The goal is to provide our 
    customers with information on soon-to-be released security updates.
    
    On 8 March 2005 the Microsoft Security Response Center is planning 
    to release no new security bulletins.
    Although we do not anticipate any changes, the number of bulletins, 
    products affected, restart information and severities are subject to 
    change until released. 
    
    In an effort to continue to provide consistent support and service 
    to customers around security issues, Microsoft will offer the 
    monthly technical webcast, even though we will not be issuing any 
    new security updates, on Wednesday, March 9th, at 11:00 AM PST. 
    Registration is available at this link 
    
    We will use this opportunity to make Microsoft subject matter 
    experts available to answer any questions customers may have about 
    previous bulletin release cycles, the monthly bulletin release 
    process and the role of the Microsoft Security Response Center in 
    testing and distributing security updates.
    
    ********************************************************************
    
    Support: 
    ========
    Technical support is available from Microsoft Product Support 
    Services at 1-866-PC SAFETY (1-866-727-2338). There is no 
    charge for support calls associated with security updates. 
    International customers can get support from their local Microsoft 
    subsidiaries. Phone numbers for international support can be found
    at: http://support.microsoft.com/common/international.aspx
     
    Additional Resources:
    =====================
    * Microsoft has created a free monthly e-mail newsletter containing
      valuable information to help you protect your network. This
      newsletter provides practical security tips, topical security
      guidance, useful resources and links, pointers to helpful
      community resources, and a forum for you to provide feedback
      and ask security-related questions.
      You can sign up for the newsletter at:
    
      http://www.microsoft.com/technet/security/secnews/default.mspx
    
    * Protect your PC: Microsoft has provided information on how you 
      can help protect your PC at the following locations: 
    
      http://www.microsoft.com/security/protect/
    
      If you receive an e-mail that claims to be distributing a 
      Microsoft security update, it is a hoax that may be distributing a 
      virus. Microsoft does not distribute security updates via e-mail. 
      You can learn more about Microsoft's software distribution 
      policies here: 
    
    http://www.microsoft.com/technet/security/topics/policy/swdist.mspx

    Yes? You knocked? Hello?

    Whereever you are reading this... stop.  Listen.  What do you hear?  A computer fan running?  Cars driving by?  Depending on where you live either snow plows, rainy streets, birds chirping?  It's noise from outside of your house that just goes on all the time.  You can't filter it out.  Like you can't stop people from driving by your house.  Or even worse, knocking on your door and running off.

    In the SBS communities, in the Internet in general, we temd to be a bit sensitive to “seeing things“. 

    Right now if you are seeing 'failure audits' in your security log file that shows that usernames of '33333333' or '44444444' or 'Webmaster' or 'Administrator' are trying to log into your system, we're seeing this as well. 

    Remember that the auditing in SBS 2003 is different than SBS 2000.  It's much more alert to things going on in your network.  So while 'this time' I can say, yup, we're seeing this too, don't worry, what's the best way to handle 'stuff'' like this?

    Here's my opinion and I“m sure others will jump in with more....

    First ...don't panic.  If you know your passwords are strong enough for the Dr. Jesper Johansson seal of approval, you know that it's going to take probably insider knowledge of that password to crack anything so the first rule is

    • Know thy quality of passwords

    Next, what ports do you have open to be causing these port pings?  The less you have open, the less you need to keep an eye on.  So when you are running that connect to Internet Wizard, if you don't need to open it up to the outside... DON'T.  Then go to grc.com's site and TEST what you have open such that only what you think is truly open, is indeed open.

    • Know thy openings

    Know and understand and get a feel for your network's performance.  My servers' DSL connection is in a network room that I walk near every day at about eye level.  If someone is streaming some video [namely me] or someTHING weird is going on in the network, I can see the DSL connection.  Keep a log of when you install stuff, and honestly I don't allow auto updates on the server and autoreboot of the server because I truly want to know when something happened.  That said, the log file does indeed give clues about when the server is being patched and what not

    • Know thy normal network operations

    Also understand that in case something just doesn't feel right, ASK.  Just like the poster in the newsgroup did tonight, when something like this happens, and there's some bot or spam pinger out there doing a random scan of everyone, we're ALL going to see this.  Next know the right resource.  Remember [and I cannot say this enough], hotfixes are a free call to Microsoft, issues caused by a security patch is a free call to Microsoft and virus issues are a free call to Microsoft.  If the event is more of a Live Forensic analysis like Robert Hensing does, it will be the more normal server call pricing structure.  But the key here is when you think you might be under attack, start calling in the troups and seeing if 'we' out here the the communities are seeing it.  If it's not normal, kick it to the appropriate place to take action on it.

    • Know thy resources and visit the SBS communities and ASK

    Trend Engine Update

     To manually update TREND:

    Otherwise on March 3rd it will get the necessary update.  [me I'm waiting]

    Follow these steps to manually update your ScanMail scan engine:
    
    1. Open your Web browser and type the following URL address:
    
    http://www.trendmicro.com/download/engine.htm
    
    2. Download the scan engine for your program version of ScanMail.
    
    3. Stop the ScanMail Real-time Scanning services (Select Start >
    
    Programs > Administrative Tools > Services > ScanMail_RealTimeScan >
    
    Stop) and make sure that no scheduled scans are running.
    
    4. Double-click the downloaded file and unzip it.
    
    5. Copy all files to the ...\Trend\Smex directory, which overwrites
    
    the existing files.
    
    6. Restart the ScanMail Real-time Scanning services (follow the
    
    steps in number 3 above, but substitute Start for Stop).
    
    Excerpted from ScanMail for Exchange on-line help.

    Trend Vulnerability
    
    This vulnerability exists in the ARJ archive file format parser.
    
    The ARJ archive file format is too flexible especially in the file name 
    field in the local header. This file name is stored as a null-terminated 
    string and limited only by the overall size of the local header (local 
    header size is stored as a 16-bit value and is limited to 2,600 bytes only).
    
    If the file name exceeds the maximum allocated size, the VSAPI scan engine 
    still copies this file name into a 512-byte buffer, overwriting the 
    succeeding data structure. One of the fields in the said data structure is a 
    pointer to another data stucture. The next instruction after the copying of 
    the file name is an assignment instruction to a member of the structure that 
    is referred to by the overwritten pointer. The said routine causes an 
    illegal memory access.
    
    Thus, it is possible to create a specially-crafted ARJ archive file that 
    overwrites data after the allocated 512-byte buffer. This specially-crafted 
    file could possibly execute an arbitrary code.
    
    The ISS advisory can be seen here:http://xforce.iss.net/xforce/alerts/id/189
    
    
    

    Warning on www.SBSlinks.com

     I don't host web sites on my servers and hire others to host them for me.  But you have to the rely on their security practices to ensure all is well.  Well tonight, thanks to David Svirskis I got my own wakeup call of how bad it's getting out there to “browse” on the Internet.  David emailed me with the warning that my little SBS web site that I use to throw up pages here and there was the site of a trojan. Java/Shinwow.Q!Jar!Trojan to be exact.

    Steve Friedl, Security MVP looked at the offending file and found that it was trying to indeed hijack web browsers.

    So for now if you go to my site sbslinks, the home page isn't there as I temporarily moved it and replaced it with a temporary page.  I've emailed Readyhosting.com to have them clean up the site and take action.

    Just kinda feels a bit weird when a web page I set up to help others, ends up being a bad guy.  Downright creepy actually.

    Trend A/V Security issue

    Trend Micro has a security issue that needs an engine update.  The updates are here, but I'll check to see if they automatically come down via the autoupdate.

    I like what I see Mr. Clarke

    "Given their record in the security area, I don't know why anybody would buy from them," the former White House cybersecurity and counterterrorism adviser said yesterday, when asked for his thoughts on Microsoft's forthcoming line of security software.

    Seattle PI had that quote from Richard Clarke from the RSA Security Conference.

    Interestingly enough I don't think Mr. Clarke is seeing what I'm seeing.  On the SBS 2003 sp 1 beta [that has Windows 2003 sp1 in it] I did something stupid and Windows 2003 sp1 kept me from being blonde.  You see, before I ran the Connect to internet wizard to fully enable the RRAS [or ISA 2004] firewall, I stupidly assigned the external NIC an IP address [you see I didn't have to do that as the wizard does this for me] but the point is as I first went to run the wizard on that live enabled NIC the new Windows 2003 sp1 firewall popped up and said “are you sure?” just like XP sp2 ensures that it checks.  You see it was protecting me from my stupidity of putting a live server on the Internet and was protecting me from the get-go by ensuring that inbound protection of a LIVE connection was protected.

    Mr. Clarke?  You aren't seeing what I'm seeing .... yeah sure.... we need to get it so that running in user mode is “normal” around here but that's our entire industry.  In my own little way I'm trying as best as I can to make people aware that the software that REQUIRES power user or local admin don't “get security”, but in the meantime, I think you should see what I'm seeing.....

    • A basic firewall that protects that live NIC connection from the get go, from my own stupidity of putting a live server on the web
    • The COM protections that were put in place in XP sp2 now in Windows 2003

    Yeah, sir, I'm buying security from Microsoft because I see their CURRENT track record and I like what I see.

    I forgot the event log files

    Just when I think I got group policy... I didn't get it... but what I didn't get ...and forgot was to check the log files.. it was TRYING to tell me it was having problems accessing the location of where I stuck the Messenger file.  See as you boot up you don't have full network drives so you have to make sure you deploy using UNC names rather than domain names.  Plus it stuck the file under a place where it shouldn't have been stuck so now I'm trying again.

    I loaded up the GPMC console, start, run gpmc.msc, right mouse click and selected “create and edit a GPO here“.  Did a new package assignment, under computer configuration, software settings, and assigned the Windows messenger 5.1 update  [you see as a result of Software assurance on SBS 2000 I have Live Communication Server so I was needing to update it to 5.1 for the issue in Security bulletin 5-009]. 

    I did a whole picture -  how to - to deploy via group policy for the Ultimate Patch book from Ecora which should be coming out soon.  I'll let you know when it's released.

    P.S. Don't forget to look in your event log files.. they are trying to tell you what's wrong!

    Event Type: Error
    Event Source: Application Management
    Event Category: None
    Event ID: 102
    Date:  2/12/2005
    Time:  6:08:23 PM
    User:  NT AUTHORITY\SYSTEM
    Computer: WORKSTATION
    Description:
    The install of application Windows Messenger 5.1 from policy Deploying Windows Messenger failed.  The error was : The installation source for this product is not available.  Verify that the source exists and that you can access it.

    For more information, see Help and Support Center at http://go.microsoft.com/fwlink/events.asp.

    So I went to go set up a computer today...

    ...and the computer is for a church so when I signed up for the email account through Earthlink I put in the name of the church in the email address.  It's obviously a “churchy” sounding email name...so imagine my surprise when I tested the email account and 35 emails came down since when I first set it up..... “Mike, did I give you the email address already?” I asked the guy who I was setting it up for... “No”.  Funny thing was...this wasn't what I would call “normal” spam.  About 90% of it was “religious” spam.  Bill Gather was one of the organizations that obviously had bought some email list from Earthlink and was “spamming” out these messages.

    You know it's days like today that I realize how “rosy colored” and “naive” I am to think that Ministerial organizations wouldn't resort to something I think it unethical...spam.  It just blows me away that such “religious spam” would even considered as a viable sales channel.  Just goes to show you when organizations that I would think would consider “ethical means” of electronic delivery and not resort to spamming, we're going to have a huge battle on our hands to tame the spam beast.

     

     

    A bit of common sense

    So I got the book that Dana talked about , Kevin Day's Inside the Securty Mind and already I can tell that I like it:

    Security can be accomplished in any environment.  It can be accomplished without monopolizing our time and resources, and without emptying our wallets.  It can be accomplished without years of training and without having to know every vulnerability, threat and countermeasure in existance.  When addressed in the correct manner, security simply becomes an extension of our normal operations, and the best protective measures require the least amount of ongoing effort.”

    Found another good resource for common sense security....found the “The Security Mentor” blog.  Because technology makes sense for small businesses to invest in, we also need to think about security just as a part of life.  It just makes sense to ensure that you help the business owner cut through the confusion and get the answers [and comfort] they need.

    What did Roosevelt say.... “So, first of all, let me assert my firm belief that the only thing we have to fear is fear itself—nameless, unreasoning, unjustified terror which paralyzes needed efforts to convert retreat into advance.“

    To do Security the right way Mr. Day says that we must focus on the four virtues:

    • Daily consideration  Security MUST be a daily consideration in every area
    • Community effort - Security MUST be a community effort [oh yeah baby to this one]
    • Higher Focus - Security practices MUST maintain a generalized focus
    • Education - Security practices MUST include some measure of training for everyone

    ...so far a good thoughtful read....

     

    Windows, MSN Messenger and Office XP Users Should Install Current Security Updates Immediately

    Proof-of-Concept Code Increases Risk to Computer Users

    Windows, MSN Messenger and Office XP Users Should Install Current Security Updates Immediately

    Proof-of-Concept Code Increases Risk to Computer Users: Windows, MSN Messenger and Office XP Users Should Install Current Security Updates Immediately:
    http://www.microsoft.com/security/incident/im_info.mspx

    When Security researchers start disclosing "proof of concept" code that can easily be made into exploits.... I think the "security industry" has a problem.

    If you have not visited Windows update...do it!

    And if you are running Windows messenger or MSN IM, update them as per the instructions.

    Patch 'em up folks...in the words of Sgt. Esterhaus from the show “Hill Street Blues“.....

    .....let's be careful out here...

    See Bill Gates while wearing your Underwear!

    Got your attention didn't I?  Well seriously, with the connected world we live in even if you can't be in San Francisco for the RSA Security Conference, you can hear Bill Gates Keynote from anywhere...and pretty much wearing anything you want..even if it's only your PJs.

    The rest of the public presentations can be viewed from the RSA page


    Even if you can't make it to San Francisco, you can still learn Bill Gates' insights on the state of security today during his RSA Conference keynote speech, "Security: Raising the Bar." Join host Mike Nash for this special edition of Security360 and hear Bill Gates live and in real time. Register now.

    Raising the Bar
    As a top company priority, Microsoft has dedicated a major portion of its focus and investments to security advances. Get a top-level look at this strategy and its progress. Hear firsthand how using technology innovation and adoption allows Microsoft to better protect its customers.

    Find out Bill Gates' thoughts on:

    The evolving threats to trustworthy computing

    How the advances in Microsoft platform, products, and technologies are working to improve PC security

    Future innovations and solutions

     

    Security360, The Third Tuesday of Each Month
    These free one-hour Web shows dish up insights on specific security topics in "byte-size" segments. Get the guidance you need in the time you have.

     

    Missed Last Month's Webcast?
    You can access the Keeping an Eye on Spyware webcast or any previous Security360 show on demand by visiting
    www.microsoft.com/security360

    Don't miss Bill Gates speaking on the state of security. Secure a reservation.

    Live Video Webcast
    February 15, 2005
    9-10 A.M. (PT)

    The Case of the Stolen ....well anything!

    This month's Security Management column by Steve Riley is about physical security and boy, don't I know about this one from a personal level due to the recent burglary at the office.

     The Case of the Stolen Laptop: Mitigating the Threats of Equipment Theft -- TechNet Column - Security Management - February 2005:


    Personally I use pgpdrive on my laptop but the concept is the same....protect the data that is most “movable“.

    Also a very public thank you to Dr. Jesper Johansson... who taught me that having the local admin password match the domain controller admin password was very dumb and so when I set up my new network I purposely mismatched admin passwords.  When the "snatch and grab" of a workstation occurred at my office a few weeks back, I knew that someone didn't have access to the domain admins password.

    For us beancounters, and for your clients, identifiy your most critical data that you have a regulatory requirement to protect and put the most effort in protecting that.  When I'm traveling and I've got a client's Quickbooks data, there's too much crtical data in there and thus I drop it inside the pgpdrive.

    We'll someday have perfect software and never need patches.

    From the commentbag today comes the comment ..... “will the patching ever end...” and the answer is...um... well...no.  It won't.  You see there's a fundamental flaw in everyone's thinking.  We keep thinking that the bad guys have a limited playground, that they don't think of more dastardly things, that we'll use the same time tested software and all will be well and we won't need patches someday.

    But the reality is folks, patches are a way of life.  I consider them like “food”, or “gas” for a car” or “oil changes”.  It's normal maintenance.  See the problem is that in order for us to be the agile businesses we need to be, we need to take risks.  We need open ports, to communicate. 

    Security is a moving target and what we do now, today, will not be acceptable tomorrow.

    There's often a few questions about “how do I harden my server” and I'll be honest with you in SBSland, the best things you can do is

    As long as we have computers, we will have patching.  Get a tool, get a process.

    Me, I'm patching the desktops tonight and then the server on Friday night. Those Internet Explorer patches and the SMB 05-011 that is a VPN potential is making me put my desktops on the patch schedule for tonight.  But because I don't surf from the server, I'm less concerned about it.

    Just remember, patching is a way of life for any operating system or platform or application ...or whatever.  It's just life.

     

    Issues with updates on XP sp2?

    Here are some tips stolen from the newsgroup:

     Method 1:

    Stop the Automatic Updates Service
    1.     Click Start.
    2.     Choose Run.
    3.     In the Run box, type services.msc.
    4.     Click OK.
    5.     Right-click the Automatic Updates service.
    6.     Select Properties.
    7.     Under Service status, click Stop.
    8.     Click OK.

    Delete the Contents of the DataStore and Download folders
    1.     Click Start.
    2.     Choose Run.
    3.     In the Run box, type %windir%\SoftwareDistribution.
    4.     Click OK.
    5.     Delete the contents of both the DataStore and Download folders.

    Start the Automatic Updates Service
    1.     Click Start.
    2.     Choose Run.
    3.     In the Run box, type services.msc.
    4.     Click OK.
    5.     Right-click the Automatic Updates service.
    6.     Select Properties.
    7.     Under Service status, click Start.
    8.     Click OK.

    Reset or Optimize the Internet Explorer:
    For this lets follow the steps given below:
    1.     Double Click on Internet Explorer Icon
    2.     Select Tools
    3.     Select General Tab
    4.     Delete Cookies->Click OK.
    5.     Delete History->Click OK
    6.     Then go to Advanced Tab
    7.     Click Restore Defaults
    8.     Click Apply->Click o.k

    Turn-Off the Pop-up Blocker: To disable it :
    1.     Open an Internet Explorer window
    2.     Click Tools
    3.     Select Pop-up blocker
    4.     Select Turn-off pop-up blocker

    If our issue stays then kindly proceed to the next set of suggestions.

    Add the following Sites as Trusted Sites:
    For this lets follow the following steps:
    a.      Click Start-->Internet Explorer
    b.     Go to tools in the Tool Bar
    c.      Click on Internet Options.
    d.     Go to the security Tab
    e.      Click on trusted sites
    f.       Add the web-sites one by one.
    g.     Click add
    h.     Click ok
    i.        And click ok again

    http://Windowsupdate.microsoft.com
    http://V4.Windowsupdate.microsoft.com
    https://v4.Windowsupdate.microsoft.com
    http://Download.Windowsupdate.com
    http://V5.Windowsupdate.microsoft.com and
    https://v5.Windowsupdate.microsoft.com


    Method2:

    1.     Click on Start and then click Run,
    2.     In the open field type "REGSVR32 WUAPI.DLL" (Without quotation)
    3.     When you receive the "DllRegisterServer in wuapi.dll succeeded"
    message, click OK.
    4.     Please repeat these steps for each of the following commands:

    REGSVR32  WUAUENG.DLL
    REGSVR32  WUAUENG1.DLL
    REGSVR32  ATL.DLL
    REGSVR32  WUCLTUI.DLL
    REGSVR32  WUPS.DLL
    REGSVR32  JSCRIPT.DLL
    REGSVR32  WUWEB.DLL
    REGSVR32  MSXML3.DLL

    On the WUS Beta and having issues with Windows Update?

    Make sure your IE home page is not company web.   Karen Christain reports that having Companyweb/Sharepoint as your IE homepage and WUS does not mix.  Change IE to someother homepage and try again.

    Remember WUS is STILL BETA and should not be on production servers.

    The "sleeper" security patch

    I was analyzing the Tuesday security patches for the Window Secrets Patch Watch column and initially I was thinking that the Internet Explorer patches were the “oh you must get these now” patches.  But now I think that the patches for SMB 05-011 might be our “sleeper vulnerability of the month”.  This is the issue that eEye has had on their “upcoming” website since August and now Dave Aitel and eEye appear to be arguing over who disclosed it to their clientele first.

    The bad news is that they've both given enough detailed information on how to build a exploit that the clock is ticking.

    So if you weren't already aware of this lets recap.

    Today is Patch Tuesday.

    It's the second Tuesday of the month and security patches are released on this day.

    Anything to do with Windows, comes down on Windows Update.

    Anything to do with the application Sharepoint comes down on Windows Update.

    When you come into the newsgroup and say “I'm fully patched”, I'm putting you on notice.  Here and now that means you not only have Windows Updated your server, but that EVERY patch you need from the SBS download page is applied.

    Sorry to be mean to you folk, but “fully patched“ via Windows update, is NOT fully patched.

    And if you want to get an email whenever a patch comes out [which is primarily the second Tuesday of the month unless it's an “out of band” patch, click here and sign up for emails.

    Security bulletins just posted today

     February 8, 2005
    Today Microsoft released the following Security Bulletin(s).

    Note:
    www.microsoft.com/technet/security and www.microsoft.com/security
    are authoritative in all matters concerning Microsoft Security
    Bulletins! ANY e-mail, web board or newsgroup posting (including this
    one) should be verified by visiting these sites for official
    information. Microsoft never sends security or other updates as
    attachments. These updates must be downloaded from the microsoft.com
    download center or Windows Update. See the individual bulletins for
    details.

    Because some malicious messages attempt to masquerade as official
    Microsoft security notices, it is recommended that you physically type
    the URLs into your web browser and not click on the hyperlinks provided.

    Bulletin Summary:

    http://www.microsoft.com/technet/security/Bulletin/ms05-feb.mspx

    Critical Bulletins:

    Vulnerability in Microsoft Office XP could allow Remote Code Execution
    (873352)
    http://www.microsoft.com/technet/security/Bulletin/ms05-005.mspx 

    Vulnerability in PNG Processing Could Allow Remote Code Execution
    (890261)
    http://www.microsoft.com/technet/security/Bulletin/ms05-009.mspx

    Vulnerability in the License Logging Service Could Allow Code Execution
    (885834)
    http://www.microsoft.com/technet/security/Bulletin/ms05-010.mspx


    Vulnerability in Server Message Block Could Allow Remote Code Execution
    (885250)
    http://www.microsoft.com/technet/security/Bulletin/ms05-011.mspx

    Vulnerability in OLE and COM Could Allow Remote Code Execution (873333)
    http://www.microsoft.com/technet/security/Bulletin/ms05-012.mspx

    Vulnerability in the DHTML Editing Component ActiveX Control Could Allow
    Remote Code Execution (891781)
    http://www.microsoft.com/technet/security/Bulletin/ms05-013.mspx

    THIS IE ONE IS ONE I'LL BE PUTTING ON THE FAST TRACK FOR INSTALLING ON MY WORKSTATIONS

    Cumulative Security Update for Internet Explorer (867282)
    http://www.microsoft.com/technet/security/Bulletin/ms05-014.mspx 
    Vulnerability in Hyperlink Object Library Could Allow Remote Code
    Execution (888113)
    http://www.microsoft.com/technet/security/Bulletin/ms05-015.mspx 
    
    Important Bulletins:
     
    Remember we have asp.net under the hood in SBSland:
    ASP.NET Path Validation Vulnerability (887219)
    http://www.microsoft.com/technet/security/Bulletin/ms05-004.mspx  
    
    Vulnerability in Windows Could Allow Information Disclosure (888302)
    http://www.microsoft.com/technet/security/Bulletin/ms05-007.mspx 
    
    THIS IS THE 'DRAG AND DROP' VULN AND I'D PUT THIS PATCH ON FAST TRACK:
    Vulnerability in Windows Shell Could Allow Remote Code Execution
    (890047)
    http://www.microsoft.com/technet/security/Bulletin/ms05-008.mspx 
    
    
    Moderate Bulletins:
    
    Vulnerability in Windows SharePoint Services and SharePoint Team
    Services Could Allow Cross-Site Scripting and Spoofing Attacks (887981)
    http://www.microsoft.com/technet/security/Bulletin/ms05-006.mspx 
    
    Re-released Bulletins:
    
    Vulnerability in SMTP Could Allow Remote Code Execution (885881)
    http://www.microsoft.com/technet/security/Bulletin/ms04-035.mspx 
    
    Security bulletin summary for October 2004
    http://www.microsoft.com/technet/security/Bulletin/ms04-oct.mspx 
    
    
    This represents our regularly scheduled monthly bulletin release (second
    Tuesday of each month). Please note that Microsoft may release bulletins
    out side of this schedule if we determine the need to do so. 
    
    If you have any questions regarding the patch or its implementation
    after reading the above listed bulletin you should contact Product
    Support Services in the United States at 1-866-PCSafety
    (1-866-727-2338). International customers should contact their local
    subsidiary.

    So what are YOUR client's top security vulnerabilities?

    Got my Microsoft Registered partner newsletter today [remember all you need to be a registered partner is merely be a SBSer, YOU DO NOT NEED MCP'S, NOR MULTIPLE STAFF PEOPLE, a SINGLE MAN {or woman} SHOPS ARE WELCOME AS REGISTERED PARTNER MEMBERS, yes, sorry I'm yelling] and one of the links was about Security.  Well that's enough for me to click and keep reading and there's a kewl article about your client's top security vulnerabilties.

    They include:

    • Outdated software
    • Outdated virus protection
    • Violations through servers
    • ....and more [you'll have to click to read the rest and you'll have to sign up to be a Microsoft partner, aren't I mean?  :-)  ]
    And the first one that talks about “keeping software up to date” will be front and center tomorrow.  Tomorrow is “patch day”...or rather “patch TESTING day” in my office.  I let certain workstations get those patches that I deem critical for workstations [like anything to do with email and Internet web access] and then conversely I start testing patches on my play server at home for those I deem “critical” for the server.
     
    I will typically deploy patches that relate to email and web browsing to workstations during the week, but since I don't read email or browse at the server [not even using a Virtual PC and Windows XP inside my SBS...we don't surf from the server at all PERIOD], I don't put patches for email and browsing at a high priority for my server.
     
    I'll also actually.... are you ready for this.... READ the bulletins, because buried deep inside are the clues as to how fast I should “freak” and deploy the patches.  It's been a long long time since I've felt the need to put down my Mountain Dew and run to server to patch, but I always read the bulletins, determine “how” the bad guys may trick me to get “inside” and then determine if I can wait until Friday night to patch the server.   I prefer this as it gives me time to ensure there are no issues with the patches [someone in SBSland invariably goes first] and just in case there are issues, I can deal with it.
     
    You do know about the resources that we all have when dealing with security patches?
    First off for Microsoft partners if the patches “hurt” that server there are business down resources [see this is why those of you who install SBS need to be partners]
     
    Secondly for those that are Microsoft admins like me, ANY issue with a security patch is a free call.  As I said in the Windows Secrets Patch Watch Newletter:  Remember that if all else fails, you can always call the technical support line of Microsoft. Any issue with a security patch is a free call, but that still means you have to deal with the after-effects. In the U.S., you can call Microsoft at 866-727-2338 if you have any issue with a patch. In other countries, check Microsoft's support page to look up the correct local number.”
     
    So tomorrow when the patches come out, “zone” your “roles”.  What workstations need more protection than others [which people surf more than the rest..patch those first], which servers need faster patching due to the ports you have open and what you've exposed them to the web.  My “patch management plan” says that I patch for ALL needed patches, but I use the bulletins to determine “when” to patch.   In my office typically this means I'm patching my workstations a lot sooner than my server.
     
    There's lots of patches tomorrow and there's one other thing that I do NOT do on my server and that's turn on automatic updates.  I like to control when the server gets patches and when it reboots.  I'm still a huge huge huge fan of Shavlik's hfnetchkPro [I bought a subscription] and highly recommend it even if you just use it for the server [they have a free version for one server, 10 workstations].
     
    Fasten your seatbelts and be prepared for tomorrow....

    Hey Trend....Don't notify me...handle it!

    REMOVED_BY_THE_EXCHANGE_CONTENT_SCANNING_SERVICE_5CAE6CF4_00006695_E

     

    The original message content contained a virus or was blocked due to blocking rules and has been removed.


    Ugh... another email in my mailbox that says that Trend handled it... but I don't want to know that you handled it I want you to just handle it.  I remember that Les [is more] Connor told me how to fix this but I couldn't remember .....

    Here's the reason why this does this...

    Why do inbound and outbound message filters in ScanMail for Exchange 6.0 have to be enabled/disabled together ? is the name of the solution in the Trend database.  Basically you must make sure you clicked on the button that says “Active Action“ and let it handle the settings [and that's not the default]

    An open port is a hole is a weakness is a entry is a ....got it?

    A week or so ago, an SBSer came into the newsgroup rightfully concerned.  He was looking in the monitoring email and log files and saw attacks on the “Administrator” account.  Now the thing is, we get lulled into feeling like we're too little to get hurt by “targeted attackers” [and I would argue that we're still a bit immune from a Pen tester specificially targeting our boxes] but we are not immune from the automatic attacks and bots. 

    Now keep in mind that while I say that “we're not targeted”, we are starting to get well enough know that we have our own “Google bits”.  When this SBSer looked and saw that there were a LOT of attempts to break into the box he did what every self respecting SBSer should do... he came into the newsgroup and asked for guidance.  In doing so, he ended up teaching us all a valuable lesson.

    Lesson 1:  An open port is a hole no matter what server size you are. 

    A hole is a entry no matter what size you are.  If you are the typical SBSer you may use SMTP to send and receive email....you thusly open up port 25.  A hole is made so that your admin account can be smtp auth attacked against.  What's the remedy?  Good strong passwords.  Our SBSer had some access ports open and while there was NO intrusion, there was enough banging on the admin account to make us all worried.  I always recommend to finish up any install by going to www.grc.com clicking on Shields up and running the port scanner tests to MAKE SURE you ONLY have those ports you intended to have open truly be open.  [Risk]

    Lesson 2:  The admin account should have the biggest, fattest, nastiest, hunking... you get the idea.... passphrase on it.

    The lesson that our SBS friend really woke us ALL up with was that our Admin account cannot be locked out, so if you have the weakness in lesson 1, make sure that the account is properly protected in lesson 2. Pick a good passphrase to properly protect that account.  Understand HOW IMPORTANT it is to select good passphrases.  [Risk mitigated]

    Lesson 3:  When you open up remote access to the server for ANY employee, you open yourself up to lesson 1 and must protect with lesson 2.

    If an employee has access to a desktop or system from “outside the firewall” you are introducing risk.  Mitigate that risk by ensuring that you stress on the employee how important passwords/passphrases are. [Security education]

    The moral of this story is that it turned out to be a win/win.  A SBS box was NOT compromised and a whole bunch of SBSers learned a lesson.  I know I have and I even implemented a new bad password montor that even sends a message to my cell phone so I can “freak out“ in real time and not wait for the morning email. 

    But remember.  If you choose your passPHRASES carefully, you'll know that those bad guys can grind on your user accounts ALL THEY WANT and it will take a long long long improbably time to brute force the account if the passphrase is as it should be.

    A SBS Box was not compromised.

    A lot of SBSers learned a valuable lesson.

    Definitely a win/win in my book.

    P.S.  The moral of this story is that Remote Web Workplace was NOT compromised.

    A little security by obsecurity

    In my office I do a smidge of security by obsecurity... you see NONE of my login names MATCH the email addresses that people use.  When I set up both the SBS 2000 AND the SBS 2003 box I purposely edited the email address to be different from the login name so that as emails are sent out of the firm that part of the username/password combo can't be guessed.

    Then, ALWAYS know what ports you have open to the outside world... this lets you know the RISKS you have exposed.  Okay right now.  Can you think in your mind of the ports you have open and exposed on your own server and that of your clients?

    Remember that to lower our attack surface we *CAN* run a perfectly functioning SBS system by not opening up port 80 which is a nice target.  Don't get me wrong, any exposed port is a risk and port 25 our SMTP mail port is our next BIG target. 

    I cannot stress enough how important is it to impress upon the SBS owners HOW IMPORTANT the chosing of a password is.  We had an unusual incident in SBSland a bit ago and it looked like someone had intruded in the system via the Administrator's account but in the end, it's looking pretty good that nothing happened other than we all got a REAL GOOD WAKE UP call that even us in SBSland are not immune to brute force attempts against our boxes.  Remember as it stands now, our Administrator account cannot be locked out, so when you set these little guys up, make that password long and strong. 

    The question came up in the Mssmallbiz listserve as to how well do you trust your client?  Do you give them the administrator password?  Do you put it in an envelope and leave it behind?  How do you handle the security of a system when the owner of the system may not be the right one to trust it with?

    Interesting question isn't it?

    Fasten your Seatbelts, Patch Tuesday is going to be a fun one

     Fasten your seat belts folks because next Tuesday is going to be a busy one.....

    We just got notified that the following bulletins will be coming out next Tuesday:

    • 9 Microsoft Security Bulletins affecting Microsoft Windows. The greatest aggregate, maximum severity rating for these security updates is Critical. Some of these updates will require a restart.  [Being Windows that means Servers and Desktops]

     

    • 1 Microsoft Security Bulletin affecting Microsoft SharePoint Services and Office. The greatest aggregate, maximum severity rating for this security bulletin is Moderate. These updates may or may not require a restart[uh oh..that's our CompanyWeb aka Sharepoint]

     

    • 1 Microsoft Security Bulletin affecting Microsoft .NET Framework. The greatest aggregate, maximum severity rating for this security bulletin is Important. This update will require a restart.  [Remember we have ASP.NET under the hood]

     

    • 1 Microsoft Security Bulletin affecting Microsoft Office and Visual Studio. The greatest aggregate, maximum severity rating for this security bulletin is Critical. These updates will require a restart.

     

    • 1 Microsoft Security Bulletin affecting Microsoft Windows, Windows Media Player, and MSN Messenger. The greatest aggregate, maximum severity rating for these security updates is Critical. These updates will require a restart. [we have that on our servers and desktops]

     


    I do NOT enable automatic updates on our Servers and I'm a Shavlik customer that uses that to patch all my workstations and Servers.  Anne Stanton points to the Patch Management e-book we are working on that Chapters 1-4 are already released.  It's a free download.  While it's not geared towards the SBSers, it still gives guidance on how to test patches and the next chapters will be on making the boss realize why patching is important.

     

    I'll be doing my analysis of the patches for WindowsSecrets in the paid version of the newsletter next Tuesday after they come out.  Remember between 10 and 11 Pacific ...start testing!

     

    A Security event -Nancy Drew Security event log detective?

    Well I implemented my new “freak me out if someone fat fingers a bad password” and last night and today I had an unusual event that ended up as a “529” bad password event in my security log files ON MY SERVER.

    I first got my email notification:


    Alert on DOMAIN at 2/2/2005 10:24:13 AM

    An account has a bad password attempt made at it. This may occur if an unauthorized user attempts to gain access to the network.

    For more information about this event, see the event logs on the server computer.

    You can disable this alert by using the Change Alert Notifications task in the Server Management Monitoring and Reporting taskpad.


    Then I went in search of the event on the server and found this:

     Event Type:    Failure Audit
    Event Source:    Security
    Event Category:    Logon/Logoff
    Event ID:    529
    Date:        2/2/2005
    Time:        10:24:13 AM
    User:        NT AUTHORITY\SYSTEM
    Computer:    DOMAIN
    Description:
    Logon Failure:
       Reason:        Unknown user name or bad password
       User Name:    ftpit2004wu
       Domain:        DOMAIN
       Logon Type:    3
       Logon Process:    NtLmSsp
       Authentication Package:    NTLM
       Workstation Name:    WORKSTATION 
       Caller User Name:    -
       Caller Domain:    -
       Caller Logon ID:    -
       Caller Process ID:    -
       Transited Services:    -
       Source Network Address:    -
       Source Port:    -


    Hmm...wonder what THAT is?  Well come to find out [and I only figured this out by having the guy who was sitting at the workstation remember what he'd been doing and then trying it again so that the email and error would occur again] a tax planning application called BNA tax planner that doesn't like to go out the egress/filtering ISA firewall in the office and thus does not autoupdate is the reason for the “bad password“ hitting the security event log file.  As he would open the program and it would attempt to gain access to update, it would show up in the server's security log files.

    Interesting though that an application error on the workstation wouldn't show a thing on the local workstation but evidenced itself in the security log files of the server.

     Well solved that mystery.  Hey, I didn't grow up as a little girl as a fan of Nancy Drew Mystery stories for nothin' you know.  Hmmmm... wonder if any of today's stories include her and computers?  Certainly there are video games today 

    Used to read a ton of those books when I was little, and following the antics of Nancy, Bess and George ....ah what memories....

    Hey it worked!

    Alert on DOMAIN at 2/1/2005 6:33:56 PM

    An account has a bad password attempt made at it. This may occur if an unauthorized user attempts to gain access to the network.

    For more information about this event, see the event logs on the server computer.

    You can disable this alert by using the Change Alert Notifications task in the Server Management Monitoring and Reporting taskpad.


    Remember yesterday's post where I set it up to monitor bad password attempts on event 529.  Tonight I set it up to hit me on my ATTwireless cell phone for alerts [we'll see how that goes and if I leave them on all the time.  I went into the montoring and added my attwireless paging cell phone number [we'll see how long that stays in the setup ... if I think it's too annoying to get ping/paged when someone [usually ME] fat-fingers the log in.

    Event 529s I'm ready for Ya

    I'm stealing an idea from Jeff Meager in the newsgroup.... he said....

    I decided to make an alert that informed you when too many bad username and password attempts had been made. You will need to customise it to the size of your company, but it's too easy.

    Copy and Paste the account lockout health monitor item. Cange and rename it. change the event id to 529 which is the incorrect username and password one. Set the number of incidences before alerting to something that would signify an attack, rather than legitimate bad typing by a user. The default is to email you about it and flag it as critical.

    If you have the facility to do email > sms you could have it SMS you!

    Hey, that sounds pretty cool.  Knowing that I looked over my own even logs and didn't see too many 529s except when I fat-fingered my own passwords I thought I'd set this up.  You can either do what Jeff says or set up your own monitor.

    Remote into the server, start, all programs, Administrative tools, Health monitor.

    Wow, look at all those things being tracked.  Remember SeanDaniel.com's blog post about how SBS got monitoring in the first place?

    So under Core Server alerts I set up a new Event ID 529, right mouse clicked on the new event and made sure that it's set to event 529 to “freak” out on.  I'll have to log in from home and see if it does  :-)

    and then don't forget to change the message on the tab:

    Okay time to go “fat finger the login” and see if it works!

    There are times I love ISA, there are times I hate it

    I have a love/hate relationship with ISA server.  Most of the time I love it, but there's that one hour out of the blue that it drives me crazy.  Part of it is my own fault.  I didn't realize when I first setup the server at home, how important it was to put in the right server name [or IP address] to ensure that the Remote Web Workplace would publish properly.  One of these days I need google a resolution of the proper way to remove my unnecessary self certificates as the posts I've seen on the subject so far recommend being careful.  Tonight I was having an issue and probably should not have knee jerk re-ran the Connect to internet wizard, but I did.  And when I did it, the webproxy got stuck and would not restart.  So for anyone else having this issue, this is how I fixed it.  First I was getting these errors in the ICW log file:

    calling StartWebProxyService (0x8007041c).
    Error 0x8007041c returned from call to CCometCommit::Commit().

    -------

    CCertCommit::ValidatePropertyBag returned OK
    *** CCertCommit::EnableSSL returned ERROR 80070002
    *** CCertCommit::CommitEx returned ERROR 80070002

    And in the event viewer was this error:

    Event Type:    Error
    Event Source:    Microsoft Web Proxy
    Event Category:    None
    Event ID:    11000
    Date:        1/28/2005
    Time:        6:06:32 PM
    User:        N/A
    Computer:    SERVER
    Description:
    Microsoft Web Proxy failed to start. The failure occurred during Reading
    publishing rules because the configuration property  of the key
    SOFTWARE\Microsoft\
    Fpc\Arrays\{1D048A10-3BE8-45B1-9670-D878E8E1376B}\PolicyElements\Proxy-Destination-Sets\{0DC896D0-3484-4BC5-926C-E37C43B4B0E4}
    could not be accessed. Use the source location 2.546.3.0.1200.365 to
    report the failure. The error code in the Data area of the event
    properties indicates the cause of the failure. For more information
    about this event, see ISA Server Help. The error description is: The
    system cannot find the file specified.

