Post reply

Name:
Email:
Subject:
Message icon:

Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.scforum.info:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: devnullius
« on: 20. January 2013., 00:23:39 »

<IN EDIT>

Download White Paper & Configuration Tool here: http://go.eeye.com/icwt-thankyou





(and if I find some time, I'll test too ;))
Posted by: Samker
« on: 22. March 2012., 07:17:25 »

I came across this article today on Dark Reading. Anybody else read this? I'm thinking of downloading the free configuration tool mentioned but wanted to see if anybody else has tried it.

http://www.darkreading.com/vulnerability-management/167901026/security/vulnerabilities/232602900/simple-settings-that-could-curtail-some-attacks.html


Hi Mateo and Welcome to SCF Community.


It's very interesting article :thumbsup: :


Quote

"Organizations, especially those without the security resources to keep on top of these basic hygiene configurations, often leave themselves exposed as they struggle to keep track of the configurations. Even some large companies forget the little things or are so overwhelmed with volume that they miss them. "These little things -- not letting users download .exe files, or [not] using proxies for filtering, that don't impact the business in any way" basically raise the bar for the attacker, says Marc Maiffret, CTO and co-founder of eEye Digital Security.

So Maiffret says eEye later this week will roll out a free tool that runs a quick "health-check" on some key and simple-to-fix configuration best practices that can help shrink the attack surface. The so-called In Configuration We Trust Tool isn't meant to replace a vulnerability assessment, penetration test, or proper patch management programs, but instead to take the pulse of some of the basic protective steps in configuring a safer environment, Maiffret says.

The tool checks for 10 basic things you can do to properly configure your environment: use digitally signed running processes; use digitally signed DLLHost Services and egress port filtering; disable Microsoft Office converters; update Windows operating system with the latest releases; update Microsoft Office with the latest releases; remove administrative privileges from end user accounts; disable WebDAV; block direct downloads of executable files; and push egress traffic through a Web proxy. "



If I "find" some Free time, I'll test them during next Week. ;)


Please, provide us feedback if you decide to test them...



Regards,

Samker
Posted by: MateoFerreira
« on: 21. March 2012., 23:35:58 »

I came across this article today on Dark Reading. Anybody else read this? I'm thinking of downloading the free configuration tool mentioned but wanted to see if anybody else has tried it.

http://www.darkreading.com/vulnerability-management/167901026/security/vulnerabilities/232602900/simple-settings-that-could-curtail-some-attacks.html

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Terms of Use | Privacy Policy | Advertising