Our website makes use of cookies like most of the websites. In order to deliver a personalised, responsive and improved experience, we remember and store information about how you use it. This is done using simple text files called cookies which sit on your computer. These cookies are completely safe and secure and will never contain any sensitive information. By clicking continue here, you give your consent to the use of cookies by our website.

Friday, 10 July 2015 09:39

Tripwire announces free support solution for Windows Server 2003

Written by 

Tripwire has delivered a free configuration security evaluation tool that tests for common errors and weaknesses in Windows Server 2003

Tripwire has come to the rescue for all those still running Windows Server 2003. As you’re probably very well aware Microsoft will end extended support for Windows Server 2003 on July 14, 2015, and will no longer offer security updates, hotfixes, online content updates or technical assistance unless custom support agreements are purchased.

So to help those not ready for the move today announced Tripwire SecureCheq for Windows Server 2003, a  new addition to Tripwire’s family of free tools that test for common system configuration errors in Microsoft Windows desktops and servers. The tools also offer detailed remediation guidance on findings.

Tripwire SecureCheq for Windows Server 2003 is a free tool that provides checks for the 20 most common weaknesses and dangerous Windows Server 2003 misconfigurations. With Tripwire SecureCheq, IT professionals can quickly identify the systems that are at the greatest risk of attack and then ensure that proper monitoring and detection controls are enabled. The tool also provides detailed guidance on how to remediate common misconfigurations.

Tripwire SecureCheq for Windows Server 2003 evaluates errors and offers solutions for the following configuration categories:

  • Operating system hardening
  • Data protection
  • Communication security
  • User account security
  • Logs and auditing

Ken Westin, senior security analyst for Tripwire said “there are practical steps that can be taken today to harden these (Win2K3) systems and reduce their attack surface. These steps will make it harder for attackers to compromise devices running Windows Server 2003, even in the face of the inevitable onslaught of new zero-day vulnerabilities.”

“Many IT teams are very comfortable using Windows Server 2003 for a print or file server because it’s a very stable product, and they know how to patch and maintain it,” said Lane Thames, security researcher for Tripwire. “However, we should expect a new wave of exploits targeting these systems by mid-August. Any organization that hasn’t completed the transition should put in place a hardening plan immediately.”

Leave a comment

Make sure you enter the (*) required information where indicated. HTML code is not allowed.



255x635 banner2-compressed