    I first looked at www.eventid.net and didn't find anything spot on.  Then I googled on what I felt was the most unique thing about that error.  The part that talks about source location 2.546.3.0.1200.365.  I found a Jim Harrison post that gave me a clue:


    What that error is saying is that:
    1 - there's a protocol rule ("Reading protocol rules") that is referencing
    a certain Client Address Set ("Client-Sets")
    2 - the Client Address Set "{0FEE7518-FC55-48D1-9DB4-CB3949983e16}" likely
    couldn't be located in the Policy Elements
    ("PolicyElement")

    Start Regedit and drill down to:
      
    HKLM\SOFTWARE\Microsoft\Fpc\Arrays\{7A3F7837-26E0-4410-A364-DC70E360B72E}\PolicyElement\Client-Sets
    ...do you find a key named "{0FEE7518-FC55-48D1-9DB4-CB3949983e16}"?

    You'll have to search your protocol rules to see which one is complaining
    about a missing Client Address Set.


    I realized I had a mismash of protocol rules that wasn't matching the registries, so what I did was to manually delete all protocol rules, manually delete all web publishing rules [you have to do the protocols first and then the web publishing] and then I reran the connect to internet wizard and all was well and the wizard would run.

    By the way you have gone into the folder called Program files, Microsoft Windows Small Business Server, Networking, ICW and there are included in there an HTM file of what exactly the wizard did


    Run the Configure E-mail and Internet Connection Wizard to connect your server to the Internet.

    A key function of Windows® Small Business Server 2003 is to configure Internet services to the small business network.

    To configure Internet services, use the Configure E-mail and Internet Connection Wizard.

    The wizard is designed to correctly configure settings for your network, firewall, secure Web site, and e-mail services that are used when connecting your computer running Windows Small Business Server to the Internet. Additionally, you can use the wizard to return your server's network configuration to its original state.

    There are four components for the wizard:

    • Configure networking. Define the type of connection that your server will use to connect to the Internet. The wizard is designed to support either a broadband or dial-up connection.
    • Configure firewall. Secure your network by preventing unauthorized access to and from your local network. When you enable the firewall on your server, several standard services are allowed through the firewall to ensure Internet connectivity. You can also allow predefined Web services, predefined services, or custom-defined services through the firewall by using the wizard.
    • Configure secure Web site. Allow access to specific Web services or to your entire Web site through the firewall from the Internet. You can select to allow access to the entire Web site or only specific Web services. Specific Web services include Outlook Web Access, Outlook Mobile Access, server performance and usage reports, Remote Web Workplace, and the Windows SharePoint™ Services intranet site. When you allow access to a Web service, the service is also automatically configured to use Secure Sockets Layer (SSL) to secure communications between your server and a Web browser.
    • Configure e-mail. Specify how you will send and receive Internet e-mail. Based on the information specified in the wizard, a Simple Mail Transfer Protocol (SMTP) connector is automatically configured, which is necessary for your Exchange server. You can also configure the Microsoft Connector for POP3 Mailboxes to download mail from POP3 mailboxes at an Internet service provider (ISP). When you enable Internet e-mail, you also have the option to remove specific types of e-mail attachments from incoming Internet e-mail.
    • Troubleshoot network problems. If the network configuration of your server becomes corrupted or changed in any way, you can reset the configuration simply by running the Configure E-mail and Internet Connection Wizard again.

    Note

    • If you want to run the Configure E-mail and Internet Connection Wizard at a later time, click the Connect to the Internet task on the Manage Internet and E-mail taskpad in Server Management. To open Server Management, click Start, and then click Server Management.


    Look for an htm called ICWdetails__.htm and it will let you know EXACTLY what that wizard did:

    SUMMARY OF SETTINGS FOR CONFIGURE E-MAIL AND INTERNET
    CONNECTION WIZARD
    
    This file contains detailed information about the
    configurations specified in the Configure E-mail and
    Internet Connection Wizard.
    The configurations specified in the Configure E-mail and
    Internet Connection Wizard determine the settings for your
    network, firewall, secure Web site, and e-mail.
    
    NETWORKING CONFIGURATION SUMMARY
    
    After the wizard completes, the following network connection
    settings will be configured:
    Connection type: Do not change
    
    FIREWALL CONFIGURATION SUMMARY
    
    After the wizard completes, the following firewall settings
    will be configured:
    
    Internet Security and Acceleration (ISA) Server will be
    configured as follows:
    
    	Disable existing filters that may create a filter
    conflict.
    
    	Create a standard set of network service filters.
    For a list of the standard filters, see firewall settings
    for your Windows Small Business Server network in Help and
    Support.
    
    	Create the following additional filters:
    	E-mail
    	Virtual Private Networking (VPN)
    	Terminal Services
    	For more information about the port number and
    purpose of each additional filter, see firewall settings for
    your Windows Small Business Server network in Help and
    Support.
    
    	Create the following custom filters:
    	SBS Remote Web Workplace CustomFilter, 4125, TCP
    	NTP, 123, UDP
    
    	Add the internal domain name for Windows Small
    Business Server to the local domain table (LDT) of ISA
    Server to allow ISA Server to route internal network
    requests on the local network.
    
    	Enable IP routing.
    
    	Disable automatic discovery as this interferes with
    IIS as both ISA Server and IIS attempt to bind to port 80.
    
    	Configure the Web listeners to receive incoming http
    requests using Small Business Reverse Proxy Listen Entry.
    
    	Disable the H.323 Application Filter for video and
    audio conferencing for security.
    
    	Set the maximum number of incoming Web request
    connections allowed to the default Web site to 500. This
    improves system availability and reliability by mitigating
    denial-of-service attacks against your Web site.
    
    	Add the loopback adapter IP address of 127.0.0.1 to
    support the http://localhost for IIS.
    
    	Create an incoming Web request listener and bind to
    IP address of server’s local network adapter to allow ISA
    Server to handle Web requests from the Internet.
    
    	Set the incoming Web request listeners to allow a
    maximum of 300 connections from the outside. This improves
    system availability and reliability by mitigating
    denial-of-service attacks against your Web site.
    
    	Ensure that the publishing rules created by the
    wizard are listed first in the order.
    
    	Create publishing rules to route appropriate
    incoming Web requests to the server’s local network
    adapter.
    
    	Create a Web publishing rule for Outlook Web Access
    that publishes the following IIS Web site directories:
    /exchange, /exchweb, and /public.  This publishing rule
    routes appropriate incoming Web requests to the server’s
    local network adapter. Additionally, Outlook Web Access will
    be configured for Forms Based Authentication (also called
    Cookie Authentication). The Public folder is also configured
    to accept Windows Integrated Authentication.
    
    	Create a Web publishing rule for the Remote Web
    Workplace that publishes the /remote IIS Web site
    directory.
    
    	Create a Web publishing rule for the Server
    performance and usage reports that publishes the /monitoring
    IIS Web site directory.
    
    	Create a Web publishing rule for Outlook Mobile
    Access that publishes the following IIS Web site
    directories: /OMA and /Microsoft-Server-ActiveSync.
    
    	Create a Web publishing rule for Outlook via the
    Internet that publishes the /rpc IIS Web site directory.
    
    	NOTE:  Users connecting to Outlook Web Access,
    Remote Web Workplace, and Outlook via the Internet, must use
    an https:// connection. Additionally, these Web site
    directories are configured to require 128-bit encryption.
    All other Web sites can use either https:// or http://
    connections.
    Internet Information Services (IIS) will be configured as
    follows:
    
    	Configure http.sys driver to only bind to the local
    network adapter to prevent IIS from conflicting with ISA
    Server on the ISP network adapter.
    
    	Disable socket pooling.
    	Set DNS to listen to only to the local network
    adapter.
    	To only listen on the local network adapter. This
    allows ISA Server to monitor incoming Web requests from the
    Internet.
    
    
    
    SECURE WEB SITE CONFIGURATION SUMMARY
    
    After the wizard completes, the following secure Web site
    settings will be configured:
    Secure Sockets Layer (SSL) will be configured as follows:
    The Web server certificate required for https:// will be
    created for the following Web server name: domain.com
    	Create a Web server certificate named ISAcert.cer in
    the \sbscert folder and also install this certificate into
    ISA Server. This certificate is required so that you can
    access secure Web sites on the computer running Windows
    Small Business Server if ISA Server is installed.
    ISAcert.cer is configured for ISA Server for external Web
    clients. Create an additional Web server certificate named
    Sbscert.cer and install this certificate in IIS, which is
    used by internal clients and by redirected Web requests from
    ISA Server.
    
    	The incoming Web listener is configured to use the
    ISAcert.cer certificate.
    
    E-MAIL CONFIGURATION SUMMARY
    
    After the wizard completes, the following e-mail settings
    will be configured:
    Exchange will be configured as follows:
    Email: Do not change Exchange configuration for Internet
    e-mail.
    	Keep the existing Internet e-mail configuration.
    
    After the wizard completes, the icwlog.txt in C:\Program
    Files\Microsoft Windows Small Business Server\Support is
    updated.
    After the wizard completes, the wizard script file
    config.vbs is created in C:\Program Files\Microsoft Windows
    Small Business Server\Networking\Icw.
    NOTE: Each time the wizard runs, a new config.vbs file is
    automatically generated to preserve the previous settings.
    For example config.vbs, config1.vbs, config2.vbs, and so
    on.

    Man... I told you someone in the SBS dev team was a beancounter in a prior life.  See people?  Do you REALLY want to do that by hand? 

    So anyway I had an extreme low tolerance for tech issues tonight, called Microsoft PSS.

    What's funny is that because I ended up fixing the issue myself while on the call, they refunded the call.  ;-)

    A little bit of Wolf

    So I was helping out an SBSer and doing some investigation of the server and tonight was reading Robert Hensing's posts on “Anatomy of” and Wolf.

    Wolf you say?  See when the PSS team [either technical support or in this case Security] want to further investigate they give you a bit of code to pull a detailed file of your system.  It's how they can look at the box and see what's up.  It's kinda cool the information that they can use and review.

    Remember my ranting about knowing your log files?  Tony rightly points out that the manual installation setup of ISA server 2000 [our current one] on SBS 2003 does not set up monitoring out of the box and you/we need to ensure it's turned on.  Go into ISA management, click on monitoring configuration and ensure that the logging of ISA is what you want and it is enabled like you want it:  This is the default for the packet filters one.

    Remember the default location where the log files will be:

    I cannot stress enough how important it is to have these audit log files turned on...for the firewall, for the IIS, for the security log, don't disable ANY auditing.  If you think the log files are too “noisy“... tough.  Deal with it.  Trust me, you'll want that “just in case“.  Windows 2000 didn't have much event logging enabled.  Windows 2003 does.

    Robert Hensing points out the other advantages of 2003 and I'd like to point out our comparisons in SBSland:

    • 2003 allows you to set up a blank password but YELLS loudly when you stupidly do [but keep in mind that if you do this [now hold on to your hats folks because this is a true statement, as stated by password experts] this blank password can not be access via the network.  So if we truly wanted to “lock“ down our Administrator account from an Internet outsider brute attack, we “could“ make it blank.  Now I'm not quite sure that I'm quite comfortable with a blank password thank you very much INSIDE my office... so I think I'll opt to have a STRONG longer than 15 character password on my admin account.
    • We DO have a firewall that if we use two network cards it is enabled BY DEFAULT.
    • We don't quite have everything off by default, and that's actually why you don't want to run the Security Configuration Wizard on our SBS boxes as we are pretty darn tuned as it is.

    If I could tell every SBSer in the world what's the one thing they could do to make their systems more secure...what would I tell them?

    I'd say get the fear of God and Dr. Jesper Johansson in you and choose better passwords....excuse me..... passPHRASES.  Start with that ONE small step... one change in human behavior and you make one GIANT leap for a more secure system.

    On the topic of logging

    I always joke that someone on the SBS dev team must have been a beancounter in a previous life due to all the log files that SBS has automagically.  Eriq Neale has a great blog post about SBS and logging on his blog.  [by the way if you haven't met Eriq before, he's the resident guru in the SBS communities of SBS and Mac [and obviously as this post points out, he ain't bad at just SBS stuff  ;-) 

    So have you read your log files today?

    You heard me.  Have you looked at your log files today?  Today I was looking at the log files of a SBS box and in looking at the Security Log files, the IIS log files we found we were missing one key element.  The firewall log files.  Today I was looking at a security log file with a bunch of event 529 codes which indicate bad login [more security code analysis here] we had one big problem.   We didn't have the firewall log files to then make the connection between the Security log files and the IIS log files and compare the patterns.  There was a pattern of 529 codes and then a patter of 680 codes.  Furthermore the error code was
    0xC000006A An incorrect password was supplied which means there was indeed an incorrect password given.

    Product: Windows Operating System

    ID: 680

    Source: Security

    Version: 5.2

    Symbolic Name: SE_AUDITID_ACCOUNT_LOGON

    Message: Logon attempt by: %1

    Logon account: %2

    Source Workstation: %3

    Error Code: %4

    Furthermore in the firewall logs you should be able to see exactly what IP address they are coming in from. 

    Unfortunately we don't have that.  We do have the IIS log files that we can do a bit of analysis on but it may not be a bad idea to review what the IIS is logging as default and what we may want to kick up.  The default of the SBS IIS logging looks like this:

     

    Now that we've reviewed that .. do we know where the IIS log files end up?

    In that location and in that naming sequence.

    So where's the log files on SBS standard if you use a two nic setup for it's firewall?  Hmmm...good question.. I'm not really sure myself.  Okay looks like it's here:  C:\WINDOWS\system32\LogFiles but I can't tell if there is logging enabled?  I think I may ask around.. I know that we get a RRAS report of the firewall use, but not sure where the data get stored for long term analysis.

    For SBS 2003 Premium, you must make sure that you set up the monitoring in ISA to view the log files [soon to be ISA 2004] and I'll admit that I use Excel many times for that log file but you can use the tools at isatools.org

    So on your firewall, whereever it is. Have you looked at YOUR log files lately?  Are they as tweaked as they can be?

    Yes it's secure

    Amy 'girl power for ISA server' of Harbor Consulting Services has started an ISA on SBS blog.  You go girl in telling them “Yes it's secure”.  I was finishing up the review of Protecting your Windows Nework by Dr. Jesper Johansson and Steve Riley and he [Steve] had a sentence in there that was along similar lines and I felt like giving him a huge hug..... hmmm or maybe I'll ship him a six pack of Mountain dew.....

    Man, do we get tons of grief about ISA on our domain controller, but man do I like the fact that with Shavlik I can monitor it's patch status.  And while Matt is TOTALLY correct in saying that firewalls are ALL software, the reality is for my hardware firewalls, I just don't monitor them like I do when the are part of the integrated network.

    Amy's ISA blog up on the links on the side!

    Choosing good passwords - correction - pass phrases

    Configure Password Policies

    Using strong passwords is important, and configuring password policies to enforce strong passwords helps keep the Windows Small Business Server network secure. After you configure or change password policies, all users are required to change their passwords the next time they log on. The password policy options are as follows:

    • Password must meet minimum length requirements. This option determines the least number of characters that a password can contain. Setting a minimum length protects your network by preventing users from having short or blank passwords. The default minimum length is 7 characters.  [my note... I think we'll all agree that we're kicking this one up past 14 in our own consultant recommendations]
    • Password must meet complexity requirements. This option determines whether passwords must contain different types of characters. If this policy is enabled, passwords cannot contain all or part of a user's account name and must contain characters from three of the following four categories:
      • English uppercase characters (A through Z)
      • English lowercase characters (a through z)
      • Numerals (0 through 9)
      • Nonalphanumeric characters (such as , !, $, #, and %)
    • Password must be changed regularly. This option determines the period of time (in days) that a password can be used before the system requires the user to change it. The default maximum password age is 42 days.
    • Policies go into effect. You can specify when the policies take effect. The default is three days, but the range is "immediately" to seven days.

      You can choose to configure the password policies immediately or after a specified period of time. If you choose to configure password policies immediately, you must use strong passwords to log on to each client computer. You can simplify the process of setting up client computers by choosing to delay configuring the password policies until your configuration is complete. You will be able to work on the client computers without the password policy restrictions. If you use this option, choose to enable the policies after you have set up the client computers but before the users log on for the first time.

      P.S.  remember though...stop thinking passwords...think passphrases!!

    So I brute force cracked a password yesterday

    So I brute force cracked a password yesterday....It was a 6 character password with one capital letter, one number and the rest lowercase.  I password protected an Office document and then used an Elcomsoft.com program to see how long it would take to brute force crack it.  I came to the conclusion... two things....

    • I need a faster computer - it took about a day and a 1/2 to brute force break the password
    • And 19,770,609,664 different possible passwords still takes a while to go through.

    Now normally I would have no idea whatsoever that a 6 character password like that would have that many passwords to try but I was swapping emails with the guru of passwords, Dr. Jesper Johansson as I was reviewing a chapter on passwords in his and Steve Riley's upcoming book called Protecting your Windows Network and the topic of brute force attacks on Office passwords came up and I was doing a bit of testing to see how long it would take.   

    SuperG took a poll of how many of us truly renamed the Administrator account and I'll admit to not doing that.  But I do admit to changing the passwords every 90 days AND my password on that account and others is longer than 14 characters.  I'm the password “wrangler” in my office and the one in charge of saying to folks.. no it's time... not that's not good enough... no pick something else.  Six or seven characters for an Administrator password account is just not good enough these days.  Especially that Admin account, protect that one with a long password or passphrase.  You shouldn't be logging into that account that much anyway.

    It's the human thing not a technical thing that I think keeps you the safest.  Letting people know that blank spaces are just fine in passwords.  A small phrase is fine.  Weird stuff like ! and & and other wacko things are great.  Technology will not protect you from weak passwords.  You must inform your small business clients of HOW important this is.

    Think about your bank account ATM for a moment.. what protects that?  4 numbers.  I don't even want to think about the lack of password combinations in that one.

    Kinda scary isn't it?

    Excuse me while I go check my bank balance and change the password on my Amazon.com account which also has a sucky password.

    So you want to change the Administrator account name?

    Sometimes we feel the need to be extra paranoid in SBSland and that includes making sure the password on the Administrators account is EXTREMELY Dr. Jesper Johansson approved long and hard to crack.  There's also another step you can do BUT remember you may need to then change ALL third party software logins as well... so just be prepared.....

    Securing Your Windows Small Business Server 2003 Network http://www.microsoft.com/technet/security/secnews/articles/sec_sbs2003_network.mspx
    This document helps you to more securely configure your Microsoft Windows Small Business Server 2003 network. By completing the tasks in this document you can better protect the availability, integrity, and confidentiality of your network.

    Inside this document are the instructions to change the Administrator's account.  BUT don't forget to also change the “description“ so it doesn't say “this is the build in administrator's account that the do do brain didn't take the time to change the description so I can still see that it IS the administrator's account“.  Remember too while I say in Harry's upcoming book that PSS have not gone on record in the past as supporting this, the guidance is out there:


    Changing the Account Name of the Built-in Administrator Account

    Renaming the built-in Administrator account on all computers in the Windows Small Business Server network or at least on the computer running Windows Small Business Server 2003 is a standard security practice that can help reduce unauthorized network access. The built-in Administrator account is a well-known and powerful account. Malicious users often attempt to log on to computers by guessing the password of the Administrator account. Because the account is necessary for many functions, it cannot be locked. However, if you change the name of this account, you make it more difficult for unauthorized users to discover the password and gain access to the network.

    Additionally, you should consider using a strong password for the Administrator account as an added precaution in case an attacker is able to determine the new account name. For more information about strong passwords, see the section "Implementing Strong Passwords."

    Note: After renaming the built-in Administrator account on the computer running Windows Small Business Server 2003, it is very important that you log off the server and then log on using the renamed account. Otherwise, you may be denied access to resources or may not be able to successfully use some of the Windows Small Business Server tools.

    Requirements

    You must be logged on as a member of the Domain Admins security group.

    To rename the Administrator account on the computer running Windows Small Business Server 2003

     

    • Click Start, and then click Server Management.

     

    • In the console tree, click Users.

     

    • In the details pane, right-click Administrator, and then click Properties.

     

    • On the General tab, in the Display name text box, replace the previous name (Administrator) with a new name.

     

    • On the Account tab, in the User logon name box, type the new name.

     

    • In the User logon name (pre-Windows 2000) box, replace the previous user logon name (Administrator) with the new name, and then click OK.

     

    • After changing the Administrator account name, you must log off and then use the new name to log back on as an administrator on the server.

     

     

    To rename the local Administrator account on a client computer

     

    • On the client computer, click Start.

     

    • If the client computer is running Windows XP, click Control Panel, and then click Performance and Maintenance. If it is running Windows 2000, click Settings, and then click Control Panel.

     

    • Double-click Administrative Tools, and then double-click Computer Management.

     

    • In the console tree, click Local Users and Groups, and then click Users.

     

    • In the details pane, right-click Administrator, and then click Rename User. Enter a new name for the account.

     

    • After changing the Administrator account name, you must log off and then use the new name to log back on as an administrator on the client computer.

     

     

    Note: If you have many client computers, it may be more efficient to use Group Policy Management Console (GPMC) to automatically rename all the Administrator account names in the network (including the server). For step-by-step instructions for this method, from the computer running Windows Small Business Server 2003, click Start, click Help and Support, and then search for "rename the Administrator account using Group Policy Management Console."

     

     

    This is either good or bad ... depending on how you look at it

    It's good that we're getting important enough for a known

    "google hacker" site to post about our uniqueness...

     

    It's bad that we're getting important enough for a known

    "google hacker" site to post about our uniqueness...

     

    Just a heads up ...they know our "google parts" How do you stop this?

     

    First off... don't click the button in the connect to internet wizard to

    “expose the entire web site” Next... if you are stupid enough to do

    THAT one, I'm copying a post from Alan Billharz

     

    Some customers may wish to exclude their SBS 2003 installation

    from the scope of Web search sites such as Google.com.  This

    may be because you would prefer to restrict knowledge of your

    installation only to those who can use it, or, you may want to

    keep some portions of your site (e.g. Business Website)

    searchable while keeping other portions under the radar

    of Web search sites. There is a way to do this using

    the Robots Exclusion Protocol. 

    By placing simple text file at the root of your Web site,

    you can tell Web search robots which parts of the

    Web site are open for search.I've attached

    two versions of robots.txt that I've whipped up

    for my SBS2003 server: 

     

    1.. robots.txt - Allows search of your business Web site

    but hides SBS-specific sites from search robots. 

    2.. robots2.txt - (Must be renamed to robots.txt)

    Denies search of your entire Web site .

    For more information,

    check out these sources: http://www.robotstxt.org/wc/robots.html

    http://www.searchtools.com/robots/robots-txt.html

    http://www.searchengineworld.com/robots/robots_tutorial.htm

    Many Web sites implement this functionality. 

    For example, you can check out

    http://www.cnn.com/robots.txt .

    Please respond to this post if you have any questions

    or comments - let us know how this works out for you!

    Thanks,Alan Billharz

    --------------------------------------------------------------------------------

    # Place this file at the root of the Default Web Site (%system drive%\inetpub\wwwroot)

    # to allow search engines to catalog your Business Web site, but not catalog the other

    # SBS-specific Web sites.

    #

    # Note that you must choose to publish the root of your Web site to allow the search

    # engine robot to read this file.  In the Configure E-mail and Internet Connection Wizard,

    # choose to publish Business Web site (wwwroot).

     

     

    User-agent: *

    Disallow:   /_vti_bin/

    Disallow:   /clienthelp/

    Disallow:   /exchweb/

    Disallow:   /remote/

    Disallow:   /tsweb/

    Disallow:   /aspnet_client/

    Disallow:   /images/

    Disallow:   /_private/

    Disallow:   /_vti_cnf/

    Disallow:   /_vti_log/

    Disallow:   /_vti_pvt/

    Disallow:   /_vti_script/

    Disallow:   /_vti_txt/

    --------------------------------------------------------------------------------

     

    # Place this file at the root of the Default Web Site (%system drive%\inetpub\wwwroot)

    # to prevent all search engines from cataloging your Web site.

    #

    # Note that you must choose to publish the root of your Web site to allow the search

    # engine robot to read this file.  In the Configure E-mail and Internet Connection Wizard,

    # choose to publish Business Web site (wwwroot).

     

    User-agent: *

    Disallow: /

     

    P.S.  This will be included in the SBS 2003 advanced

    book by Harry Brelsford

    The right password in the right place

    Many eons ago I thought I did a brilliant thing about passwords.  I made sure that all the local adminstrator passwords on my desktops matched the Administrator password of the domain.  But see what I didn't realize was that I was in reality causing my server to be more insecure.  Dr. Jesper Johansson made me realize what a dumb blonde move I made by doing this because I was making my domain controller rely on the security of my desktops and laptops.  As he says, more secure systems shouldn't rely on the security of weaker ones. 

    Since then I have a different password for the admin account that does not match the server's admin account.

    Today one and only one of our desktops was stolen from the office and because it did not have the default password of the server on it, I didn't have to freak out and change the admin password of the network. 

    It's obvious that my most insecure systems are the ones that can be easily stolen.  I was a local CPA tech meeting last week and they said that these “snatch and grabs“ were happening all over town.  One firm even had 8 such buglaries over the last three years.  Wow. 

    In the 10 laws of security, law number 3 says if a bad guy has physical access to your computer, it's not your computer.  Well I can certainly attest to that.  It's definitely NOT my computer anymore.

     

     

    So why do we need more firewalls? Steve Riley says why and now you can listen

    A while back I blogged about why we needed multiple firewalls in our network.  In addition to our firewalls on the outside, we in SBSland are now putting firewalls on the inside.  Remember I said that Steve Riley talked about this in his “death of the DMZ” presentation?  Now you can listen to it on his web site and download it or stream it.

    ooohhhhhh kewlamundo he's got a blog.  One post but it's a start folks. 

    I started reviewing some of the Chapters that he's writing on Protecting your Windows Network [Out in 2005 Addison-Wesley] [excerpt here] and you can tell Steve's chapters and they combine tech words with like ... oh like Rave...and mentions of RFCs [I think he reads them in his spare time for entertainment  - I mean like who else knows the number for the RFC on Pigeons] and citations to the 13 Steps to Mentalism by Corinda and other such slightly unique topics that really and truly do weave together with technology to make for a very educational read.

    It's one of those things you're just going to have to experience for yourself.  Trust me on this one.

    Is Microsoft asking Hackers for patch suggestions?

    Via the mailbag today I got a heads up to a post that saysMicrosoft is asking external coders, aka Hackers if they have patch suggestions”.

    Now keep in mind, this post is as a result of an eweek article that talks about a closed beta program for External patch testers.  Now, unless I'm mistaken, I think it's the same Security Patch Validation program that was talked about in yesterday's patch webcast.  And based on “my” personal listening of that webcast, I don't get the impression that ... firstly that external “hackers” are being asked for patch suggestions, and secondly, that it is anything other than an exercise in ensuring quality control of patches.

    I downloaded the slides to remind myself of what was talked about and slide 25 says:

    • uA limited and blind beta program for the testing of security updates
    • Purpose is to ensure the quality of security updates
    • Outside participants with dedicated evaluation teams apply the updates in simulated production environments
    • Participants are restricted to deploying the updates only in test environments
    • Participants are made up of Microsoft customers across numerous segments 
    • The program is closed and we have the appropriate coverage in both active and standby participants

    Doesn't sound like any “hacker“ or third party patch coding to me.  Sounds more like a Patch testing process that Anne and I recommend in our Patch ebook.  Test patches in a testing environment FIRST before deploying them globally.  Even in SBSland, if you don't have a test environment, wait a few days and see if everything is okay.  The kewl thing about SBSland is we report back pretty quickly if we see something.

    Besides, according to the article Microsoft Most Valuable Professionals [not players as the article states] are in this program and no MVP that I personally know would I describe as a hacker in the vernacular of “today's definition” of hacker.

    Certainly, show me an MVP and they would probably call themselves a person who loves to figure things out [the traditional “hacker” definition before the media took it over to mean the bad guys of today], but certainly they are not “script kiddies” or anything like that.  In fact one of my fellow MVPs that goes by the name of “Calamity Jane” is one of the nicest people I know...except...when it comes to malware when she comes out with both barrels ready to fight the bad guys.  In fact Calam will be on next week's Security 360 Show with Mike Nash on Malware.  She spends tireless hours on webboards helping folks with their hijack this logs ripping out the bad guys.

    This does remind me of a thread in the newsgroup and on the patch management listserve.

    The question on the patch management listserve had to do whether folks would patch Windows 2000 machines for Security patch 05-003 given that Windows 2000 wasn't “vunerable” but that there was additional security item added to active x component to “tighten it up” called the Microsoft.ISAdm.1 ActiveX control .  I said it depended on if your firm/enviornment was a “100% deploy all patches” or a “just deploy critical ones”.  Dave in the SBS newsgroup talked about how even on our download page you need to evaluate whether or not you truly need the patch.  If you don't run the POP connector... you don't need to load the POP connector patch.

    Bottom line ... if this means that patches won't hurt and be more rock solid for us out here?  More power to 'em.

    What do I not do with Remote Web Workplace?

    What's the one thing I don't do with the Remote connectivity features of SBS 2003?

    I don't connect to my network from any public computer, one that is like a Internet cafe/kiosk computer or even a hotel business center.  Why?  Because it's not my computer, I don't know if it has keyloggers and I haven't “vetted it”.  I have my own laptop but my firm has “floater laptops” that we loan out if people need to take computer on trips.  The risk of potential “gunk” from Internet cafes are not worth it.  And while we just take laptops [or in my case my Acer Travelmate Tablet PC that is just a nice travel size that my sister is buying one as well], for those people that need even MORE mobility, I'd advise that you do the SeanDaniel.com thing and go OMA with a smartphone.  You CAN take “it“ with you and it can bring all your data in a manner which keeps you totally safe.

    So be a little paranoid.  Set a policy in your firm that if you don't own “it“, don't trust it.  And remember what Sam the SBS 2003 server reminds us to follow the guidance of Dr. J's passwords, make them good strong passphrases and let Sam the SBS 2003 server make the policy.

    So what kind of admin are you?

    Come sit on the couch while Psychologist Hensing determines what kind of computer admin you are, shall we?

    I was a bit surprised that 60% of admins set up their servers without a firewall.  I guess I've lived too long in wizard land where we just take a firewall for granted.  I mean like how can you NOT have a firewall these days since most DSL modems come with a bare minimum?

    Me, I'm somewhere in between the Skilled admin and the Sophisticated.  I know what I need to do, just haven't gotten around to doing it or just not quite yet ready for that step. 

    So what kind of admin are YOU?

     

     

    Heads up - Security bulletins today

     January 11, 2005
    Today Microsoft released the following Security Bulletin(s).

    Note:
    www.microsoft.com/technet/security and www.microsoft.com/security
    are authoritative in all matters concerning Microsoft Security
    Bulletins! ANY e-mail, web board or newsgroup posting (including this
    one) should be verified by visiting these sites for official
    information. Microsoft never sends security or other updates as
    attachments. These updates must be downloaded from the microsoft.com
    download center or Windows Update. See the individual bulletins for
    details.

    Because some malicious messages attempt to masquerade as official
    Microsoft security notices, it is recommended that you physically type
    the URLs into your web browser and not click on the hyperlinks provided.

    Bulletin Summary:

    http://www.microsoft.com/technet/security/Bulletin/ms05-jan.mspx

    Critical Bulletins:

    Vulnerability in HTML Help Could Allow Code Execution (890175)
    http://www.microsoft.com/technet/security/Bulletin/ms05-001.mspx

    Vulnerability in Cursor and Icon Format Handling Could Allow Remote Code
    Execution (891711)
    http://www.microsoft.com/technet/security/Bulletin/ms05-002.mspx

    Important Bulletins:

    Vulnerability in the Indexing Service Could Allow Remote Code Execution
    (871250)
    http://www.microsoft.com/technet/security/Bulletin/ms05-003.mspx


    This represents our regularly scheduled monthly bulletin release (second
    Tuesday of each month). Please note that Microsoft may release bulletins
    out side of this schedule if we determine the need to do so.

    If you have any questions regarding the patch or its implementation
    after reading the above listed bulletin you should contact Product
    Support Services in the United States at 1-866-PCSafety
    (1-866-727-2338). International customers should contact their local
    subsidiary.

    Trend's SMEX patch is now PUBLIC

    In this patch release, the issue that causes queueing of mails downloaded using the POP3 Connector has been resolved. 
    http://www.trendmicro.com/download/product.asp?productid=39

    http://kb.trendmicro.com/solutions/search/main/search/SolutionDetail.asp?SolutionID=23065

    Patches

    Client Server Messaging Suite for SMB v2.0 Patch 1 for Messaging Component
    Platform:   Windows
    Description:   It is recommended to install the patch release if you are currently running Client/Server/Messaging with Exchange 2000/2003.
    Date:   Jan 10, 2005
    Files:   csm2-smex621-win-patch1.exe
    Before downloading, view this ReadMe first.
     
    Client Server Messaging Suite for SMB v2.0 Patch 1 for Messaging Component with deployment tool
    Platform:   Windows
    Description:   It is recommended to install the patch release if you are currently running Client/Server/Messaging with Exchange 2000/2003.
    Date:   Jan 10, 2005
    Files:   csm2-smex631-win-patch1-deploy.zip
    Before downloading, view this ReadMe first.

    "Let's be careful out here"

    I'm starting to sound like a broken record but watch out and keep IE [and I would argue all browsers] in high security

    Tools

    Internet options

    Security tab and reset the Internet for High security


    From Incidents.org

    Secunia Advisory for IE
    Thanks to John Germain for bringing this update to our attention. Secunia has upgraded the advisory for SA12889 to "Extremely Critical" as of January 7th. They also have add a nice link to test your browser. The orginal advisory was posted at
    http://freehost07.websamba.com/greyhats/sp2rc-analysis.htm
    The vulnerability is yet another cross-site scripting vulnerability. It will allow remote code execution on a victim's system just by visiting the website. The Storm Center has received one email of such a site and confirmed that it was actively using the exploit to attempt to download XP.exe from several locations. Currently vulnerable is IE6 on a fully patched WindowsXP system. As of now, there is no patch available. I know Symantec is detecting this as bloodhound.exploit.21 from what I have observed, but I'm not sure what other antivirus software is doing. It is advisable to keep your antivirus software updated and move to another web browser if possible. For more information, please see

    http://secunia.com/advisories/12889/

    For those who would like to check out the source code themselves before visiting an untrusted website and don't/can't use wget, there is a good online tool found at the following URL which will retrieve the source code of the web page for you.

    http://willmaster.com/master/snooper/MasterSnooperV2.cgi


    Secunia states that you need to disable the “Drag and Drop or copy and past files“... I say “run in high security“

    Internet benefits - do employees have the right?

    Is it the right of employees to surf the net, download anything, use personal email?

    It is if you don't have an acceptable use policy.

    Sample policies can be downloaded and customized from the SANS.org web site.

    Sample checklists can be downloaded here.

    Security whitepapers can be viewed here.

    Remember .... policy first...technology second.

     

    Microsoft's Anti Spyware beta opens up today

    Microsoft just opened up a public anti spyware beta today.  You can download the software here.

    So far, nice interface, but I did already “beta bug” that I wanted a corporate console version, something that we could do just like the Trend console works.

    And when I ran it on my system, it did find a few things [mainly security tools that it saw as possible issues]. 

    Check it out, I think you might like it.  Check out the release notes as well.

    Is having "cached credentials" enabled a security risk?

    Just to bring up to the top of the blog a comment about having “cached credentials” turned on in your network that I referred to in the prior post.  A recent post to Russ Cooper's Ntbugtraq questioned the “security“ of having cached credentials enabled, but Russ failed to post in any information regarding the “flip side“ of disabling the setting.  Keep in mind that if you totally disable cached credentials, any laptop off the domain will not be able to log into that domain profile, thus disabling “cached credentials” [the ability to log into a “non existent domain until the domain comes back online] shouldn't be done [if at all down here in SBSland] unless you are mandidated by having to follow some misguided Department of Defense guidelines or something.  It's going to cause you way way more headaches than any security value you might think you are gaining.

    From the Threats and Countermeasures guide.....


    Interactive logon: Number of previous logons to cache (in

    case domain controller is not available)

    The Interactive logon: Number of previous logons to cache (in case domain

    controller is not available) setting determines whether a user can log on to a Windows domain using cached account information. Logon information for domain accounts can be cached locally so that, in the event a domain controller cannot be contacted on subsequent logons, a user can still log on. This setting determines the number of unique users whose logon information is cached locally.

    If a domain controller is unavailable and a user’s logon information is cached, the user is prompted with the following message:   A domain controller for your domain could not be contacted. You have been logged on using cached account information. Changes to your profile since you last logged on may not be available.

    If a domain controller is unavailable and a user’s logon information is not cached, the user is prompted with this message:

    The system cannot log you on now because the domain is not available.

     

    The possible values for this Group Policy setting are: 

    ? User – defined number (between 0 and 50)

    ? Not defined

     

    Vulnerability

    The number assigned to this setting indicates the number of users whose logon information the servers caches locally. If the number is set to 10, then the server caches logon information for 10 users. When an eleventh user logs on to the computer, server overwrites the oldest cached logon session.

    Users who access the server console will have their logon credentials cached on that server. An attacker who is able to access the file system of the server could locate this cached information and use a brute force attack to determine user passwords.  Windows mitigates this type of attack by encrypting the information and keeping the cached credentials in the systems’ registries which are spread across numerous physical locations.

     

    Countermeasure

    Set Number of previous logons to cache (in case domain controller is not available) to 0. Setting this value to 0 disables the local caching of logon information.  Additional countermeasures include enforcing strong password policies and physically securing the computers.

     

    Potential Impact

    Users will be unable to log onto any computers if there is no domain controller available to authenticate them. Organizations may want to set this to 2 for end – user systems, especially for mobile users. Setting this value to 2 means that the user’s logon information will still be in the cache even if a member of the IT department has recently

    logged onto their computer to perform system maintenance. This way, those users will be able to log onto their computers when they are not connected to the corporate network.

    Planning for the worst

    The big server land folks thing we're crazy.  They have redundant domain controllers, backup this and that, fallover, you name it.  Heck most of the “big server” folks that even try SBS say that the would never set up one without a secondary domain controller [you guys know whom I'm talking about], so when people post into the newsgroups that they want a totally backup second server, a failsafe falloever, a total redundancy, I'll be honest with you. 

    It's a total waste of your money.

    In the years that I've had computers in my office which is exactly 1 month after I started work there, the following “things“ have died.

    • One server NIC with the Novell network we had ages and ages ago.  {I attributed this to the SBS 4.0 in a newsgroup post, but in hindsight I was wrong, this was on the Novell}
    • One switch.
    • One server nic on the SBS 2000.
    • One harddrive off the raid 5.
    • A couple of viruses way back when.
    • Numerous floppy disks [which is why we don't save this way any more]
    • Numerous numerous cases of the “fatal finger“ which I still fight to this day.  To have the ability to save, you also have the ability to move.  Someone will buzz me and say “I can't find the folder for Client ABC“ and 100% of the time the folder has been accidently slid over to and under it's next door neighbor.
    • Numerous cases of “oh my gawd the file is gone“ when they are trying to open an Excel file in word, or a word file in Excel and of course you only see that “kind of file“ from inside the program.

    Bottom line while I did  buy spare harddrives this time for this server, I honestly don't feel that we in SBSland are spending money in the right way if we “have to have“ a duplicate spare computer.  Read the backup documents, test it out, but I still believe that our server dollars are better spent elsewhere.

    If you buy good quality hardware, the risk is less to begin with.

    Money is better spent on an antivirus package that covers the server, the mailboxes and the desktops.  It's better spent on better equipment from the get-go.  It's better spent on security awareness and training.  It's better spent on Window XP sp2 and Office 2003 on every desktop.

    It's not better spent on a secondary domain controller, or a duplicate server.  Of course that's my opinion, but I don't have my network set up this way and just haven't felt the need.  What would you rather your clients' spent their budgets on?

    P.S.  XP computers used cached credentials and with the use of Outlook in cached mode, I can literally stay working on my local machine and the workstations don't care if the server drops off for even a security patch reboot.  I still say that I don't see a huge need  to have a complete spare server as long as I have “good server quality equipment“ in the first place.  I still find it difficult to justify the added complexity of the secondary domain controller unless you are dealing with the issues of a branch office location.

     

    Securing Microsoft Small Business Server 2000

    So I'm up really late...um early today because I wanted to get my GSEC renewal out of the way.  6 binders are laid out in front of me as I took the online exam.  And I just finished up ...yeah... I recertified!  Yeah!  I had to laugh... one of the questions had to do with passphrases.  You can bet the GSEC folks don't recommend a password of “password”.

