------ Domain Controller -----------------
%systemroot%\System32\ntfrs.exe
%systemroot%\System32\dfsr.exe
%systemroot%\System32\dfsrs.exe
---- DNS Server -----------
%systemroot%\System32\dns.exe
----- Exchange 2007-2010 -------------
EdgeTransport.exe
Microsoft.Exchange.AddressBook.Service.exe
Microsoft.Exchange.Cluster.ReplayService.exe
Microsoft.Exchange.Monitoring.exe
Microsoft.Exchange.RpcClientAccess.Service.exe
Microsoft.Exchange.Search.ExSearch.exe
MSExchangeMailboxReplication.exe
MSExchangeMailSubmission.exe
MSExchangeRepl.exe
MSExchangeTransportLogSearch.exe
MSFTEFD.exe
msftesql.exe
Store.exe
MSExchangeFDS.exe
-- FPE (Forefront Protection for Exchange) --------
FSCConfigurationServer.exe
FSCEventing.exe
GetEngineFiles.exe
ScanEngineTest.exe
FSCManualScanner.exe
FSCScheduledScanner.exe
FSCRealtimeScanner.exe
MultiEngineScanner.exe
Kavehost.exe
FSEMailPickup.exe
FSCVSSWriter.exe
-- Hyper-V Host Server ---------
%systemroot%\System32\vmms.exe
%systemroot%\System32\vmwp.exe
%systemroot%\System32\vds.exe
-- IIS --------------
%systemroot%\system32\inetsrv\w3wp.exe
%systemroot%\SysWOW64\inetsrv\w3wp.exe
-------------- Operations Manager 2007 --------------------
%programfiles%\System Center Operations Manager 2007\HealthService.exe
%programfiles%\System Center Operations Manager 2007\Microsoft.Mom.ConfigServiceHost.exe
%programfiles%\System Center Operations Manager 2007\MonitoringHost.exe
---------- FPSP (Forefront Protection 2010 for SharePoint) ------------------------
FSCConfigurationServer.exe
FSCEventing.exe
GetEngineFiles.exe
ScanEngineTest.exe
FSCManualScanner.exe
FSCScheduledScanner.exe
FSCRealtimeScanner.exe
MultiEngineScanner.exe
Kavehost.exe
FSEMailPickup.exe
FSCVSSWriter.exe
wsstracing.exe
owstimer.exe
mssearch.exe
---- SQL Server 2005 (KB article 309422)--------- --
%ProgramFiles%\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\SQLServr.exe
%ProgramFiles%\Microsoft SQL Server\MSSQL.3\Reporting Services\ReportServer\Bin\ReportingServicesService.exe
%ProgramFiles%\Microsoft SQL Server\MSSQL.2\OLAP\Bin\MSMDSrv.exe
----- SQL Server 2008 (KB article 309422)---------------------
%ProgramFiles%\Microsoft SQL Server\MSSQL10.MSSQLSERVER\MSSQL\Binn\SQLServr.exe
%ProgramFiles%\Microsoft SQL Server\MSRS10.MSSQLSERVER\Reporting Services\ReportServer\Bin\ReportingServicesService.exe
%ProgramFiles%\Microsoft SQL Server\MSAS10.MSSQLSERVER\OLAP\Bin\MSMDSrv.exe
Tuesday, March 15, 2011
FEP(Forefront Endpoint Protection) File exclusions for Servers
----FEP Default Server Policy--------------
%ALLUSERSPROFILE%\NTuser.pol
%SystemRoot%\System32\GroupPolicy\registry.pol
%windir%\Security\Database\*.chk
%windir%\Security\Database\*.edb
%windir%\Security\Database\*.jrs
%windir%\Security\Database\*.log
%windir%\Security\Database\*.sdb
%windir%\SoftwareDistribution\Datastore\Datastore.edb
%windir%\SoftwareDistribution\Datastore\Logs\edb*.log
%windir%\SoftwareDistribution\Datastore\Logs\Edb.chk
%windir%\SoftwareDistribution\Datastore\Logs\Edbres00001.jrs
%windir%\SoftwareDistribution\Datastore\Logs\Edbres00002.jrs
%windir%\SoftwareDistribution\Datastore\Logs\Res*.jrs
%windir%\SoftwareDistribution\Datastore\Logs\Res*.log
%windir%\SoftwareDistribution\Datastore\Logs\Tmp.edb
---FEP Configuration Manager 2007------------
%programfiles%\Microsoft Configuration Manager\Inboxes\adsrv.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\adsrv.box
%programfiles%\Microsoft Configuration Manager\Inboxes\AIKbMgr.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\AIKbMgr.box
%programfiles%\Microsoft Configuration Manager\Inboxes\amtproxymgr.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\amtproxymgr.box
%programfiles%\Microsoft Configuration Manager\Inboxes\asstdata.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\asstdata.box
%programfiles%\Microsoft Configuration Manager\Inboxes\ccr.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\ccr.box
%programfiles%\Microsoft Configuration Manager\Inboxes\ccrretry.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\ccrretry.box
%programfiles%\Microsoft Configuration Manager\Inboxes\certmgr.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\certmgr.box
%programfiles%\Microsoft Configuration Manager\Inboxes\clifiles.src
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\clifiles.src
%programfiles%\Microsoft Configuration Manager\Inboxes\COLLEVAL.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\COLLEVAL.box
%programfiles%\Microsoft Configuration Manager\Inboxes\coll_out.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\coll_out.box
%programfiles%\Microsoft Configuration Manager\Inboxes\CompSumm.Box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\CompSumm.Box
%programfiles%\Microsoft Configuration Manager\Inboxes\coursend.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\coursend.box
%programfiles%\Microsoft Configuration Manager\Inboxes\dataldr.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\dataldr.box
%programfiles%\Microsoft Configuration Manager\Inboxes\ddm.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\ddm.box
%programfiles%\Microsoft Configuration Manager\Inboxes\ddmnotif.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\ddmnotif.box
