Vulnerability scan on 2008 R2 Domain Controller


we use qualys scan our servers , our new 2008 r2 domain controllers came 2 vulnerabilities:

  • null session / password netbios access
  • netbios remote user list disclosure

a posted in thread found (http://social.technet.microsoft.com/forums/en-us/winservergen/thread/4f2da8e0-0b56-40c1-a821-bf3b9294fa2c) had suggested fixes, unsure of consequences.  i figured cross-post in subforum in hopes of more response.  does have suggestions or comments on fixes this?  unfortunately scan points documentation server 2003 , wasn't sure if applicable , wasn't able find other info.

any appreciated.

hi,

 

since microsoft tools , third party tools use different mechanism, result may different.

 

based on current situation, microsoft tools scan system , results good. suggest contact qualys support following link further assistance.

 

 http://www.qualys.com/support/ 

 

please note: microsoft provides third-party contact information find technical support. contact information may change without notice. microsoft not guarantee accuracy of third-party contact information.

 

 

regards,


please remember click “mark answer” on post helps you, , click “unmark answer” if marked post not answer question. can beneficial other community members reading thread.


Windows Server  >  Directory Services



Comments

Popular posts from this blog

some help on Event 540

WMI Repository 4GB limit - Win 2003 Ent Question

Event ID 1302 (error 1307) DFS replication service encountered an error while writing to the debug log file