Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Microsoft Releases Major Windows Server 2003 Update: Page 2 of 3

An interesting set of fixes in Windows Server 2003 SP1 targets end-user programs. The release includes updates to Internet Explorer that guard against automatic window resizing spoofs and malicious code, as well as an Outlook Express fix that lets users choose to render HTML e-mail as plain text and limit downloading of external HTML content, which can forestall user identification and executable schemes against mail recipients. Administrators can also choose lockdown features for IE from the server management console, according to Microsoft documents.

Among other key features in the SP1 release are:

  • A Security Configuration Wizard that lets server administrators assess specific server roles and cut out ports and services not needed for a given server to perform.
  • Post-Setup Security Updates (PSSU), Microsoft's new system for temporarily disabling connections to servers while the automatic Windows Update feature sends patches and security updates for installation.
  • Stiffened authentication procedures for remote procedure call (RPC) and Distributed Component Object Model (DCOM) services, whose basic essence -- allowing remote calls to or launching of programs across a network to another machine -- have made them the frequent target of malicious hackers using such exploits as the MS Blaster worm.
  • Support for "no execute" hardware from companies such as Intel and Advanced Micro Devices that prevents, at the processor level, malicious code from launching attacks from areas of computer memory that should have no code running in it.
  • And a system known as Network Access Quarantine Control that lets administrators identify out-of-date virtual private network accounts and assets.

Also included is a metabase auditing system for Internet Information Services, Windows Server 2003's built-in Web server, that lets administrators target potential incursions should the system's XML-based, hierarchical store of configuration information become corrupted.

Microsoft put the SP1 release through extensive testing with a wide range of server-based applications, according to the company's release, and Muglia urged administrators to install the update immediately. "Service Pack 1 is a major component of our overall strategy to help keep customers as secure as possible," Muglia said. "I encourage all of our Windows Server 2003 customers to deploy Service Pack 1."

However, it is likely that many Windows Server administrators -- particularly those who didn't experiment with any of the update's public release candidates -- will wait to test the server package against custom-built applications, as well as to assess bug reports from the Windows server community.