Forum Moderators: open
I have three dedicated servers and a part-time system administrator to help me manage everything.
My sysadmin insists on giving NETWORK SERVICE: Read & Execute, List Folder Contents and Read permissions for the root websites folder and all sub-folders that hold my websites.
There are only a few files amongst hundreds of thousands of files that really need those permissions.
What's everyone's take on how to handle NETWORK SERVICE permissions? Apply it to everything or only apply it to the files/folders that really need it? I know a blanket application is easier but is it inherently more risky? It's the Read & Execute permission that has me most concerned.
Thanks in advance for any advice.
The one that I would not want to give is "List Folder Contents", which basically lets anyone see what is in your directories.
Network Service will need access to these folders because that is the account that the web server IIS runs under in Windows 2003.
Then when the backup and UPS stop working I enable some again!
Best bet is follow a hardening guide & run baseline security analyser
Thanks for your advice aspdaddy. My sysadmin and I need to have a chat about who asks, how high, when I say, jump! ;)
Now the sys admins have a laugh and call the servers fort knox, and from time to time things dont work because they atre so locked down.
The problem with most sysadmins is they are so used to deploying file and internet gateways, rather than web application servers. And so used to making things connect and work like remote access rather than first securing the services.
Things like allowing outbound web access, enablinmg dhcp and RDP ports are perfectly normal for them, they think its strange to disable them.
Im yet to find a good sys admin when it comes to hardening and deploying windows database & web servers. You would think M$ would develop a template.