From: Cliff Galiher - MVP on
In short, yes I have seen the Windows Firewall stop a threat. I wrote up an
entire post on it some time back, I'm sure it is archived via google groups
or something similar.

But I also find it interesting, just on an academic level, that your reply
to Susan about not running AV on the server was:

> Things get in, it happens, and sometimes they are not caught by the
>workstation AV product - the server AV product scans everything,
> profiles, my-documents, etc...

The exact same logic could be applied to a firewall. You can scan for
viruses at the edge, but sometimes things just get by. Why is a network
exploit any different? Sometimes things don't get caught at the edge.
Rogue laptop, or legitimate PC that got infected by something the AV didn't
catch (which we just established *CAN* happen...)

A firewall is just that added minor protection. Is it the end-all-be-all?
No. But the cost-to-benefit ratio certainly makes it a worthwhile tool.
:)

-Cliff



"Leythos" <spam999free(a)rrohio.com> wrote in message
news:MPG.25d1de53a58f3bd098a0f3(a)us.news.astraweb.com...
> In article <9634EE67-6E05-4A12-B6B7-6303366C4271(a)microsoft.com>,
> russ(a)REMOVETHIS.sbits.biz says...
>>
>> hmmm..
>> Ok, I leave it on, I'd rather than disable security.
>> Some "visitor" Plugs in a Laptop on the LAN
>> and starts port sniffing, it's all over. (or has a worm that does it.)
>> One less thing to worry about IMO.
>> I just thought it was causing a problem
>> Russ
>
> In the past, and with 2008, I've had issues with applications as well as
> workstations, having problems with the win firewall on the server.
> Mostly with third party apps that don't auto-configure the firewall as
> needed.
>
> During all the years, since well before NT4, I've not seen any firewall
> installed on a server that actually protected it from something
> malicious on the LAN, have you specifically, yourself, seen the Win
> firewall protect the SBS server 2003/2008, on a LAN?
>
> --
> You can't trust your best friends, your five senses, only the little
> voice inside you that most civilians don't even hear -- Listen to that.
> Trust yourself.
> spam999free(a)rrohio.com (remove 999 for proper email address)

From: Leythos on
In article <518B86D9-BCBF-4994-BF5C-B327F60108F1(a)microsoft.com>,
russ(a)REMOVETHIS.sbits.biz says...
>
> You don't remember the SQL Worm Do you?
> or Melissa? (I think it was called)
> That a basic Firewall Protected
>
> And No I don't see any issue because I always had one
> Which is maybe why I don't see any issues on my servers?
>
> Oh well Your Mileage may differ :)
> That's why we are consultants, we have a difference of opinions
> Later :)
> Russ

Yes, I was online watching it spread around the country while it was
happening, and it didn't impact SQL servers that were properly secured,
even without a firewall. The only people that were hit by SQL Slammer
were idiots that didn't have patched SQL installations - as I recall,
the patch had been released at least half a year before it was
exploited.

Melissa was a email worm that would not have been prevented by the
Servers Firewall - it worked by using the users credentials in Outlook
to email itself to people, so the firewall on SBS would not have
prevented it from reaching the SBS SMTP service and getting out.

I've never seen a malware that would have been stopped by the Servers
standard windows firewall, not in all my years.

--
You can't trust your best friends, your five senses, only the little
voice inside you that most civilians don't even hear -- Listen to that.
Trust yourself.
spam999free(a)rrohio.com (remove 999 for proper email address)
From: Russ SBITS.Biz [SBS-MVP] on
Cliff,
That's why I was confused also
Leythos is Pro AV an the Server
Anti Firewall?

Seems like a Flip?
However he has his own ideas as we all do! :)

I'm Pro on both especially since the cost is minimal vs the result of not
doing it...
I do not want to explain to a client why I didn't implement something cheap
and easy to save them from an issue that I have to BILL for :)

But Then like I've said, we are all consultants and of course that means
Different Opinions :)

:)
Later
Russ

--
Russell Grover - SBITS.Biz [SBS-MVP]
Microsoft Gold Certified Partner
Microsoft Certified Small Business Specialist
24hr SBS Remote Support - http://www.SBITS.Biz
Second IT Opinion http://www.personalitconsultant.com
Free Trial Microsoft Online Services (BPOS) -
http://www.microsoft-online-services.com


