Home » » Configuration Check Tool

Configuration Check Tool

Written By Unknown on Tuesday, 10 July 2012 | 07:10

A Configuration Check Tool by eEye Digital Security. Effective Security Starts with Strong Configuration Best Practices. CAn be used for scoring your servers and applications. Find more about the system vulnerability and act on it.

Effective security starts with strong configuration best practices. In fact, a healthy percentage of each year’s Microsoft Security Bulletins could be rendered moot if some basic configuration changes were made to systems.
Features of Configuration Check Tool
Straightforward but impactful configuration changes related to VLANs and IPSec, proxies, disabling WebDAV, and more
How hackers view outdated and unused features as their attack surface
Upgrading your Microsoft software as a security practice
Practical ways to protect against high-profile threats
The research also shows that in addition to upgrading and disabling WebDAV and Office converters, users should limit administrative privileges, put proxy servers to work, encrypt traffic on VLANs and IPsec, and deny access to Windows subsystems. Additional recommendations, most of which are easy fixes, are noted in the research, including how to protect against threats such as Stuxnet, Night Dragon and Aurora.


Download Configuration Check Tool -
Configuration Check Tool – 
http://go.eeye.com/icwt
For More Information -
http://www.pentestit.com/configuration-check-tool/
http://www.eeye.com/eEyeDigitalSecurity/media/ResearchPapers/eEye_ICWST_WP.pdf

Share this article :

Post a Comment

 
Support : Creating Website | Johny Template | Mas Template
Copyright © 2011. Turorial Grapich Design and Blog Design - All Rights Reserved
Template Created by Creating Website Published by Mas Template
Proudly powered by Blogger