Preventing two vulnearbilities

Discussion in 'Server Security' started by zeb2100, May 28, 2009.

  1. zeb2100

    zeb2100 Guest

    I have a Server 2003 domain controller that I am able to access from home
    through our border firewall. I have run a scan using a product from McAfee
    called Foundstone. The Foundstone reports two issues:

    1. possible DNS cache snooping

    2. NetBIOS Null Session Enabled

    If anybody knows how to fix these two problems I would appreciate the help.
    zeb2100, May 28, 2009
    1. Advertisements

  2. zeb2100

    zeb2100 Guest

    zeb2100, May 29, 2009
    1. Advertisements

  3. zeb2100

    zeb2100 Guest

    I had another question concerning netbios null sessions. I noticed that
    under non plug and play devices, that netbios over tcp/ip is enabled. Just
    as a test, I disabled it, and restarted the server. Upon reboot, computers
    were able to log in, but access to mapped drives was denied. It looks like
    port 445 is used to map network drives. Unfortunatlely the Domain Controller
    also servers as a file I turned on the netbios over tcp/ip back on and was
    able to accessed mapped drives again.

    In a worst case scenario, If I had to disable netbios over tcp/ip in the non
    plug and play devices, is there a way to specify which port mapped drives
    should be using?

    Also what effects would this have on Active Directory?

    What effect will it have on WSUS 2.0?

    Thanks for any help.

    zeb2100, Jun 3, 2009
    1. Advertisements

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments (here). After that, you can post your question and our members will help you out.