    So I'm just kinda “brain vegging” out  now and finish surfing the site when I notice a recent GSEC certificate holder did a practical that is called “Securing Microsoft Small Business Server 2000”.  Way to go Matt Gibson for showcasing in your practical that SBS is a box that you CAN build on security [even SBS 2000 for that matter and I would argue that SBS 2003 is even better].  A practical is the first part of the GSEC exam process where you write a “white paper”.  Most students hated that part, but I LOVED writing the practical.  I look back at mine now... it was so lame.  Back then I thought power user was good enough security on my desktop.  Now, I totally agree with Matt's assessment of killing off Win98's and removing local admin rights.  The next advanced version of Harry's book will have a “how to“ from Jeff Middleton on this concept.

    Oh I could just kiss Matt for this paragraph:

    “The single adapter configuration is potentially the least secure of all the SBS network configurations, due to the fact that ISA can only be used for its caching components, and not its firewall or proxy components. Far too often, the firewall (if any) used in this topology is only a basic NAT/PAT router, with no proxying or access control list capabilities. Unless the firewall can provide advanced ACL capabilities, this configuration should not be used. If a hardware firewall must be used (corporate policy), then it should ideally be used in conjunction with ISA, not as a replacement for it. This configuration should be avoided at all costs, as it does not provide any advantages over the two NIC configuration, while coming at a higher security risk.“

     

    We constantly get into the one nic/two nic arguements including inside the Microsoft's own documents.  I'll keep a firewall/router on the outside, but i LOVE my egress filtering firewall smack dab on my domain controller, thank you very much.

     

    If you are still maintaining a SBS 2000 network this is a pretty good security primer on that platform.  Keep in mind for SBS 2003, a lot of the “tightening” listed here is automagically done and then some for that platform.  The everyone group in Windows 2003 no longer includes “annoymous”, auditing is already turned on, just a lot of the tweaks he has in here are already on the SBS 2003 system.

     

    Check out Matt's practical!

    What if?

    What if your worse nightmare came true?  What if your client called you up in a panic that something really bad happened to his office?  Would you be prepared?  Would he?  The other day on a listserve someone asked about Business Continuity Planning documents and I don't think I took the time to google up examples.  Well tonight I was reading some stuff for my GIAC renewal and one of the chapters was on basic policies and here are some sample Business Continuity plans for your review:

    MIT Recovery Plan Master:
    http://web.mit.edu/security/www/pubplan.htm


    University of California Plan http://www.ucop.edu/ucophome/policies/bfb/is3.pdf

    UWS - Year 2000 Business Continuity Plan:
    http://www.swan.ac.uk/uws/y2k/bcplan.htm

    California CPA Society sample disaster plan http://www.calcpa.org/MAP/disaster.pdf

    Disaster Recovery Journal's - Sample Plans:
    http://www.drj.com/new2dr/samples.htm

    So as we start the new year... are you ready?  Are your clients ready?

    Where's your dataflow diagram?

    My what?

    You know what I mean don't you?  How are all the ways that data can get into your network?  Does “little Johnny's” use of the boss's home computer impact that firm's network and it's security?  You bet it does. 

    Microsoft recently opened up a “at home” security site that is designed to ensure that as we talk “basic security” to folks, they won't suddenly “glaze over on you” as they are apt to do sometimes.  We, all of us, need to do a better job of educating all of us out here.  None of us are immune from possibly being tricked.

    Empower employees to stop and ask me when things occur is one that I'm trying to increase.  The Security 360 webcasts are now adding “checklists” to each monthly video and one of the prior ones talks about “Establish a central location, such as an e-mail alias or intranet site, where employees can report unusual activity.”  Hmm... doesn't that sound like a Sharepoint to me?  And remember our past Blog to Sharepoint post?  Couldn't you see this to be part of that?  A centralized place of links to go to for basic security answers.

    CNN/Next was just talking about the “National Do Not Call” email hoax that was floating around.  Last week they had a huge spike in posts to the web site.  And last week my Dad called me about this very email.  His age group in particular is very much being targeted to be tricked into downloading and clicking. 

    I've also found that I need to let people know about the “Snopes hoax” site because on a regular basis hoax emails float around.  There's a couple of times that people have sent me “forwarded warning emails” and I immeidately recognize it as a hoax.

    So check out the At home site.  You might find some things to use in better educating your clients so that the “dataflow diagram” for that network is more contained to that network.

    It's that time of year

    No, not Christmastime or Hanukkah or anything like that, I'm talking about the season of the year that is the Social Engineers best time of the year. Social Engineer... you know someone devious who takes information about a company and with the bits of info they have, “tricks” their way into a place they really should be in.  This is the time of the year that if you send an email to a listserve that is set up for direct replies, you will get a cornucopia of potential ways for “social engineering attacks”.

    Just exactly what the heck am I talking about you ask?  I'm talking about  “Out of Office messages”.  Those lovely emails that tell people you are out of your firm and depending on how you've set them up may even give such juicy details as to possibly expose too much information about your office.

    My personal favorites are the “out of office messages” on listserves that in turn cause the mailbox to respond to it's own out of office message such that you end up in a virtual loop of out of office messages.

    The best series of “out of office messages” I got was last Christmas eve when I sent an email to the ntbugtraq list.  All of a sudden I got hundreds of emails in my inbox.  I was truly amazed of the number of detailed information that firms were allowing out the door.

    I personally don't turn them on here.  We have enough remote connectivity, or people with delegated rights to mailboxes, that it just doesn't make sense to turn them on.

    The other interesting tool that I've seen used for social engineering is a book I bought off of e-bay.  [Okay you already know I'm a bit strange, so here goes this confession].  I bought a book off of ebay that was previously held by the FBI as evidence for Kevin Mitnick.  The book was a “Western Washington Technology Firm“ who's who and listed the CEO, President and key employees along with phone numbers, addresses, etc. 

    Told you I was strange.

    Microsoft acquires anti-spyware company

    Today, Microsoft announced that we have acquired GIANT Company Software Inc., a New York-based company that develops anti-spyware and Internet security products. The goal of this strategic investment is to help our customers keep spyware off of their computers with new solutions that they can use in the near future. It also provides us with a solid foundation for delivering new long-term solutions.

     

    In order to help protect customers as soon as possible, we plan to roll out a beta offering of a new spyware prevention, detection, and removal solution based on Giant's technology within the next month. The solution, which will be available for Windows 2000 and later operating systems, will enable customers to decide whether to block, find and remove spyware and other unwanted software from their PCs. Together with the security technologies in Windows XP Service Pack 2 that improve the security of browsing, this solution will offer a higher level of protection for customers on the Internet.

     

    We are also tackling the spyware issue in other ways, including consumer guidance & engagement, industry collaboration and cooperation with legislators & law enforcement.

     

    This acquisition reflects Microsoft's deep commitment to security. We intend to continue investing in solutions to help protect customers against all types of malicious software, not just spyware.

     

    Details on timing and terms of product availability for our new anti-spyware offerings are yet to be determined. It will be available for Windows 2000 and later operating systems.

     

    Microsoft has posted more information on our efforts to combat spyware on: http://www.Microsoft.com/spyware

     

     

    Thank you,

     

    Microsoft PSS Security Team

    Two more patches you might need

    There are two other patches that came out today... one is a re-release of the GDI+ patch that affects Visual Basic, .NET framework and Windows Messenger.  The other is a patch for the XP sp2 firewall and is available on Windows Update.  Since it's not deemed a Security patch, I'm not sure it will be on Shavlik.

    Don't forget we still need to apply the mitigation patch for ASP.net for our Sharepoint and Remote Web Workplace.  There is still a final security patch in the works but this will fix us up ship shape and keep us protected for now.

    Security Bulletins today

    Microsoft Security Bulletin MS04-041
    Vulnerability in WordPad Could Allow Code Execution (885836)
    http://www.microsoft.com/technet/security/Bulletin/MS04-041.mspx
    Severity: Important
    
    Microsoft Security Bulletin MS04-042
    Vulnerability in DHCP Could Allow Remote Code Execution and Denial of
    Service (885249)
    http://www.microsoft.com/technet/security/Bulletin/MS04-042.mspx
    Severity: Important
    
    Microsoft Security Bulletin MS04-043
    Vulnerability in HyperTerminal Could Allow Code Execution (873339)
    http://www.microsoft.com/technet/security/Bulletin/MS04-043.mspx
    Severity: Important
    
    Microsoft Security Bulletin MS04-044
    Vulnerabilities in Windows Kernel and LSASS Could Allow Elevation of
    Privilege (885835)
    http://www.microsoft.com/technet/security/Bulletin/MS04-044.mspx
    Severity: Important
    
    Microsoft Security Bulletin MS04-045
    Vulnerability in WINS Could Allow Remote Code Execution (870763)
    http://www.microsoft.com/technet/security/Bulletin/MS04-045.mspx
    Severity: Important

    Update on the WINS security issue

    [First a disclosure - I'm still not freaking out, probably won't install this, but just an update]

    The WINS security issue that I posted about the other day has had it's knowledge base article updated.  First off they indicate as I stated that SBS 2000 and 2003 does indeed have WINS installed by default but, the good news is that we do not have the port 42 [the target port] open. 

    Right now I'm seeing some reports on the Net that they are seeing port 42 pings but I'm not seeing any remote attack that is trying to wiggle its way inside.

    There are two actions you can take if you want to be extremely paranoid [for now, I'd just keep this in mind if we see things kick up going forward]

    For now though, I'd just put these in your back pocket and not really make a big fuss.

    Tomorrow I'm killing off SBS 2000 and news about the IE patch

    It's been a good week on SBS 2003 and tomorrow I'll be in the office to start the last transition.  Taking my old server and making it into a member server with Windows 2003.  Bye Bye Windows 2000 and we're closing a chapter on that operating system.

    Don't have to patch anything tonight because I'm on XP sp2 and Windows 2003 which do not need the patches.

    For anyone out there seeing issues such as is discussed below, please remember that issues with a security patch are a FREE CALL to Microsoft

    No-Charge Support - 1-866-PCSAFETY or 1-866-727-2338


    Rick in the Midwest writes:

    Installed this on Windows 2000 Pro that is behind ISA 2004 (don't know if
    ISA causes the problem) and when using IE 6 and clicking a few links, IE
    would lock up. Went to various site to test and rebooted 5 times, problem
    was repeated every single time.
    Uninstalled patch....IE works perfect as before.


    Gary writes:

    The installation of yesterday's IE cumulative patch on my SBS2K server
    broke the Veritas Update function on BEWS 9.1. Removing the patch (I'm
    guessing it was removable because I installed Windows Installer 3 last week) restores
    the Veritas Update function. This function is highly convenient because it
    keeps track of already installed updates.

    One of the functions that the IE cumulative patch modifies is I-Frame,
    which the Veritas Tech Support guy said is used on the Veritas Update site.

    The IE patch has no other negative effects that I could see, but that
    was at best a cursory look.


    We'll keep you posted of any other issues we see out there.

    You might also want to get the other IE rollup patch:

    An update rollup is available for Internet Explorer 6 SP1:
    http://support.microsoft.com/kb/889669

    Which includes additional hotfixes that you may have received:

    • You may receive an error message in module Mshtml.dll and Internet Explorer quits when you run a custom Web program in Internet Explorer 6:
      http://support.microsoft.com/kb/888092
    • A fix for a problem that causes Internet Explorer not to be able to locate the correct program associated with a particular file type. This problem occurs if the content-type header that is returned by the server contains trailing attributes, such as the character set. For example, if the content type that is returned by the server is "text/xml; charset=utf-8," Internet Explorer may not be able to locate the program that is used to open the file. We will update this article as soon as the Microsoft Knowledge Base article that is associated with this problem, 871248, is published.

    We may have WINS but we don't have an issue

    You may have heard of a security issue with WINS and the original bulletin forgot that we install WINS on our SBS boxes.  Remember though the previous post about how “if the port is open” ...well the vulnerability ONLY exists if port 42 on your server is open to the outside.  Trust me.  Unless you are really really really stupid... you didn't open port 42.  The SBS connect to the Internet wizard doesn't open it and you'd have to manually open it.  You'd remember if you did.

    If you don't believe me go to the Shields up/Ports up website and do a scan of your system. Click proceed, then “all service ports”.  You should see green for most of those ports and ONLY have open ports where you intend to have them open.

    Bottom line.. we don't have an issue with WINS and don't unistall it!!  Roll over and go back to sleep.

    So like how many #$%# firewalls do we need?

    The question was asked again in the newsgroup today --

    Do I need the XP sp2 firewall enabled on the workstations inside my network when I have a firewall on the outside?”

    First off some background.  In your computer, in any computer there are over 64,000 ports... tcp/udp ports that are used to talk to one another.  Sometimes there is an application that is loaded up and “listening“ on a port.  Kinda like it's sitting on your computer going “I'm ready! I'm here!“.  For bad things to happen a couple of things have to align in the cosmos.

    First you would have to have this open port with an application that is “listening“.  Then you would have to have a vulnerable application, something that you didn't patch.  Now knowing that I'd wack you guys upside the head for not patching, that's probably not going to happen, but let's pretend, shall we?  Then there would have to be a way inside your network.

    If a bad guy knows that behind that open port [think of it as an open door] that application “X“ is waiting and ready to go, they can build a worm that attacks that “listening application“ that specifically targets that open port.  Now we all know that all we need to be absolutely positively 100% safe is a firewall, right?

    Wrong.  A firewall is only as good as the ports you have closed.  Furthermore, its only as good if there's absolutely no other way to get inside your network.  In order to do “normal“ business, we MUST open ports.  Think of it this way, in order to do your job you must take the risk of driving a car.  You must get in the car and drive on the road or highway to get to your destination.  Thus you have opened yourself up to risks.  In a typical firm you probably have some ports opened up all the time:

    • Port 443 - the SSL port that SBS 2003 needs for secure access to RWW and OWA
    • Port 25 - needed for email

    On port 25 in particular [the email port] spammers are trying to “hang off your nice IP address“ and do what is called an SMTP authorization attack.  They will attempt to “crack“ the password on that port and try to authenticate on the Administrator's account.  Keep in mind that the “attacker“ doing this... I wouldn't call an “attacker“.  It's a “bot“ a machine just trying to add another victim to it's lair.  There's no human “hacker“ on the other end of your rj45 connection manually trying to crack password, it's more likely that it's an automated program trying to get into your system. 

    This by the way is the “finagle“ vulnerability that was discussed by USAToday... aka stupid cracked passwords...a “don't do that“ event as Jason out of Mothership Charlotte would say.

    Okay lets discuss historical events in history that would have been prevented if a firewall had been on the inside of a network shall we?

    SQL slammer would not have been as damaging for one - right now my file and printer sharing ports, my Trend listening ports and nothin' else are open on this workstation.  Thus 1433/1434 the MSDE/SQL server ports are not open.  Now if I had something like an application [like the new 2005 Lacerte will do] that has MSDE installed on the desktop, I can sleep easier knowing that that application is protected.

    Remember too that the other way you got nailed was when you had unpatched machines, a firewall on that outside peremeter and somone remoted in/VPN'd into the network and infected the unprotected/unpatched network.  Most of us probably are not running with VPN quarantine features running as it's not quite SBSized, so unless you can guarantee that all your salesmen have nice, clean, protected machines as they remote into the network, you probably need to think about firewalls on the INSIDE of your network. 

    Steve Riley will be including this in an upcoming book, but the gist is that the concept of the DMZ is dead.

    So why do you need a firewall on the inside of your network when you have a perfectly good one on the outside?  Because stuff happens.  That's why.  And it's another layered defense to have on our side.

    Speaking of patching... for those people that are 100% borg [aka SBS 2003 and Windows XP sp2.... there is no patching needed today whatsoever]

    Non-Affected Software:

    Microsoft Windows XP Service Pack 2

    Microsoft Windows XP 64-Bit Edition Version 2003

    Microsoft Windows Server 2003

    SECURITY PATCH FOR INTERNET EXPLORER - OUT OF BAND PATCH

    Internet Explorer OUT OF BAND PATCH

    http://www.microsoft.com/security/bulletins/200412_windows.mspx

    If you are running XP sp2 you do NOT need this.  This is the patch for the IFrame attacks that occurred on systems not on XP sp2.

    PATCH FOLKS!

    Dear USA Today - followup - what our SBS box got "hit" with

    I found out how the SBS 2003 got ”Finagled” into.... it was weak password

    That's what the “hijack the Windows Small Business Server, the attacker finagled his way into a function of the Windows operating system that allows file sharing between computers. He then uploaded a program that gave him full control."  was all about in the USA Today article.  I checked with the person who set up the honeypot experiment named in the article [he's a moderator for the Patch Management.org listserve I hang out on] and he confirmed that it was a weak Administrator password [the chosen password was password] that was broken that allowed them access.  That once a strong password was chosen, SBS 2003 was snug as a bug.

    Guys, read this post about choosing passwords.  Any questions?  No?  Good.  Roll over and go back to sleep.

    Heck I'm not a coder or scripter or hacker but I think even “I“ could have “finagled“ my way into a server using that attack.

    And I still say that SMTP auth attacks, worms and bots are not directly “targeted to us“ but like SuperG says, it's like buckshot, we get shot via the blast.  I'll repeat this again:

    • Stupidly misconfiguring my SBS box
    • Weak passwords
    • Not patching
    • No backup
    • Not paying attention to the risks of my desktops

    Now “THAT'S“ my risk factors

    Dear USA Today

    I'd like to point out some problems with your study you did in particular about the claims on SBS 2003.

    In your information you indicate that on a SBS 2003 box you had  "Mitnick and Ryan Russell, an independent security researcher and author of Hack Proofing Your Network, were contracted by Avantgarde to set up and carry out the experiment."

    "To hijack the Windows Small Business Server, the attacker finagled his way into a function of the Windows operating system that allows file sharing between computers. He then uploaded a program that gave him full control."

    As a person who day in and day out is in the SBS newsgroups, this doesn't happen.  We're road kill out here.  We don't have attackers specifically targeting our boxes so the scenerio you have described doesn't happen.

    The reality is we are more hurt by misconfigurations, weak passwords and what not.

    You don't give details as to whether this was an attack from the inside or remotely from the outside. Given our file and printer sharing ports are closed from the outside, but obviously open and needed from the inside I'm guessing {I could be wrong} that it appears that the firm has an Human Resource issue [how to fire someone, perhaps?] rather than worrying about outside attackers?  However since the article is unclear as to the technical detail of “finagle“, it's hard to say from what location the attack was launched from.

    Could a specifically targeted attack get into our systems?  Ever seen Dr. Jesper Johansson  aka Dr. J, “hack” his way into a fully patched network?  I have no doubt that you can "finagle" yourself into ANY network given enough time, expertise and talent [and a dash of social engineering thrown in if the normal methods don't work].

    Reality is folks, that Ryan Russell and Kevin Mitnick would not be wanting to go after SBS boxes.  The reality is that spybots and malware are our issues. Stupid passwords and SMTP auth attacks.

    Security is about Risk.  Ryan and Kevin are so NOT my risk factors. 

    • Stupidly misconfiguring my SBS box
    • Weak passwords
    • Not patching
    • No backup
    • Not paying attention to the risks of my desktops

    Now “THAT'S“ my risk factors.

    {READ THIS FOLLOWUP - it was a stupid password that is our “finagle” vulnerability}

    So if the Airforce can get this, why can't you?

    Couple of stories today on the Air Force making a deal to get a “special security tweaked” version of XP.  And in the TaoSecurity blog, asks “Will Microsoft sell this "special version" elsewhere, and if so, is the Air Force the guinea pig paying to develop this version?”

    Uh..sir... all the information YOU need to have this version is in this guide.  But here's the catch.  The special version that works for the Air Force MAY NOT work for you.  In fact, YOU may be able to tweak and tune more securely than they can.

    I'd probably guess they have a lot of legacy apps and interoperability they have to deal with so I'm going to go out on a limb and say that I just “might” be able to tweak down tighter than the Air Force can.. I could be wrong.

    The bottom line folks... we've got the tools and information right NOW today to do exactly what the AirForce is getting. 

    Read the ...um... manual folks.  It takes a real good understanding of your network, not a deal with Microsoft to be secure.

    And while you are at it... read the Threats and Countermeasures guide and the 2k3 security guide.

    Details on Group Policy

    Jeff from Vancouver also writes in that he wants a more detailed description of what the group policy can and cannot do.

    You know [in my opinion] the best source for seeing the power of group policy is?  In an Excel spreadsheet. Now granted I think it's because us beancounters are born with a spreadsheet so it's more natural to us, but that one document more often than not shows me what can be done. 

    Remember my NOLMHash thing?

    On the spreadsheet it's detailed out like this:

    Computer Configuration\Windows Settings\Local Policies\Security Options

    Network security: Do not store LAN Manager hash value on next password change

    Determines if, at the next password change, the LAN Manager (LM) hash value for the new password is stored. The LM hash is relatively weak and prone to attack, as compared with the cryptographically stronger Windows NT hash. Since the LM hash is stored on the local computer in the security database the passwords can be compromised if the security database is attacked.
    For more information on cryptographic hashes of passwords, see "Microsoft NTLM" in the Microsoft Web site at http://go.microsoft.com/fwlink/?linkID=7029.                                                                  
    Important:
    Windows 2000 Service Pack 2 (SP2) and above offer compatibility with authentication to previous versions of Windows, such as Microsoft Windows NT 4.0.
    This setting can affect the ability of computers running Windows 2000 Server, Windows 2000 Professional, Windows XP, and the Windows Server 2003 family to communicate with computers running Windows 95 and Windows 98. 

    Check this spreadsheet out Jeff.  It takes some time to go through, but I think it might help.

    Let me know.

    An open letter to "the Dark Side"

    To the marketing department of Companies in Technology:

    Two things came across my desk this week to inspire this post.  The first was a study to help “develop a share CIO/TMT understanding” and the other was this blog post.

    First off, there's a fundamental flaw in how you market computers to decision makers.  You make it seem so easy to install networks and computers and technology in your message to decision makers and quite honestly, it's not, nor should it be. 

    The study that I refer to above says “the CIO must consistently work to provide the TMT with realistic expectations of the capabilities of IS. If the CIO allows the TMT to understand how IS can realistically be used within their firm to meet specific objectives, the CIO and TMT will be better able to reach a mutual understanding regarding the role IS will play within their organization.” 

    Let's translate for the SBS world, shall we?

    The consultant must constantly fight against marketing materials that indicate that installing and migrating to a new system is so easy that all it takes is putting a cdrom in a drive and following clicks.  The consultant must try, as best as possible, to manage the expectations of the customer that have been improperly set by brochures and information that state that the network installation is so easy, will only take minutes, computers are a piece of cake, and 2 year olds can handle this. 

    Gordonian was blindsided by the expectations that you gave his customer that upgrading was easy. Even on those “15 minute” preloaded machines, you do realize that it took me way longer than 15 minutes to find all the tweaks in Trend I needed to do, to add patches, to adjust some group policies.   Now granted, I was slowed down a bit by capturing what I did and blogging about it, but still, the process I've done took longer than you, the marketing department, has set as expectations. 

    Yes, I'm sorry to call you guys the “dark side”.  I know you don't mean to.  It's hard to run a business that needs to “cheerlead” out new products at the same time you properly set expectations. 

    But understand, that to set up a network, securely, safely takes time.  Computers aren't easy. There's a reason that the geek squad division of Best Buy is making a name for itself or that geeks are going home at Thanksgiving fixing computers..  [thanks to Anne for that blog link]

    Have you seen the other message that marketing puts out?  It's an ad by Cisco advertising their Network protection feature.  You've seen it, Dad is at the office and there's a massive worm attack underway and they can't figure out how it got in and then “Sally” skips by and tells Dad “Oh, I just downloaded a game on your computer, Daddy!”. 

    Well folks, first and foremost, there's a flaw in that commercial.   First, “Daddy” should never allow kids on corporate assets and this should be a written policy that technology isn't needed for.  Secondly, “Daddy” shouldn't have the rights to download everything and anything on his computer.  He should be protected from himself.  Jeff Middleton wrote a section of Harry Brelsford's next book on the concept of “least privilege”, but honestly that's not an easy thing to do.  Security takes time.   

    We” need to change our view.  We need to change the idea that all of the packets on the inside of our networks are good packets.  That we can trust explicitly all traffic that is on the inside of our networks.  That we don't need outbound filtering because only “good stuff” can be traveling outside, right?  That workstations are protected enough as long as there's a firewall on the outside.  Steve Riley talked about this at Tech Ed this year and it was captured on some of the blogs and articles around that time [and for the record XP sp2 is out Windows 2003 sp1 is still in beta]. 

    But let's start first by changing... managing...the expectations of the decision makers.  Putting in network infrastruture isn't easy.  It's hard work.  And quite honestly even if it WAS possible to install a network in 15 minutes.... it wouldn't be secure.  You can't get fast and secure at the same time. Decisions are involved here and the word alone implies thought, consideration, review... certainly longer than 15 minutes anyway.

    So to all those folks that market.. make sure your message is clear and truthful.  Security is a process, it takes time.  Help the consultant manage those expectations by managing the message from the get-go. 

    To all those customers out there ....hire competent folks that make the right decisions.  Understand that they are making decisions in your best interests and don't rush them.

    To you consultants ....communicate to your customer of your process and why this isn't a 15 minute thing.

    Let's all manage those expectations, shall we?

    OH and one more thing... you don't NEED all those attachments

    Just a reminder... your end users.. your customers? 

    THEY DON'T NEED TO OPEN EVERY ATTACHMENT THEY GET.

    They don't need .scr or .exe or .pif or any of that gunk.  Go into Scanmail and click on “enable attachment blocking“.  Click on the “Ok“ that says turn this off after the incident.  Blow that off.  You want this setting on ALL THE TIME.  Now click on settings and  click “block specific attachments“ adjust to those items that you want to block.  Here's a sample from a University of what they block.  Figure out those minimal attachments you have to have for business and block everything else.

    P.S.  In that same screen make sure the quarantine is on a large place.  Those bad files locations can fill up.  Exchange 2003 sp1 no longer saves “badmail” which is a good thing these days.

    Group policy anyone?

    Thought I'd show you what I did to enable the NoLMHash

    How to prevent Windows from storing a LAN manager hash of your password in Active Directory and local SAM databases:
    http://support.microsoft.com/default.aspx?scid=kb;en-us;299656

    First I opened up the Group Policy from start, programs, administrative tools, group policy management and went down to the Domain Controller section and right mouse clicked to “Credit and link an GPO“ here.

    Next I named it what it was doing [LAN Manager Hash] so I could know that was the policy doing the “pushing“.  Next I right mouse clicked on the name and clicked “Edit“

    Now we drill all the way down, computer configuration, then expand windows settings, then security settings, then local policies, then security options and click on that section.

    On the right hand side you should see a list of things you can do, scroll down to the “N” section and look for this setting:

    Now double click and ENABLE that setting.

    When you get all done the “resulting window should look something like this:

    The last two patches and a Security tweak

    Hmmmm..... there's two patches that won't push down from MBSA/Shavlik so I'm doing them manually.  The first is the .NET 1.1 sp1 and the second is the 03-31 for the SBSMonitoring SQL/MSDE instance.  One tweak I'm putting in place is the “Dr. J Password security tweak“.  What?  Don't know what I'm talking about? 

    If you have a full Windows 2000/XP network OR have made your 9x clients use the active directory add on, you can turn off something called Lan Manager Hash.  What's that?  It's a legacy leftover from IBM that we really don't need to keep turned on if we have up to date networks.

    In this KB it talks about how to ensure that this hash is not saved.  Why is this important?  Because if you've ever played with LC4 or LC5 or John the Ripper, you know how fast and quickly passwords can be retrieved if these hashes are saved. It's mere seconds that someone can retrive your passwords if they are saved in this manner.  I've seen LC5 nail a 9 character dictionary word in mere minutes.

    • In Group Policy, expand Computer Configuration, expand Windows Settings, expand Security Settings, expand Local Policies, and then click Security Options
    • In the list of available policies, double-click Network security: Do not store LAN Manager hash value on next password change
    • Click Enabled, and then click OK

    So why are passwords important?  Let's think of all the ways and places that we rely on password for the first line of defense of security.

    • Banks and online banking.
    • ATMs and Debit cards and PIN numbers
    • Websites and online shopping

    Don't you hope that all those places where YOU store passwords would enable that setting too?  [Granted you are probably not putting your password into a AD environment when you log in...but you get the point.] What other places do you put passwords in a computer system and probably don't know what procedures they have for protecting them?  I've seen places like Tmobile and ATT wireless airport signups demand that the password that I chose matched a secure policy.  I don't even want to admit how lame my Amazon.com password is.  Hmmmm... reminds me.... I should go change that sucker.  Excuse me while I go do that after I just admitted how lame it was  :-)

    So you think you are patched, do you?

    Sorry for harping on this issue like a broken record but I'm finishing up the new server and just wanted to point out a few things:

    Windows update may say I'm patched:


    But Shavlik 's HfnetchkPro disagrees:

    In fact we're missing 3 service packs and 8 security updates:

     


    We're not done yet!

    But even then, we need a bit more patches found on our download page:

    The post Exchange sp1 fix up and our ASP.net mitigation to name just a few

    Wonder if he's wearing a Blue Shirt?

     Every month Mike Nash does a series of Webcasts and chats that are live and interactive.  The running joke we have is that Mike Nash always wears a blue shirt for such things [Seriously I've only seen him wear a blue shirt for the webcasts].  So tomorrow, the VP of the Security Business Unit will be having a chat.

     

    Thursday (November 18th, 2004 9:00am Pacific/12:00pm Eastern) in our

    monthly security chat with Mike Nash's Security Team.

    Chat room: http://www.microsoft.com/technet/community/chats/chatroom.aspx

    Add to calendar:

    http://www.microsoft.com/communities/chats/vcs/Security_in_Microsoft_nov18.ics

     

    OOH...next month is on streamling patch management.  I need to go post that to the patch management listserve.

     

    Have you visited the download page lately?

    Just a reminder that Windows update at this time is NOT enough to keep us patched up. The WUS public beta just opened up but it's not [let me repeat that] NOT MEANT to be put on production machines.  As a consultant on a TEST BOX you can try it out, give feedback and be an annoying SBSer, but DON'T put it on a production setting.

    In the meantime, don't forget our download page.  On that page there are some additional patches that are NOT Windows Updatable.  Our ISA 2000 patch for SBS 2003 premium is not yet on the site but it was “just” re-released.

    Remember when you sign up for the beta [IF you sign up for the beta] that you download the readme file and READ IT [you know... read the um.... manual].  There are some SBS specific steps, so make sure you read the instructions.

    Go here, go into the reporting bugs section, follow the instructions for getting to The WUS OEP Beta site and click on the known issues link.

    Information Workers Security Handbook

    Information Workers Security Handbook

    The Security Business and Technology Unit (SBTU), with the assistance of the Microsoft Solutions for Security (MSS) team has put together an Information Workers Security Handbook 

    IT professionals have requested guidance for their end users. 
    This document provides, in plain language, the needed background information on how computer networks work and the specific security risks they face. It also provides real-world actions you can take to better secure your own computer and help preserve the security of the network as a whole 

    The document is available for download here

    P.S.  I spotted this blog.  LOVE the title!  Security Awareness for Ma, Pa and the Corporate Clueless

    Choosing passwords

    So I'm building my new baby [umm server] and I get to the part where you have to enter the password and because this is a HP machine that I”ve used the HP setup wizard on [yup just seeing how this will go] and I've set up a password on the HP web admin AND a password on the Windows part.  I was just up in Redmond and one of the presentations given to us was on Passwords. 

    The background can be found here, here and here.

    So I purposely chose a longer than 14 character password for the Administrator account.  I made sure that it following the rule of complexity, This is the admin's account and I wanted to make sure that sucker was long and complex.  The admin's account is a target and you really shouldn't be logging into your server on a regular basis like this anyway so set it up right.  There's a listing on this page of the most common passwords used.  Make sure yours is not on there for a start.

    Next it was interesting to find another password on this machine I wasn't expecting.  This model has an integrated lights out model and IT has a password.  Me, being the paranoid person that I am made sure that I checked Secunia's web site for public vulnerabilities.  See what going to a Microsoft Security Summit has done to my paranoia level?  Definitely knocked it up a notch ...or two... or three. 

    I know that I“m also looking forwarded to checking out the RSA secure offerings for small businesses.  At the summit, the point was also made that the problem with biometrics was once they were “compromised“ it wasn't easy to reissue a new one.  Thus secondary authentication with a physical device was actually, in the long run, better than “who you are“.  Remember the forms of authentication?  What you know [passwords], what you have [smart cards], who you are [biometrics].

    I'm also reminded of the bogus security issue about blank passwords that was posted to a security list.  That may not be a bad thing as is stated here:

    “Remote users cannot authenticate by using an account that has a blank password. This authentication is configured separately.“

    Ever notice how one person's best practice is another person's idea of a dumb thing to do?  I keep getting the feeling these days that following “best” isn't good enough.  Doing your own risk analysis is the right thing to do.

    ISA 2000 and the 04-039 patch

    Heads up folks, it appears that the issue we've been seeing in the newsgroups about ISA 2000 and the 04-039 patch is only on machines that are NOT [let's repeat that] NOT on ISA 2000 service pack 2.  If you are still on Service pack 1, it looks like you might be hit with this issue of spiking CPU and webproxy shutting down.

    So here's my advice.....

    Quite honestly if you do those steps, you'll be fine.

    Remember this is for SBS 2000 with ISA installed and SBS 2003 Premium with ISA installed.  This does not affect ISA 2004...which... we are going to be getting we just have to wait for Windows 2003 sp1 as the SBS 2003 sp1 bundle is piggy backing on that.  Remember that AT THIS TIME, ISA 2004 is not supported by “Mothership Charlotte, Los Colinas, Shanghai or Redmond” on our SBS boxes.  If you are a consultant, I'd probably be putting ISA 2004 on a virtual server and start playing... it's a learning curve that I think you need to be ahead of before it SBS 2003 sp1 comes out.  But DO NOT put it on your client's boxes at this time nor are your clients licensed for it.

    So, to recap....

    • Apply ISA 2000 sp2
    • Apply 04-039 patch

    Quite honestly, I nearly didn't realize that ISA 2000 sp2 came out.  The SP was released about the time of ISA 2004 and I didn't see it myself until later.

    P.S.  You can also do the following - but quite honestly, I'd much rather everyone be on SP2

    1. remove the patch
    2. apply the workaround in http://support.microsoft.com/kb/889189
    3. wait for the patch to be re-released.

     

    I think I see an Elephant doing a quick agile move

    There are times when the large corporation of Microsoft surprises me.  Today was one of those times. 


    Microsoft Security Bulletin Advance Notification Announcement

    Published: November 4, 2004

    In response to consumer feedback, Microsoft is expanding its security bulletin program to provide all customers with advance information about upcoming monthly security updates.

    Starting in November 2004, the TechNet Security site will publish a general summary of planned security bulletin releases three business days before each regularly scheduled monthly bulletin release. Currently, security bulletins are scheduled to be released on the second Tuesday of each month.

    The advance notifications will include the number of bulletins that might be released, the anticipated severity ratings, and the products that might be affected.

    The purpose of the advance notification is to assist customers with resource planning for the monthly security bulletin release. The information provided in the notification will be general and will not disclose vulnerability details or other information that could put customers at risk.

    The notification will be based on the information available three business days before the monthly bulletin release date. However, this information often changes due to the complexity of testing security updates. Therefore, the notification should not be viewed definitive.

    Check back again in December when customers will be able to sign up and receive advance bulletin notifications via email.

    See the most recent security bulletin advance notification


    Holy Security bulletin Batman, they are releasing the info about Security bulletins 3 days ahead of time to all.  Whoa.  Talk about “Microsoft the Elephant” making a bold, agile move in my book.    I did not expect them to do this one at all.  Next month they will have a sign up for “early announcement emails“.  I hope they do RSS as well but I'll just let them slide for a bit as I'm still a bit surprised at this move.

    For the record next month is going to be a quiet month with only an “Important” security release for ISA server [will need a restart] which means that's a heads up to us SBSers that we will be affected [those of us using ISA anyway - and remember MBSA, nor WU scans for ISA patches]

    So if you see a Elephant dancing by... it's just Microsoft making a move that surprised even me.

    Security newsletters for your clients

    In the latest Microsoft Partner newsletter they refer to a customizable newsletter that you can send to your clients.  I set it up and emailed it to myself.  Check it out.  It's good, but I think a little “too” geeky for clients.    The topics of “learning about Office 2003 sp1, Windows XP sp2 requires MBSA, new features of XP sp2, Anti-Phishing Working group, Testing and Reporting, and listing the security alerts of AOL, Microsoft, Oracle, Red Hat, Sun and SuSE in a client newsletter?  Just not what your clientele really care about.  That's YOUR job. 

    I think the better one for end users/clients may be from the SANS.org organization called “OUCH”.  It's much less “network admin-y“ and much more “end user-y“ which is where most of our problems come from.  I've copied the recent version of this newsletter below.  You can see it's much more geared toward what you clients will see coming into their email boxes and on their machines.  Now again, I'm of the belief that down here in SBSLand our threats are not the attacks on our servers, but rather our users not “doing the right things“.  We need to “Blonde” this stuff down if we want end users/clients to understand this.

    *************************************************************************
    OUCH: The Report On Identity Theft and Attacks On Computer Users
    Volume 1, No. 11.                                       November 01, 2004
    *************************************************************************
    
    Major threat this month:  New Phishing System Takes Advantage of JPEG Bug.
    (Phishing attacks masquerade as email from trusted sites and try to get
    you to visit a web site where the attacker steals your private
    information.)
    This attack has not yet spread widely, but future variants could
    improve. Experts call methods it uses "sophisticated," Read the full
    story here:
    http://www.eweek.com/article2/0,1759,1664909,00.asp
    
    ************************
    I. What To Avoid This Month
      Email from people trying to get you to divulge private details.
      These criminals are often trying to steal your identity (and your money)
       I.1 'Your membership will be cancelled'
       I.2 eBay Scam of the Month
       I.3 'EarthLink Account Expired - Update Now'
       I.4 'Washington Mutual Bank'
       I.5 Citibank - 'Security Alert on Microsoft Internet Explorer'
     
    II. Virus/Hoax Alerts 
      II.1 W32.Spybot.FBG
      II.2 Virus targets Mac OS X users
     
    III. Microsoft Issues 10 Security Bulletins, Seven Critical
     
    IV. Interesting Phishing Links
     
    VI. Four Eastern Europeans First To Face Criminal Charges For Phishing
    
    **********************************
    More Details About Things To Avoid
     
    I. Email from people trying to steal your identity (and your money)
     
       I.1  'Your membership will be cancelled': 
      
       The Bait:  This one tries to lure you into believing that your MSN
         membership is being cancelled.
       What it tries to make you do:
         Give up your credit card information, contact information (name,
         address, phone number, etc.)
       Where you can see how it actually appears:
     
    I.2 eBay Scam of the Month:
     
       eBay Scam of the Month:  'we had to block your eBay and PayPal account
         because we had been notified that your account may have been
         compromised by outside parties... In order that you may access your
         account, verify your identity by clicking here...'
       What it tries to make you do:
         Give up your credit card information, contact information (name,
         Address, phone number, etc.)  
       Where you can see how it actually appears:
    
    
    I.3 EarthLink Account Expired - Update Now
     
       The Bait:  This one tries to lure you into believing that your
          EarthLink Account has Expired
       What it tries to make you do:
         Give up your credit card information, contact information (name,
         address,phone number, etc.) , earthlink.com username/pass.
       Where you can see how it actually appears:
    I.4 'Washington Mutual Bank : Notification of Washington Mutual Internet
          Banking Account'
    
        What it tries to make you do:
          Give up your credit card information, contact information (name,
          address, phone number, etc.) , wamu.com username/pass.
        Where you can see how it actually appears:
    
    I.5 Citibank - 'Security Alert on Microsoft Internet Explorer'
    
        What it tries to make you do:
          Give up your debit card information, citibank.com username/password
        Where you can see how it actually appears:
    
    II. Virus/Hoax Alerts:
     
       II.1 W32.Spybot.FBG - Worm
          W32.Spybot.FBG is a worm that may be remotely
          controlled and may launch attacks to slow down other internet
          servers.  In addition, it may open up a "back door" capability 
          that provides the criminal with access to your computer. Lastly, 
          and perhaps most importantly, the worm also attempts to steal 
          confidential information from the infected computer.
          Where you can read more on this story:
     
       II.2 Virus targets Mac OS X users
          A new virus targeting Mac OS X is not expected to cause much
          trouble. But experts said it should serve as a warning
          to those using alternatives to Microsoft that their machines are
          not attack-proof. 
          Where you can read more on this story:
    
    III. Microsoft Issues 10 Security Bulletins, Seven Critical:
       
       Microsoft handed Windows users a headache in the form of 10 security
       bulletins Tuesday, seven of them critical. They outline security holes
       an attacker could use to cause a denial of service, view sensitive data
       or launch malicious code. Multiple Windows products are affected,
       including NT, Excel, XP, Server 2003 and Internet Explorer.
       Where you can read more on this story:
      
       Important note: When updating your Windows computer, you usually must a
       get both Windows updates and Microsoft Offices updates.  They are at
       different sites:
     Office Update: http://office.microsoft.com/en-us/officeupdate/default.aspx
     Windows Update: http://windowsupdate.microsoft.com/
     
    IV. Interesting Phishing Links
       IV.1 The Phishing Guide
         http://cnscenter.future.co.kr/resource/security/hacking/Phishing.pdf
       IV.2 It's Phishing Season
          http://www.nlectc.org/techbeat/fall2004/PhishingSeason.pdf
       IV.3 U.S. House Passes Anti-Spyware Bill
          http://www.eweek.com/article2/0,1759,1668518,00.asp
       IV.4 New Phishing Trends Report Available!
          http://www.antiphishing.org/APWG_Phishing_Attack_Report-Jul2004.pdf
    
    V.  Four Eastern Europeans First To Face Criminal Charges For Phishing
       Four Eastern Europeans phishers were charged Thursday in a London court,
       the first time that criminal charges have been pressed against phishers.
       Where you can read more on this story:
          http://www.securitypipeline.com/showArticle.jhtml?articleID=50500190
    
    ==end==
    
    Copyright 2004, The SANS Institute.  Permission is hereby granted for
    any person to redistribute this in whole or in part to any other persons
    as long as the distribution is not being made as part of any commercial
    service or as part of a promotion or marketing effort for any commercial
    service or product.

