Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
18Activity

Table Of Contents

0 of .
Results for:
No results containing your search query
P. 1
Sap Hardering for Windows Server

Sap Hardering for Windows Server

Ratings: (0)|Views: 474 |Likes:
Published by naveen

More info:

Published by: naveen on Jun 24, 2009
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

10/18/2011

pdf

text

original

 
 
SAP Hardening and Patch Management Guidefor Windows Server
Microsoft CorporationNovember 15, 2005
Summary
This whitepaper introduces security measures for SAP systems running on Windows Server. Twosecurity measures are described: hardening and patch management. These security measures canhelp enhance security within your Windows Server-based SAP environment.
 
 
The information contained in this document represents the current view ofMicrosoft Corporation on the issues discussed as of the date of publication.Because Microsoft must respond to changing market conditions, it should not beinterpreted to be a commitment on the part of Microsoft,
 
and Microsoft cannotguarantee the accuracy of any information presented after the date of publication.This Whitepaper is for informational purposes only. MICROSOFT MAKES NOWARRANTIES, EXPRESS OR IMPLIED, AS TO THE INFORMATION IN THISDOCUMENT.Complying with all applicable copyright laws is the responsibility of the user.Without limiting the rights under copyright, no part of this document may bereproduced, stored in or introduced into a retrieval system, or transmitted in anyform or by any means (electronic, mechanical, photocopying, recording, orotherwise) or for any purpose, without the express written permission of MicrosoftCorporation.Microsoft may own patents, patent applications, trademarks, copyrights, or otherintellectual property rights covering subject matter in this document. Except asexpressly provided in a written license agreement from Microsoft, the furnishing ofthis document does not assign any license to these patents, trademarks,copyrights, or other intellectual property. © 2005 Microsoft Corporation. All rights reserved.Microsoft, SQL Server, Windows, Windows Server, and the Windows logo areeither registered trademarks or trademarks of Microsoft Corporation in the U.S.A.and/or other countries.The names of actual companies and products mentioned herein may be thetrademarks of their respective owners.
 
 
Table of Contents
1 Introduction...........................................................................................................................................1
 
2 Hardening..............................................................................................................................................5
 
2.1 What Is Hardening?.........................................................................................................................5
 
2.2 Multi-layered Hardening...................................................................................................................6
 
2.3 Harding Implementation Steps.........................................................................................................6
 
2.4 Implementation of Hardening...........................................................................................................7
 
Network Hardening.............................................................................................................................7
 
Server Hardening.............................................................................................................................23
 
Implement Other Hardening.............................................................................................................41
 
2.5 Other Hardening Information.........................................................................................................44
 
2.6 Operation Checks..........................................................................................................................45
 
2.7 Final Security Check......................................................................................................................47
 
2.8 Other Methods for Checking Hardening Implementation..............................................................47
 
3 Patch Management.............................................................................................................................48
 
3.1 What Is Patch Management?.........................................................................................................48
 
3.2 Collecting Information....................................................................................................................49
 
Collecting Information about Security Vulnerability..........................................................................49
 
3.3 Assessing Risks.............................................................................................................................50
 
Assessing the Consequences and Urgency of the Vulnerability......................................................52
 
What is a Vulnerability Assessment Matrix?....................................................................................52
 
Organizing the Information about Security Vulnerability..................................................................53
 
Assessing the Pros and Cons of the Risk........................................................................................54
 
Determining the Degree of Urgency.................................................................................................54
 
Devising a Plan for Responding to the Vulnerability........................................................................59
 
3.4 Applying Security Update Program................................................................................................61
 
Points to Consider When Applying Security Patches......................................................................61
 
Testing the Security Update Program before Application................................................................62
 
Testing the Application in a Test Environment.................................................................................62
 
Updating via Management Tools.....................................................................................................62
 
3.5 Monitoring the Results...................................................................................................................63
 
Verifying Behavior in the Test Environment.....................................................................................63
 

Activity (18)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
raulazo20 liked this
Sharmila Sankar liked this
Bharat Singh liked this
Bharat Singh liked this
neel1000g liked this
y2india_007 liked this
dakegg7009 liked this
amit liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->