22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Next, if MS SQL server is needed, it’s better to use an installed<br />

implementation of the MS SQL server on some other machine. Database<br />

applications need not be running on the same machine as the database<br />

server.<br />

Although it is possible to remove the MS SQL server subsystem from the<br />

workstation or server, it’s probably best to just shut it down since there are too<br />

many interdependencies among the components of the Windows operating<br />

system versions to be 100% sure that deleting the subsystem components<br />

won’t affect something else that depends on it later on.<br />

Finally, if the MS SQL server is purposefully installed it should be immediately<br />

disabled until such time as all patches and hot fixes have been applied and<br />

hardening has been completed.<br />

2. Patching the MS SQL server<br />

Patches (service packs and hot fixes) for MS SQL server can be found using<br />

the MBSA tool discussed earlier. All outstanding patches must be applied as<br />

soon as possible and no MS SQL server should be made available until all<br />

patches have been applied. The MBSA tool will detect several security<br />

problems that might otherwise be overlooked and should be immediately<br />

investigated.<br />

– See the Microsoft Network Security Hot Fix Checker (Hfnetchk.exe) Tool<br />

(Q303215) mentioned previously.<br />

– See also the Frequently Asked Questions about the Microsoft Network<br />

Security Hot Fix Checker (Hfnetchk.exe) Tool (Q305385)<br />

The referenced patches are all available from Microsoft Security Bulletins<br />

available on the Microsoft Technet Web site.<br />

Penetration tests<br />

Many security vendors provide free tools to evaluate IT systems (and they do, at<br />

the same time, encourage you to buy their product). These vendors check how<br />

well the IT system being tested has been hardened with the help of a<br />

“penetration test.”<br />

For example, Symantec, makers of Norton Anti-Virus, offers “Symantec Security<br />

Check,” where it’s possible to find some very good free services. These can be<br />

found at the following URL:<br />

http://security.symantec.com/ssc/home.asp<br />

The free services provided include a “Scan for Security Risks” (that is, a<br />

penetration test), a “Scan for Viruses” (very much like the Norton Anti-Virus tool)<br />

and a tool to “Trace a Potential Attacker” (given an IP number). These tools are<br />

all very competent at what they do.<br />

Chapter 9. Server hardening 385

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!