    Shadow Copies, Trend and Office scan

    Are you getting Trend's Officescan reporting viruses in the quarantine folder of Shadow Copies?

    • Make sure you move the quarantine folder out of the following path locations
      • \windows
      • \program files
      • \documents and settings
    • Move the quarantine folder to \Trend\SMCF\quarantine
    • Remove/Exclude this from the daily backup routine
    • Remove/Exclude that same folder from all of the scans in the Trend console

    Okay, now I don't want them to use the Internet

    So you've set up SBS 2003 and it's working a little TOO good and you want to restrict some people from using the Internet.  So how do you do that?

    Got SBS 2003 Premium? 

    Remove the folks from the Internet users security group.  As they log into different machines, this restriction will follow them as they log into different machines.

    Got SBS 2003 Standard?

    Well, hopefully they will be using the same workstation otherwise this won't work as Standard only can restrict by physical location.  In the RRAS firewall, you can use the RRAS filtering to restrict access by IP.  Click on RRAS, then on IP routing, then on NAT/Basic Firewall, then on Network Connections, then on Properties, then on Outbound filters.

    Got that?

    Or you could just buy the Standard to Premium upgrade and get SQL as well.

    It's two months and counting

    It's two months and counting.... to what you ask? 

    To End of Life of Windows NT Server.  So for anyone still running SBS 4.5 [or heaven forbid SBS 4.0] the clock is ticking folks. 

    Microsoft Monitor talks about the latest Steve Ballmer memo about Windows versus Linux and he says it's related to the end of life of Windows NT and the announcement of Dell and Novell's SuSe Linux.  For the small biz space, I still don't see a huge move towards Linux especially as the main domain controller.  Medium firms, larger firms, but not down here.

    So get ready to say goodbye to DIP switches.

    Goodbye to no plug and play.

    Goodbye to closing my eyes and thinking happy thoughts as I would reboot my SBS 4.5.

    Goodbye to a platform that served us well, but it's time is now over.

     

    So what kind of VAR/VAP are you?

    I was on the phone earlier tonight talking to a gentlemen about security and the impact of it on the Value Added Reseller and Value Added Provider marketplace.  As I was talking to the gentlemen, he was saying that consultants tended to install the networks and then just go on to the next network.  Hmmm... not the consultants that I hang around with.  Sure there is always the revenue from the new projects, but networks need maintenance.

    Now before you say, well that's because you run a Windows network.  No.  It's because I run a NETWORK, period.  A living, organic, working environment that needs vigilence. 

    Today in the Encase, Computer forensics class, the instructor was asking one of the students about his position and the student said that most of the time his job included “firewalls”.  So the instructor said well you probably just set them up once, right?  And the student said, “No actually on a regular basis we have to examine intrusion attempts, ensure that remote access to the network has only been done by authorized employees”.  You don't just set things up and walk away. 

    Take today for example, I got a couple of alerts about Bagle varients, next month, second Tuesday we will have another Patch day to review the patches for, and on a regular basis, I would argue that you should make sure that no one has changed the network you have configured.  To ensure that a network is secure, passwords and passphrases should  be changed, the network should be scanned for rogue wireless access points, to just make sure that everything is as you left it.

    Look around us.  What we consider to be secure today will not be secure tomorrow.  Already RSA has announced a Small Business push for two factor authentication.  May of the folks in the class that worked for larger firms already do this.  That's something I'm interested in checking out.

    Think about the last few years.  What we take for granted now, we did nothing like this a few years ago.  Look at just what happened Thursday in the USA.  A law went into affect called “Check 21”.  No longer will you be getting copies of your paper cancelled checks, instead you will get a “digital” image.  This of how much we email, fax, send electronically, order over the web now than we did a few short years ago.

    You know what this business is like, the things you did ten years ago, five years ago are not what you do now.  Heck, did we even know what Voice Over IP was a few years ago?  And now more and more businesses are intregrating it into their networks. 

    Security is not an end goal.  It's a process.  We don't get a map, a final destination, it's like life.... we keep growing, learning, changing, evolving.

    Over the last four days, I used computer tools to search for emails that were deleted, for documents printed.  I remounted drives that were fdisked.  I made hashes of certain files that I was looking for and ran an exam against the hard drive to see if those files that weren't supposed to be on that hard drive, were in fact, on there.  I learned that as we were there using the Internet on our lab machines, traces of our activity, our email from our offices were leaving there traces in our Internet temp files [just another reason to never use Internet kiosk machines to check email and to only use your own computer], that while one piece of circumstancial evidence might be explained away, that the patterns and history I was finding left trails behind.

    Our “digital lives“ need constant attention.  Setting networks up, of any flavor, whether Linux or Small Business Server flavors, is not just about setting them up securely right NOW.   Keeping safe on the Digital Information SuperHighway age means that you will reevaluate that network on a regular basis.

    Heck look at me now, sitting in a hotel room, connected wirelessly typing up this hopefully somewhat coherent post.  It wasn't too long ago that I was pretty much dialing up on the road.  I haven't used the phone cable in my laptop bag in ages. 

    So getting back to the point of this rambling post, I don't think you guys just set up networks and walk away.  I think more of you guys out here are the other kind of VAR/VAP.  The one who is the Outsourced Chief Information Officer and not just “the guy [or gal] who installed the network“.

    From Today's mailbag, James asks "Do you send emails to clients prior to the install?"

    From today's mailbag, James asks “What type of emails do YOU or others send to the companys employee's to get them excited about the install that is coming soon?“ 

    Good question.  I know in my firm we have training sessions to ensure that folks know how to use the new stuff and while the SBS box sends out an “welcome to your new server“ email, it certainly isn't something that folks probably take the time to read. 

    I know that Chad does indepth training in Outlook [and Sharepoint] for his clientele but I don't know if he sends out emails “ahead“ of time. 

    This is part of that “managing expectations“ process.  There does need to be a process where you communicate with your clientele and ensure they are aware of the process. 

    In my firm, before the install is rolled out, I normally don't send out notifications ahead of time, I do the training once the install is rolled out. 

    So I'll ask the community out here.... do you send out emails ahead of time to let the employees know what is in store?  How much training do you budget ahead of time for your install?

    Why aren't we?

    So in the Encase class today we're discussion hashes and file signatures.  And we discuss how you can change the file name but you can't change the hash value.  So Gater.exe would still be identified as a bad program no matter what you renamed it.

    So I'm chatting with Eric F and he brings up that much of this can be done with group policy.  So off to google I go to check and sure 'nuff, we can block this stuff like this.  So why aren't we?

    The article “To create a hash rule” talks exactly how to do this in Software restriction policies.  Now granted it would probably be tough to do this, and might be easier to build the “here's the good program” database and just put in those programs that CAN be run, but why aren't we utilizing more of this power that we have already under the hood?

    Like all the running around with our heads cut off we've been doing for the gdiplus.dll issue.  Couldn't we build a restriction policy to either allow only the good one to run or the bad one not to run?  Or am I oversimplifying this?

    NIST has hash files that you can subscribe to along with other sources on the web.

    I just think that as we go forward more of the “kewl” stuff like this will be more integrated and automated.

    Well those of us in the USA have to get something in return!

     Last week I posted about how you guys in Australia were getting Wayne Small, Dean Calvert AND Jeff “Mr. Swing It!! Migration” Middleton at a HP and Microsoft SMB conference throughout Australia.  Well it's only fair that we in the USA get something nice this week, don't you think?

    I just found that there's a new TechNet Magazine that is free to techies in the USA

    I just ordered my copy and you can review some of the articles online.  Dr. Jesper Johansson and Steve Riley are working on a book together and a sneak peak is included in the first edition of TechNet Magazine.  Anatomy of a Hack talks about what you need to know that the “bad guys” already know.

    Got your policy in place?

    I'm in Pasadena this week at Encase/Guidance software training and one of the key elements they discussed was an AUP.  What?  Don't know what an AUP is?  It's your guideline to your employees..it's called an Acceptable Use Policy.  the SANS.org web site has a whole list of policies that I”ve linked to before. 

    So ...do your clients have a security policy?  Do your clients require their employees to sign the policy?  Does it document what resources they have the rights to access?  Is it less than 10 pages?  This is approximately the size that will result in 15 minutes of attention.  If employees cannot read it in 15 minutes it's too long.

    I'm listening to a recording about the subject and one of the recommendations they make is to make sure that the boss is aware and in agreement of the policy.  Do you ask your client if they have a policy?  Do you recommend that you help them craft a policy.... one that they can live with? 

    One of the discussions we got into today is what is acceptable for one firm, may not be for another.  A guy from a software firm that does databases [and no it wasn't Microsoft] was saying that they use internal and external IM because for their environment they need this type of “collaboration” enviornment.  So for him, he can't restrict IM.  Another firm who is an insurance company has to worry about HIPAA and any ePHI can't go over IM without protection and logging.  So for her environment, IM is not acceptable.  At least not “normal” IM that most of us use. 

    I realized today... as I was in the class that had Internet access on the desktops, that I would try out the web based MSN IM and realized that it appears that the traffic for MSN IM goes over port 80.   You know port 80?  What the experts call the universal firewall bypass port? 

    It's clear to me that if we don't have the written policies in place to help the people know exactly what they can and cannot do, even in our small firms, we're not properly matching up policies with technology.  Even in our firms, have both in place.  We have risks just like big firms.  Your security policy should be a clear roadmap of what your risks are.  If your clients, if you, have as your biggest risks worms and viruses, if your security policies do not include limitation or blocking of web based email, you are not aligning your policies with your risks.

    So the next time you are in your client's office, ask them what their “pain point“ is... what are the biggest risks they face?  Now have them grab their security policy.  Compare that policy with what they just said their risks are.  Do they line up?

    I'm going to be a bit offline the rest of the week

    I'm going to be a bit offline the rest of the week and checking with the hotel where I am staying, it looks like it only has dial up.  Ugh!  I'll be in search of a Starbucks for sure.  But it's all for a good reason.  The firm that I work for [you know, the day job] specializes in litigation consulting and for awhile we've been “dabbling” in forensics and are seeing a need going forward.  So I'm off to Pasadena tonight to start four days of training at Guidance Software/Encase

    David Coursey went to the training and talked about it at Eweek recently.  NIST even has a paper on PDA forensics.

    Personally I think I'll end up being even more paranoid than I am now... which may or may not be a good thing.  Friday night I went on a candlelight historical tour and one of the mansions that I walked through is now re-used as an office building by Attorneys.  What do I remember most about that building?  Not the wood staircase or the vaulted ceilings.  Oh no.  I remember freaking out that as part of the public tour they had us on walked right by their Windows 2003 server for the firm.  [And not an SBS box at that too!]

    Nice physical security there.  We're making sure in my office that our new server that is being added to our network is in the locked network room, the patch panel is also under lock and key.  Our workstations have locks as well. 

    After I get back from Encase training, I'll probably never let anyone save anything ever again. 

    :-) 

    Want to play a game?

    A game of picking passphrases? 

    Okay here's the rules.  Think of a passphrase that you would use.  Say.... Mountain Dew comes in five flavors!  Now send that to passstud@microsoft.com.  In the latest installment of Passwords versus Passphrases by Dr. Jesper Johansson he asks:

    In this installment of the passwords article series, we took a first a step toward analyzing passwords and pass phrases. As you might have noticed, however, we do not know much about the pass phrases people use. In order to understand more about this, we would like to ask you a favor. If you would like to help us, think of a pass phrase you might use (preferably not the one you are currently using!) and e-mail it to passstud@microsoft.com*. We hope to get enough samples to be able to perform some analysis on pass phrases and understand how they are actually formed.

    Sounds like fun!

    Okay I'm in a mood....

    Fredly posted in the newsgroup asking a question about Watchgard versus ISA and where ever he crossposted to responded back that he had gotten another response that said this:

    “The best thing you can do is to get a firewall as Watchguard or another box
    and remove the ISA. Its never any good ide to run a firewall on the same as
    your production server. I cant think off any explanation why MS dont removed
    the ISA when they removed the TS on SBS2003, its a bad ide to have firewall
    on your production server, very bad. But if you have the Watchguard you will
    be safe, and then you only need one network card. But if you only are runing
    ISA, DHCP and DNS and not excahnge or other stuff, then you can use your SBS
    as a stand alone firewall and thats ok, but maybe a litle overkill to have a
    SBS box for that and not only a standard server with  ISA.”

    To whom it may concern that posted that:  The best thing you can do is to understand that right now my vulnerabilties, my threats, my weaknesses are not my ISA on my domain controller but the fact that many of my line of business apps want local administrator.  Having a firewall on our little boxes is not where my security threats are coming in from, dude.  It's my blasted desktops that cause me my grief.  A firewall is a speed bump.  A Watchgard firewall is also just “software on a box“.  And right now with my Shavlik, I have a patch tool for my firewall.  Watchgard needs patching just like anything else. 

    As long as you are running Windows 98 or XP's in local administrator mode, the number of NICs, the position and make/brand etc of your firewall is irrelevant. 

    My threats are not attacking my domain controller.  They are attacking my desktops

    As long as we don't understand where our true vulnerabilities are.... we will be arguing while the house burns down in flames behind us.

    UPDATE:  Bruce Schneider has a blog post on this subject:

    http://www.schneier.com/blog/archives/2004/10/security_inform.html

    “Again and again, it tells customers that they must buy a certain product to be secure. Again and again, they buy the products -- and are still insecure.

    Firewalls didn’t keep out network attackers -- in fact, the notion of "perimeter" is severely flawed. Intrusion detection systems (IDSs) didn't keep networks safe, and worms and viruses do considerably damage despite the prevalence of antivirus products.

    The key to network security is people, not products.”

    Ever notice how people tell you things ...after....

    My Dad calls.  “I got this notification that my AOL account has been locked down to a terms of service violation and I have to go into the master account to re-open it”.  Okay, Dad, no problem.  It's probably an expired credit card or something, I'll take care of it as I'm the master account holder anyway.  [Yes I still have an aol account]


     Dear Member,

    America Online's Terms of Service agreement (AOL Keyword: TOS) prohibits members from sending unsolicited bulk e-mail. This prohibition helps protect the AOL community from unwanted junk e-mail or spam.

    On 10/21/2004 22:24:07 EST, your account was secured by America Online's Community Action Team because unsolicited bulk email was sent from the ######## Screen Name.

    AOL secures accounts used to send bulk e-mail or spam because they often may be compromised: that is, somebody has stolen the account password and is using a screen name on the account to send spam without the knowledge or consent of the account holder. By securing the account, AOL ensures that an authorized owner regains exclusive use of the account.

    We understand that taking these actions may inconvenience some of our members. However, we think you will agree that regaining security of your AOL account, and the personal information it contains, is top priority.

    There are several ways that you can help to keep your account more secure. If you feel your account was compromised, these tips can be especially helpful.

    Computer Safety Tip #1: Beware of websites that claim to be America Online. Remember, the only time you will be required to enter your password is when you log onto AOL or when you change your password at AOL Keyword: Password. Often members receive e-mails with a link to a website that claims to be an "official" America Online website. Be very cautious when going to one of these websites, especially if they are soliciting your password or personal information. Most AOL accounts that are compromised are compromised because the legitimate user clicked on a link or provided information in a scam pop-up or e-mail.

    Generally an authentic AOL website will have "aol.com" somewhere within the web address, (i.e., aol.pictures.com). If you are unsure about whether a site is a legitimate AOL site, you can always try to go directly to the area (for example, if an e-mail or pop-up asks you to update your password, try closing the form and going directly to AOL Keyword: Password). If you want to make doubly sure, you can chat with one of our consultants online at AOL Keyword: Get Billing Help.

    Computer Safety Tip #2: Beware of "Trojan Horses." Trojan Horses are files attached to e-mail or web pages, some of which send your AOL password to another person, allowing them to access your account. Never download an e-mail attachment sent to you by someone you don't know and be very careful about what you download from the Internet.

    If you think you inadvertently may have downloaded a Trojan Horse program, go to AOL Keyword: Anti-Virus, and click on the Try It Now For Free button. Once you click on the Download Now button, you will be registered for the McAfee VirusScan software. Just follow the instructions as they come up. The software will download and install itself with pauses where the computer needs to be restarted. After the software is installed, don't forget to run a virus scan to ensure there are no Trojan Horses on your computer.

    Enjoy your first month FREE of McAfee VirusScan Online brought to you by AOL. After your free trial offer, the service is $2.95 a month plus any applicable taxes in addition to your basic monthly AOL membership fee, conveniently billed to your AOL payment information on file. To avoid being charged a monthly fee, simply cancel your McAfee VirusScan Online membership before the trial period ends.

    Password Tip #1: Change the passwords to all Screen Names on your account at AOL Keyword: Password. Be sure to keep your passwords a secret, and change them frequently. Also, remember that AOL staff will never ask for your password.

    Password Tip #2: Don't create passwords that are easy to guess. The best passwords are at least six characters long and contain a combination of numbers and letters.

    Safety Awareness Tip #1: Visit AOL Keyword: Neighborhood Watch regularly for updates on account security issues.

    Safety Awareness Tip #2: Check out the security options available at AOL Keywords: Parental Controls and Mail Controls.

    Safety Awareness Tip #3: - Keep informed on how to combat unwanted junk mail at AOL Keyword: Junk Mail.

    Safety Awareness Tip #4: Take advantage of the information and tools at AOL Keyword: TOS.


    I hope you find this information to be useful. Please note that this screen name cannot accept replies. Therefore, if you have any other Terms of Service related questions or comments, please visit AOL Keyword: TOS Questions. To review AOL's Terms of Service agreement, which is presented to all members during the sign up process, see AOL Keyword: TOS.


    Holy ____ Dad, what did you do?  So I unlock the account, reset the password and call him back.  My sister is over at their house picking up our very spoiled Toy Poodle who goes over to their house during the day for “doggie day care” and she relates the story to Dad.  “Dad, they cracked your password”, she says to him.  And I give her the guidance to relay to him about long passwords, make sure there are numbers  blah blah ....and then she comes back that “he says that a month ago someone asked for his password and he typed it in.”...

    Whoa.  Say that again?  What did what?

    Ever notice [and this happens even in my office] that people will tell you things LONG after the flames are shooting up and then they remember that “oh yeah, something happened”?

    Mind you, he's made me the paranoid person I am today but the Internet is one place that he's probably still a little too trusting on. 

    Take the time to discuss “normal” operations and empower people to tell you “oh yeah, this happened” more often.

    I'm just going to stop using the Internet...maybe that's the proper answer?

    So I'm reading that Internet Explorer, XP sp2 is screwed, Firefox and Mozilla have vulnerabilties and as the Incidents.org web page so aply puts it, “If you are reading this diary with any web browser other then 'lynx' or 'wget', you are likely vulnerable to one of the issues released today.”

    Okay... so that's nice to know.  And how long before Lynx and Wget get vulnerabilties?  I know a lot of geek buddies have switched to firefox but I don't like any browser that can't authenticate in with ISA and active directory.

    When push comes to shove it's all about risk.  A new blog on Security guides opened up recently and Brian Johnson pointed to a Security Risk document that was released. 

    Me, I'm making to movement to User Mode and least privilege here in the office and making sure I have other processes in place.  I'm not willing to move from a browser that I can remotely patch.  Sometimes you have to stand back and realize that we will never ever have absolute security.

    Just is not going to happen folks. 

     

    Handicappin' the Patches

    In the SBS newsgroup someone asked if they applied “all“ of the critical security bulletins because they were afraid of breaking something on their boxes.  First off, realize that not only do these patches go through an internal testing process, but they go through external testing by OEMs, partners, etc as well.  They DO get tested on SBS boxes.

    Next, you guys probably know that I'm writing a book on patch management and I'll share with you in this post a part of the book “in real time“, a concept that I call “handicapping the patches“.

     

    First let set forth some understandings:

     

    1.  Do we apply all patches in SBSLand?

    • I do.  I don't feel that at the present time since I still have too much local administrator, not enough control of the desktops that I don't feel comfortable in NOT patching.  The guidance normally says “apply patches based on risk, cost, availability and timing and minimize change whenever possible“ [1]  Well I have a tool to easily patch [Shavlik], since I have a 100% Borg network [all XP sp2s], I normally schedule patching if the risk is a “normal“ risk for Friday night [gives me a weekend to undo anything], and I know that I have good backups.

    2.  Any recommendations for best practices?

    • Good backup.
    • Reboot the server before applying patches to ensure that the server is in good working order BEFORE you apply the patches.
    • Patch has been either
      • Tested in a test bed network [my SBS2003 home network serves this purpose for me]
      • On a VMware network or VPC network - you literally image a system and patch it
      • You scan the newsgroups for “dead bodies“ - other SBSers report in the yahoogroups and sbs public newsgroup when we have issues with patches
      • You have “canaries“.  A couple of people in my office [me being one of them] gets the patches THAT DAY.  We then monitor our systems and ensure that all is well
    • Keep a log file of what system changes you have made.  David emailed me the other day his log file of a system so I could update his “patches for a SBS box“ and it was a gorgeous document.  Let me see if I can reproduce it so you can see a FANTASTIC best practice
    • Do you priortize your patches {I do this and will discuss this below} Internet Explorer patches get FAST TRACKED in my office and are definitely OUT that week on all desktops.  BUT that same IE patch is not fast tracked for the server.  I don't surf at the server so it's “role“ as not a “surf machine“ means that I don't patch it for IE patches like I do for the workstations.
    • I will put patches on fast tracks whether or not public vulnerabilities are “in the wild“.  You don't have to be the listserve junkie I am to know this info.  Most of it is in the bulletins.
    • Critically rated bulletins get the first glance and I review them THAT DAY to see what priority I put them on.

    3.  I agree with Eric that we're not yet in a position to “choose“ patches.  I test.  Make sure I'm not seeing issue on mine or on the newsgroups and then they get rolled out.

     

    So without further ado, here's “my personal risk analysis“ of the bulletins this month:

     

    Critical Bulletins:

     

    MS04-032 - Security Update for Microsoft Windows (840987)

    http://www.microsoft.com/technet/security/Bulletin/ms04-032.mspx 

     

    Okay first off - Remote Code Execution is the impact...hmmm that doesn't sound good...let's keep reading...hey already a KB on “known issues“.  Cool... see they are doing testing on this and are ensuring that it's known.  Okay that's the issue of the disk size on NT 4 that showed up a bit back.

     

    Okay now lets Expand that section on “Executive summary“.  See that “Vulnerability Identifiers section“?  See those CAN numbers?  Lets pick the worst one, the Graphics rendering one CAN-2004-0209 and see if it links us back to “in the wild“ stuff.  Okay right now it doesn't.  So far so good.   In fact the description says “privately reported”

     

    Next, the bulletin says MBSA will detect this.  Good.  Windows Update Yes.

     

    Okay now lets look a the vuln details section and in particular mitigating factors.  Since this is a “multi patch“,there are several issues being patched here.  Lets again review the worst one, the Graphics rendering one.  Okay that one has a mitigation of reading email in plain text. 

     

    In the Security update section, we read that it needs a reboot, and the patch can be uninstalled.  Then scroll down and look at the affected files. Hmmmm... some of those have been patched before I recall.  And if you remember reading the patch chapter in the Server 2k3 patch they have two versions.

     

    To verify installation you can use MBSA, check the version in the version tab window or look at the reg key.

    The last section - the acknowledgments also helps me “rate“ the security patches.  Anytime eEye, or another of the “major“ security researchers that have found nasty stuff in the past are listed, I take a closer read.  Keep in mind that while this is privately reported, eEye will be disclosing details in a usually short time frame.  They also tend to give enough detail to make the lovely communities start reverse engineering.

     

    My take?  Higher priority for workstations, lesser for servers.


     

    MS04-033 - Vulnerability in Microsoft Excel Could Allow Code Execution

    (886836)

    http://www.microsoft.com/technet/security/Bulletin/ms04-033.mspx 

     

    Well I’m a beancounter so if it’s critical for Excel…well…BUT I’m already on Office 2003 service pack 1 so I’m not affected.  But.. it is remote execution.

     

    Per the Executive summary it is “privately reported” And to be exploited pretty much you have to be emailed an Excel file.  Windows Update, No.

     

    My take?  For me, I’m patched.  Obviously NO issue on servers, and since I haven’t seen a lot of vulns via Excel, this is probably a lower priority in my book especially if you don’t have an automatic patch tool for Office.

     


    MS04-034 - Vulnerability in Compressed (zipped) Folders Could Allow Code

    Execution (873376)

    http://www.microsoft.com/technet/security/Bulletin/ms04-034.mspx 

     

    Critical, remote code.  Again, look at the executive summary, privately reported.  This one has the caveat that if the user is logged in as admin, the attacker could take complete control if they tricked them into open up an compressed file. 

    Hmmm… eEye again, which means the details will probably be posted in a bit and people will begin reverse engineering this.

     

    Scannable by MBSA, may not need a reboot, can be removed. 

     

    My take?  Not as high for servers, higher on the desktop.  But I already am using Outlook 2003 and thus this attack vector is reduced. 


     

    MS04-035 - Vulnerability in SMTP Could Allow Remote Code Execution

    (885881)

    http://www.microsoft.com/technet/security/Bulletin/ms04-035.mspx 

     

    Critical, Remote code execution again.  Newly discovered with no acknowledgments and the CAN link has no “live exploits”.  The issue is with DNS lookups, but in our SBS boxes, we don’t normally have port 53 open on the outside anyway.  A lot of us use Smarthost for email delivery anyway.  Will I patch this anyway.  Yup.  Better be safe than sorry.

    Needs a reboot.  Can be removed.  Can be scanned by MBSA.  Not Windows Update.

     

    My take?  Server only and not a high priority, nothin’ to do on the workstation.


     

    MS04-036 - Vulnerability in NNTP Could Allow Code Execution (883935)

    http://www.microsoft.com/technet/security/Bulletin/ms04-036.mspx  

     

    Critical, Remote Code execution again.  Private reporting.  On our SBS boxes, NNTP is not enabled and running,  Read the bulletin and it’s ONLY important on Server 2003.  MBSA will scan for this.  Furthermore we don’t have port 119 and 563 open from the outside unless we ARE running a newsgroup. Thus in theory while I could never really need to patch for this since I’m never doing NNTP, nor opening up ports 119 or 563, I’ll still patch because I want to make sure that in case I do something STUPID in the future I won’t nail myself.

     

    May not need a reboot.  And can be removed. Can be scanned by MBSA. 

     

    My take?  I’ll patch, but I’m not putting it on a high priority


     

    MS04-037 - Vulnerability in Windows Shell Could Allow Remote Code

    Execution (841356)

    http://www.microsoft.com/technet/security/Bulletin/ms04-037.mspx 

     

    Critical, remote code.  Uh, oh.. “Public vulnerabilities” as per the executive section.  BUT it’s only has a rating of Important on the Server 2003 system. 

     

    This one is again mostly email and web based attack.  So for the server I’m not so concerned.

    Needs a reboot.  Can be removed.  Can be scanned by MBSA

     

    My take?  I’ll patch, but I’m not putting it on a high priority


     

    MS04-038 - Cumulative Security Update for Internet Explorer (834707)

    http://www.microsoft.com/technet/security/Bulletin/ms04-038.mspx 

     

    This one to me is the biggie of the month. 

     

    Critical. Remote code.  Public AND private vulnerabilities.  And here’s the example of where those “in the wild” stuff is.  See this CAN link?  That’s what I was talking about earlier.  That drives you right back to the discussions on the Full Disclosure listserves.  Along with this one.  The infamous Drag and Drop vulnerability.  One called HijackClick.  And some others not public.  This suckers on a fast track.  I’m going to put it on a couple of desktops tonight and start testing for a fast rollout as I need this even on XP sp2.

     

    Needs a reboot, can be removed, Windows Update and MBSA scannable.

     

    My take?  ROLL THIS OUT ON YOUR WORKSTATIONS ON THE FAST TRACK.  Server … I don’t surf on the server so it’s not the biggie there but this IS a highly critical on my workstations.

     


    Important Bulletins:

     

    MS04-029 - Vulnerability in RPC Runtime Library Could Allow Information

    Disclosure and Denial of Service (873350)

    http://www.microsoft.com/technet/security/Bulletin/ms04-029.mspx 

     

    For SBS 2003 we don’t even need this at all.  If you are still running SBS 4.5 …folks the clock is ticking.  You don’t have a huge community to help you test patches.  We’ve had historical issues in the past that ONLY aftected the 4.5 platform.  This sucker replaces the Blaster patches.  It is only a denial of service.

     

    My take?  I’m glad I’m off NT4.  NT4 server is on service pack coverage until the end of the year… clock is ticking folks.


     

    MS04-030 - Bulletin Title Vulnerability in WebDAV XML Message Handler

    Could Lead to a Denial of Service (824151)

    http://www.microsoft.com/technet/security/Bulletin/ms04-030.mspx 

     

    Private vuln, on our IIS boxes, and Webdav is enabled on our SBS 2000 boxes.  I don’t remember if WebDav is enabled on SBS2k3… I’ll check.. but I’ll patch in due time but I’m not freaking on this one.

     

    My take?  I’ll patch just to be a good patcher.


     

    MS04-031 - Vulnerability in NetDDE Could Allow Remote Code Execution

    (841533)

    http://www.microsoft.com/technet/security/Bulletin/ms04-031.mspx 

     

    Remote code – important.

    I don’t even know what this is… http://msdn.microsoft.com/library/default.asp?url=/library/en-us/ipc/base/establishing_a_network_dde_conversation.asp  but again, for now I’ll patch but not on a priority schedule.

    MBSA Scannable. May need a reboot. Can be uninstalled.

     

    My take?  I’ll patch just to be a good patcher.

     


     

    Re-Released Bulletins:

     

    MS04-028 - Buffer Overrun in JPEG Processing (GDI+) Could Allow Code

    Execution (833987) http://www.microsoft.com/technet/security/Bulletin/ms04-028.mspx 

     

    Per Russ Cooper the reason for revision:  Bulletin updated to advise on the availability of revised security updates for Office XP, Visio 2002, and Project 2002 customers that are using Windows XP Service Pack 2. Microsoft Knowledge Base Article 833987 documents the currently known issues that customers may experience when installing these security updates. The article also documents recommended solutions for these issues. Microsoft has also released the MS04-028 Enterprise Update Scanning Tool to help customers detect and deploy the required updates. For more information about the MS04-028 Enterprise Update Scanning Tool, see Microsoft Knowledge Base Article 886988. We have released an update for Windows 2000-based systems that have installed the Windows Journal Viewer. The bulletin has also been updated with a new FAQ that addresses questions regarding the Visio 2002 Viewer, Visio 2003 Viewer, and PowerPoint 2003 Viewer programs.

     


    All of this is my personal opinion, your mileage may vary. You need to do you own “way” of handicappin' the patches so that you feel comfortable.  If you have a test system install them there first.  If not, watch the SBS newsgroup  and we'll report if they are okay.  I'm pretty confident with security patches.  They are doing a much better job of testing these days.  I'm off to start installin' tonight!  See ya later!

     

    [1]  See posting from Dominc White on the Patch Management listserve... while the document and posting referred to SUN, the guidance is universal:

     

    Sun has released a reccomended patch management policy for Solaris.

    It is primarily a description of the tools Sun provides and how to use them.
    The concept most repeated is minimise change and patch appropriately for the
    role of the machine. Here's a summary snip.

    Sun's recommended strategy for updating software includes these practices:

    * Analyzing the need to apply patches or update your software based on
    risk, cost, availability, and timing
    * Minimizing change to your environment whenever possible
    * Addressing SunSM Alert notifications and other critical issues as soon as
    possible
    * Only making other changes to your environment to address known problems
    * Maintaining your environment as current as appropriate for your business
    and application needs

    http://docs-pdf.sun.com/817-0574-12/817-0574-12.pdf?biga=15
    http://singe.rucus.net/blog/archives/243-Sun-Recommended-Patch-Management-Policy.html

    --
    Dominic White

     

    Gentlemen, Start your Patch Testing

    October Summary
    http://www.microsoft.com/technet/security/Bulletin/ms04-oct.mspx 
    
    Critical Bulletins:
     
    MS04-032 - Security Update for Microsoft Windows (840987)
    http://www.microsoft.com/technet/security/Bulletin/ms04-032.mspx  
    
    MS04-033 - Vulnerability in Microsoft Excel Could Allow Code Execution
    (886836)
    http://www.microsoft.com/technet/security/Bulletin/ms04-033.mspx  
    
    MS04-034 - Vulnerability in Compressed (zipped) Folders Could Allow Code
    Execution (873376)
    http://www.microsoft.com/technet/security/Bulletin/ms04-034.mspx  
    
    MS04-035 - Vulnerability in SMTP Could Allow Remote Code Execution
    (885881)
    http://www.microsoft.com/technet/security/Bulletin/ms04-035.mspx  
    
    MS04-036 - Vulnerability in NNTP Could Allow Code Execution (883935)
    http://www.microsoft.com/technet/security/Bulletin/ms04-036.mspx  
    
    MS04-037 - Vulnerability in Windows Shell Could Allow Remote Code
    Execution (841356)
    http://www.microsoft.com/technet/security/Bulletin/ms04-037.mspx  
    
    MS04-038 - Cumulative Security Update for Internet Explorer (834707)
    http://www.microsoft.com/technet/security/Bulletin/ms04-038.mspx  
    
    
    Important Bulletins:
     
    MS04-029 - Vulnerability in RPC Runtime Library Could Allow Information
    Disclosure and Denial of Service (873350)
    http://www.microsoft.com/technet/security/Bulletin/ms04-029.mspx  
    
    MS04-030 - Bulletin Title Vulnerability in WebDAV XML Message Handler
    Could Lead to a Denial of Service (824151)
    http://www.microsoft.com/technet/security/Bulletin/ms04-030.mspx  
    
    MS04-031 - Vulnerability in NetDDE Could Allow Remote Code Execution
    (841533)
    http://www.microsoft.com/technet/security/Bulletin/ms04-031.mspx  
    
    Re-Released Bulletins:
    
    MS04-028 - Buffer Overrun in JPEG Processing (GDI+) Could Allow Code
    Execution (833987)
    http://www.microsoft.com/technet/security/Bulletin/ms04-028.mspx  
    
    This represents our regularly scheduled monthly bulletin release (second
    Tuesday of each month). Please note that Microsoft may release bulletins
    out side of this schedule if we determine the need to do so. 

    Tomorrow is SECURITY BULLETIN DAY but I have a patch to apply tonight

    Remember that tomorrow is Security Bulletin day, but in the meantime tonight I'll be ensuring that I'm all patched up for any ASP.net vulnerability.  The patch to apply is located here and has been SBS approved.

    Microsoft has released an ASP.NET HTTP module that Web site administrators can apply to their Web server. This module will protect all ASP.NET applications against all potential canonicalization problems known to Microsoft.

    The bad news is that this does not come down during Windows Update, does not get applied with Shavlik's HFnetchkPro because it's not a Security bulletin nor it is a Knowledge base article.  The Shavlik folks have added tools to their downloads and gotten complaints, came out with the Download.Ject patch after complaints and have to draw the line somewhere. 

    So you'll have to know to apply this because we have two applications that are asp.net related and could be exposed to the Internet.  The first is Sharepoint, the second is Remote Web Workplace. 

    Fortunately it's NOT remote access, nor a code red, or nimda attack where someone can deface your web site and cause damage, but I like to stay nice and patched.   [In other words, I'm not putting down my can of Mountain Dew and running screaming to the server screeching “PATCH, I MUST PATCH NOW” or anything like that.....]

    Mark Stevens and nine questions

    Nine questions to ask when evaluating a security threat - Computerworld:

    http://computerworld.com/securitytopics/security/story/0,10801,96425,00.html

     

     

    1. Does the new threat affect software we use?

     

    2. Is this exploit an insider threat or from the outside?

     

    3. How difficult is this exploit?

     

    4. What is the impact of a successful attack?

     

    5. When was my last backup?

     

    6. Have we prepared a response to this kind of threat?

     

    7. What's the state of my network today?

     

    8. Is this threat personal?

     

    9. Is the cure worse than the disease?

     

    Mark Stevens is chief strategy officer at WatchGuard Technologies Inc., a network security company based in Seattle.

     

    Good things to think about there, Mark.  Thanks.

     

    So? How do you patch?

    If you didn't know already, I'm a nutcase on patch and patch management and found this section on patching in a Risk Management checklist.  Good things to think about.

     *  When applying a patch to any system vulnerability, do you have a
         process for verifying the integrity, and testing the proper
         functioning of the patch?
       * Have you verified that the patch will not negatively affect or
         alter other system configurations?
       * Are patches tested on test beds before being released into the
         network?
       * Do you make a backup of your system before applying patches?
       * Do you conduct another vulnerability test after you apply a patch?
       * Do you keep a log file of any system changes and updates?
       * Are patches prioritized?
       * Do you disseminate patch update information throughout
         organization's local systems administrators?
       * Do you add timetables to patch potential vulnerabilities?
       * Are external partners required to patch all non-critical patches
         within 30 days?
       * Are external partners required to patch critical patches to
         servers and clients within 48 hours?

    http://www.infragard.net/library/pdfs/technologyrisklist.pdf

    Have you checked out the SANS top 20?

    SANS Top 20 lists is a list of 10 Windows and 10 Unix vulnerabilities that need immediate action.  I'd invite you to read through and compare last year to this years:

    SANS Top 20 for 2003 http://www.sans.org/top20/top20_oct03.php

    SANS Top 20 for 2004 http://www.sans.org/top20

    Web servers

    Workstation Service

    Remote Access

    SQL server

    Windows Authentication

    Web Browsers

    File Sharing apps

    LSAS Exposures

    Mail Client

    Instant Messaging

    The real weapons of mass destruction

    The press talk about “weapons of mass destruction” but you know what the biggest weapon of mass destruction we have around here? 

    Windows XP with local admin and a keyboard. 

    Get something inside your system, get a compromise in a forest, and can you clear out that network?  Think in terms of how the “nature's” forests and how we stop issues in them like forest fires.  We have to dump chemicals, water and build a fire break to stop that fire.  It's better if we are proactive and prevent stuff.   Forest managment.  Our computer networks need to be managed as well, at least better than we are now.

    Risk management is a big issue.  Lack of structure is also a big issue.  Lack of policies is a big one.  If you haven't checked out the SANS site for sample policies for your firm.  Do so.  Have an acceptable use policy.  Protect your forest from bad management up front.

    ASP.net vulnerability update - Remote Web Workplace

    Just to let you know that Microsoft has updated the ASP.net security incident page with a program to help protect from this information disclosure vulnerability.  The application called Validate Path Module has just been released and we've asked for clarification to see if us SBS 2003 boxes need this and to ensure that our customizations for SBS have been tested.  For now hang tight.  This is not a issue that would cause defacement or damage like Code Red or Nimda and I have not see any reports of it being see out on the web in action to the level that we need to be worried out here.  I'd rather hang tight and hear from the “Motherships” [Redmond, Charlotte, Las Colinas, Shanghai] before applying this on our boxes.

