Mastering Microsoft Exchange Server 2007 SP1

We talked about network security monitors and scanners in Chapter 20, "Securing Exchange Server." Scanner products plow through network nodes on an IP-by-IP basis looking for such things as missing service packs and hotfixes, open ports, weak passwords, and potentially dangerous assignments of security privileges as well as services, applications, and Registry key entries that might threaten security. Security monitors examine system logs for potential security holes and breaches.

Intrusion detectors are sort of intelligent firewalls for networks, servers, and workstations. They can find and thwart internal and external attempts to access resources far beyond the port and protocol level.

Категории