Error opening template: advertisement/zones/468x60_generic.tplError opening template: advertisement/zones/728x90_leaderboard.tplError opening template: advertisement/zones/728x90_bottom_ad.tplError opening template: advertisement/zones/300x250_right_ros_up.tplError opening template: advertisement/zones/300x250_right_ros_down.tplError opening template: advertisement/zones/160x600_left_nav.tplError opening template: advertisement/zones/160x600_right_nav.tpl Management Server Security Risks

Management Server Security Risks

A management server is a platform used within organizations to deliver centralized management services that include the employment of a comprehensive security policy, chain of command security management, monitoring of real-time applications, logging activity, auditing of programs, and compliance reporting. The management server also monitors all of the firewalls, database applications, and security applications.

Management servers contain many monitoring and reporting systems, filters and directory servers. This is the primary reason they present multiple opportunities for hackers to exploit existing vulnerabilities in the software that is deployed on the server as well as compromise the server that hosts the software.

Affected Components of Management Servers

  • Client Configurations and Patches: These are configurations that are hosted on the server for the purpose of patching vulnerabilities and monitoring client configurations for programs that are used on a regular basis. If a hacker is successful in penetrating these configurations, it opens up the network to the installation of malicious software.
  • Scanners: Management servers deploy scanners for viruses, spam, phishing, and other malicious attacks. Although the scanners scan for unauthorized access, the software can contain its own vulnerabilities. Hackers can exploit the vulnerabilities by simply sending an email message with virtually no user interaction. Once the message reaches the email client, it can send spam containing malicious files.
  • Directory Servers: These are servers that store directories of user and system information. They are used to make necessary changes to usernames and passwords as well as system configurations. If a directory server is exploited the hacker can gain access to large amounts of crucial and sensitive information.
  • System Monitors: Management servers usually have multiple system monitors that perform various different functions for monitoring a server and the software that is hosted on the server. Some of the system monitors track client usage and if they are exploited, the hacker gains access to the systems that the client uses.

How to Protect Against Management Server Vulnerabilities

In addition to using a vulnerability scanner and keeping track of security announcements that are provided by software vendors, you can take the following precautions:

  • Use an Automatic Update System: Make sure that the latest service packs contain a method for updating the system automatically otherwise, vulnerabilities could occur due to oversight.
  • Use Operating System Security Settings: The management server programs are run on a variety of different systems that include Microsoft Windows, Solaris, Novell, and others. These systems each contain their own security settings in which the default settings are not set at the highest security level. Make sure you configure the settings to provide the highest security protection.
  • Use Intrusion Detection: In addition to a firewall, use an Intrusion Detection System that detects unauthorized access to software and the host server. This should include limiting who has authorized access to the systems and the software.
(0 Comments)
Log in or sign up to comment.

Post a comment

Log in or sign up to comment.

With the advent of wireless Internet, more and more computer users are entering the world of cyber space.

Yet, while these users are well aware of the importance of the protection of their computer when hooked up to regular internet providers, they are often oblivious to the fact that the same cyber dangers, and in fact even more, exist in the world of WiFi.

What you may not know is that same Internet connection that makes it possible to check your email from the comfort of your bed also makes it easier for hackers to access your personal information.

It is for this reason, the sharing of the wireless Internet connection, that protecting your computer when wireless is even more important than ever before.