    Microsoft has released an ASP.NET HTTP module that Web site administrators can apply to their Web server. This module will protect all ASP.NET applications against all potential canonicalization problems known to Microsoft.

    The Remote Web Workplace is an ASP.NET Web site that lives on the Small Business Server. It requires authentication to reach the main menu, which is the dynamic list of links that is determined by the available features on the particular SBS installation and the user's credentials.

    http://support.microsoft.com/default.aspx?scid=%2fservicedesks%2fwebcasts%2fen%2ftranscripts%2fwct010804.asp

    Dana blogs about the update here as well.

    What You Should Know About a Reported Vulnerability in Microsoft ASP.NET

    I posted in the links the other day that Dana has posted about the ASP.NET vulnerability and today the following have been released: 

    What You Should Know About a Reported Vulnerability in Microsoft ASP.NET

    http://support.microsoft.com/?kbid=887459
    http://www.microsoft.com/security/incident/aspnet.mspx

    Oliver? Try recalulating that price tag again

    Oliver Rist gives a review of ISA 2004 and says

    “I think ISA is an excellent SMB firewall provided you’ve already got an anti-spam and anti-virus solution. And you’ll also need a fairly deep wallet because ISA is most likely to cost you about $3,000 for the software and another $2,800 to $4,000 for the hardware. Then again, for an IT admin who’s harried for time, those wizards and tight AD integration may make every penny worthwhile.”

    I think we need to re-add some costs.  Try the cost of shipping and handling for us “S”s in the SMB marketplace.  Remember as part of SBS 2003 sp1 we will get ISA 2004.  We had a discussion on a listserve about ISA 2000 and the comments were back and forth whether people liked ISA or didn't like ISA.  One comment that it was a resource hog, but I'm not sure that everyone knows about the tweak we need. 

    What does ISA 2000/2004 that RRAS doesn't give me?  The logging I need.  RRAS doesn't give me the control I need. 

    The community of ISA is also very strong from ISATools.org to ISAServer.org.  There isn't a RRAS community out there ;-)  As you know I”m big on Community and ISAserver has even begun to post articles on SBS/ISA on their site.

    ASP.net form vulnerability

    I first spotted this on LeastPrivilege.com and Dana follows up on his blog about the issue.  The good news in this as yet unpatched vulnerability is that IIS6.0 is not affected.  That means our little SBS 2003 boxes are not affected by this issue and can go back to doing what they do best.  Staying on the latest platform means that you get all the best protection afforded to you.  Thus Windows 2003, Windows XP sp2, it all adds up in layers in your environment to keep you safe.  Dana and I were IMing over the issue of ROI.  You get nailed ONE TIME with a virus or disaster issue and suddenly your budget for such events goes shooting through the roof.  CFOs can't compute the cost savings from protection and so they can't compute a proper ROI on an upgrade.

    For SBS 2000, as per Dana we're guessing that we probably dont' use .NET auth but a nice good IIS lockdown and URLscan on our boxes will proactively protect us and is a standard “good thing to do anyway“.  If you have port 80 open, hosting a web site on your SBS 2000 box and you haven't done IIS lockdown and URLscan?  What ARE you waiting for?

    Switching gears, I was reading the incidents.org home page and a story about how a damaged computer was stolen and resulted in the loss of data, of personal information, of tax data should be a reminder to all of us that we have just of important “stuff” on our home systems.  They need backups too.

    So I'm trying NOT to freak out here

    Boss/partner brings in his HP laptop so I can upgrade it to Windows XP sp2.  [It's the really cool HP with the built in ten key that all us bean counters go ooooohhhhhhhhhh]  So I boot it up to begin the upgrade process and there's a spysware scanner program on it.  Oh cool, right? 

    Uh...no, not so cool.  I didn't install it. Where it came from, I'm not exactly sure.  Fortunately I do some hunting that it is a freeware spyscanner so I'm not freaking.... completely...but still it points out that “social engineering” can easily trick someone into downloading a program and installing it. 

    Because he has full rights to that machine, he can install anything without thinking of the consequences. 

    I/We need to get used to running as a plain user.  There was something I read a night or two ago that Network Quarantine/protection would be huge for us good guys in the year ahead at the same time Social Engineering would be huge for the bad guys.

    Just when I think they get it......

    To whom it may concern at MSPress [you know, the book arm at Microsoft]  You guys need another Security Book.

    There's a security phrase that the marketing department at Microsoft uses.  [Yes, the "dark side" as I call them]

    SD cubed plus C

    Secure by Design, Secure by Default, Secure by Deployment + Communication.

    Now you would think that with the emphasis on Communication of Security that Microsoft [and especially MSPress] would publish anything on Security even if the Janitor at Microsoft wanted to write about it, but as I recently found out that's not always the case and quite frankly I was very surprised.

    I'm in the humble position of getting a sneak peak of some chapters by "THE" good Dr. J [Jesper Johansson] and "THE" Steve Riley on the topic of Network Protection.  Now you are probably going ... but isn't the Ben Smith/LeBlanc book on "Assessing Network Security" on the same topic?  No.  Not at all.   

    For one, that book is more focused more on assessments, whereas this one is more thinking about the interaction with the "People issue" up front.  You know how I say "Policy First, Technology Second"?  Well this book is definitely looking at "security" with that in mind.  After I read Chapter Two, I'm convinced more than ever that the network attacks we've seen out here in the past that go after the core services are going to morph [if they haven't already] into application attacks and we need to stop looking at the little "parts" of security in our networks and instead at the bigger picture.  Dana Epp [the Security blogger] and I have been swapping a few emails about balancing risk in SBSland.  His Eight Rules of Security also touch on this "bigger picture" concept.

    I find that each time I find a security book it brings a unique viewpoint to it.  Maybe it's just me, but each time I pick up a book, or read a listserve on security, I learn some new nuance.  I'm not a coder yet I have the LeBlanc Howard book on writing Secure Code.  I'm not a scripter, yet I have Robbie Allen's Active Directory Cookbook and the Command line Admin pocket consultant.  I'm not a programmer, yet I have Swiderski and Snyder's Threat Modeling Book.

    In my mind you can't have ENOUGH security books.  The other day at my sister's firm she was flabergasted to learn that she could install any software that she wanted to.  When she talked to one of the IT guys, he said that they had pushed to lock down some of the computers but that if they took away the rights of all of the users that too many people would complain about not being able to listen to music or play games.  One Tech call, the guy was asked to install Turbo tax [a personal tax prep program] on a business computer.  Who really owns the computers in our networks these days?

    Looking over the MSpress list of security titles, there just isn't enough guidance in the “big picture“ of security.  The more books like this that talk about risks, that talk about how we should better separate the security guys from the admin guys, the better.   Sounds like the Dr. J/Riley book will be picked up by another publisher but I just think Microsoft should be advertising the fact that they have this many really good people who communicate security so well and have all of them with those dorky blue covers with the hardware devices on the front.  If any Microsoft author has to go "outside" to get an EXTREMELY valuable message to the public, I think someone needs to review what "SD cubed plus C" is all about.   I've been saying that Microsoft “gets“ security.  If I were Microsoft, even the Janitor would be publishing his book on "how to secure the bathrooms" at MSPress to drive home that point that Microsoft truly does indeed “GET SECURITY“.

    I'm an e-author now!

    So I'm an ebook author now.  I normally write technical articles for the AICPA Infotech newsletter and for various other CPA industry tech newsletters but I'm now an “Ebook” author.  Anne Stanton and I are doing a book on Patch Management. I think I would stress that it's Patch Control... as management is sort of a wishy washy term.  Last night I was “handicapping” the GDIPlus.dll vulnerability and was scanning the network and found that because I was up on the latest service packs [XP sp2 and Office 2003] I really did not have to do too much patching at all.  Dang. I so love the feeling of power I get with an entire office of Windows machines reboot on my command. 

    I was talking at SMBNation about my patching techniques.. read the bulletin, assign the risk factor and determine the threat vector.  Look at what I have open, look at when it's the “right time” for my firm to do patching based on the risks... see if the exploit is in the wild and patch based on timing.  As I stated in the book [at least in the future chapters anyway] I ALWAYS patch everything.  My analysis is not about what patches can I skip, rather it's about the timing of the patches.

    Internet Explorer - high on the desktops, low on the server

    IIS - very low on the desktops, high on the server

    ...and so on..... I assign the risk based on the role of the system.  During my presentation and talking about how I had a patching tool and how I patched, Jeff Middleton stopped me and asked the audience if they had a similar process in place of testing patches, rolling out patches, etc.  Very few folks do this.  I'm always surprised at how many people don't “manage“ patching and instead let the patches “manage“ them.

    So I invite you to download Chapter 1..... go ahead... ping me with feedback  :-)

    Thoughts after SMBNation

    As I'm here at the office patching the computers for the GPIPlus.dll issue [04-028] with my Shavlik I figured I'd type up some thoughts of this weekend at SMBNation.  Harry Brelsford had advertised it as “Return to the Mothership” and I've always called Redmond, one of four Motherships of SBS.  Little did I know that three of the four “Motherships of SBS” would be represented at SMBnation.  As I've already blogged about, Marie McFadden, Pre-Sales Lead out of Mothership Charlotte was there for the weekend and attended SMBnation with us.  It was heart warming to find people coming up to Marie and saying “you are Marie?” and giving her big hugs.  The folks in “Mothership Charlotte” especially with the Partner Server offerings do indeed save many a partner's livelihood and reputation.  Now obviously “Mothership Redmond” was represented as was reported earlier with presentations by Charles Anthe, Release Manager among others, but also “Mothership Las Colinas” was also represented because Damian Leibaschoff was in Redmond and stopped by.  Now if “Mothership Shanghai” and Wallace Fu had been in attendance, it would have been truly all of the “Motherships” of SBS that look out for us in one place.

    I do have to tell a funny story.  [okay so it's funny to a geek okay?]  During Charles Anthe's presentation on SBS 2003 sp1, a gentlemen in the back of the room was earnestly talking and asking questions about ISA server 2004 on SBS 2003 [remember -- we will get it as part of SP1].  Wayne Small was behind me and I was sitting a row ahead when Wayne pinged me on IM “Do you think he knows that's Dr. Tom?”  You see, Dr. Tom, the gentlemen grilling Mr. Anthe was none other than Mr. ISAServer.org, Tom Shinder, noted ISA Server MVP.  I pinged back to Wayne, “should I tell him that he's talking to Mr. Isaserver.org?” and Wayne's response on IM was “nah ;-)”  Mean aren't we?  We let Charlie get questioned by the gentlemen known as THE ISA expert and didn't even give him a heads up.  At the end we did introduce them to one another. 

    There's always this arguement over ISA Server on a separate box and after hearing a partner talk about how they needed to update an accounting application and they temporarily turned off the firewall to get the app to update and then turned it back on, I think any firewall that's properly configured even IF it's ON the domain controller is going to be just fine out here in SBSLand.  Not setting it up right, not making sure that the system is secure is the bigger issue.

    I think we don't do what the good Dr. J tells us to do.  We don't look at the big picture. 

    “Security administrators face some interesting tradeoffs. Fundamentally, the choice to be made is between a system that is secure and usable, one that is secure and cheap, or one that is cheap and usable. We cannot have everything.“

     

    Windows Update and ISA - Revisited

    UPDATED WITH THIS KB:   http://support.microsoft.com/?id=885819

    I just reposted the workaround for the Windows Update and ISA Server issue

    There's one more step that has been added to fix XP sp2 machines

     Ensure Internet Explorer patches are up to date and validate or set a registry value

     For pre-XPSP2 internal clients

    • Download and apply this Internet Explorer update package

    http://support.microsoft.com/?id=871260

     For all internal clients

    NOTE: This registry value is not read at the local machine level.  If you need this to be applied for all users on a machine, you may want to consider adding it to your domain logon scripts.

                 HKEY_CURRENT_USER

    \Software\Microsoft\Windows\CurrentVersion\InternetSettings

                REG_DWORD: ReleaseSocketDuringAuth = 0

    Specifically do THIS:

    1. Click Start, click Run, type regedit, and then click OK.
    2. Locate and then click the following key in the registry:

      HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings

    3. On the Edit menu, point to New, and then click DWORD.
    4. Type ReleaseSocketDuringAuth, and then press ENTER.
    5. On the Edit menu, click Modify.
    6. Type 0, and then click OK.

    Security Bulletins for today

    Bulletin Summaries:

    September Summary
    http://www.microsoft.com/technet/security/Bulletin/ms04-sep.mspx

    Critical Bulletins:
     
    MS04-028 - Buffer Overrun in JPEG Processing (GDI+) Could Allow Code
    Execution (833987)
    http://www.microsoft.com/technet/security/Bulletin/MS04-028.mspx

    If a user is logged on with administrator privileges, an attacker who successfully exploited this vulnerability could take complete control of an affected system, including installing programs; viewing, changing, or deleting data; or creating new accounts with full privileges. Users whose accounts are configured to have fewer privileges on the system would be at less risk than users who operate with administrative privileges.

    [Translation if they are running as user mode are at WAY less risk.... see why we keep harping on this?]

    <MBSA will NOT scan for ALL affected software on this>

    Yes. MBSA does detect if the update for this vulnerability is required for Office XP, Office 2003, Project 2002, Project 2003, Visio 2002, and Visio 2003. However, MBSA does not currently support the detection of several of the programs that are listed in the Affected Software and Affected Components section of this security bulletin. For detailed information about the programs that MBSA currently does not detect, see Microsoft Knowledge Base Article 306460. If you have installed any of the programs that are listed in the Affected Software and Affected Components section of this security bulletin you may have to manually determine if you have to install the required update. For example, a Windows 2000 or Windows NT 4.0 system that has installed Internet Explorer 6 Service Pack 1 will need to install the Internet Explorer 6 Service Pack 1 security update and MBSA will not detect the missing update in these configurations. Also, MBSA cannot use the Office Detection Tool to scan remote systems, it will only use this tool to scan a system locally for required security updates. For more information about MBSA, visit the MBSA Web site.


    Important Bulletins:
     
    MS04-027 - Vulnerability in WordPerfect Converter Could Allow Code
    Execution (884933)
    http://www.microsoft.com/technet/security/Bulletin/MS04-027.mspx 


    <MBSA will scan for this>

    If a user is logged on with administrative privileges, an attacker who successfully exploited this vulnerability could take complete control of an affected system, including installing programs; viewing, changing, or deleting data; or creating new accounts with full privileges. Users whose accounts are configured to have fewer privileges on the system would be at less risk than users who operate with administrative privileges. However, user interaction is required to exploit this vulnerability.

    <cough>  See.  What did I tell ya!  Get rid of admin rights!

    Remember Dana, I said you weren't normal.....

    Dana blogs that he's delayed his rollout of SBS 2k3 because he can't do what he wants to do with the existing ISA 2000.  Well I said from the get-go that he wasn't the  "normal" SBSer.  At the present time, we SBSers are NOT specifically targeted out here and are honestly WAY more often to be stupid and roadkill out here than we are targeted.  We have how many SBSers installed out here and we're doing just fine as long as we...

    1.  Patch
    2.  Antivirus
    3.  Firewall

    He comments that it's "not supported" because the normal SBSer wouldn't know how to properly set up ISA 2004 on their box.  Somehow I think you'd do just fine.

    Go for it my friend. I'll be more than glad to help/assist/link you up with whomever you need.  If it weren't for the roadmap of SBS being tied to the delay of Windows 2003 sp1, we'd have ISA 2k4.  But that was/is delayed due to XP sp2.  Personally, I'll take the delay as I'd rather have xp sp2 in the channel.

    I just am going home from SMBnation and trust me..... I've got bigger battles to worry about my friend.  Business owners who won't get rid of Windows 98 and 95.  Applications wanting local admin rights. 

    Let's win THAT battle shall we?  I've currently got WAY WAY WAY more issues with the insecurity caused by that than anything else.  Some folks at SMBnation were asking about if ISA could ever be taken off the SBS 2003, but  I'll be honest with you, as long as you have ONE STUPID WINDOWS 95 OR 98 IN YOUR NETWORK your security dollars would be WAY better spent killing those suckers off.

    SBS 2003 “IS” a balance between functionality and risk.  Right now our desktops are the ones causing the most risk.  I set up a web site to point out those programs that cause me insecurity at http://www.threatcode.com.  If you have any programs that force you or your clients to be insecure becaue they force you to be in local administrator mode I recommend that you add to the list.

    Let's shame these vendors into coding more securely shall we?

    I didn't know Lookout could do THAT!

    So I was reindexing the LookOut tool bar in Outlook on my Acer tablet [purchased refurbished I might add] and realized that it can also search “my documents' and even search placed on a network?  I'll have to try that at the office.  The only thing I've seen is that Least Privilege.com reports that it must run as admin, but I'll bet that if I took incntrl5 to it or regmon we could hack that registry  ;-)  The same concepts will be talked about at smbnation.com next weekend.

    Issue with the V5 version of Windows update and ISA Server

    UPDATED - CLICK HERE http://support.microsoft.com/?id=885819

    We're seeing issues with computers being able to get to Windows update if they are on the v5 platform: 

    Here is the info you will need:

    Windows Update on the v5 platform which is
    all XP sp2 machines
    Some XP sp1 machines
    [how to tell ... when the machine goes to Windows update there will be a v5 in the url name]

    Anyone running with ISA in the egress filtering mode [not all/all/all rule] will get this issue.  Adjust your ISA 2000's accordingly

    [The following info courtesy of Mr.  Jim "Mr. Isa" Harrison]

    Please note this also affects any other authenticating firewall [and not just ISA server]

    -------------------------------------------------------



    There are two NTLM authentication issues affecting WU v5 when WU uses web proxy requests to access Windows Update:

    1 – NTLMSSP_AUTH responses may contain null credentials

    2 – NTLMSSP_NEGOTIATE credentials may be sent on a half-closed connection

     

    We haven’t heard any reports of WUv5 issues with non-NTLM (Basic, Digest) authentication yet and we haven’t specifically tested this.

    We have been able to repro this with ISA Server 2000 and we have also heard reports of WU failing through other NTLM-authenticating proxy servers (Proxy 2, Squid are two examples).

    The cause of each problem is still being worked out, but a clear workaround is available and it boils down to three things:

    •  Ensure Internet Explorer patches are up to date and validate or set a registry value
    • Disable authentication for Windows Update requests.
    • Disable “global authentication” for web proxy requests

     

    ISA Server Note: you may have heard that the “ReturnDeniedIfAuthenticated registry setting explained in http://support.microsoft.com/?id=297324 is part of the problem.  While applying this setting to ISA 2000 does help expose the WU authentication problems, it is not the cause. If you have applied this setting to your ISA 2000 Server, you did so with good reason to solve a specific problem. You should not remove this setting if you have applied it.  By the same token, if you are not experiencing the problem outlined in this KB article, you don’t need to and shouldn’t apply it.  The above article applies only to ISA 2000; you should not apply any ISA 2000 registry settings to ISA 2004 unless the relevant KB article explicitly instructs you to.  Currently, none do.

     

    Now let’s get on with the workaround…

    Per the WU team, there are four destinations that should be included for creating anonymous Windows Update access policies:

    TABLE 1

    Item

    FQDN

    1

    *.download.microsoft.com

    2

    *.windowsupdate.com

    3

    *.windowsupdate.microsoft.com

    4

    windowsupdate.microsoft.com

     

     

    For pre-XPSP2 internal clients

    • Download and apply this Internet Explorer update package

    http://support.microsoft.com/?id=871260

     

     

    For all internal clients

    NOTE: This registry value is not read at the local machine level.  If you need this to be applied for all users on a machine, you may want to consider adding it to your domain logon scripts.

     Validate or set the following registry value as shown (see http://support.microsoft.com/?id=312176 for details):

                 HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\InternetSettings

                       REG_DWORD: ReleaseSocketDuringAuth = 0x0

    For ISA 2000

    • Disable “global” authentication for web proxy requests
      1. Open the ISA Manglement MMC
      2. Select View, then Advanced
      3. Expand Servers and Arrays
      4. R-click   , select Properties
      5. Select Outgoing Web Requests
      6. Uncheck Ask Unauthenticated users for identification
      7. Click Apply,
      8. When prompted, select Save the changes and restart the service(s)
      9. Click OK

     

    • Create a destination set for Windows Update domains
      1. Expand and PolicyElements
      2. R-click Destination Sets, select New, then Set
      3. Enter WindowsUpdate in the Name field, click Next
      4. Click Add
      5. Enter *.download.microsoft.com in the Domain field
      6. Leave the Path field blank
      7. Click OK
      8. Repeat steps 4 through 7 for each remaining entry in Table 1
      9. Click OK

     

    • Create an anonymous Site and Content rule for Windows Update requests
      1. Expand Access Policy
      2. R-click Site and Content Rules, select New, then Rule
      3. Enter Windows Update in the Name field, click Next
      4. Select Allow, click Next
      5. Select Allow access based on destination, click Next
      6. In the Apply this rule to: drop-down list, select Specified Destination Set
      7. In the Name: drop-down list, select Windows Update
      8. Click Next, then Finish

     

     

    For ISA 2004

    • Disable “global” authentication for web proxy requests

    Open the ISA Manglement MMC

    Expand , then Configuration

    Select Networks

    In the middle pane, select the Networks tab

    R-click Internal and select Properties

    Select the Web Proxy tab

    Click Authentication

    In the Authentication window, uncheck Require all users to authenticate, click OK

    Click Apply, then OK

    Repeat steps 5 through 9 for each network object where you allow Web Proxy requests

     

    • Create an anonymous Access Rule for Windows Update

    In the left pane, R-click Firewall Policy and select New, then Access Rule

    Enter Windows Update in the Name field, click Next

    Select Allow, click Next

    In the This rule applies to: drop-down list, select Selected Protocols

    Click Add

    In the Add Protocols dialog, expand Web

    Select HTTP and click Add

    Select HTTPS and click Add

    Click Close, then Next

    In the Access Rule Sources dialog, click Add

    In the Add Network Entities dialog, expand Networks

    Select Internal and click Add

    For each network where you unchecked Require all users to authenticate, select that network object and click Add

    Click Close, then Next

    In the Access Rule Destinations window, click Add

    In the Add Network Entities window menu bar, click New, then Domain Name Set

    In the New Domain Name Set Policy Element window, enter Windows Update in the Name field

    Click New

    In the Domain names included in this set list, change the new entry to *.download.microsoft.com

    Repeat steps 19 and 20 for each remaining entry in Table 1

    Click OK

    In the New Domain Name Set Policy Element window, select Windows Update, click Add, then Close

    Click Next, Next, then Finish

    In the top part of the middle pane, Apply and Discard buttons will appear; click Apply

    When Apply New Configuration dialog reports “Changes to the configuration were successfully applied”, click OK

     

    • Make the Windows Update rule the first rule

    NOTE: If you prefer to list all of your deny rules first, then you can make the Window Update rule the first rule following them

    In the left pane, select Firewall Policy

    If Windows Update is already the first rule in the list, stop here

    In the middle pane, select Windows Update

    In the right pane select the Tasks tab

    Click Move the selected rule up until Windows Update is the first rule in the list

    In the top part of the middle pane, Apply and Discard buttons should appear; click Apply

    When Apply New Configuration dialog reports “Changes to the configuration were successfully applied”, click OK

     

    Look for a KB that details the WU side of the issue and cross-links to an ISA KB with these instructions.

    XP sp2 - the components you need to enable the firewall inside your network

    If you cannot adjust the firewall on your XP sp2 it's because you haven't applied the “fix” to allow us SBSers to adjust the firewall: 

    First you need this:   Download details: Update for Windows Small Business Server 2003: KB 872769:
    http://www.microsoft.com/downloads/details.aspx?FamilyID=d70097c2-4317-40e0-b7da-feb52c6b6386&displaylang=en

    Then you need this:  842933 - "The following entry in the [strings] section is too long and has been truncated" error message when you try to modify or to view GPOs in Windows Server 2003, Windows XP Professional, or Windows 2000:  http://support.microsoft.com/?kbid=842933

    Deployment paper is here:  http://go.microsoft.com/fwlink/?linkid=33331

    Someone in the newsgroup asked if this was more of an update for laptops and home users.   NO.  This strengthens the computer zones to make XP sp2 more “malware” proof.

    Overview of Windows XP Service Pack 2 Security Technologies

    In Windows XP Service Pack 2, Microsoft is delivering several improved security technologies that help protect customers against malware and other risks to their computer. These technologies are not intended to replace periodic security updates as they are released, but rather to help strengthen Windows XP's overall defenses against malicious attacks.

    Network protection. These security technologies help to provide better protection against network-based attacks, like MSBlaster, through a number of innovations, including enhancements to Windows Firewall and a reduced RPC attack surface. These enhancements include turning on Windows Firewall in default installations of Service Pack 2, closing ports except when they are in use, improving the user interface for configuration, improving application compatibility when Windows Firewall is on, and enhancing enterprise administration of Windows Firewall through Group Policy. The attack surface of the Remote Procedure Call (RPC) service is reduced, and you can run RPC objects with reduced credentials. The DCOM infrastructure also has additional access control restrictions to reduce the risk of a successful network attack.

    Memory protection. Some attacks by malicious software leverage software security vulnerabilities that allow too much data to be copied into areas of the computer’s memory. These vulnerabilities are typically referred to as buffer overruns. Although no single technique can completely eliminate this type of vulnerability, Microsoft is employing a number of security technologies to mitigate these attacks from different angles. First, core Windows components have been recompiled with the most recent version of our compiler technology, which provides added protection against buffer overruns. Additionally, Microsoft is working with microprocessor companies to help Windows support hardware-enforced data execution prevention (DEP) on microprocessors that contain the feature. Data execution prevention uses the CPU to mark all memory locations in an application as non-executable, unless the location explicitly contains executable code. This way, when an attacking worm or virus inserts program code into a portion of memory marked for data only, an application or Windows component will not run it.

    E-mail handling. Security technologies help to stop viruses (such as SoBig.F) that spread through e-mail and instant messaging. These technologies include default settings that have enhanced security, improved attachment control using the Attachment Execution Service (AES) API. This results in security and reliability enhancements for communications applications such as Microsoft Outlook, Outlook Express and Windows Messenger. As a result, potentially unsafe attachments that are sent through e-mail and instant messages are isolated so that they are less likely to affect other parts of the system.

    Browsing security. Security technologies that are delivered in Microsoft Internet Explorer provide improved protection against malicious content on the Web. One enhancement includes locking down the Local Machine zone to help prevent the running of malicious scripts and fortifying against harmful Web downloads. Additionally, better user controls and user interfaces are provided that help prevent malicious ActiveX® controls and spyware from running on customers’ systems without their knowledge and consent.

    Computer maintenance. A very important part of any security plan is keeping computers updated with the latest software and security updates and understanding the role they play in protecting your computer. Ensuring that you have current knowledge of security attacks and trends is also important. For example, some software updates that mitigated known viruses and worms were available days or weeks before any significant attacks began. New technologies are being added to help the end user stay up-to-date. These technologies include Security Center, which provides a central location for information about the security of your computer, and Windows Installer, which provides more security options for software installation.

    Also review this post:  http://msmvps.com/bradley/archive/2004/08/19/12056.aspx#12929

    I'll take Security Center vulnerability for $1,000 Alex!

    PcMag and other magazines came out with an article on the “vulnerabity of the Security center” and Larry Osterman has a post on the issue.  My take is that it's a risk analysis issue.  What is worse?  That a malware is going to get in and overwrite the security center application or that the person is still running the same Norton Antivirus definition files that came with the computer two years ago when the computer was new?

    Yeah, we need to stop making people be local administrators, but you know what?  The ENTIRE INDUSTRY hasn't woken up to this issue yet.  Least Privilege is HARD to do and it should be soooo much easier than it is now.  Every single application developer should be reprimanded if they are writing an app today that will have an impact in the future and it is not “least privilege” aware.

    We've taught our end users that they need absolute control of their box and haven't given them enough training at all to be able to handle “RunAS” or “SuDo”.  At the same time, I would not be as computer enabled as we are today if Windows 95 demanded that we RunAs. 

    I've said this before, I'll say it again, what I consider to be acceptable risk today, will not be acceptable risk tomorrow.  Someone said to me that they call end users “dear Muggles”.  I think we do need to have a wizard, a protector, a defender behind every user.

    The polluted Internet | The Register:
    http://www.theregister.co.uk/2004/08/27/polluted_internet/

    "People shouldn't have to be computer experts to own a computer. But without a firewall, router, mega patches, anti-virus and anti-spyware, my auntie Fern has little hope."

    ... sad but true.....

    ISA 2004

    ... so like when are we getting it?  seems to be the big question in the newsgroup

     [I just got an email on this as a matter of fact]

    Patience.

    We need Windows 2003 sp1 to come out before be can get our wizardized ISA 2004 which will be included in Small Business Server Service Pack 1.  If you want to put ISA 2004 on your server, remember that .....

    a.  You won't have help from the newsgroups ... I'm staying with what is official for our platform which is ISA 2000.

    b.  You will have to get help from the folks at ISAserver.org and trust me... sometimes those ISA guys are not exactly SBS friendly  :-)

    c.  You'll have to buy the product outright and get the necessary cals if you want it NOW.

    “Already know you that which you need“... Yoda

    Stay with the force... patience,  young padawan, patience.

    ETA is 2005.

     

    Oh the fun we can have with the new Netstat commands in XP sp2

    Check out the netstat -b command and how it can show you what executibleis creating the connection and listening port.  Oh what fun... we might be able to better see trojans and malware  :-)

    Microsoft Windows XP [Version 5.1.2600]
    (C) Copyright 1985-2001 Microsoft Corp.

    Displays protocol statistics and current TCP/IP network connections.

    NETSTAT [-a] [-b] [-e] [-n] [-o] [-p proto] [-r] [-s] [-v] [interval]

      -a            Displays all connections and listening ports.
      -b            Displays the executable involved in creating each connection or
                    listening port. In some cases well-known executables host
                    multiple independent components, and in these cases the
                    sequence of components involved in creating the connection
                    or listening port is displayed. In this case the executable
                    name is in [] at the bottom, on top is the component it called,
                    and so forth until TCP/IP was reached. Note that this option
                    can be time-consuming and will fail unless you have sufficient
                    permissions.
      -e            Displays Ethernet statistics. This may be combined with the -s
                    option.
      -n            Displays addresses and port numbers in numerical form.
      -o            Displays the owning process ID associated with each connection.
      -p proto      Shows connections for the protocol specified by proto; proto
                    may be any of: TCP, UDP, TCPv6, or UDPv6.  If used with the -s
                    option to display per-protocol statistics, proto may be any of:
                    IP, IPv6, ICMP, ICMPv6, TCP, TCPv6, UDP, or UDPv6.
      -r            Displays the routing table.
      -s            Displays per-protocol statistics.  By default, statistics are
                    shown for IP, IPv6, ICMP, ICMPv6, TCP, TCPv6, UDP, and UDPv6;
                    the -p option may be used to specify a subset of the default.
      -v            When used in conjunction with -b, will display sequence of
                    components involved in creating the connection or listening
                    port for all executables.
      interval      Redisplays selected statistics, pausing interval seconds
                    between each display.  Press CTRL+C to stop redisplaying
                    statistics.  If omitted, netstat will print the current
                    configuration information once.

    This looks fun!

    ~Susan

    Xp2 and Prescott processors issue

    Chris Quirke (new address) wrote:
    Stop me if you've heard this one; consider this the formal heads-up!

    This is a serious bug, as most affected users who install SP2 will assume
    the system cannot be salvaged, and will wipe and rebuild from scratch.

    Cari and I have both hit this issue, and found references to it elsewhere
    in various forums etc.  We know it affects some systems based on Intel's
    865 and 875 chipsets, which have been bulk products for a while now.  We
    suspect it only applies to Prescott generation processors.

    AumHa Forums:
    http://forum.aumha.org/viewtopic.php?t=7447

    Obviously I don't have Prescott processors  :-)

    I can see the headline now... AOL doesn't work with XP sp2

    I was called today by a reporter getting my experiences with XP sp2 given that TODAY was the start of pushing  out to the masses day.  I told the reporter that I had manually installed service pack 2 and on one laptop I had issues with it being installed due to the fact that it has two versions of AOL on there [version 7 and 9] and it corrupted the tcp/ip stack...mainly because AOL 7 in particular was back in the day when AOL build it's own funky dialer.  I went on to say that my experiences with using my patch management tool Shavlik were flawless, no runs, no drips, no errors and that the rollout on the desktops went without a hitch.[Thank you Eric and the gang at Shavlik by the way] As I was talking to the reporter and he started saying things like “you would think that Microsoft would have tested this with AOL” and I could just imagine the headlines. 

    I'm not putting the blame on AOL exactly and especially not on SP 2.  I mean like stuff happens.  And especially on an older laptop that used to be Windows 2000, then updated to XP, Office XP with a layer of Office 2003 on there and previously on AOL 7 and had a second copy of AOL 9, it's no wonder it did what it did.

    But anyway, the rollout with Shavlik's HfnetchkPro did go very very well.  Get a patch tool folks, it makes your life WAY easier.  And it gives folks like me who are control freaks a thrill when I can remotely push and reboot my computers in my network.

    So if you read an article where it says “XP sp2 doesn't work with AOL”.... uh.... well.... you see.....it's like this.....

    Oh stop complaining and just install it will ya.....

     It Admins Not 'Trusting' SP2 Security:
    http://www.eweek.com/article2/0,1759,1638531,00.asp

    Why don't those admins just run with IE in high security and shut up and install it? Geeze we're never going to have absolute security but at least we can be as protected as we can be.

    This came down on the download site and Joe Wilcox of Microsoft monitor indicates it includes scripts for testing as well [haven't checked it out myself personally yet....]

    Windows® XP SP2 introduces new security technologies to better enable Windows XP computers to withstand viruses, worms and other kinds of attacks. This guide will assist IT Professionals to test and mitigate application compatibility issues arising from these more stringent security technologies.

    RWW revisited [Remote Web Workplace]

    So on yesterday's blog I linked to a story on RWW from MS AU division.  But I'm looking for a more “weedy” article on remote web workplace.  Why?   Because I don't think there is enough technical information on the pros and cons of RWW versus VPN.

    So I was emailing with Jeff Middleton about RWW versus VPN and he brought up an interesting point.  The good thing about a VPN connection is that it builds a secure tunnel back to 100% of your network.  The bad thing is that it builds a secure tunnel back to 100% of your network.  With a VPN connection, you are at risk that the user will bring in viruses, unpatched machine connections as Jeff pointed out.  As he said,

    “You can't compare the difference between RWW to VPN as if they are on the same level of absolute security for the entire site, and the only risks.  It's a topic that requires more depth than a yes, no answer.  If you open a VPN connection, you start by default with an unrestricted, unfiltered exposure of the entire LAN, from which you have to reduce your risk. It's a huge opening to do a threat analysis from, and you rely only upon the password as your protection. 

    RWW flips that over. It opens a pin-hole, using SSL session to the website. You don't even need port 80.  You are building up function from the narrowest of openings to the client. Your threat analysis is fixed. You look at the server exposure to the web to present RWW "at all". From there, you present limited exposure "per user", "per session". The threat analysis is pretty tightly confined to building up, not scaling back.  The only major "exposure" you add to your risk is a very narrow issue of the RDP authentication not passing under encryption, though all the other client services do. It's a real issue, it's narrowed by how RWW handles that exact handshake timing, and qualification.

    As you can see, you aren't making the same kind of tunnel back to your network with a Remote Web Workplace connection.  The problem is that in the documents that talk about the features and benefits of both RWW and VPN technologies, they don't talk about both the risks and advantages well enough.

    Is it a risk that you will set up RWW and expose it to the web?  Sure, but don't do that [Charlotte PSS Jason taught us DDT, remember?].  And if you are exposing your web site to the net [which you should first step back and evaluate risks and backup and recovery strategies on that], then make sure you put in Alan's robot exclusion file.

    On a side note, I asked Ben Smith, the author of Assessing Network Security what he would take with him if he were stuck on an island with a computer....and he said the Internet and google. 

    Information is powerful, isn't it?

     

    Need to adjust the timeout value in the Remote Web Workplace?

    If you want to extend the timeout value in the RWW, the value that controls this is:

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SmallBusinessServer\RemoteUserPortal

    Value : PublicTimeOut

    The number of minutes will be listed in ( ).

    Just remember that if the person steps away from the remote computer on the other end, this may be a security issue.

    Don't forget to update your Trend

    My Trend Client/Server/Messaging suite for SMB here at home is registering the “dat” file as 2.160.00, but at the office it says I'm at “dat” file of 960.  Why?  Because I'm on the older Trend at the office and I haven't done the critical update I should do to ensure that I can receive the four digit dat file updates.  Don't forget to do that update!

    I'm probably not going to update because before I hit pattern 999 I plan to be on the new CSM suite for SMB by that time.

    So hover over your blue dot in the system tray down in the bottom right of your screen.  If it says Eng/Ptn 7.100/2.160.00 DCE/DCT 3.6/399 then you are in good shape and don't need to take action.

    I AM a SBSer and yes, I AM perfectly sane.

    In Adam's blog he asks the question, do only nutters use SBS? And then says while he would buy it, he still wouldn't be a fan of the wizards.

    Does everyone understand that the wizards just do the heavy lifting for you?  That they follow the best practices?  That if you want to mess with a SBS box, run the wizard and THEN start playing around? 

    You do realize that every wizard that is run leaves behind a log file?  Review that log file and it shows how the box is checking to see if what is needed is “there” and if not ensures that it's set the registry or done what it needs to properly set up that system.

    Many of these logs are found at C:\Program Files\Microsoft Integration\Windows Small Business Server 2003\Logs but there are other log files at c:\program files\microsoft windows small business server\support\

    In fact the log file for the wizard for setting up Email and Internet is located at c:\program files\microsoft windows small business server\support\icw.txt

    You wanna know what the biggest mistake that “Enterprise folks“ make?  In thinking they know better.  Take that “CEICW“ aka the Internet and email wizard.  People who don't use the wizard screw up the setting up of DNS and don't realize that the DNS addresses of the ISP need to go in as “forwarders“, and that the server and workstations need to look to the server for the DNS entries on those network IP entries in order for Windows XP to run properly. 

    Show me a screwed up SBS box and I'll show you someone who went around a wizard.

    “Luke, trust the force“ as I always joke in the newsgroups....

    Sure, understand what the wizards do, but TRUST THEM, USE THEM, DON'T GO AROUND THEM. 

    Inside of every SBS is a little green jedi master.  Trust him.  As Yoda says...

    “Size matters not. Look at me. Judge me by my size, do you?“

    “Do or do not. There is no try. “

    “Dwell on the could haves, we must not. Focus on the solution, we must.“

    “You must unlearn what you have learned.“

    Welcome to SBS Land, Dana.  You are VERY much welcomed around here!

    Intuit and Anne

    Intuit's online blog talks about the Accountants' day we had there last week.  Anne Stanton even has pictures of the event.  They talk about the impact of the Calfiornia law commonly known as SB1386 and whether or not Accountants know about it.  As the Chairman of the Technology Committee for the CALCPA society, this has been one of my goals for my term. 

    What I'd like even better is for Intuit, CCH and Creative Solutions to support wrapping my tax data in encryption.  If that tax data is encrypted, then I don't have to notify clients. 

    Is is a big issue?  Yes, but I need help from the vendors to make it less so.  I need help, Intuit, from you.  I understand that it's hard to bolt on encryption afterwards but you won't even go on the record as supporting it.  That makes is hard for me as Chairman to put out a statement saying that our committee recommend encrypting the data.

    Help me keep my client data more secure.

     

    Wow, Dana got hate mail when he blogged about SBS?

    I think some folks need to load up a SBS 2003 box and take it for a drive.  Dana posts that he got a lot of responses on his posting about Small Business Server 2003.

    There's one thing I take exception to... he says “It's in an unknown product solution called Small Business Server 2003, more commonly known as SBS2003 (or sometimes just SBS).”

    Unknown to him maybe.  But not unknown to a lot of people I know.  Now granted I'm totally biased and live in a SBS world, but when even the .NET [soon to be IP Pro] have stories about SBS.  I think we're on the map. 

    I do agree STRONGLY with Dana when he talks about the costs of the additional security tools like RSA secureID tokens and what not.  I was talking with my buddy Jim Cowing and he was talking about the VISA CISP program being pushed down to smaller merchants in the coming years. Small businesses need security solutions too.  Set your prices in a manner that small businesses can find your offerings affordable.