"Cliff Galiher - MVP" <cgaliher(a)gmail.com> wrote in message
news:BAB2C001-6BFD-438E-A2FA-D24629F2B0FC(a)microsoft.com...
> In short, yes I have seen the Windows Firewall stop a threat. I wrote up
> an entire post on it some time back, I'm sure it is archived via google
> groups or something similar.
>
> But I also find it interesting, just on an academic level, that your reply
> to Susan about not running AV on the server was:
>
>> Things get in, it happens, and sometimes they are not caught by the
>>workstation AV product - the server AV product scans everything,
>> profiles, my-documents, etc...
>
> The exact same logic could be applied to a firewall. You can scan for
> viruses at the edge, but sometimes things just get by. Why is a network
> exploit any different? Sometimes things don't get caught at the edge.
> Rogue laptop, or legitimate PC that got infected by something the AV
> didn't catch (which we just established *CAN* happen...)
>
> A firewall is just that added minor protection. Is it the end-all-be-all?
> No. But the cost-to-benefit ratio certainly makes it a worthwhile tool.
> :)
>
> -Cliff
>
>
>
> "Leythos" <spam999free(a)rrohio.com> wrote in message
> news:MPG.25d1de53a58f3bd098a0f3(a)us.news.astraweb.com...
>> In article <9634EE67-6E05-4A12-B6B7-6303366C4271(a)microsoft.com>,
>> russ(a)REMOVETHIS.sbits.biz says...
>>>
>>> hmmm..
>>> Ok, I leave it on, I'd rather than disable security.
>>> Some "visitor" Plugs in a Laptop on the LAN
>>> and starts port sniffing, it's all over. (or has a worm that does it.)
>>> One less thing to worry about IMO.
>>> I just thought it was causing a problem
>>> Russ
>>
>> In the past, and with 2008, I've had issues with applications as well as
>> workstations, having problems with the win firewall on the server.
>> Mostly with third party apps that don't auto-configure the firewall as
>> needed.
>>
>> During all the years, since well before NT4, I've not seen any firewall
>> installed on a server that actually protected it from something
>> malicious on the LAN, have you specifically, yourself, seen the Win
>> firewall protect the SBS server 2003/2008, on a LAN?
>>
>> --
>> You can't trust your best friends, your five senses, only the little
>> voice inside you that most civilians don't even hear -- Listen to that.
>> Trust yourself.
>> spam999free(a)rrohio.com (remove 999 for proper email address)
>
From: Leythos on
In article <BAB2C001-6BFD-438E-A2FA-D24629F2B0FC(a)microsoft.com>,
cgaliher(a)gmail.com says...
>
> In short, yes I have seen the Windows Firewall stop a threat. I wrote up an
> entire post on it some time back, I'm sure it is archived via google groups
> or something similar.
>
> But I also find it interesting, just on an academic level, that your reply
> to Susan about not running AV on the server was:
>
> > Things get in, it happens, and sometimes they are not caught by the
> >workstation AV product - the server AV product scans everything,
> > profiles, my-documents, etc...
>
> The exact same logic could be applied to a firewall. You can scan for
> viruses at the edge, but sometimes things just get by. Why is a network
> exploit any different? Sometimes things don't get caught at the edge.
> Rogue laptop, or legitimate PC that got infected by something the AV didn't
> catch (which we just established *CAN* happen...)
>
> A firewall is just that added minor protection. Is it the end-all-be-all?
> No. But the cost-to-benefit ratio certainly makes it a worthwhile tool.

You're right, but I've never seen malware that compromised a patched
server from inside the LAN, so, like the SQL slammer and Melissa, they
required either an unpatched server or a user account access.

If the AV software doesn't catch the malware and the user has
authentication with the server at the necessary level, the firewall is
not going to prevent anything...

Think about it, for Melissa to work the malware used the USERs Outlook
account to send itself - so the firewall would not have done anything.

Same with SQL Slammer, the firewall would not have done anything because
the ports needed to exploit it were open on the LAN to start with.

Now, if you have a exploit that uses TCP 60,000 (I just made that up),
there is little chance that MS has code listening to TCP 60,000 and if
you had an app using TCP 60,000 you would already have a exception in
the firewall for it......




--
You can't trust your best friends, your five senses, only the little
voice inside you that most civilians don't even hear -- Listen to that.
Trust yourself.
spam999free(a)rrohio.com (remove 999 for proper email address)
From: Leythos on
In article <2FC668CA-2E38-4E0B-850B-7F3609AE2C48(a)microsoft.com>,
russ(a)REMOVETHIS.sbits.biz says...
>
> Cliff,
> That's why I was confused also
> Leythos is Pro AV an the Server
> Anti Firewall?
>
> Seems like a Flip?
> However he has his own ideas as we all do! :)

It's not a flip at all - the two have NOTHING to do with each other. A
firewall blocks PORTS, AV software blocks programs.

> I'm Pro on both especially since the cost is minimal vs the result of
> not doing it...
>
> I do not want to explain to a client why I didn't implement something cheap
> and easy to save them from an issue that I have to BILL for :)

But, like you don't want to bill them for something that might help
them, I don't want to bill them for enabling something that causes
problems for their applications hosted on the SBS server.



--
You can't trust your best friends, your five senses, only the little
voice inside you that most civilians don't even hear -- Listen to that.
Trust yourself.
spam999free(a)rrohio.com (remove 999 for proper email address)