Vulnerability scan on 2008 R2 Domain Controller
we use qualys scan our servers , our new 2008 r2 domain controllers came 2 vulnerabilities:
- null session / password netbios access
- netbios remote user list disclosure
a posted in thread found (http://social.technet.microsoft.com/forums/en-us/winservergen/thread/4f2da8e0-0b56-40c1-a821-bf3b9294fa2c) had suggested fixes, unsure of consequences. i figured cross-post in subforum in hopes of more response. does have suggestions or comments on fixes this? unfortunately scan points documentation server 2003 , wasn't sure if applicable , wasn't able find other info.
any appreciated.
since microsoft tools , third party tools use different mechanism, result may different.
based on current situation, microsoft tools scan system , results good. suggest contact qualys support following link further assistance.
http://www.qualys.com/support/
please note: microsoft provides third-party contact information find technical support. contact information may change without notice. microsoft not guarantee accuracy of third-party contact information.
regards,
please remember click “mark answer” on post helps you, , click “unmark answer” if marked post not answer question. can beneficial other community members reading thread.
Windows Server > Directory Services
Comments
Post a Comment