    Adding Symantec exceptions to the firewall in XP SP2

     [Stealing a post from Stuart Mackie [MCP, MSP]
    In terms of the Symantec AV Exceptions as you know you will have to add the 
    exceptions.  This is possible by GP, and you should be able to see the GP 
    settings to do this.  They are located in
    
    Computer Configuration
      Administrator Templates
        Network
          Network Connections
            Windows Firewall
              Domain Profile
    
    
    Just in case you haven't worked through the Symantec Documents yet, the 
    entries you will need to allow remote client deployment, remote 
    configuration of clients using Symantec System Centre, and the ability for 
    updates to be pushed to the clients are listed below (I run Symantec Corp 
    Edtn 9.0):
    
    
    Windows Firewall: Define Program Exceptions -
    
    %Program Files%\Symantec AntiVirus\Rtvscan.exe:[serverIP]:enabled:Symantec 
    Client Security Rtvscan
    
    %Program 
    Files%\Symantec\LiveUpdate\LuComServer.exe:[serverIP]:enabled:Symantec 
    Client Security LuComServer
    
    
    Windows Firewall: Define Port Exceptions
    
    2967:UDP:[serverIP]:enabled:Symatec System Centre Control
    (The symantec documets have an error and actually state TCP which is wrong.)

    Group Policy for XP sp2 on SBS 2003 boxes

     Download details: Update for Windows Server 2003 (KB842933):
    http://www.microsoft.com/downloads/details.aspx?familyid=532a4cd0-f2ce-4fa7-92ab-ac336ad18409&displaylang=en

    It's official. Elvis is in the building.  The patch for the group policy that we need is now on the download site.

    In case you need this....This is the manual instructions for adding the adm files
    Try this:

    Without the special Small Business Server 2003 group policy settings
    patch, you can manually update the group policy settings:

    1.    Install Windows XP SP2 on a computer that is a member of the domain
    that contains the computer accounts of the other computers running
    Windows XP on which you plan to install Windows XP SP2.
    2.    Restart the computer and log on to the Windows XP SP2 computer as a
    member of the Domain Administrators security group, the Enterprise
    Administrators security group, or the Group Policy Creator Owners
    security group.
    3.    From the Windows XP desktop, click Start, click Run, type mmc, and
    then click OK.
    4.    On the File menu, click Add/Remove Snap-in.
    5.    On the Standalone tab, click Add.
    6.    In the Available Standalone Snap-ins list, click Group Policy Object
    Editor, and then click Add.
    7.    In the Select Group Policy Object dialog box, click Browse.
    In the Browse for a Group Policy Object, click the Group Policy object
    that you want to update with the new Windows Firewall settings.
    8.    Click OK.
    9.    Click Finish to complete the Group Policy Wizard.
    10.    In the Add Standalone Snap-in dialog box, click Close.
    11.    In the Add/Remove Snap-in dialog box, click OK.
    In the console tree, open Computer Configuration, Administrative
    Templates, Network, Network Connections, and then Windows Firewall.

    Repeat this procedure for every Group Policy object that is being used
    to apply Group Policy to computers that will have Windows XP SP2 installed.

    Malware tools from www.incidents.org

    Anti-Spyware Tool Kit

    Yesterday's diary entry solicited a number of replies regarding the "tool kits" people use for fighting spyware, malware and viruses. I've collated the most popular, from both e-mail submissions and some from the Handlers themselves. This list is not necessarily complete in anyway...just a starter for people to help built their own kit.

    Tools:

    Spybot - Search & Destroy :http://security.kolla.de/ orhttp://www.safer-networking.org
    Ad-Aware:http://www.lavasoftusa.com/software/adaware/
    SwatIt:http://www.swatit.org
    TDS-3 - Trojan Defence Suitehttp://tds.diamondcs.com.au/
    TrojanHunter:http://www.misec.net/trojanhunter
    TheCleaner:http://www.moosoft.com/
    BHOdemonhttp://www.spychecker.com/download/download_bhodaemon.html
    SpySweeper:http://www.webroot.com/
    Process Explorerhttp://www.sysinternals.com/
    HijackThishttp://www.spywareinfo.com/~merijn/
    AntiVir:http://www.free-av.com/
    AVG:http://www.grisoft.com/us/us_index.php

    Sites:

    Rogue/Suspect Anti-Spyware Products & Web Sites:http://www.spywarewarrior.com/rogue_anti-spyware.htm
    Broadband Reports (aka DSL Reports):http://www.dslreports.com/forum/security,1

    Please note, some or all of these tools are NOT for the novice, and should be used with GREAT care. If you are not careful, there is the possibility that you may damage parts of your operating system

    Why do you still want ISA Server 2000 after XP sp2's firewall....

    Stealing post from Jim Behning for the blog:

    I was at an account troubleshooting a ftp on one of the member
    Servers. I did a speed test at toast.net and was only getting 200k. I
    was not happy. I looked in ISA and saw who had session’s running. I
    went to all the machines and asked them to stop. One of the users had
    nothing open on her machine. She was reading a book or something. I
    went back to the server and she was still showing up. I went back to
    her machine, from add/remove I yanked out all non-work related stuff.
    I went in to the registry and yanked out all bad run lines and all
    software keys that were known junk. I ran process explorer and killed
    the malware/spyware processes so I could delete the folders for
    save/searchbar and junk like that. I reboooted the workstation and she
    said that was the fastest she ever saw that machine go. The server was
    able to do a 1 meg download. All that just because I could read some
    logs in ISA.
     
    In ISA I can ban certain types of downloads and access to certain
    websites. I can give users internet bandwidth priority. Users that do
    real research get high priority will people known to goof off get real
    low bandwidth priority. 
     
    I hate installing SBS basic with no ISA because ISA is such a great
    tool for troubleshooting problems and preventing them.
     
    For more info on ISA go to www.isaserver.org One of the best sites to
    see how people do stuff with ISA. There is a great article by Tom
    about what ISA is versus other firewalls.
     
    Note that ISA can run for years with no touching. If you want to touch
    it to see what is happening then it is a great tool to have. I really
    miss it at the few accounts I have that do not have it.
     
    SP2 fixes lots of thing in XP. Just having a popup blocker reduces the 
    opportunity for malware to get on a machine. But SP has more.
    Microsoft has more info on their website about what SP2 is about.
    Windows XP Service Pack 2 Resources for IT Professionals: 
    http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/winxpsp2.mspx

    So Dana in his blog asks for a SBS MVPer....

    So Dana Epp in his excellent Security blog has a post today asking for a SBS MVP and I just pinged up Dana with an MVP in his area, Steven Banks and another MVP, Jeff Middleton as well and posted this as a comment to his blog:

    As I said to Dana, I'd recommend ISA 2000 at this time as we SBSers won't get a wizardized ISA 2004 until SBS sp1 comes out which is waiting on Windows 2003 sp1 [got that roadmap?]

    IMHO if you open up for OWA, you DON'T have to open up port 80, you can fully function with a port 443.  Opening up Sharepoint for annonymous access [oh yeah that is something that is optional and we can do that too] is what I think is our potentially weakest issue going on in the future.

    Before I'd budget for RSA keyfobs, I'd budget for a patch management solution as WUS/MUS isn't ready and SUS is not enough.  I'm a died in the wool www.Shavlik.com gal myself.

    Because we are all on one box, because we are doing OWA, we can't do high security hardening and we have to say with Enterprise or Legacy settings.  We track pretty closely as a matter of fact with those CIS benchmarks.

    This one vendor did a "test" of security issues with SBS 2003 http://www.predatorwatch.com/vulnerability_alerts.html  the problem is they are/were scanning it for vulnerabilities from the inside where all our "squishy ports" are.  Thus this is a totally bogus analysis as it isn't looking at the machine from where the attackers would be seeing it as.  And yes, I've pinged those folks about the inaccuracy of their press release and they fail to respond.

    Honestly, patching, antivirus, firewall AND Passphrases and we do just fine out here.

     

    Pen testing a SBS box?

    Security audit  [with or without penetration testing]

     

    Many times I get asked about penetration testing [or pentesting] a Small Business Server network.  First off I would argue that pentesting on a SBS box is a silly exercise.  First off, pentesting is for the likes of Dr. J [aka Jesper Johannson who I can never spell his name right so I just call him Dr. J], and secondly it assumes that someone would be on a computer and decide to knock over a SBS box. 

     

    First off, the idea that some DefCon hacker is going to want to gain his hacker stripes by nailing a SBS box is just silly.  They won’t gain too many brownie points for nailing a SBS box.  But we can and do get nailed by the automated “bot” stuff.

     

    Jim Cowlng a buddy of mine in the Security biz [from the firm Digital Resources Group] gave a presentation to my CPA Tech group and discussed the general process of a security audit.  Now this has some relevance to SBS firms:

     

    1. Discovery of assets [you think you have only 10 computers, but what if someone brought in a wireless access point and is using their laptop on that connection too?
    2. Prioritize Business values
    3. Identify risks [grab the threat modeling book for this]
    4. Evaluate effectiveness of controls [this assumes you have a written acceptable use policy]
    5. Security and risk assessment
    6. Follow standard IT audit frameworks
      1. BS 7799
      2. ISO 17799
      3. COBIT
      4. Octave
      5. Others
    7. Examine Data classification policy [is the data handled properly for restricted and confidential?]
      1. Public
      2. Restricted
      3. Confidential
    8. PreVisit checklist
    9. Gather data
    10. External network vulnerability analysis
      1. This can be “roll your own”
      2. Jim prefers Qualys.com for their analysis and reports
    11. Onsite work
      1. Interview management and staff
      2. Walk through of facility
      3. Hands on testing [with the network admin there]
      4. Internal network testing
    12. Analyze data back at the office
    13. Issue report.

     

    See that number 10?  It can be penetration testing, looking at sql server injection attacks and database vulnerabilities, but in a SBS network it can be as basic as just understanding what ports you have open. 

     

    I use the information of what ports I have open in my analysis of “timing” of patches.  If I know that the vulnerability is attacking in a manner that I don’t have “name that port” open, I know that while I will still patch the server and systems that I can do it on a later roll out schedule.  Thus a basic understanding of what your network includes is key to understanding it and protecting it.

     

    I’m actually going to talk about this concept and www.SMBnation.com. 

     

    Bottom line, you can’t protect what you don’t know you have.

     

    [update, added the link to Dr. J's security column's and Jim's firm]

     

    One more thing, a good book on Network Security Assessment is the Smith, LeBlanc book.

     

    XP sp2 - one casualty

    I've got my neck crooked in a funny angle with the phone and shoulder rest as I listen to some jazz music.  I'm waiting on hold for a XP sp2 support representative because I have one laptop that the network card will not “wake” up and find that it's got a live cable connected to it. 

    Now I could uninstall SP2 and it would go on and function, but I don't want to.  I'm a stubborn female who wants to go forward and make things work and not fall back.  Besides I really like the features in XP sp2 especially for laptops.  So here I am getting a neck in a funky crook because I want to work though these issues.  And by the way THIS IS A FREE CALL.  Why?  Because the issue is totally due to the install of Server pack 2. 

    Gavin pinged me the other day if there was a “marketing deck” that showcased the advantages of XP sp2 over Windows 2000.  The advantages of XP [any SP] over 98 and ME are pretty obvious....

    Let's review them shall we?

    98's have no security  [oh that reminds me of a newsgroup post I did - I'll copy it here:]

    1.  When logging on ... hit cancel.  You still can get into that
    workstation right?  Got any sensitive documents on that machine?

    2.  Lanmanhash.  98 based machines require a lower authentication
    protocol to connect to a network.  This lower authentication leaves
    behind a "hash" of the passwords on a place on the server.  Take LC4 or
    John the Ripper program and run in on a network that runs 98's and it
    can break that hash... less than 7 character password that is a
    dictionary word gets broken my lc4 faster than I can find the icon on
    the desktop.

    3.  User mode.  XP/2k have three levels of security.  User mode, Power
    users mode, Local administrator.  98s has one level.  Local admin.  That
    means that your employees can load on that machine ANYTHING they want.

    4.  Going to Windows 2000/XP is considered by my friends who work in the
    defense contractor industry to be a downgrade.  Why?  Because of 3 above.

    5.  Services running as different levels.  Even in windows 2000 versus
    2003 you can see the impact of security.. many of the patches released
    today didn't affect Windows 2003, or there is mitigating factors.

    6.  Hold onto your hats because right around the corner and within 90
    days in the OEM channel XP sp2 will be released in August. XP sp2 is
    very solid.  All of the recent attacks affecting IE ... are all fully
    protected in XP sp2.  It's almost like a new OS, it's that good.

    7.  Group policy.  Oh man this is where is really gets good.  You want
    to control the interior firewall on the XP sp2 machines INSIDE your
    network, well get ready to.  SBS2003 will be getting an update to our
    Group policy to adjust so that the firewall is on inside our networks
    better protecting us.

    8.  Group policy.  If you have 98's you have no idea of the power you
    can from that server.  From locking down the screen saver to controlling
    what programs are loaded, one of the advantage we SBSers have is we are
    already on Active Directory.

    9.  98's have no security.  That's an oxymoron.  It doesn't exist.

    10.  No blue screens of death.  I honestly have never had one, don't
    know what they look like on XP

    11.  System restore, load a driver that would normally BSOD a 98, and
    you can easily recover on XP

    12.  SUS or Shavlik.  You can't do a Patch management program on a 98.
    You need XP....

    How many more do you want?

    C S R C - Systems Administration:
    http://csrc.nist.gov/itsec/guidance_WinXP.html

    See that?  You can't do anything like that on 98s.

    But what is better in XP SP2 versus 2000?  Let's see shall we?

    1.  Firewall

    3.  Local zone protection [IE is better pretected from malware]

    4.  Firewall that is there protects it as the tcp/ip stack builds [unlike sp1 the firewall protects 100% of the time that the “network stack” builds

    5.  “In your face” notification of security issues if antivirus is not up to date, firewall is not on and patching is not set.

    6.  Pop up toolbar

    7.  Restriction of Active X

    Here's the details here: Changes to Functionality in Microsoft Windows XP Service Pack 2: Part 1: Introduction:
    http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/sp2chngs.mspx

    Bottom line KILL OFF THOSE WINDOWS 98'S AND ME MACHINES first and foremost, but consider going “borg“ [as I affectionally call it] by having a full Windows XP firm.  My life is easier, my issues are easier to troubleshoot, my body of knowledge is much easier to manage, I'm just an all around happier camper.

    Still on hold... I'll post the resolution in another blog post.

    [UPDATE] I think having two versions of AOL on this computer “toasted” things.  I got a pcmcia based wired ethernet card and it wakes up just fine.  I think the AOL messed up the NIC connection.  So this weekend I'll mess with some of the registry settings in there and see what I can do.

    But I'm an Administrator! Why can't I log in?

    841188 - "The local policy of this system does not permit you to logon interactively" error message when you try to log on to a computer that is running Windows Small Business Server 2003 by using an Administrator account:
    http://support.microsoft.com/?kbid=841188

    Because you mucked around with group policies and you put someone into a group that you shouldn't have. 

    This question comes up quite a bit in the newsgroup.  I'm blogging it here to remind folks that it's an easy fix.

    MBSA 1.2.1 released [the scanning tool we need for SBS]

    Download details: Microsoft Baseline Security Analyzer v1.2.1 (for IT Professionals):
    http://www.microsoft.com/downloads/details.aspx?familyid=b13ebd6b-e258-4625-b0a3-64a4879f7798&displaylang=en

    While I still prefer Shavlik's HfnetchkPro, this is a nice tool to have for us SBS boxes to scan our networks.

    You said that the SP release was too soon, Microsoft listened....

    From a notice that I got today -- 
    As you know, Microsoft recently released Windows XP Service Pack 2 (SP2)
    to manufacturing on Friday, August 6, 2004.  You may also know that
    Microsoft will deliver Windows XP SP2 through the Automatic Update
    delivery mechanism in Windows as a critical update.  This process began
    on Tuesday, August 10.  
    
    Since some of our customers, such as your organization, utilize
    Automatic Update for a collection of your PC's, and since your
    organization may not yet be prepared to deploy Windows XP SP2 onto those
    machines, we recently made available a mechanism for temporarily
    blocking the download of Windows XP SP2 to those machines using
    Automatic Update.  Last week, we received feedback from our corporate
    customers that they would like more time to put this temporary blocking
    mechanism into place.  Based on that feedback, we have altered the
    delivery schedule of Windows XP SP2.  The machines in your organization
    using Automatic Update will not receive Windows XP SP2 until Wednesday,
    August 25 - at the earliest - as long as those machines are running
    Windows XP Professional Edition.  
    
    Here is a summary of the altered delivery schedule for Windows XP SP2:
    
    		8/6	Release to manufacturing
    
    		8/9	Release to Microsoft Download Center (full network installation package)
    			Release to MSDN subscription site (CD ISO image)
    Download details: Windows XP Service Pack 2 for IT Professionals and Developers: 
    http://www.microsoft.com/downloads/details.aspx?familyid=049c9dbe-3b8e-4f30-8245-9e368d3cdb5a&displaylang=en 8/10 Release to Automatic Update (for machines running pre-release versions of Windows XP SP2 only) 8/16 Release to Software Update Services 8/18 Release to Automatic Update for users running Windows XP Home Edition only 8/25 Release to Automatic Update for all Windows XP users including those running Windows XP Professional Edition Release to Windows Update for interactive user installations As mentioned above, Microsoft has already shipped a mechanism to temporarily disable delivery of Windows XP SP2 via Automatic Update and Windows Update. For more information on this mechanism and to download the associated tools, please visit
    http://www.microsoft.com/technet/winxpsp2. We are confident that Windows XP SP2 is a significant step forward in helping increase the resiliency of your desktops and we look forward to partnering with your organization to ensure a successful rollout of Windows XP SP2 in your organization.

    FUD Factor part 3

    Microsoft has the following KB article out about XP sp2

    884130 - Programs that may behave differently in Windows XP Service Pack 2:
    http://support.microsoft.com/default.aspx?kbid=884130&product=windowsxpsp2

    And it says “The programs that are listed in this article may experience issues after you upgrade to Windows XP SP2. You may not notice some of these issues. Additionally, software vendors may have resolved some of these issues. Contact the software manufacturer or vendor for more specific details. ”

    Oh thanks, that's real descriptive.  Talk about FUD from Microsoft itself!  A couple of folks have pointed to the fact that includes Microsoft's own products in the list.  The only time I had “changes” to office products post sp2 was when I was on a web site and they prompted me to download Excel or Word differently where appropriate.  Otherwise let me state this again, that I've not noticed any of my applications working any differently.

    So stop listening to the newsreports, heck, stop listening to Microsoft themselves and YOU load it up and try it out.

    Donnez-moi une coupure!

    I sign up for the security info from K-OTik french security list because they've sent out some “zero day” exploit information in the past.  Today they emailed out the following:

    Microsoft a publié plusieurs articles techniques décrivant les
    différents effets secondaires liés au déploiement du Service Pack 2
    pour Windows XP. En effet, suite à l'installation de ce mega-patch,
    plusieurs logiciels cesseront de fonctionner correctement, en partie
    à cause des nouvelles restrictions sécuritaires introduites par le
    nouveau firewall SP2 (IFC2).

    L'équipe technique "K-OTik Security" recommande fortement aux
    entreprises et aux particuliers de retarder l'installation du Service
    Pack 2, dans un environnement de production.

    http://www.k-otik.com/news/08152004.XPSP2Incompatible.php

    Which translates using Google language tools to:

    Microsoft published several technical articles describing the various side effects related to the deployment of the Service Pack 2 for Windows XP. Indeed, following the installation of this mega-patch, several software will cease functioning correctly, partly because of the new sedentary restrictions introduced by new firewall SP2 (IFC2).  The technical team "K-OTik Security" strongly recommends to the companies and to the private individuals to delay the installation of the Service Pack 2, in an environment of production.

    Ridiculous.  Other than some of the security scanning tools I've used [and hey load up vmware or vpc], there has been no programs that I use that have been affected.  I've got it on 4 laptops in the office right now, two desktops and none of them had errors during install, and all are working just fine.  I'm planning to roll it out next week as a matter of fact.

    By the way, if google language tools is correct, “donnez-moi une coupure” should translate to “give me a break”

    Adam's blog and Rootkits

    Anne knows how much of a nutcase I am about security and pointed me to Adam's blog that had an entry about Rootkits.  Cool.  .... well not so cool if you've got an incident on your system, but cool about the sharing of information and better understanding of this that can occur.

    You guys also know about www.rootkit.com website, right?

    XP sp2 stuff on the download site today

    http://www.microsoft.com/downloads/details.aspx?FamilyID=7bd948d7-b791-40b6-8364-685b84158c78&DisplayLang=en
    This document focuses on the changes in Windows XP Service Pack 2 and its implications for developers. Examples and details are provided for several of the technologies that are experiencing the biggest changes. Future versions of this document will cover all new and changed technologies.


     
    http://www.microsoft.com/downloads/details.aspx?FamilyID=ef3a35c0-19b9-4acc-b5be-9b7dab13108e&DisplayLang=en 
    Group Policy Settings Reference for Windows XP Professional Service Pack 2 Release Candidate 2
      This spreadsheet lists the full set of Group Policy settings described in Administrative Template (.adm) files shipped with Windows XP Professional Service Pack 2 Release Candidate 2 (RC2).


     
     

     http://www.microsoft.com/downloads/details.aspx?FamilyID=15491f07-99f7-4a2d-983d-81c2137ff464&DisplayLang=en

    Windows XP Home Edition with Service Pack 2 Utility: Setup Disks for Floppy Boot Install
      The Windows XP startup disk allows computers without a bootable CD-ROM to perform a new installation of the operating system. The Windows XP startup disk will automatically load the correct drivers to gain access to the CD-ROM drive and start a new installation of Setup.


     
    http://www.microsoft.com/downloads/details.aspx?FamilyID=535d248d-5e10-49b5-b80c-0a0205368124&DisplayLang=en
      
     Windows XP Professional with Service Pack 2 Utility: Setup Disks for Floppy Boot Install
      The Windows XP startup disk allows computers without a bootable CD-ROM to perform a new installation of the operating system.


     
    http://www.microsoft.com/downloads/details.aspx?FamilyID=938f3fec-9e63-40c2-83a6-fc97a239ddd5&DisplayLang=en
      
     Windows XP Service Pack 2 SMS Files
      Download of Windows XP SP2 package definition files

     
    http://www.microsoft.com/downloads/details.aspx?FamilyID=3e90dc91-ac56-4665-949b-beda3080e0f6&DisplayLang=en
     
     
     Windows XP SP2 Deployment Tools for Advanced Users
      Download the latest deployment tools for help installing Windows XP Service Pack 2 (SP2) on multiple computers. This file contains updates to the deployment tools and documentation.

     
     
    http://www.microsoft.com/downloads/details.aspx?FamilyID=7a4d8d12-9f5d-42bb-b31c-7b31657c869c&DisplayLang=en

     Windows XP Service Pack 2 Checked Build
      For download and installation on multiple computers on a network.


    [THIS IS THE ONE YOU WANT] 
     
    http://www.microsoft.com/downloads/details.aspx?FamilyID=049c9dbe-3b8e-4f30-8245-9e368d3cdb5a&DisplayLang=en

    Windows XP Service Pack 2 for IT Professionals and Developers
      This installation package is intended for IT professionals and developers downloading and installing on multiple computers on a network. If you're updating just one computer, please visit
    http://www.microsoft.com/protect.


     
    http://www.microsoft.com/downloads/details.aspx?FamilyID=49ae8576-9bb9-4126-9761-ba8011fabf38&DisplayLang=en
     
     Windows XP SP2 Support Tools for Advanced Users
      The Windows Support Tools for Microsoft Windows XP are intended for use by Microsoft support personnel and experienced users to assist in diagnosing and resolving computer problems.

     

    Following up on my earlier Vulnerability posting....

    So the other day I talked about a vulnerability that was rated as critical as it pertained to the Windows 2003 server platform and Bill and I agreed that we disagreed with the official rating.  The response was from the Secuity gurus was that because it was a gif file that the IE enhanced lockdown did not mitigate against, they still rated it as critical because an Admin could surf at the server and accidentally infect their server by surfing.  I think it was Jason in the SBS Microsoft Charlotte PSS department [aka SBS Mothership Charlotte] labelled these kind of occurrances as “DDT” events.

    Don't Do That.

    It's a “SERVER“ designed to SERVE you not surf the internet.  This is why it should never be used as a workstation, never be used to surf at, and the screen and keyboard is hardly used. Here at home I even have the server of a KVM switch as it doesn't need to really have a screen for 99.999% of what I need to do with it.  If I need to look at something at the server, I remote desktop into it most times anyway.

    So remember.....

    DDT

    And I still disagree with the rating of critical on a server.  At least servers that I control.  I'm not surfing on them.  Thus they are not at risk.

     

    Spyware is getting bad.....

    And while XP sp2 will help out, you may have another helper tool already on your network that you have not enabled!  If you are running the Trend CSM suite, there is a spyware module but the default is that it's not enabled.  I've put together screen shots to show you how to enable it.

    Michael Jenkins SBS MVP shared his list of spyware tools that he finds helpful:

    Moosoft

    http://www.moosoft.com/

    Registry cleaner tool

    Hijack This

    http://www.spychecker.com/program/hijackthis.html

    Use this to review your registry.  It’s recommended to review this CAREFULLY as you could accidentally remove a registry item that is needed

    Adaware

    http://www.lavasoftusa.com/default.shtml.en

    Ad-Watch is a good tool to ensure that your registry is proactively protected.  

    Process Explorer

    http://www.sysinternals.com/ntw2k/freeware/procexp.shtml

    Helpful in investigating programs operating on your system

    Spybot S&D

    http://www.safer-networking.org/en/index.html

    Use this and AdAware

    CWShredder

    http://www.spywareinfo.com/~merijn/downloads.html

    Removes the Cool Web search tool.  At the time of the writing of this chapter the CWShredder author no longer maintains the tool but it still may be of help.

    SpySweeper

    http://www.webroot.com/

    Also has an Enterprise version of Spysweeper

    I also found a cool blog on spyware.  Scoble talks about how geek events are places where we can “talk security”.  You know what else occurs?  FUD - fear uncertainty and doubt also gets cleared out at these kind of events.  One of my fellow MVPs was an a training session and some folks started talking about XP sp2 as “that SP that breaks everything”.  Try not breaking anything.  I've got it loaded now on three machines and nothing is broken, everything is working and all is well in the world.  My buddy SBS MVP Steve Foster did run into an issue with a LaCie Firewire harddrive causing his laptop to get “frozen during boot” but bottom line, he knows what the issue is and can kick it up to the next level.

    SBSized info for XP sp2

    [Borrowing a post from the newsgroups]

    Is it out yet?
    Yes. To beta testers at this time.  Should be on the Download site on Monday:

    http://blogs.msdn.com/mswanson/archive/2004/08/06/210345.aspx

    The release to manufacturing (RTM) version of Windows XP Service Pack 2 is now available for download via MSDN Subscriber Downloads. The CD ISO image weighs in at 475.35MB.

    If you’d rather let Windows Update automatically install it, visit this page to ensure that your Internet Connection Firewall and Automatic Update settings are configured correctly. I don’t think it’s available through Windows Update quite yet, but enabling these features will allow your computer to download it as soon as it’s posted.

    This is a fantastic release with a lot of new security features. I’ve been running various builds of SP2 over the past few months, and I’ve loved every minute of it. The pop-up blocker is a very welcome addition, the much improved firewall is easy to configure, and I find that I don’t have nearly as much spyware finding its way onto my computer. Some of the areas that have been improved are: network protection, memory protection, safer e-mail handling, enhanced browsing security, and improved computer maintenance.

    From a customer-ready e-mail that is being sent out:

    I am pleased to inform you that Windows XP Service Pack 2 released to manufacturing on Friday August 6, 2004. Windows XP Service Pack 2 contains major security improvements designed to provide better protection against hackers, viruses, and worms.  Windows XP Service Pack 2 also improves the manageability of the security features in Windows XP and provides more and better information to help users make decisions that may potentially affect their security and privacy. 

    On Monday, August 9, 2004, the full network installation package for Windows XP Server Pack 2 will be posted on the Windows XP Service Pack 2 site on Microsoft TechNet (http://www.microsoft.com/technet/winxpsp2).  This site is also the best resource for accessing the most up-to-date technical information regarding Windows XP Service Pack 2. 

    On-line distribution will be the primary distribution vehicle for Windows XP Service Pack 2 and below is a summary of the key milestones of the distribution plan:

    8/6  Release to manufacturing
    8/9  Release to Microsoft Download Center (network installation package)
    8/9  Release to MSDN subscription site (CD ISO image)
    8/10  Release to Automatic Updates (for machines running pre-release versions of Windows XP Service Pack 2 only)
    8/16  Release to Automatic Updates (for machines NOT running pre-releases versions of Windows XP Service Pack 2)
    8/16  Release to Software Update Services
    Later in August Release to Windows Update for interactive user installations

    Because of the significant security improvements outlined above, Microsoft views Windows XP Service Pack 2 as an essential security update and is therefore distributing it as a “critical update” via Windows Update (WU) and the Automatic Updates (AU) delivery mechanism in Windows. Microsoft is strongly urging customers with Windows XP and Windows XP Service Pack 1-based systems to upgrade to Windows XP Service Pack 2 as soon as possible.
    --------------------------------
    What do we SBSers need to do specifically?

    If you want to be able to enable the firewall INSIDE your networks, install
    http://www.microsoft.com/downloads/details.aspx?familyid=d70097c2-4317-40e0-b7da-feb52c6b6386

    This update enables and configures the Windows Firewall in Windows XP Service Pack 2 on Windows Small Business Server 2003 networks.

    ONLY install this after you have at least one machine in the office at XP sp2 RTM as the group policy will no longer be able to be edited from the server until this is released: 
    842933 - "The following entry in the [strings] section is too long and has been truncated" error message when you try to modify or to view GPOs in Windows Server 2003, Windows XP, or Windows 2000:
    http://support.microsoft.com/?kbid=842933
    [I called about 2 hours ago and they are working on the 2k3 version]

    -------------------------------
    More reading on this
    http://download.microsoft.com/download/7/9/a/79a88f49-5a0f-42f8-b6bb-63939752fb80/SBS_XPSP2.DOC

    --------------------------------
    What if I do nothing?
    Then the firewall will be disabled inside the network and while the active X and pop up blocking will be in place, the internal firewall blocking will not.
    ----------------------------------
    What's the most impact I will see if I install this?
    Quite frankly on my desktop at the office where I have been running the RC2 candidate, none of my applications have been affected in any way, shape or form.  The install does take a bit of time [its a 200+kb file and ensure that you archive the bits when installing.  Once it installs the first screen up will look a bit text-installer like and then it will ask you if you want to enable auto update.
    First screen
    http://www.winsupersite.com/images/reviews/xp_sp2_02_01.gif
    ----------------------------------
    What's this I hear about the security center?
    This is kewl as it monitors your patch level, your firewall status and your antivirus level.  It will know that Trend SMB is loaded and alert you if it might be out of date.  Symantec doesn't at this time but the patch is expected soon.  Etrust needs to be on the latest and greatest engine/client to work properly.
    Looks like this [obviously Paul's wasn't fully enabled]
    http://www.winsupersite.com/images/reviews/xp_sp2_02_02.gif
    ----------------------------------
    What the pop up blocker and active x blocker do?
    I see the most impact for me on business web sites like
    www.bankofamerica.com where we had to manually add the web site and the site it "launches off to" when making tax payments electronically so we could get page properly. 

    When you get to a page that the IE blocks some possible harmful scripting and you need to enable it [like the first time you go to Remote Web Workplace after installation] the IE info tool bar will let you know what to do:

    http://blogs.msdn.com/tonyschr/archive/2004/06/15/156787.aspx

    The pop up manager can be adjusted as well and looks like this:
    http://msdn.microsoft.com/security/productinfo/XPSP2/securebrowsing/popupmanager.aspx
    http://www.winsupersite.com/images/reviews/xp_sp2_ie_pop-up-blocker.gif
    ----------------------------
    What about the firewall? Won't it stop programs?
    If you are running with local admin rights the programs should just poke their own holes through without issue
    http://www.winsupersite.com/images/reviews/xp_sp2_security_alert.gif
    One thing to check [and unfortunately I can't here at home] On my original test of RC1  I had to manually make a port exception for tcp 27529 for Trend to pick up the dat file updates [SMB suite]  I've heard from other folks that later builds did not need this manual adjustment.  If someone else newly installing this can let me know if this is true, I'd appreciate it.
    ---------------------------------
    What about SBS 2000?  Doesn't it need a patch too?
    No,  the firewall and everything on the XP sp2 client will work independently of the server and you won't need to adjust any group policy to make anything work.
    -------------------------------
    The biggest impact in my office?
    On the four machines that are running the sp2, I've had to let folks know how to add a web site to the trusted site zone to enable scripting when needed and to add sites to the pop up tool bar. 

    As I've posted in my blog:
    http://msmvps.com/bradley/archive/2004/08/04/11232.aspx

    "I haven't met a web site yet that I couldn't get to work with XP sp2.  Now mind you I'm adding a few to my “trusted site zone“ settings with my handy dandy Trusted site tool bar add in that works on XP sp2, IE 6 [I'm starting to sound like a broken record but I'll post it again]

    http://www.microsoft.com/windows/ie/previous/webaccess/pwrtwks.mspx

    ooh and BobP posted in another example at http://www.jasons-toolbox.com/programs.asp?Program=Trust%20Setter

    ----------------------------------
    How soon should I be rolling this out to clients?
    Of course, after you test it.  But I can say it's been very stable for me.  Call your clients and inform them that if they are still on 98, this is the time to get off that platform and get on a OS that is much much better built for spyware and malware protection
     

    XP sp2 has RTM'd

    Already on my laptop... soon to be on my desktop here... look for it on the download site next week sometime.

    From David Coursey's blog.....

    http://blog.ziffdavis.com/coursey/archive/2004/08/06/1678.aspx

    *Here's the text of an e-mail I received from Microsoft concerning today's release-to-maufacturing (RTM) of Windows XP Service Pack 2:*

    Today Microsoft announced the release to manufacturing (RTM) of Microsoft Windows XP Service Pack 2 (SP2) with Advanced Security Technologies. As you know, SP2 delivers the latest security updates and innovations from Microsoft, establishes strong default security settings, and adds new proactive protection features that will help better safeguard computers from hackers, viruses and other security risks.

    The easiest way for current Windows XP users to ensure they receive SP2 when it releases in their language is to simply turn on the Automatic Updates feature in Windows XP. The timing for customers to receive the SP2 download through Automatic Updates is dependent upon a number of factors, including the customer’s Internet usage, location and language and the level of Internet demand for SP2. During the worldwide rollout of Service Pack 2, Microsoft will localize the software in 25 languages over the next two months and distribute it to computer manufacturers, enterprise customers and consumers through downloads, retail installation, free CDs and on new PCs. Microsoft expects to distribute SP2 to approximately 100 million PCs through Automatic Updates. Automatic Update is simple to turn on in Windows XP: Visit
    www.microsoft.com/protect <http://www.microsoft.com/protect>.

    Businesses of all sizes should be evaluating Service Pack 2 now, if they have not begun doing so already.

    Windows XP SP2 was designed by Microsoft and the cooperation of industry partners explicitly to provide proactive protection for Windows XP. The updates and enhancements in Windows XP SP2 focus on three main areas:

    · Stronger Security Settings -- Windows XP SP2 establishes stronger default security settings and updates for Windows XP with new features and tools designed to help customers better defend their systems and information from hackers, viruses and other security threats. This means safer browsing and communications for consumers and an improved security infrastructure for businesses.

    · Increased Manageability and Control – Windows XP SP2 makes it easier to configure and manage security resources with new functionality, more accessible and intuitive security tools, and improved settings.

    · Improved and More Secure Experiences – Windows XP Service Pack 2 improves users’ ability to remaining secure by providing users with better information for making decisions that affect their security and privacy. It also includes updates for key drivers, support for new technologies and security updates for key features, all of which provide a better end-user experience and enable more productive and enjoyable computing.

    * *For complete details, please see the press release at
    http://www.microsoft.com/presspass/newsroom/winxp/.

    I love these types of vulnerability postings

    Files to exclude from Antivirus Scanning

    823166 - Overview of Exchange Server 2003 and antivirus software:
    http://support.microsoft.com/default.aspx?scid=KB;EN-US;823166

    Okay do those

    822158 - Virus scanning recommendations on a Windows 2000 or on a Windows Server 2003 domain controller:
    http://support.microsoft.com/default.aspx?scid=KB;EN-US;822158

    Hmmmm......Okay don't do those.  Okay looks like I'll be adding more files to the exclude section.  Thanks to Merv for the heads up on Ray's post in the newsgroup today.

    FUD patrol Windows XP sp2 - post number 2

     Today I got an email regarding XP sp2 and while the emailer should be commended for their forward looking communication with their clientele there was a statement in there that was a bit ... well... a bit harsh.  It said that “Non Microsoft Software has a high probability to break, due to major changes in the service pack“
    I was chatting with someone else about this and he felt the same way, the very first build of XP sp2 was quite “achy breaky“ [to borrow a song title from the country singer with the long hair that I can't remember his name now], but the RC2 build and these last bits are very stable, very nice, very cooperative in not breaking applications, and quite frankly, I haven't met a web site yet that I couldn't get to work with XP sp2.  Now mind you I'm adding a few to my “trusted site zone“ settings with my handy dandy Trusted site tool bar add in that works on XP sp2, IE 6 [I'm starting to sound like a broken record but I'll post it again]

    http://www.microsoft.com/windows/ie/previous/webaccess/pwrtwks.mspx

    ooh and BobP posted in another example at http://www.jasons-toolbox.com/programs.asp?Program=Trust%20Setter

    Don't know about the rest of you guys but I'm looking forward to rolling this out very quickly in my firm.  Granted I have a lot of shrink wrapped software, but I haven't noticed “non Microsoft software breaking“.

    Again, planning to have a education and awareness session on the IE information bar and the firewall settings and I'm adding that tweak toolbar, but I see this as a good thing.

    Which reminds me, I need to ping Russ Cooper.  Many eons ago he emailed me about a poster ranting on how the firewall was disabled inside the SBS 2003 network.. and how Microsoft didn't “care enough“ about small businesses to properly protect them... gee... I think I'll go find that email.  :-)

     

    FUD patrol on Windows XP sp2 - post number one

    We're now going to start a series of “uh... that's not quite true” postings regarding XP sp2

    Today in the SmallbizIT group this article was posted:

     http://www.internetnews.com/security/article.php/3390031

    Where it talks about how CRM is “broken“ by XP sp2.  While the article talks about that "Microsoft CRM version 1.2 requires updates to both the Microsoft CRM Server and Outlook client and several manual configuration workarounds to operate properly," the company said.  It fails to point out that there's a fix already posted to the download site:

    http://www.microsoft.com/downloads/details.aspx?familyid=95ed89d0-8b99-4458-b798-90ad5400923e

    By the way in case you don't know -- FUD = Fear, Uncertainty, Doubt

    XP sp2 patch for us SBSers is now on the Download site ... is that XP sp2 I see in the future?

    By default, the Windows Firewall, that Windows XP Service Pack 2 (SP2) 
    includes, is disabled by a Group Policy setting in all Windows Small 
    Business Server 2003 networks. To enable the Windows Firewall on computers 
    running Windows XP SP2, install this QFE on the computer running Windows 
    Small Business Server 2003.
     
     
    http://www.microsoft.com/downloads/details.aspx?familyid=d70097c2-4317-40e0-b7da-feb52c6b6386&displaylang;=en

    Here's that patch to SBS2003 boxes that makes the Firewall enabled.  There will be a Win2k3 group policy patch to fix a issue where the editing of the group policy on the server now throws off an error after the patch [no worries, it's expected and there's a fix coming] and don't forget to poke a hole in the firewall if your antivirus on the workstations “listens” to the server for its updates.  In my case Trend listens on port 27529 TCP.  I just added that port to the firewall settings and Trend picks up the  dat file updates as it should.

    Trend, SBS 2000 and SMEX issue

    First off  the good news -- this does not affect SBS 2003 with the Trend SMB suite

    It does affect SBS 2000, the older Trend Scan Mail suite SMEX, and pop collected email.

    If you patch for the IE patch 04-025 [which like... you should apply it] your email stops being delivered.

    Hats off to Bret Bennett in the SBS newsgroup for MS Partners for posting this:

    Hi,

    After applying a handful of Critical Updates to a customer's SBS 2003
    Premium box this weekend, they called me and said that they were no longer
    receiving email.

    A little investigation showed that their Pop Connector was pulling the email
    down to Exchange, but then it just sat in the SMTP queue for delivery to the
    desktops, without ever getting delivered.

    The short story is that the act of applying the Critical Updates caused
    Trend CMS (SMEX) to change a registry setting that basically kept Trend CMS
    (SMEX) scanning those emails continuously over and over in a loop, and not
    allowing them to be delivered to the desktops.

    The fix, should you choose to accept this mission, is to go to
    HKLM\System\CurrentControlSet\Services\MSExchangeIS\VirusScan . In there you
    will see an entry titled "Enabled". "Enabled's" value needs to be set to 0
    (ie. zero). If it is set to "1", the email inbound email will hang there as
    I described above. After the value is changed to 0, the email will go out to
    the desktops as usual.

    For what it's worth. . .

    Regards,
    Bret

    Remember if you sell, install SBS sign up for to be AT LEAST a registered Microsoft partner.  You then get the ability to purchase the Action Pack [a must have for a consultant] and access to the Microsoft partner newsgroups where you are guaranteed a response.  Not quite as wacko as the public newsgroup ;-)  but it's still SBS.  More like a more “adult“ member of the family.  ;-)

    Norton needs an update for XP sp2

    XP sp2 is coming.  And if a program doesn't work as it should, go to the manufacturers site and get an update.  In today's CNN it talked about how Norton needs an update to work with XP sp2.  I think it's key that we test before we roll it out, but we should work through these issues.

    Kewlamundo - Robert starts a blog

    David Hibbeln pinged me this morning that Robert Hensing started a blog.  Who?  You ask?  Security Dude at Microsoft. That's who.  Good stuff.  Subscribed!  He does the Security Incident Response stuff at Microsoft.  Talk about a “been there, seen that” kind of job.

    He starts off with passphrases and getting rid of LMhash.  Start reading... and then go change your password to a passphrase.

    If you are a beancounter... this KB makes your heart go pitter patter...

    839503 - "Connection Error: 10057” error message when you try to connect to the Lacerte Web site or to download updates of the Lacerte Tax program in SBS 2000 or in SBS 2003:
    http://support.microsoft.com/default.aspx?scid=kb;en-us;839503

    XP Service Pack 2 - get ready to play

    I write articles for my local business journal as well as for the AICPA Infotech newsletter and they needed an article for the September/October edition.  PERFECT TIMING!  Unless you've been living under a rock, you know that XP Service Pack 2 will be out in the month of August and I'd strongly recommend that consultants and admins review the document located on the web that details out what specific setting you can do with the firewall.  Remember that in the SBS 2003 network, we will get a specific group policy that will enable it inside the network but we can even edit it MORE than they have and do our own adjustments.  There's settings in there that can limit the settings to just certain IP addresses, to just the local network or to the entire Internet. 

    Start with the base and then start to “play” to better protect your clients.  My guess is that you will find you'll build on top of the rules that the SBS 2003 team has built to customize it for your clients.

    I was out surfing and found this web site that talked about some of the things they didn't like in XP sp2.  It's an interesting site that talks about some of the concerns that some of us have been discussing on a listserve.  Will end users just blindly approve applications to go out the firewall without understanding what they are approving?  I do think that the IE scripting limitations, the pop up blocker and the firewall action will need end user education.  In my office where we have the RC2 installed on four production workstations, it already has needed some explanation for those folks running it.  But that's good.  The more we educate, the better we are protected.

    So, I'm looking forward to it... August... come on August!

    My way is better... no MY way is better

    “One nic [network card] is better than two nics“

    “A hardware firewall is better than a software firewall“

    I was reminded by these “mine is better than yours” by a post by Rory.  He starts out by relating the story of Nike and how he thought if he only had the “swoosh” on his side, he'd be better, stronger, he'd be just ... just more.  Well he found out that shoes do not make the man.  He uses it as an analogy over “language wars”.

    The same can be said in SBS land.  I'm guilty in the newsgroups of posting in a “pompous manner' oh don't do it with a one nic, always do it with two nics, but you know what?  I'm second guessing that consultant who [if they've done what they are supposed to do], analyzed the client, looked at the issues they face and determined the best solution.  At the same time, for all those folks that recommend one nic, don't blame me for liking and recommending two network cards.  I like having the separation and feeling like I'm doing it like the big boys. I'll paraphrase Rory's question but in the case of SBSland where we can do things in many many ways.....

    1) Can it do the job well?

    2) Can it do the job in a way which pleases you?

    If you can answer "yes" to these two questions, then you have the right bloody “technology“, and don't let anybody tell you otherwise.

    As long as both methods work, keep the networks safe, and provide that company with what they need, does it matter how you do it?  It provides a solution.  So let's get past arguing what is the “best practice“ as what is “best“ for you might not be “best“ for me.  The “best“ solution is one where the consultant has set up “the“ firewall [whatever brand], in a manner that it is controlled, auditable, confirmed to only have those ports open what is it was intended to have open, configurable only by those who are authorized to configure it, and without known vulnerabilities. As long as whatever technology is in place protects and defends that network exactly when it needs it, who cares what is used?

    ISA Server 2000 ... to reinstall SP2 or not to reinstall SP2 ...that is the question....

    Just a reminder to folks running with ISA Server 2000....

    You must reinstall ISA Server SP2 after you do any of the following:

    ·       Add or remove ISA Server components
    ·       Install ISA Server Feature Pack 1
    ·       Change ISA Server installation mode

    The upgrades to ISA Server Feature pack 1 will only get “smooshed“ on there if you reapply SP2 afterwards.  So don't forget to reapply SP2 when installing that feature pack.

     

    Getting Ready for XP sp2......

    Noticed the following two KBs come out in advance of XP sp2.  Kewl.  Vendors who are stepping up to the bat before XP sp2 hits the streets.  In a listserve I'm on a guy says “once you step outside the business world and start talking to residential users, they don't know what spyware is or don't care“.  I guess I must hang around with folks that surf a lot because comments always come back to me about pop ups and slow Internet experiences.  Many of these folks have kids that download music and are on Kazaa.

    Sorry but I DO perceive it to be an issue to home users.

     

    870906 - McAfee Virusscan Professional version 6.0 quits unexpectedly after you install it on a Windows XP Service Pack 2-based computer:
    http://support.microsoft.com/?kbid=870906


    870907 - NetZero closes unexpectedly when you start it in Windows XP SP2:
    http://support.microsoft.com/?kbid=870907

    123 Protect your Server - Firewall, Antivirus and Patching

    Did everyone see this?  Trend and HP will be partnering to pre-load Trend on SBS boxes sold by HP.  Kewl!  Remember the 1-2-3 Protect your PC campaign?  We got the Firewall.  This provides the Antivirus bundle.  Now we only need Patching built in for the “swwweeeettt” product!

    The room service bacon burger at the Bellagio is still better....

    Driving in the taxi from the Airport, I drove by the Alexis Park Hotel and Resort.  So THAT's what it looks like 'eh?  So why is that of interest to me?  Because Alexis Park is the venue for Defcon the annual Hacker convention.  HD Moore will be there, among others.  FX the guy who has the database of default passwords, will be running a presentation on “The goal is that you walk out with your own 0day already developing in your mind.”  Oh, cool.... but it's still interesting to scroll down and see what “stuff“ is going to be presented.

    Oh, and the room service bacon burger at the Bellagio is still the best room service bacon burger that I've eaten in hotel rooms.....

     

    So "not supported" isn't enough of an argument, 'eh?

    So an SBSer asked in the newsgroups tonight for some arguments as to why 98 is more secure than XP as telling the client “it's not supported for certain security patches“ wasn't cutting it anymore with the client.....

    Oh stand back folks... here goes the soapbox......

    98 isn't secure, wasn't ever secure, won't ever be secure.  Boot that sucker and hit cancel and that box spills it's guts to you without even a whimper.  You can't control them, can't remotely manage, can't do remote web workplace, don't have the rock solid operating system that doesn't BSOD....

    Now that said, technically speaking 98's do get patches, only that they only get the critical ones via Windows update, the rest you have to call Microsoft [it's a free call but still a pain]

     1.  When logging on ... hit cancel.  You still can get into that workstation right?  Got any sensitive documents on that machine?

    2.  Lanmanhash.  98 based machines require a lower authentication protocol to connect to a network.  This lower authentication leaves behind a "hash" of the passwords on a place on the server.  Take LC4 or John the Ripper program and run in on a network that runs 98's and it can break that hash... less than 7 character password that is a dictionary word gets broken my lc4 faster than I can find the icon on the desktop.

    3.  User mode.  XP/2k have three levels of security.  User mode, Power users mode, Local administrator.  98s has one level.  Local admin.  That means that your employees can load on that machine ANYTHING they want.

    4.  Going to Windows 2000/XP is considered by my friends who work in the defense contractor industry to be a downgrade.  Why?  Because of 3 above.

    5.  Services running as different levels.  Even in windows 2000 versus 2003 you can see the impact of security.. many of the patches released today didn't affect Windows 2003, or there is mitigating factors.

    6.  Hold onto your hats because right around the corner and within 90 days in the OEM channel XP sp2 will be released in August. XP sp2 is very solid.  All of the recent attacks affecting IE ... are all fully protected in XP sp2.  It's almost like a new OS, it's that good.

    7.  Group policy.  Oh man this is where is really gets good.  You want to control the interior firewall on the XP sp2 machines INSIDE your network, well get ready to.  SBS2003 will be getting an update to our Group policy to adjust so that the firewall is on inside our networks better protecting us.

    8.  Group policy.  If you have 98's you have no idea of the power you can from that server.  From locking down the screen saver to controlling what programs are loaded, one of the advantage we SBSers have is we are already on Active Directory.

    9.  98's have no security.  That's an oxymoron.  It doesn't exist.

    10.  No blue screens of death.  I honestly have never had one, don't know what they look like on XP

    11.  System restore, load a driver that would normally BSOD a 98, and you can easily recover on XP

    12.  SUS or Shavlik.  You can't do a Patch management program on a 98. You need XP....

    How many more do you want?

    C S R C - Systems Administration:
    http://csrc.nist.gov/itsec/guidance_WinXP.html

    See that?  You can't do anything like that on 98s.

    So what other reasons do YOU have for getting rid of those 98s?

    SBSers get ready to feel the power of group policy just a little bit more..

    Charlie Anthe posts today that they are planning to put the SBSized adjustment to the group policy on Windows Update and the plan is to push it out around the release of XP sp2.  Remember of prior blog where we indicated that Xp sp2 should be out in August?  Remember how our SBS boxes currently block the application of the firewall inside the network?  Well they are going to change that and turn it on and will be pushing out a fix to adjust that.

     

    Security bulletins today - only one restart and it's not for SBS 2003!

    Of the security bulletins today, only one states for certain that it needs a restart the others are “may not“

    The one that needs a restart is SBS 4.5.

    Today 13 July 2004, Microsoft is releasing 7 security updates for newly discovered vulnerabilities in Microsoft Windows.
    
     - One Microsoft Security Bulletin affecting Microsoft Windows with a maximum severity of Moderate, MS04-018
     - One Microsoft Security Bulletin affecting Microsoft Windows with a maximum severity of Important, MS04-019
     - One Microsoft Security Bulletin affecting Microsoft Windows with a maximum severity of Important, MS04-020
     - One Microsoft Security Bulletin affecting Microsoft Windows with a maximum severity of Important, MS04-021
     - One Microsoft Security Bulletin affecting Microsoft Windows with a maximum severity of Critical, MS04-022
     - One Microsoft Security Bulletin affecting Microsoft Windows with a maximum severity of Critical, MS04-023
     - One Microsoft Security Bulletin affecting Microsoft Windows with a maximum severity of Important, MS04-024
    Per Incidents.org web site, they are kicking up the Criticality of 04-024 [the shell patch] because of “public availability of the exploit“
    
    
    Summaries for these new bulletins may be found at the following page:
     - http://www.microsoft.com/technet/security/bulletin/ms04-jul.mspx
    
    Customers are advised to review the information in the bulletins, test
    and deploy the updates immediately in their environments, if applicable.
    
    Microsoft will host a webcast tomorrow to address customer questions on
    these bulletins. For more information on this webcast please see below:
     - Information about Microsoft's July Security Bulletins
     - Wednesday, July 14, 2004 10:00 AM - Wednesday, July 14, 2004 11:00 AM
    (GMT-08:00) Pacific Time (US & Canada)  
     - http://go.microsoft.com/fwlink/?LinkId=30865
    
     - The on-demand version of the webcast will be available 24 hours after
    the live webcast at: 
     - http://go.microsoft.com/fwlink/?LinkId=30865
    
    MS04-018
    
    Title:  Cumulative Security Update for Outlook Express (823353)
    
    Affected Software: 
     - Microsoft Windows NT Workstation 4.0 Service Pack 6a
     - Microsoft Windows NT Server 4.0 Service Pack 6a 
     - Microsoft Windows NT Server 4.0 Terminal Server Edition Service Pack 6 
     - Microsoft Windows 2000 Service Pack 2, Microsoft Windows 2000 Service
    Pack 3, Microsoft Windows 2000 Service Pack 4 
     - Microsoft Windows XP and Microsoft Windows XP Service Pack 1 
     - Microsoft Windows XP 64-Bit Edition Service Pack 1 
     - Microsoft Windows XP 64-Bit Edition Version 2003 
     - Microsoft Windows Server 2003 
     - Microsoft Windows Server 2003 64-Bit Edition 
     - Microsoft Windows 98, Microsoft Windows 98 Second Edition (SE), and
    Microsoft Windows Millennium Edition (Me) - Review the FAQ section of
    this bulletin for details about these operating systems.
    
    Affected Components: 
     - Microsoft Outlook Express 5.5 Service Pack 2
     - Microsoft Outlook Express 6
     - Microsoft Outlook Express 6 Service Pack 1
     - Microsoft Outlook Express 6 Service Pack 1 (64 bit Edition)
     - Microsoft Outlook Express 6 on Windows Server 2003
     - Microsoft Outlook Express 6 on Windows Server 2003 (64 bit edition)
    
    Impact of Vulnerability:  Denial of Service
    
    Maximum Severity Rating:  Moderate
    
    Restart required:  In some cases, this update does not require a
    restart. The installer stops the required services, applies the update,
    and then restarts the services. However, if the required services cannot
    be stopped for any reason or if required files are in use, this update
    will require a restart. If this occurs, a message appears that advises
    you to restart.
    
    Update can be uninstalled: Yes
    
    More information on this vulnerability is available at:
    http://www.microsoft.com/technet/security/bulletin/MS04-018.mspx
    **********************************************************************
    
    MS04-019
    
    Title:  Vulnerability in Utility Manager Could Allow Code Execution
    (842526)
    
    Affected Software: 
     - Microsoft Windows 2000 Service Pack 2, Microsoft Windows 2000 Service
    Pack 3, Microsoft Windows 2000 Service Pack 4
    
    Impact of Vulnerability: Local Elevation of Privilege
    
    Maximum Severity Rating: Important
    
    Restart required:  In some cases, this update does not require a
    restart. The installer stops the required services, applies the update,
    and then restarts the services. However, if the required services cannot
    be stopped for any reason or if required files are in use, this update
    will require a restart. If this occurs, a message appears that advises
    you to restart.
    
    Update can be uninstalled:  Yes
    
    More information on this vulnerability is available at:
    http://www.microsoft.com/technet/security/bulletin/MS04-019.mspx
    **********************************************************************
    
    MS04-020
    
    Title:  Vulnerability in POSIX Could Allow Code Execution (841872)
    
    Affected Software: 
     - Microsoft Windows NT Workstation 4.0 Service Pack 6a
     - Microsoft Windows NT Server 4.0 Service Pack 6a 
     - Microsoft Windows NT Server 4.0 Terminal Server Edition Service Pack
    6
     - Microsoft Windows 2000 Service Pack 2, Microsoft Windows 2000 Service
    Pack 3, Microsoft Windows 2000 Service Pack 4
    
    Impact of Vulnerability: Local Elevation of Privilege
    
    Maximum Severity Rating: Important
    
    Restart required: In some cases, this update does not require a restart.
    The installer stops the required services, applies the update, and then
    restarts the services. However, if the required services cannot be
    stopped for any reason or if required files are in use, this update will
    require a restart. If this occurs, a message appears that advises you to
    restart.
    
    Update can be uninstalled: Yes
    
    More information on this vulnerability is available at:
    http://www.microsoft.com/technet/security/bulletin/MS04-020.mspx
    **********************************************************************
    
    MS04-021
    
    Title:  Security Update for IIS 4.0 (841373)
    
    Affected Software: 
     - Microsoft Windows NT Workstation 4.0 Service Pack 6a
     - Microsoft Windows NT Server 4.0 Service Pack 6a
    
    Affected Components: 
     - Microsoft Internet Information Server (IIS) 4.0
    
    Impact of Vulnerability: Remote Code Execution
    
    Maximum Severity Rating: Important
    
    Restart required:  Yes
    
    Update can be uninstalled:  Yes
    
    More information on this vulnerability is available at:
    http://www.microsoft.com/technet/security/bulletin/MS04-021.mspx
    **********************************************************************
    
    MS04-022
    
    Title:  Vulnerability in Task Scheduler Could Allow Code Execution
    (841873)
    
    Affected Software: 
     - Microsoft Windows 2000 Service Pack 2, Microsoft Windows 2000 Service
    Pack 3, Microsoft Windows 2000 Service Pack 4
     - Microsoft Windows XP and Microsoft Windows XP Service Pack 1
     - Microsoft Windows XP 64-Bit Edition Service Pack 1
    
    Affected Components: 
     - Internet Explorer 6 when installed on Windows NT 4.0 SP6a
    (Workstation, Server, or Terminal Server Edition)
    
    Impact of Vulnerability: Remote Code Execution
    
    Maximum Severity Rating: Critical
    
    Restart required: In some cases, this update does not require a restart.
    The installer stops the required services, applies the update, and then
    restarts the services. However, if the required services cannot be
    stopped for any reason or if required files are in use, this update will
    require a restart. If this occurs, a message appears that advises you to
    restart.
    
    Update can be uninstalled:  Yes
    
    More information on this vulnerability is available at:
    http://www.microsoft.com/technet/security/bulletin/MS04-022.mspx
    **********************************************************************
    
    MS04-023
    
    Title:  Vulnerability in HTML Help Could Allow Code Execution (840315)
    
    Affected Software: 
     - Microsoft Windows 2000 Service Pack 2, Microsoft Windows 2000 Service
    Pack 3, Microsoft Windows 2000 Service Pack 4 
     - Microsoft Windows XP and Microsoft Windows XP Service Pack 1
     - Microsoft Windows XP 64-Bit Edition Service Pack 1 
     - Microsoft Windows XP 64-Bit Edition Version 2003
     - Microsoft Windows Server 2003
     - Microsoft Windows Server 2003 64-Bit Edition
     - Microsoft Windows 98, Microsoft Windows 98 Second Edition (SE), and
    Microsoft Windows Millennium Edition (ME) - Review the FAQ section of
    this bulletin for details about these operating systems.
    
    Affected Components: 
     - Internet Explorer 6.0 Service Pack 1 when installed on Windows NT 4.0
    SP6a (Workstation, Server, or Terminal Server Edition)
    
    Impact of Vulnerability: Remote Code Execution
    
    Maximum Severity Rating: Critical
    
    Restart required: In some cases, this update does not require a restart.
    The installer stops the required services, applies the update, and then
    restarts the services. However, if the required services cannot be
    stopped for any reason or if required files are in use, this update will
    require a restart. If this occurs, a message appears that advises you to
    restart.
    
    Update can be uninstalled: Yes
    
    More information on this vulnerability is available at:
    http://www.microsoft.com/technet/security/bulletin/MS04-023.mspx
    **********************************************************************
    
    MS04-024
    
    Title:  Vulnerability in Windows Shell Could Allow Remote Code Execution
    (839645)
    
    Affected Software: 
     - Microsoft Windows NT(r) Workstation 4.0 Service Pack 6a
     - Microsoft Windows NT Server 4.0 Service Pack 6a
     - Microsoft Windows NT Server 4.0 Terminal Server Edition Service Pack
    6
     - Microsoft Windows NT(r) Workstation 4.0 Service Pack 6a with Active
    Desktop
     - Microsoft Windows NT Server 4.0 Service Pack 6a with Active Desktop
     - Microsoft Windows NT Server 4.0 Terminal Server Edition Service Pack
    6 with Active Desktop
     - Microsoft Windows 2000 Service Pack 2, Microsoft Windows 2000 Service
    Pack 3, Microsoft Windows 2000 Service Pack 4 
     - Microsoft Windows XP and Microsoft Windows XP Service Pack 1
     - Microsoft Windows XP 64-Bit Edition Service Pack 1
     - Microsoft Windows XP 64-Bit Edition Version 2003
     - Microsoft Windows Server 2003
     - Microsoft Windows Server 2003 64-Bit Edition
     - Microsoft Windows 98, Microsoft Windows 98 Second Edition (SE), and
    Microsoft Windows Millennium Edition (ME) - Review the FAQ section of
    this bulletin for details about these operating systems.
    
    Impact of Vulnerability:  Remote Code Execution
    
    Maximum Severity Rating:  Important
    
    Restart required:  In some cases, this update does not require a
    restart. The installer stops the required services, applies the update,
    and then restarts the services. However, if the required services cannot
    be stopped for any reason or if required files are in use, this update
    will require a restart. If this occurs, a message appears that advises
    you to restart.
    
    Update can be uninstalled: Yes
    
    More information on this vulnerability is available at:
    http://www.microsoft.com/technet/security/bulletin/MS04-024.mspx
    **********************************************************************
    
    PLEASE VISIT http://www.microsoft.com/technet/security FOR THE MOST
    CURRENT INFORMATION ON THESE ALERTS.

    So what's a person to do if they need Modem sharing?

    Third party solutions!

    http://www.pcmicro.com/dialoutserver/

    http://www.spartacom.com/

    Remember though the reason they took it out is that it's a Security issue to have modem sharing in a server...remember Secure by Design, Secure by Default, Secure by Deployment... yeah the same Security push that took out Terminal Server in application mode on our domain controllers, took out Modem Sharing. 

    So just remember .... you are adding a security threat back in.

    XP sp2 - release in August - WUS - not released this year

    Get ready folks, XP sp2 is coming soon.  Mary Jo Foley and the rest of the press indicates that XP sp2 will be coming out in August.  Remember for the SBS 2003 platform, there is currently in place a group policy that shuts off the internal firewall capabilities of the firewall, however this will be adjusted with a SBS group policy tweak to enable it once the xp sp2 has been released.

    I've got XP sp2 RC2 on three machines in the office and all are working very nicely.

    But this doesn't look to good for us SBSers - per the news report below, the nearly all in one patch platform called Windows Update Service or MUS or WUS or whatever, has been pushed back until next year.  Ouch.  We need this.  We need an all in one patch tool and right now we rely on the kindness of the folks at Shavlik.com to patch everything on our servers including ISA Server.  Even the MBSA tool does not identify the patches needed for our ISA server.  There is no Microsoft tool to scan the patches needed for ISA server that I know of.  And there should be.

    Sorry but this just doesn't cut it anymore in my book.  CNN's Money indicated that the analysts are happy with what is going on with Microsoft, citing Steve Ballmer's cost cutting memo as one example, but they called Microsoft the 500 pound elephant.

    Well I think the 500 elephant need to strap on Roller Skates.  We need that patching tool and we need ISA server to be able to be patch scanned.

    MICROSOFT further delays patching product, service
    InfoWorld - San Mateo,CA,USA
    ... a result of the additional delays, "Microsoft Update," the planned
    successor to the current Windows Update service, and Windows Update Services
    (WUS), formerly ...
    

    So we should stop using Internet Explorer, right?

    The news is buzzing out the US-CERT/Department of Homeland Security said to stop using Internet Explorer. 

    Hello?  It's like the last option at the bottom of the recommended page....

    http://www.kb.cert.org/vuls/id/713878

    The rest of the suggestions, like run with IE in High Security, ensure A/V is up to date is way more reasonable than trying to get Firefox on a bunch of users used to Internet Explorer [not to mention business web sites that want IE].

    Also, does everyone realize that there's a TON of browsers out there that are just as “loosey goosey“ as IE is?

    The Secunia web site at http://secunia.com/advisories/11978/ lists the following as vulnerable....


    Software: Internet Explorer 5.x for Mac
    Konqueror 3.x
    Mozilla 0.x
    Mozilla 1.0
    Mozilla 1.1
    Mozilla 1.2
    Mozilla 1.3
    Mozilla 1.4
    Mozilla 1.5
    Mozilla 1.6
    Mozilla Firefox 0.x
    Netscape 6.x
    Netscape 7.x
    Opera 5.x
    Opera 6.x
    Opera 7.x
    Safari 1.x

    Is there any web browser left?  [actually there's like 3 that aren't on this list]....but the point is we let our web browsers do WAY WAY WAY too much.

    Lock down these desktops people, run as User like Aaron Margosis is preaching folks.  Amen brother.  We have GOT to take back the rights and not let these programs do stuff.  I started a web site a bit back to help others whack the registry of their Windows machines when programs refuse to run correctly in User mode.  If you have any suggestions to the “hall of fame”, feel free to forward them over.

    My web site is located at http://www.threatcode.com

    And yes, right now, Internet Explorer IS listed on that site.  Guess I should put those other browsers too, 'eh?  ;-)

    For anyone else who uses the Shavlik HFnetchkPro product to scan their machines....

    Instructions for scanning and deploying the recently announced ADODB.stream patch 877069 
    
    Microsoft has released a critical update to protect systems against a recent Internet 
    threat. Adodb.stream provides a method for reading and writing files on a hard 
    drive. This by-design functionality is sometimes used by web applications. However, 
    when combined with known security vulnerabilities in Microsoft Internet Explorer, 
    it could allow an internet web site to execute script from the Local Machine Zone 
    (LMZ). This occurs because the ADODB.Stream object allows access to the hard drive 
    when hosted within Internet Explorer.
    
    Because this patch was not released as part of a security bulletin, this patch is 
    not included as part of the default Shavlik HFNetChkPro assessment XML file. 
    However, Shavlik has created an optional XML file that will specifically scan for 
    and deploy this patch. To enable support for this patch download 
    https://xml.shavlik.com/optional.zip and expand this package to a well-known 
    location on your Shavlik HFNetChkPro console. Next, create a scan template that 
    points to the enclosed optional.xml file. Scans performed with this template will 
    provide assessment results and deployment capabilities for this specific issue. 
    Please note: you must be running Shavlik HFNetChkPro version 4.3 or later to use 
    this optional XML file. 
    
    For more information on this patch, including known issues and caveats, please 
    see Microsoft Knowledge Base article 870669.
    - The Shavlik XML Team

    ADO kill bit for Internet Explorer posted on Windows Update.....

     Per Thor's posting on NTbugtraq ~
    If you are curious about what this configuration change might be, it is a
    registry entry that sets the killbit on the ADODB.Stream ActiveX object. There
    is a Knowledge Base article detailing how to manually implement this change and
    there is a Critical Update available for download that accomplishes the same.
    
    How to disable the ADODB.Stream object from Internet Explorer
    http://support.microsoft.com/?kbid=870669
    
    Critical Update for Microsoft Data Access Components - Disable ADODB.Stream
    object from Internet Explorer (KB870669)
    http://www.microsoft.com/downloads/details.aspx?FamilyID=4D056748-C538-46F6-B7C8-2FBFD0D237E3&DisplayLang=en
    
    What You Should Know About Download.Ject
    http://www.microsoft.com/security/incident/download_ject.mspx
    
    
    
    Regards

    Death of the DMZ?

    J. Wright has an interesting blog post that I'm reading from the TechEdBloggers site.  It's about ISA 2004 and how the death of the DMZ in ISA 2004 ~

    Death of the DMZ is a debate evangelised by Steve Riley which basically implies that firewalls as we know them today will not be part of the security solution of the future. The concept is that we should let networks do what they are good at, shift data from point ‘a’ to point ‘b’, security cant be controlled by a single appliance with a single method. Platforms and application are being designed and built today to exists in a ‘hostile environment’ each node is therefore secure or secure enough. The analogy is streets, our roads are public, people can walk down the streets where we live however each house is responsible for its own security, places of high value have better security the standard house has standard security. Note Microsoft.com is not behind a firewall! Because no firewall exists that is capable. I cant do this subject justice but imagine this, if all your nodes on your network are secure, can authenticate to each other, by domain membership are patched have anti virus and have a good group policy deployed etc etc, do you need a corporate network? What is wrong with the biggest most resilient network in the world (the internet).  The corporate network boundaries are becoming grey WiFi, VPN’s, extranets etc, the internal network is no longer trusted, so how are firewalls really helping?“

    Well it's certainly in line with my rants of late that my security issues are not the fact that I have my firewall on my domain controller, it's the fact that I DON'T have good group policy deployed that is my security weakness.

     

    Windows XP Security guidance from NIST

    The listserve I'm on from the Center for Internet Security has this posting yesterday and I forgot to stick it up here.  NIST has some good guidance.  Not SBSized but still food for thought nonetheless...... 
    NIST has completed the draft NIST Special Publication 800-68, Guidance for
    Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security
    Configuration Checklist.  NIST Special Publication 800-68 has been created to
    assist IT professionals, in particularly Windows XP system administrators and
    information security personnel, in effectively securing Windows XP systems. It
    discusses Windows XP and various application security settings in technical
    detail. The guide provides insight into the threats and security controls that
    are relevant for various operational environments, such as for a large
    enterprise or a home office. It describes the need to document, implement, and
    test security controls, as well as to monitor and maintain systems on an ongoing
    basis. It presents an overview of the security components offered by Windows XP
    and provides guidance on installing, backing up, and patching Windows XP
    systems. It discusses security policy configuration, provides an overview of the
    settings in the accompanying NIST security templates, and discusses how to apply
    additional security settings that are not included in the NIST security
    templates. It demonstrates securing popular office productivity applications,
    Web browsers, e-mail clients, personal firewalls, antivirus software, and
    spyware detection and removal utilities on Windows XP systems to provide
    protection against viruses, worms, Trojan horses, and other types of malicious
    code.  NIST requests comments by August 3, 2004.  Comments should be addressed
    to itsec@nist.gov.
    
    <http://csrc.nist.gov/itsec/guidance_WinXP.html>

    Threat Modeling and Risk Analysis....

    So my Threat Modeling book came in today from Amazon.com [I've only preordered it for ages] and even before I've started reading it I'm doing a bit of “threat modeling/risk analysis” here at the office today. 

    Internet Explorer.  Unless you've been living under a rock, you'll know that IE has a bit of issues lately.  Per newsreports, one of the web sites that was unpatched for 04-011 and thus was vulnerable to being overtaken and used in the browser attack was Kelley Blue Book.  That sort of hit a little too close to home.  Since that would be a business site that I would consider “trustworthy” I'd probably be adding that to a trusted zone if I needed it to work. 

    First and foremost as administrator I need to ensure that the firms data remains secure.  If I can't control what is going on on my workstations, I'm not controlling my network.  My workstations are where my vulnerabilties are.  Jeff Middleton just said it yesterday.  Security isn't about following a
    "readers digest how to" book, it's about *administration and control.*

    So I made a risk analysis.  I know that I don't have my entire office running as user because either the applications I run won't support it, or in my role as network enabler, I'm unwilling to push my office workers into a “painful” and loss of productivity position.  So I've done things like running with IE in high security, adjusting the Trusted site zone to be no lower than medium.  I have certain positions locked down, but not my IT workers who aren't ready for a lack of control.

    Today I decided to roll out XP sp2 to my higher risk workstations [like mine].  I know that I'm going to have to work something out around Shavlik.com's patch progam that needs outbound NetBIOS connections [and inbound return responses], but right now I've not been seriously hampered by running a firewall inside my firewall.

    Off to check out the Threat Modeling book....

    UPDATE - another mitigation alternative is to run this IE registry tool here from eEye. This “kills“ the adodb bit.

    Closing the adodb issue closes the possiblity for this latest zero vulnerability from running, as it requires it to run. Microsoft has not considered the fact that the adodb issue allowing code to be run in the "My Computer" zone to be a security problem, however multiple issues of this have been made.

    It's the home stretch for XP sp2 ......

    "We're on the home stretch for Windows XP SP2! I can't begin to tell you what a relief it is to see it almost done." says Michael Howard on his blog.   I agree.  In looking over the Secunia advisories for Internet Explorer... IE is getting pretty nasty these days .....

    The following are unpatched:
    Secunia - Advisories - Internet Explorer File Download Error Message
    Denial of Service Weakness:
    http://secunia.com/advisories/11868/

    Secunia - Advisories - Internet Explorer Security Zone Bypass and
    Address Bar Spoofing Vulnerability:
    http://secunia.com/advisories/11830/

    Secunia - Advisories - Internet Explorer Local Resource Access and
    Cross-Zone Scripting Vulnerabilities:
    http://secunia.com/advisories/11793/   <<< this is the Russian IIS one
    that is currently being exploited>>

    Secunia - Advisories - Microsoft Internet Explorer and Outlook URL
    Obfuscation Issue:
    http://secunia.com/advisories/11582/

    Secunia - Advisories - Windows Explorer / Internet Explorer Long Share
    Name Buffer Overflow:
    http://secunia.com/advisories/11482/

    Secunia - Advisories - Internet Explorer/Outlook Express Restricted Zone
    Status Bar Spoofing:
    http://secunia.com/advisories/11273/


    .....you get the idea..... basically walk down the IE advisories and see which ones don't point to a security bulletin.....but even then, I think I'm going to keep running in high security.  There's no reason that web sites should do “stuff” without my permission.

    Remember the 10 laws of security?  I'd say IE is letting rule number 2 to get broken.

    Law #1: If a bad guy can persuade you to run his program on your computer, it's not your computer anymore Law #1: If a bad guy can persuade you to run his program on your computer, it's not your computer anymore
    Law #2: If a bad guy can alter the operating system on your computer, it's not your computer anymore Law #2: If a bad guy can alter the operating system on your computer, it's not your computer anymore
    Law #3: If a bad guy has unrestricted physical access to your computer, it's not your computer anymore Law #3: If a bad guy has unrestricted physical access to your computer, it's not your computer anymore
    Law #4: If you allow a bad guy to upload programs to your website, it's not your website any more Law #4: If you allow a bad guy to upload programs to your website, it's not your website any more
    Law #5: Weak passwords trump strong security Law #5: Weak passwords trump strong security
    Law #6: A computer is only as secure as the administrator is trustworthy Law #6: A computer is only as secure as the administrator is trustworthy
    Law #7: Encrypted data is only as secure as the decryption key Law #7: Encrypted data is only as secure as the decryption key
    Law #8: An out of date virus scanner is only marginally better than no virus scanner at all Law #8: An out of date virus scanner is only marginally better than no virus scanner at all
    Law #9: Absolute anonymity isn't practical, in real life or on the Web Law #9: Absolute anonymity isn't practical, in real life or on the Web
    Law #10: Technology is not a panacea Law #10: Technology is not a panacea

    http://www.microsoft.com/technet/archive/community/columns/security/essays/10imlaws.mspx

    If you are a Trend Micro customer..... READ THIS

    http://www.trendmicro.com/en/support/npf/overview.htm

    Be sure to apply the Service Pack or upgrade to a product version using the new pattern file numbering format by September, 2004. Trend Micro currently estimates that it will be able to continue releasing the old 3-digit pattern files until September 2004, at which time support for the 3-digit numbering format will cease and new anti-virus pattern files will be released in the new multi-digit format only. This date is subject to change, however, based on the volume of new computer viruses and the resulting demand for new pattern files. Accordingly, Trend Micro customers are strongly encouraged to apply updates or service packs as soon as possible.

    In the words of Sgt. Esterhaus, "And hey, let's be careful out here...."

    News reports are saying that high traffic web sites that IIS 5.0 sites were not patched with 04-011 security hot fix [hello people let's patch!] have been infecting people browsing the infected web sites.  If you are running XP sp2, you are protected.   But what if you can't run the RC [after all it still "is" in beta], how can you protect yourself while surfing.

    1.  Alternative browser.  I'm not a fan of this one because I have no patch tool to help me patch the browser. 

    2.  Run with IE in High security and do a little tweaking.

    Download a tool:

    http://www.microsoft.com/windows/ie/previous/webaccess/pwrtwks.mspx

    I blogged about this before.  This little IE addition adds a quick shortcut under “Tools” for “add to trusted sites”.  When you get to a web site that you really “need” to have working [like a business site] you can add the site to the trusted zone and hit “refresh” and voila.

    Then, I go to tools, Internet options, Security, and I click on the "trusted sites" and I click on custom level and instead of "low" I change it to run as "medium" [prompt me for stuff like scripting and downloads... don't just "do" stuff].  Then I click on Internet and change it to "high security".  THEN, and here' s the fun part.  When I need to go to a web site that will not work in "high security" and it's a web site THAT I TRUST, I then add the web site to my "trusted sites" with the toolbar.  Yes the tool bar works with IE 6.0 and even under XP sp2.

    3.  Try to run with less privileges.  A blog recently opened up recommending ways to do this.

    I really recommend that we all try to push our vendors to support "user" and limit the privileges.  We do NOT need to be admins on our own boxes anymore.

    Notice in SBSland our threat vectors here.  Not so much our SBS boxes themselves, it's our workstations that are the big targets.  Your threats are YOU surfing the web, not THEM out there.

    [for those of you not old enough, Sgt. Esterhaus was the character on the 1981-1987 USA cop show called “Hill Street Blues”, he would end each roll call with “...and hey, let's be careful out here...”]

    One more note - keep your antivirus up to date on your workstation as well. 

    Keep an eye out guys [and gals], there's something up on the 'Net.....

    UPDATE - What You Should Know About Download.Ject:
    http://www.microsoft.com/security/incident/download_ject.mspx

    I normally have as my “home” page the Incidents.org web page.  Today they are indicating that there is a possible Spam/vulnerability attack going on. 

    SANS - Internet Storm Center - Cooperative Cyber Threat Monitor And Alert System - Current Infosec News and Analysis:
    http://www.incidents.org/

    I recommend that you check out the posting and in particular.....

     "What we DON'T know, and can use some help in figuring out, is how the malware is installed on the IIS server to begin with. Is there a zero-day floating around? Is it via a known vulnerability and the use of agent.exe as mentioned above? (Ed Skodis, one of our handlers, suggested that perhaps the IIS system admin used a local copy of IE to browse a site and pulled down hostile JavaScript. Does that jive with anybody's findings?)

    Our concern is that there might be an IIS zero-day floating around. We won't list the sites that are reported to be infected in order to prevent further abuse, but the list is long and includes businesses that we presume would normally be keeping their sites fully patched.

    [original diary entry follows]

    A reader pointed us to an IIS discussion group (microsoft.public.inetserver.iis.security) where several IIS administrators discovered some strange .dll files on their web servers in the past 24 hours. According to the discussion on that list, they are all 1kb .dll files. They were deposited in the \winnt\system32\inetsrv directory with names like iis7xy.dll where x is a random number that appears to be between 1-3 and y is a random character or number."

    Don't use your server as a workstation.  Don't introduce an unnecessary threat by surfing at your server.  Be safe.  Be paranoid. 

    More info on the popup blocker in XP sp2

    windows xp sp2 rc2:
    http://blogs.msdn.com/jeffdav/archive/2004/06/21/161789.aspx

    Some interesting regedits in there...and more tweaks than I realized....

    The various aspects of pop-up manager are controlled by values in the registry under HKCU\Software\Microsoft\Int ernet Explorer\New Windows.  The registry values are all dword values, unless noted.  Values are all either 0 or 1, unless noted.

    PopupMgr - Whether the pop-up blocker feature is enabled or not.  This is the checkbox on the privacy tab of the Internet Control Panel.
    PlaySound - Whether or not a sound should be played when a pop-up is blocked.  This sound is set in the Sound Control Panel.
    ApplyToWebOC - Applications hosting the webbrowser control only get pop-up blocking if they opt in.  This forces pop-up blocking on non-opted-in apps when true.
    UseSecBand - Whether or not pop-up blocker notifications should appear in the Information Band.
    AccUserInitOnClick - Turns off or on an app compat work-around for some Accessibility Aids.  This is on by default.
    Balloon - Set when the balloon notification has been shown.  Not a very interesting value, listed here for completeness.
    BlockHTMLDialogs - Whether or not to treat HTML dialogs as pop-ups. 
    UserInitTimeout - Number of ms in the timeout period when the UseTimerMethod value is set (see below). 

    So what's the deal about getting those hotfixes...

    Whenever you need a hotfix for an issue, just a reminder that it's a TOTALLY free call.  Now I'll admit I'm spoiled [in many ways].  I live in Calfornia where I can get a hotfix 24/7.  Call the 800 number, press option 3, rattle off the KB number and in a couple of minutes I get my link to a download along with a password.  Done.  International folks don't have it quite so nice.  For that... I feel for you guys.. it should be way easier than it is right now.

    And another thing... if you have applied a security bulletin, remember if you have any issues with that security hotfix, IT'S A FREE CALL.  So back up your system, apply those patches and if you have issues... call. 

    And if you are a SBSer make sure you ask for the SBS specific support.  We've got “Motherships” in Charlotte, Las Colinas, Shanghai and of course Redmond.  The folks in those SBS PSS departments “do“ look out for us SBSers. 

    Q: Who can I contact if I apply a patch that is recommended by HFNetChk and the patch appears to cause problems on my computer?
    A: Please contact Microsoft Product Support Services for hotfix-related issues.

    Q: How can I contact Microsoft Product Support Services?
    A: For a complete list of Microsoft Product Support Services (PSS) phone numbers and information about support costs, view the following Microsoft Web site:
    http://support.microsoft.com/default.aspx?scid=fh;EN-US;CNTACTMS

    When you contact PSS with a hotfix or patch issue, please inform them that you are having issues with a hotfix.

    Q: How much does a call to PSS cost?
    A: There is no charge for support calls that are associated with hotfixes.

    http://support.microsoft.com/default.aspx?scid=http://support.microsoft.com:80/support/kb/articles/Q305/3/85.ASP&NoWebContent=1

     

    Get ready folks... XP sp2 is comin' .....

    This spreadsheet lists the full set of Group Policy settings described in Administrative Template (.adm) files shipped with Windows XP Professional Service Pack 2 Release Candidate 2 (RC2).

    Gentlemen... start your downloads....

    http://www.microsoft.com/technet/prodtechnol/winxppro/sp2preview.mspx  Everyone did hear the news that XP sp2 RC2 is now out and ready for a test drive, right?  Everyone should take this last opportunity to test drive it and GIVE FEEDBACK.  This is a SP that I'm going to be rolling out pretty quickly in my office and I'm very much looking forward to the additional security features in it.

    In partcular, the additional protection for laptops is a “must have” if you are a road warrior.

    Threat Modeling in the SBS World

    So Michael Howard is posting about “Threat Modeling”, and while I'm not a coder or a scripter [heck I can barely run SQL queries worth a darn], I must say that I enjoyed the first part of the Howard/LeBlanc book “Writing Secure Code, Second Edition”.  The concepts threat modeling and DREAD and STRIDE and threat modeling can be applied in a weird wacko way also to “setting up a network” as well as writing code.

    I've even ordered the book “Threat Modeling” and I'm not a coder.  So why am I so into “threat modeling” from a SBS network admin standpoint?  Because I totally think we are looking in the wrong directions at our threats in SBSLand.  We spend so much time worrying about what our boxes look like from the “outside” from a Penetration Testing point of view, in the meantime our staff are downloading smily faces for their email and getting spybots and ad gunk trojans in their machines.  Right now our biggest threat of “Tampering with data” is due to “Elevation of Privilege” issues.  But here's the rub... it's not really “elevation” of privileges... we give our end users too much rights and privileges to their own machines all the time. 

    Think about our little networks shall we, in terms of “entry points“? 

    Entry points.... in my network, that's email, remote connections and the like.  I don't open up port 80 or port 443 for web site hosting, but every day I accept gladly all sorts of fun stuff via email.  I've purposely opened the port.  Time and time again we get asked in the newsgroup, I want to run a port scan on my server, and while that is a valid thing to do, I don't think “pen” testing a SBS box is a valid exercise if I can walk by the Secretary's desk and her password is on a sticky note [it's really not in my office, I'm just making a point].

    Your network security is not only your server.  Your threat model needs to encompass the workstations as well.  Your weakest link is not your Server.  Your weakest link it out there surfing the Internet looking for emoticons to download.

     

    June Security Bulletins

     Bulletin Summaries:

    Microsoft:
    http://www.microsoft.com/technet/security/Bulletin/ms04-jun.mspx

    Moderate Bulletins:

    MS04-016 - Vulnerability in DirectPlay Could Allow Denial of Service
    (839643)
    http://www.microsoft.com/technet/security/Bulletin/MS04-016.mspx 

    MS04-017 - Vulnerability in Crystal Reports Web Viewer Could Allow
    Information Disclosure and Denial of Service (842689)
    http://www.microsoft.com/technet/security/Bulletin/MS04-017.mspx

    [This one is if you have Outlook with BCM or MS CRM installed - MBSA will NOT find this]

    This represents our regularly scheduled monthly bulletin release (second
    Tuesday of each month). Please note that Microsoft may release bulletins
    out side of this schedule if we determine the need to do so.

    If you have any questions regarding the patch or its implementation
    after reading the above listed bulletin you should contact Product
    Support Services in the United States at 1-866-PCSafety
    (1-866-727-2338). International customers should contact their local
    subsidiary.

    Can I use the Microsoft Baseline Security Analyzer (MBSA) to determine if this update is required?
    No. MBSA does not support Outlook with Business Contact Manager, Visual Studio .NET 2003, or Microsoft Business Solutions CRM 1.2. Microsoft has no plans to develop a scanning tool to determine if a system is vulnerable.

    Can I use Systems Management Server (SMS) to determine if this update is required?
    Yes. SMS can help detect if there are other programs installed that may have installed a version of the vulnerable component. SMS can search for the existence of the CrystalDecisions.Web.dll file. Update all versions of the CrystalDecisions.Web.dll file that are earlier than version 9.1.9800.
    9.

    ....sorry Russ I'm not coming up with your numbers....

    I sent an email to Russ Cooper questioning his count of 60 IIS vulnerabilities as he talked about at the AU-CERT conference.  In his first email, he talked about the conference, in his second email, he detailed how he counted these 60 IIS vulnerabilities.

    However I found upon reviewing his methodology and listing of vulnerabilities that some were not needed to be applied to a server running IIS [using a server role count methodology]

    Here's my notes....see what you think....  Bernard Cheah IIS MVP counted 48 [if I remember right] using Russ's method, not 60.

    Security bulletins via RSS

    For you RSS fans [like me] hearing that I can now get the Security bulletins via RSS is HOORAY!

    http://www.microsoft.com/technet/security/bulletin/secrss.aspx

    I found that I had to manually add this into my newsgator, but I'm all set for next week and any potential security bulletins that might come out!  :-)

    Mail server attacks - ensure you have a "strong" password on your admin account

    Heads up SBSers --- from the www.incidents.org website

    Mail server dictionary attacks

    While not new, the number of reported dictionary attacks against mail servers is up. These attacks are characterized by spam being sent to random users at a particular domain. The amount of inbound mail may in itself cause some mail servers to die or slow down to a crawl. If the mail server sends bounce notices for unavailable accounts, they frequently are directed to invalid email addresses and causing another bounce in reply (which will end up in the postmaster's inbox if the mail server is configured correctly).

    This issue has been discussed over the last few days at one of our mailing lists:http://lists.sans.org/pipermail/list/2004-May/031574.php .

    There are a number of possible defenses against these attacks. Turning off "mailbox not available" notices may be one method, but it will also prevent such notices to valid e-mail senders who typed an e-mail address incorrectly.

    Rate limiting traffic to mail servers on a per-IP basis is a simple solution for most firewalls.

    If you are using software like spamassassin, you may want to consider delivering e-mail to its 'learn' feature for some of the most popular spam recipients.

    Tom Liston, one of our ISC handlers, recorded the frequency of userids used in e-mail sent to an unused domain:http://isc.sans.org/presentations/spam_scan.txt

    Remember that us SBSers have a wizard to rename our Administrator account!

    So use strong passwords and rename that account!

    After applying the "Critical Update for SQL Server 2000 Desktop" you get a funky icon in the system tray...

    829358 - Overview of the Critical Update for SQL Server 2000 Desktop
    Engine (Windows) on Windows Server 2003 (KB829358):
    http://support.microsoft.com/default.aspx?scid=kb;en-us;829358

    After applying that patch, you'll get a funky icon in the system tray.  I've included screenshots so you can see what it looks like.  Don't worry it's merely cosmetic and doesn't hurt anything.  Either live with it or delete it as shown.

    http://www.sbslinks.com/sqlpatch.htm

    ISA Server 2000 SP2

     Download details: ISA Server 2000 SP2:
    http://www.microsoft.com/downloads/details.aspx?familyid=c8d3d98b-1cd4-406a-a04a-2aa2547d09a3&displaylang=en

    Now do I install this Friday night...or wait until right before Memorial Day weekend...hmmm.... ;-)

    Patching and Passwords - stuff that even us SBSers have to worry about

    This month's Technet brings an excellent article on why we need to patch even in SBS land:

    Microsoft TechNet - Help: I Got Hacked. Now What Do I Do?:
    http://www.microsoft.com/technet/security/secnews/articles/gothacked.mspx

    Cleaning up after something happens is not fun.  Patch, Firewall and Antivirus.  Keep all three in place and you are just fine.  In the newsgroups we're seeing reports of SBSers seeing that they are getting dictionary attacks on accounts. 

    Funny thing is, the website www.incidents.org talked about these password “bot” attacks on their web site the other day.  Bottom line... think of them as passphrases not passwords and make them alphanumeric.  I ususally substitute numbers for vowels and add things from the top row of the keyboard like $ or ! or &.  Next make them longer than 7 characters to ensure they don't have low “entropy“.

    <theory> A measure of the disorder of a system. Systems tend to go from a state of order (low entropy) to a state of
    maximum disorder (high entropy).  [pssst... translation... just make them long, alphanumeric and hard to guess.  If they are less than 7 characters and in the dictionary, Lc4 or John the Ripper can crack them pretty quickly.

    “Worm Passwords List

    Passwords are in general, the weakest link in the corporate security strategy. In the 2003 edition of SANS Top 20 vulnerabilities, weak passwords are listed as one major vulnerability:
    http://www.sans.org/top20
    Item 4.1 Description:

    "Passwords, passphrases and/or security codes are used in virtually every interaction between users and information systems. Most forms of user authentication, as well as file and data protection, rely heavily on user or vendor supplied passwords. In addition, since properly authenticated access is often not logged, or if logged not likely to arouse suspicion, a compromised password is an opportunity to explore a system virtually undetected. An attacker in possession of a valid user password would have complete access to any resources available to that user, and would be significantly closer to being able to access other accounts, nearby machines, and perhaps even obtain root level access on this system. Despite this threat, user and administrator level accounts with poor or non-existent passwords are still very common. As well, organizations with a well-developed and enforced password policy are still uncommon.

    The most common password vulnerabilities are: (a) user accounts that have weak or nonexistent passwords; (b) users accounts with widely known or openly displayed passwords; (c) system or software created administrative level accounts with widely known, weak, or nonexistent passwords; and (d) weak or well known password hashing algorithms and/or user password hashes that are stored with weak security and are visible to anyone.

    The best defense against all of these vulnerabilities is a well developed password policy that includes: detailed instructions for users to create strong passwords; explicit rules for users to ensure their passwords remain secure; a process in place for IT staff to promptly replace weak/insecure/default or widely known passwords and to promptly lock down inactive or close down unused accounts; and a proactive and regular process of checking all passwords for strength and complexity. "

    In today's ISC Webcast, we talked about an example of a password list that was used by malware known as "IRCBot" to guess/brute force passwords to get access on systems.

    This list is available at:
    http://isc.sans.org/presentations/ircbot_pwlist.txt

    Did you miss our monthly ISC Webcast?
    Check out the Webcast archives: http://www.sans.org/webcasts/archive.php

    OT: [sort of] A KB on that annoying ~ on the desktop

    830921 - A file named ~ appears on the desktop or in another location on the hard disk:
     http://support.microsoft.com/default.aspx?scid=kb;en-us;830921

    If you've seen that little ~ file on your desktop... this KB will fix it....

    Note to self... don't try to use Newsgator to be a NNTP posting engine and a Blog posting tool at the same time....I got a newsgroup post stuck into the blog posting [sorry about that]

    May Security Bulletins - [note that 04-015 not needed on SBS 2000]

    May 11, 2004
    Today Microsoft released the following Security Bulletins.

    Note: www.microsoft.com/technet/security and www.microsoft.com/security are authoritative in all matters concerning Microsoft Security Bulletins! ANY e-mail, web board or newsgroup posting (including this one) should be verified by visiting these sites for official information. Microsoft never sends security or other updates as attachments. These updates must be downloaded from the microsoft.com download center or Windows Update. See the individual bulletins for details.

    Because some malicious messages attempt to masquerade as official Microsoft security notices, it is recommended that you physically type the URLs into your web browser and not click on the hyperlinks provided.

    Bulletin Summaries:

    Windows: http://www.microsoft.com/technet/security/Bulletin/winmay04.mspx

    Important Bulletins:
     
    MS04-015 - Vulnerability in Help and Support Center Could Allow Remote Code Execution (840374)
    http://www.microsoft.com/technet/security/Bulletin/MS04-015.mspx

    Re-Released Bulletins:
    The following bulletins have been re-released. Please see the bottom of each bulletin for revision information.

    MS04-014 - Vulnerability in the Microsoft Jet Database Engine Could Allow Code Execution (837001) - Important
    http://www.microsoft.com/technet/security/Bulletin/MS04-014.mspx
    Summary Bulletin:
    http://www.microsoft.com/technet/security/Bulletin/winapr04.mspx

    MS01-052 - Invalid RDP Data can Cause Terminal Service Failure - Moderate
    http://www.microsoft.com/technet/security/bulletin/MS01-052.mspx 

    This represents our regularly scheduled monthly bulletin release (second Tuesday of each month). Please note that Microsoft may release bulletins out side of this schedule if we determine the need to do so.

    If you have any questions regarding the patch or its implementation after reading the above listed bulletin you should contact Product Support Services in the United States at 1-866-PCSafety (1-866-727-2338). International customers should contact their local subsidiary.

    Security information for Small Businesses

    Security Focus - Small and Medium Business Security
    http://www.microsoft.com/smallbusiness/gtm/securityguidance/hub.mspx
    The Security Guidance Center for Small Businesses is Live
    Reduce your risk from viruses, hackers and similar threats with our 12-point, do-it-yourself security checklist at the new Security Guidance Center for Small Businesses.

    Security Guide for Small Business
    http://www.microsoft.com/smallbusiness/desktopsecurity/pdf.mspx
    Microsoft has released the 'e-Security Guide for Small Business,' explicitly written for small-business owners to help them secure their computers and networks. Download the guide now.

    Securing Your Windows Small Business Server 2003 Network
    http://www.microsoft.com/technet/security/secnews/articles/sec_sbs2003_network.mspx
    This document helps you to more securely configure your Microsoft Windows Small Business Server 2003 network. By completing the tasks in this document you can better protect the availability, integrity, and confidentiality of your network.

    Securing Your Network: Identifying SMB Network Perimeters
    http://www.microsoft.com/technet/security/secnews/articles/sec_net_smb_per_dev.mspx
    Learn how to identify the different network perimeters in your organization, and the steps you should take to help secure these perimeters and ensure your corporate network cannot be compromised.

    Software Update Services 2.0 Overview
    http://www.microsoft.com/technet/security/secnews/articles/sus20.mspx
    The upcoming Software Update Services (SUS) 2.0 is intended to help you quickly deploy the latest security updates to Microsoft Windows 2000-based servers and Windows ServerT 2003-based servers, as well as to desktop computers running Microsoft Windows 2000 Professional or Windows XP Professional.

    Securing Windows XP Professional Clients in a Windows Server Environment
    http://www.microsoft.com/technet/security/secnews/articles/sec_winxp_pro_server_env.mspx
    This document explains how to use the Active Directory® service in a small or medium business environment to implement the security measures recommended in the Microsoft Windows XP Security Guide.

    Heads up ... check out your port 443!!!

    Here I am at the AICPA Tech conf in Las Vegas at the Venetian hotel.

    News this week... I'm passing along an email from the MS listserve....

    If you have port 443 open on your SBS 2k system ... watch out as we're seeing exploits.

    How do I know if port 443 is open?

    Go to https://grc.com/x/ne.dll?bh0bkyd2 and click on proceed, then on "common ports".  If port 443 is closed or stealth, you are in good shape.  If you have open port 443, then you need  to patch NOW.
    ------------------

    Hello all~

    With Brett’s permission, I wanted to take a brief moment to reach as many IIS 5.0 administrators as possible to warn them against not having the MS04-011 fix.  Microsoft is currently seeing an increase in customers who are being hit by the exploits released within the past two weeks which creates a Denial of Service (DoS) against servers who are using SSL.  It is important to note that this exploit does not impact your servers which are ONLY using HTTP (non-secure).

    With that said, I would like to personally ask all IIS administrators to take the time to test and install MS04-011.  The critical update is located here:

    MS04-011 Information: http://www.microsoft.com/technet/security/bulletin/MS04-011.mspx

    Critical Update: http://www.microsoft.com/downloads/details.aspx?FamilyId=0692C27E-F63A-414C-B3EB-D2342FBB6C00&displaylang=en

    Considerations:

    If you are using SSL on your IIS 5.0 servers and have not patched your systems you will be vulnerable to the DoS against exploits.  The symptoms are easily recognized by the following in your System event viewer:

    Source: LsaSrv

    Event ID: 5000

    Description: The security package Microsoft Unified Security Protocol Package generated an exception. The package is now disabled. The exception information is the data.

    The method to correct this problem is the following:

       a).  Rebooting the server will recycle the SSL components and allow your site to resume service (but unpatched)

       b).  Install MS04-011 which mitigates the exploit

    Current Investigations:

    Microsoft is currently investigating problems related to installations of IIS 5.0 and SSL with Client Certificates.

    In short, IIS 5.0 installations which use large Certificate Revocation Lists (CRL) might lead to client certificates failing.  However, it is still recommended that you install the hotfix if at all possible to avoid not having important fixes above and beyond the SSL fix.

    Situations where Microsoft has seen Client Certificates fail:

       a).  Certificate Trust List’s failures – Resolve this by disabling use of CTL’s (http://support.microsoft.com/default.aspx?scid=kb;en-us;216485)

       b).  CA’s are getting restricted to no longer accept Client Certs – No Documentation, but using the Certificates Snap-In and editing the Usage can mitigate - contact me if you need more details.

       c).  CRL lookup problems:  Occurs with large CRL files.  Disable CRL Checking on your IIS 5.0 Server ((http://support.microsoft.com/default.aspx?scid=kb;en-us;295070)

    At this time, we have not currently released a update that addresses all of the issues which are listed in this mail.  There are also other random issues which we have not confirmed as being related to MS04-011 but lack confirmation.  It is suggested that you monitor the Technet security center at www.microsoft.com/technet/security to watch for updates to resolve these problems.

    In conclusion, most IIS installations will not be effected by the few considerations listed in this email.  This is the reason we are requesting that all customers test and install MS04-011 on their Windows 2000 SP 2, 3, or 4 machines.

    Thanks in advance for your time,

    ~Chris Adams

    Web Platform Supportability Lead

    IIS:  www.microsoft.com/iis

    APRIL SECURITY BULLETINS

    April 13, 2004
    Today Microsoft released the following Security Bulletins.

    Note: www.microsoft.com/technet/security and www.microsoft.com/security are authoritative in all matters concerning Microsoft Security Bulletins! ANY
    e-mail, web board or newsgroup posting (including this one) should be
    verified by visiting these sites for official information. Microsoft never
    sends security or other updates as attachments. These updates must be
    downloaded from the microsoft.com download center or Windows Update. See the individual bulletins for details.

    Because some malicious messages attempt to masquerade as official Microsoft security notices, it is recommended that you physically type the URLs into your web browser and not click on the hyperlinks provided.

    Bulletin Summaries:

    Windows: http://www.microsoft.com/technet/security/Bulletin/winapr04.mspx

    Critical Bulletins:

    MS04-011 - Security Update for Microsoft Windows (835732)
    http://www.microsoft.com/technet/security/Bulletin/MS04-011.mspx

    MS04-012 - Cumulative Update for Microsoft RPC/DCOM (828741)
    http://www.microsoft.com/technet/security/Bulletin/MS04-012.mspx

    MS04-013 - Cumulative Security Update for Outlook Express (837009)
    http://www.microsoft.com/technet/security/Bulletin/MS04-013.mspx

    Important Bulletins:

    MS04-014 - Vulnerability in the Microsoft Jet Database Engine Could Allow
    Code Execution (837001)
    http://www.microsoft.com/technet/security/Bulletin/MS04-014.mspx

    Re-Released Bulletins:
    The following bulletins have been re-released to advise of the availability
    of updates for various versions of Microsoft Exchange Server. Please see the
    bottom of each bulletin for revision information.

    MS00-082 - Patch Available for 'Malformed MIME Header' Vulnerability
    http://www.microsoft.com/technet/security/Bulletin/MS00-082.mspx

    MS01-041 - Malformed RPC Request Can Cause Service Failure
    http://www.microsoft.com/technet/security/Bulletin/MS01-041.mspx

    MS02-011 - Authentication Flaw Could Allow Unauthorized Users To
    Authenticate To SMTP Service
    http://www.microsoft.com/technet/security/Bulletin/MS02-011.mspx


    MS03-046 - Vulnerability in Exchange Server Could Allow Arbitrary Code
    Execution (829436)
    http://www.microsoft.com/technet/security/Bulletin/MS03-046.mspx

    This represents our regularly scheduled monthly bulletin release (second
    Tuesday of each month). Please note that Microsoft may release bulletins out
    side of this schedule if we determine the need to do so.

    If you have any questions regarding the patch or its implementation after
    reading the above listed bulletin you should contact Product Support
    Services in the United States at 1-866-PCSafety (1-866-727-2338).
    International customers should contact their local subsidiary.

    Just a reminder - Security bulletins day

    Today is the second Tuesday of the month and you know what that means boys and girls?  .... okay how about SBSers?  It's Patch day!  Stay tuned to this blog channel to see if there are Security patches to come out today that we will need to worry about!

    XP sp2 - download and test it out!

    To aid IT professionals in planning and testing for the deployment of Windows XP SP2, Microsoft is making available this preview, based on Release Candidate 1 (RC1) of the SP2. Additionally, we have established 11 newsgroups for sharing information.

    http://www.microsoft.com/technet/prodtechnol/winxppro/sp2preview.mspx

    A Security guide for Small Businesses

    e-Security Guide for Small Business:
    http://www.microsoft.com/smallbusiness/desktopsecurity/pdf.mspx

    One nice thing about this PDF document on Security with the small firm in mind, is that it's “Branded“ with the same “male boss, female with the messed up sweater“ that is included in the SBS marketing literature.  Therefore it's nice to “co-brand“ it with your information that you give to your clients.

     

     

    Security bulletins today - Moderate or Important [ONE critical ones today]

    MS Monthly Updates Released
    ---------------------------------------------
    Microsoft has released three updates on its regular "second Tuesday of the month" schedule:

    Microsoft Security Bulletin MS04-008 describes a possible DoS condition within Windows Media Services. The issue affects only Microsoft Windows 2000 Server Service Pack 2, Microsoft Windows 2000 Server Service Pack 3, and Microsoft Windows 2000 Server Service Pack 4. The only vulnerable version of Windows Media Services is version 4.1 for Windows Server 2000. If you are unable to patch an affected system, a possible work-around would be to block port 7007 and 7778 at the firewall. Note: Blocking port 7007 will keep multicast streams and playlists from being streamed to the Internet. Blocking port 7778 will disable remote administration of Windows Media Services. This issue is listed by Microsoft as having a severity of "Moderate."

    http://www.microsoft.com/technet/security/bulletin/MS04-008.mspx

    Microsoft Security Bulletin MS04-009 describes a vulnerability in Microsoft's HTML rendering code (on machines with Outlook 2002 installed) that could allow a malicious HTML to execute script code within the "Local Machine" zone on an unprotected system. It appears that anything that uses Microsoft's HTML rendering code on such a machine could be vulnerable. The issue is caused by the way Outlook 2002 handles certain "mailto" URLs. Microsoft has listed this issue as having a severity of "CRITICAL."  {Note - this was revised on 4/10/2004 to be critical}

    http://www.microsoft.com/technet/security/bulletin/MS04-009.mspx

    The third update, Microsoft Security Bulletin MS04-010, covers a possible information disclosure in Microsoft MSN Messenger. This issue affects Microsoft MSN Messenger versions 6.0 and 6.1, and does not affect any versions of Microsoft Messenger. Because of a flaw in the way that MSN Messenger handles file requests, a remote attacker could view the contents of files at known locations on a user's system. Microsoft has listed the severity of this issue as "Moderate."

    http://www.microsoft.com/technet/security/bulletin/MS04-010.mspx

    An Alert regarding viruses..... Exchange server best practices

    With the recent activity in mass mailer e-mail worms, we wanted to advise
    you of some Exchange security best practices that you can use to improve
    your security and availability.
    Specifically, we wanted to let you know of some best practices around:

     - Configuring attachment blocking using Microsoft Outlook
     - Excluding certain directories from file-level virus scanners
     - Preparing for an Exchange disaster recovery
     - Closing an open relay

    Configuring Attachment Blocking Using Microsoft Outlook

    An effective way that most mass mailer e-mail worms can be prevented is
    through the use of the Attachment Blocking capabilities in Microsoft
    Outlook. By default, Attachment Blocking in Microsoft Outlook blocks the
    executable attachment types that most mass mailer e-mail worms use to
    propagate. Even those mass mailer e-mail worms that use attached .zip files
    can be blocked by adding .zip files to the blocked attachment types.

    Outlook 2003, Outlook XP and Outlook 2000 SP2

    By default, Microsoft Office Outlook 2003, Outlook 2002 in Microsoft Office
    XP, and Outlook 2000 SP2 provide an attachment security feature. This
    security feature is designed to increase the security protection for
    certain types of e-mail attachments. This feature provides explicit warning
    language when attachments are opened, and you have to save the attachment
    to the file system before opening it. This can help you avoid accidentally
    releasing viruses that hide in certain file types.

    While Microsoft does not recommend reducing e-mail client security levels,
    there may be instances when an organization wants to customize or remove
    the additional protections provided by Microsoft Outlook.

    Best practice: You can modify default security settings for the Outlook
    2003 client by using the Outlook Security template, which you install as a
    form in Outlook. To install this form, read the following Knowledge Base
    article:

     - How to configure Outlook to block additional attachment file name
    extensions - http://support.microsoft.com/?id=837388
     - Administrator Information About E-Mail Security Features -
    http://support.microsoft.com/?id=290499

    For additional information, see:
     - You Cannot Open Attachments - http://support.microsoft.com/?id=290497
     - Customizing Security Settings by Using the Outlook Security Template -
    http://www.microsoft.com/office/ork/2003/three/ch12/OutG03.htm

    Outlook 2000 SP1, Outlook 2000, Outlook 98 and Outlook 97

    Microsoft Outlook® 2000 Service Pack 1 (SP1), Outlook 2000 without service
    packs, Outlook 98, and Outlook 97 do not have mechanisms to block
    attachments. If you are using one of these versions, virus and worm
    protection must be provided on the server running Exchange.
    Best practice: Upgrade to Outlook 2000 Service Pack 2 (SP2) to protect the
    client or install the appropriate e-mail security update:

     - Office 2000 Update: Service Pack 3 (SP3) (Includes Outlook 2000 SR1
    E-mail Security Update) -
    http://www.microsoft.com/downloads/details.aspx?FamilyID=5C011C70-47D0-4306-9FA4-8E92D36332FE&displaylang=EN
     - Outlook 98 E-mail Security Update -
    http://www.microsoft.com/downloads/details.aspx?FamilyID=48B0BC6A-B123-4F48-B27D-119078B4819F&displaylang=en
     - Outlook 97 Email Security Update -
    http://www.microsoft.com/downloads/details.aspx?FamilyID=8dee9e59-23dc-46fc-8fc1-7b680b7e9d13&DisplayLang=en

    Exclude Certain Directories from File-level Virus Scanners

    File-level scanners scan a file when it is used or at a scheduled interval
    and can lock or quarantine an Exchange log or database file while Exchange
    tries to use the file. This can cause a sever failure in Exchange Server
    2003 and earlier versions and can also generate -1018 errors.
    Best practice: Make sure that you exclude the following directories on all
    the drives.

    In Exchange 2003, exclude:
     - Exchsrvr\MDBData
     - SRS

    In Exchange 2000 Server, exclude:
     - Exchsrvr\MDBData
     - SRS

    Important: Do not scan the M: drive. File-level scanning of your M: drive
    can cause calendar items to disappear from users' folders.

    In Exchange Server 5.5, exclude:
     - Exchsrvr\MDBData
     - DSAData

    For more information, see the following articles in the Microsoft Knowledge
    Base:
     - XADM: Exchange and Antivirus Software -
    http://support.microsoft.com/?id=328841
     - XADM: Large Number of Transaction Logs Created -
    http://support.microsoft.com/?id=298551
     - XADM: A "C1041737" Error and an Event ID 470 Message May Be Displayed -
    http://support.microsoft.com/?id=300608
     - XADM: Do Not Back Up or Scan Exchange 2000 Drive M -
    http://support.microsoft.com/?id=298924

    Preparing for an Exchange Disaster Recovery

    When preparing for a Disaster Recovery situation, thinking through a few
    key questions will help guide you to the necessary steps. Do you need to
    recover data from a backup (private or public store) and have questions
    about how to setup the recovery environment or the restore itself? What do
    you need to setup for Active Directory® directory service and DNS? Do you
    need to have the same organization, administrator group, server, and store
    names as the production environment?

    Best practice: Test your backup files monthly and become familiar with the
    processes themselves. Should it ever become necessary to restore data to
    your production environment, your familiarity with the procedure will
    lessen the downtime of your servers.

    For answers to your questions, see the following articles in the Knowledge
    Base:
     - How to Back Up and Restore an Exchange 2000 Computer -
    http://support.microsoft.com/?id=258243
     - Running a Disaster Recovery Setup -
    http://support.microsoft.com/?id=257415
     - Disaster Recovery Includes Metabase Backup and Restore -
    http://support.microsoft.com/?id=241635
     - Disaster Recovery of Information Store on Exchange Server -
    http://support.microsoft.com/?id=313184

    Also, download the following white papers from the Microsoft Download
    Center:
     - White Paper for Exchange 2003 Disaster Recovery -
    http://www.microsoft.com/downloads/details.aspx?FamilyID=df144af6-bee5-4b35-866a-557e25fe2ba1&displaylang=en
     - White Paper for Exchange 2000 Disaster Recovery -
    http://www.microsoft.com/downloads/details.aspx?displaylang=en&FamilyID=6E55DD49-8A6C-4F30-947E-BDE95917F585
     - White Paper for Exchange 5.5 Disaster Recovery -
    http://www.microsoft.com/downloads/details.aspx?FamilyID=df586628-3abe-40c3-8e8f-beb4122de3d7&displaylang=en

    Closing an Open Relay

    The top causes for open relays with Exchange include:
     - The SMTP service is live on the Internet and not enforcing
    authentication to relay.
     - The SMTP server has accounts locally or is part of a domain that has
    poor passwords or no password at all.

    Best practice: The following list of known accounts have the potential of
    being compromised and should either be disabled or should have a strong
    password.
    These accounts have been logged in past cases through the event viewer
    after turning up diagnostic logging. Remember, the passwords should never
    match the logon name.
     - Webmaster
     - Admin
     - Root
     - Test
     - Master
     - Web
     - www
     - administrator
     - backup
     - server
     - data
     - abc
     - guest

    These articles should help guide you to configuring and preventing your
    Microsoft Exchange Server from becoming an open relay and how to look for
    key clues in the future to ensure it doesn't relay.
     - HOW TO: Prevent Exchange 2000 from Being Used as a Mail Relay in Windows
    2000 - http://support.microsoft.com/?id=310380
     - HOW TO: Block open SMTP Relaying and clean up Exchange Server (article
    can be used with Exchange 2000 and Small Business Server) -
    http://support.microsoft.com/?id=324958
     - Cannot send E-Mail Messages to a growing list of domains -
    http://support.microsoft.com/?id=300580
     - HOW TO: Examine relay restrictions for anonymous SMTP connections and
    filter unsolicited E-mail messages in Exchange 2000 Server -
    http://support.microsoft.com/?id=313395
    If you have any questions regarding this alert, you should contact Product
    Support Services in the United States at 1-866-PCSafety (1-866-727-2338). 
    International customers should contact their local subsidiary.

    Now how do we keep our SBS boxes secure?

    Web Seminar: Monitoring and Maintaining a Secure SBS Solution

    Okay so you've locked down your customers Small Business Server.
    Now, how do you keep it secure? We'll spend an hour with one of the SBS
    Product Managers discussing how to keep an SBS network secure.

    We will discuss and demonstrate the Software Update Service,
    Microsoft's Baseline Security Analyzer as well as the Monitoring
    Tools built into SBS 2003. We will conclude with a conversation about
    how to keep abreast of the ever evolving world of security.


    To Register

    http://www.msusapartnerreadiness.com/eventregister.asp?eid=173

    [But I'll be honest, I still like my www.shavlik.com hfnetchkpro software to patch all of my machines.  Until SUS 2.0 comes out the current SUS 1.0 doesn't cover everything that us SBSers need to patch our systems

    Can SBS be a Security solution?

    WEB SEMINAR Configuring SBS 2003 as a Security Solution

    Date and Time:
    3/24/2004
    10:00AM Pacific Time (US & Canada)


    Description:

    We will spend one hour demonstrating and talking about SBS's
    security configurations with one of the team's Product Managers.

    Our primary objective in the session will be to demonstrate how to
    take a plain vanilla installation and lock down all of the core
    components.

    We will discuss the technical specs as well as the specific value
    that each of the core security components provide your customers.


    To Register:
    http://msusapartnerreadiness.com/eventregister.asp?eid=172

    Can a system that is “all on one box“ be a security solution?  Heck yes.  In a typical SBS enviornment we have more security issued on our desktops than we do on the server itselfHere's a rant I posted in the newsgroups on this topicYour security issues are not your server.  Don't look there.  It's your desktops.  it's your employees.  It's not "out there", it's "in here".

    In SBS land that $8,000 would be a waste of time because Foundstone would look at you from a corporate network "attitude".

    In big server land, you assume people are sniffing your traffic, examining what information is bleeding off your connections seeing what patch level you are at.  If you had posted in via a newsgroup versus the web interface I could have told you your external IP address that you posted from what version of newsreader you used.  I could [with permission] fire packets at you using Foundstone's Superscan tool and told you what ports you had open.  I could use nmap or any number of freely available tools what operating system you were running and through what hotfix you had installed.  If you were not up to date on patches, I'd go to FullDisclosure or K-0tiks.com [or whatever that disreputable site in French is] and I'd download exploit code and fire it off at your unpatched system and nail you if the proper port was open in your firewall.

    The reality is that none of this occurs in SBSland.

    We get nailed from OUR stupidity because we don't patch and don't maintain.

    You don't need to spend your security dollars on a security audit in SBS land.  That's not where are risks lie out there.

    1.  What do "bots" see as your open ports?  In SBS land we don't get hacked, we get stupid.  Defcon hackers do not boast about taking down a SBS box.  Go to grc.com click on shields up/ports up.. what ports are open.  The fewer the ports, the less attack surface.  Only open what you need, close what you don't.

    2.  What user rights are running on those workstations?  I have to have a pretty loosey gooesy internal network to be "businessy" in my firm. I'm the only person running in "user" mode in my LAN, the rest are power users or local admin.  Local admin means they can accidentally install ANYTHING... so to counter that with .....

    3.  Trend SMB ... EVERY email that comes in the door is scanned and checked, I also quarantine zip files and what not.  A/v on the server and the desktop and it checks for updates every hour on the hour.

    4.  Pop up blockers on Windows machines in the form of the Google tool bar

    5.  Plans to roll out XP sp2 as soon as it hits the streets [lots of security features].

    6.  Get 100% Windows XP office so that at a moments notice I can patch ALL workstations - if you have one Windows 98 in the LAN you have no security.

    7.  Save your money on that audit and buy
    www.shavlik.com HfnetchkPro and be able to remotely from your desktop [or the server] patch the server and all XP workstations with one button.

    8.  Ensure that all laptops have antivirus/patching/firewall as well. Set up a procedure where standalone laptops are "checked in and checked out"

    9.  Do you have employee manuals that cover authorized and unauthorized internet and email use?  {Policy first and foremost}

    10.  Buy employees a copy of Trend Micro's pccillian for home use, require that they load it up.

    11.  Sign up for Microsoft security bulletins and ensure you get notified.  Patch in a timely manner.

    12.  Have monthly employee awareness meetings training people to "not just click"

    13.  Alarm on the building.

    14.  Good tape backup with rotation off site.

    15.  Kensington phyiscal cable locks on computers in the office to slow burglars down.

    16.  Think passphrases and not passwords

    There... I'll bet you those steps don't cost $8,000 and I just gave you action items rather than giving you a security audit that would tell you that you have weaknesses and then you'd have no budget to do anything about them.

    Securing your SBS2k3

    This document helps you to more securely configure your Microsoft® Windows® Small Business Server 2003 network. Completing the tasks in this document helps you protect the availability, integrity, and confidentiality of your network.

    SUS on SBS2k3

    This document helps you plan, install, deploy, and test Software Update Services (SUS) Server 1.0 in order to update your Windows® Small Business Server 2003 network.

    Will RMS run on SBS2k3?

    From a posting in the newsgroups ... RMS can run properly on any Windows 2003 AD server which includes SBS 2K3.

    The problem that the external clients cannot reach your RMS server is probably because that the Internet clients cannot find the RMS Services. Since the client machine is not in the domain, it will not automatically query the AD to find the location of the RMS services. I've discussed with our RMS support and they suggested that you add two registry values in the client machine to point to the RMS services directly:

    " HKLM\Software\Microsoft\Office\11.0\Common\DRM\Corplicenseserver to point to the licensing service like: http: [wack wack] >_wmcs/licensing“

    " HKLM\Software\Microsoft\Office\11.0\Common\DRM\CorpCertificationserver to point to the certification service like: http: [wack wack] wmcs/certification“

    However, if the problem still occurs, can I suggest that you also post out this issue on the public newsgroup: microsoft.public.rights_mgmt_svcs? In that newsgroup, you will get the most qualified pool of respondents, and so other customers and partners who regularly read the newsgroups can either share their knowledge or learn from your interaction with us.

    
                    

    Get the fix for the IE Search error [it's a free call for the hotfix]

     832870 - "Cannot find '::{e17d4fc0-5564-11d1-83f2-00a0c90dc849}'" error message when you click Search in Windows Small Business Server 2003:
    http://support.microsoft.com/?id=832870

    [Update - now included in a more recent IE patch {I forget which one}]

    Tip for excluding your box from Google Searches

    Some customers may wish to exclude their SBS 2003 installation from the
    scope of Web search sites such as Google.com.  This may be because you would
    prefer to restrict knowledge of your installation only to those who can use
    it, or, you may want to keep some portions of your site (e.g. Business Web
    site) searchable while keeping other portions under the radar of Web search
    sites.

    There is a way to do this using the Robots Exclusion Protocol.  By placing a
    simple text file at the root of your Web site, you can tell Web search
    robots which parts of the Web site are open for search.

    I've attached two versions of robots.txt that I've whipped up for my SBS
    2003 server:

      1.. robots.txt - Allows search of your business Web site but hides
    SBS-specific sites from search robots.
      2.. robots2.txt - (Must be renamed to robots.txt) Denies search of your
    entire Web site.
    For more information, check out these sources:

    http://www.robotstxt.org/wc/robots.html

    http://www.searchtools.com/robots/robots-txt.html

    http://www.searchengineworld.com/robots/robots_tutorial.htm

    Many Web sites implement this functionality.  For example, you can check out
    http://www.cnn.com/robots.txt.

    Please respond to this post if you have any questions or comments - let us
    know how this works out for you!

    Thanks,
    Alan Billharz

    Program Manager, SBS 2003

    # Place this file at the root of the Default Web Site (%system drive%\inetpub\wwwroot) 
    # to allow search engines to catalog your Business Web site, but not catalog the other 
    # SBS-specific Web sites. 
    # 
    # Note that you must choose to publish the root of your Web site to allow the search 
    # engine robot to read this file.  In the Configure E-mail and Internet Connection Wizard, 
    # choose to publish Business Web site (wwwroot). 
    
    
    User-agent: *
    Disallow:   /_vti_bin/
    Disallow:   /clienthelp/
    Disallow:   /exchweb/
    Disallow:   /remote/
    Disallow:   /tsweb/
    Disallow:   /aspnet_client/
    Disallow:   /images/
    Disallow:   /_private/
    Disallow:   /_vti_cnf/
    Disallow:   /_vti_log/
    Disallow:   /_vti_pvt/
    Disallow:   /_vti_script/
    Disallow:   /_vti_txt/
    
    
    
    # Place this file at the root of the Default Web Site (%system drive%\inetpub\wwwroot) 
    # to prevent all search engines from cataloging your Web site. 
    # 
    # Note that you must choose to publish the root of your Web site to allow the search 
    # engine robot to read this file.  In the Configure E-mail and Internet Connection Wizard, 
    # choose to publish Business Web site (wwwroot). 
    
    User-agent: *
    Disallow: /