%programfiles%\Microsoft Configuration Manager\Inboxes\distmgr.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\distmgr.box
%programfiles%\Microsoft Configuration Manager\Inboxes\dseval.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\dseval.box
%programfiles%\Microsoft Configuration Manager\Inboxes\hman.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\hman.box
%programfiles%\Microsoft Configuration Manager\Inboxes\inventry.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\inventry.box
%programfiles%\Microsoft Configuration Manager\Inboxes\invproc.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\invproc.box
%programfiles%\Microsoft Configuration Manager\Inboxes\mmctrl.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\mmctrl.box
%programfiles%\Microsoft Configuration Manager\Inboxes\objmgr.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\objmgr.box
%programfiles%\Microsoft Configuration Manager\Inboxes\offermgr.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\offermgr.box
%programfiles%\Microsoft Configuration Manager\Inboxes\OfferSum.Box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\OfferSum.Box
%programfiles%\Microsoft Configuration Manager\Inboxes\pkginfo.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\pkginfo.box
%programfiles%\Microsoft Configuration Manager\Inboxes\PkgTransferMgr.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\PkgTransferMgr.box
%programfiles%\Microsoft Configuration Manager\Inboxes\policypv.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\policypv.box
%programfiles%\Microsoft Configuration Manager\Inboxes\polreq.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\polreq.box
%programfiles%\Microsoft Configuration Manager\Inboxes\rcm.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\rcm.box
%programfiles%\Microsoft Configuration Manager\Inboxes\replmgr.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\replmgr.box
%programfiles%\Microsoft Configuration Manager\Inboxes\RuleEngine.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\RuleEngine.box
%programfiles%\Microsoft Configuration Manager\Inboxes\schedule.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\schedule.box
%programfiles%\Microsoft Configuration Manager\Inboxes\sinv.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\sinv.box
%programfiles%\Microsoft Configuration Manager\Inboxes\sitecomp.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\sitecomp.box
%programfiles%\Microsoft Configuration Manager\Inboxes\sitectrl.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\sitectrl.box
%programfiles%\Microsoft Configuration Manager\Inboxes\SiteStat.Box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\SiteStat.Box
%programfiles%\Microsoft Configuration Manager\Inboxes\smsbkup.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\smsbkup.box
%programfiles%\Microsoft Configuration Manager\Inboxes\statmgr.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\statmgr.box
%programfiles%\Microsoft Configuration Manager\Inboxes\swmproc.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\swmproc.box
%programfiles%\Microsoft Configuration Manager\Inboxes\WSUSMgr.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\WSUSMgr.box
%programfiles%\Microsoft Configuration Manager\Inboxes\wsyncmgr.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\wsyncmgr.box
------FEP Domain Controller -----------------
%systemroot%\ntds\ntds.dit
%systemroot%\ntds\EDB*.log
%systemroot%\ntds\Edbres*.jrs
%systemroot%\ntds\EDB.chk
%systemroot%\ntds\TEMP.edb
%systemroot%\ntds\*.pat
%systemroot%\SYSVOL\domain\DO_NOT_REMOVE_NtFrs_PreInstall_Directory
%systemroot%\SYSVOL\staging
%systemroot%\SYSVOL\staging areas
%systemroot%\SYSVOL\sysvol
-----FEP DHCP Server-----------------
%windir%\System32\DHCP\*.mdb
%windir%\System32\DHCP\*.edb
%windir%\System32\DHCP\*.pat
%windir%\System32\DHCP\*.log
%windir%\System32\DHCP\*.jrs
%windir%\System32\DHCP\*.chk
%windir%\System32\DHCP\backup\*.mdb
%windir%\System32\DHCP\backup\*.log
%windir%\System32\DHCP\backup\*.chk
----FEP DNS Server ----------------
%windir%\System32\DNS\*.dns
%windir%\System32\DNS\*.scc
----- FEP Exchange 2007-2010 -------------
%ExchangeInstallPath%\Mailbox
%ExchangeInstallPath%\GroupMetrics
%ExchangeInstallPath%\TransportRoles\Logs
%ExchangeInstallPath%\Logging
%ExchangeInstallPath%\ExchangeOAB
%ExchangeInstallPath%\Mailbox\MDBTEMP
%SystemDrive%\DAGFileShareWitnesses\*
-------FEP Hyper-V Host Server -------------
%ProgramData%\Microsoft\Windows\Hyper-V
%Public%\Documents\Hyper-V\Virtual Hard Disks
%ProgramFiles%\Hyper-V
%SystemDrive%\ClusterStorage
------------ IIS -------------------------
%systemroot%\System32\LogFiles
%systemroot%\SysWow64\LogFiles
-------------- Operations Manager 2007 --------------------
%programfiles%\System Center Operations Manager 2007\Health Service State\*
----------------FEP SharePoint 2010 ----------------
%systemroot%\Temp\WebTempDir
%programfiles%\Common Files\Microsoft Shared\Web Server Extensions\14\Logs
%programfiles%\Common Files\Microsoft Shared\Web Server Extensions\12\Logs
%programfiles%\Microsoft Office Servers\14.0\Logs
%programfilesx86%\Microsoft Office Servers\14.0\Logs
%programfiles%\Microsoft Office Servers\12.0\Logs
%programfilesx86%\Microsoft Office Servers\12.0\Logs
%programfiles%\Microsoft Office Servers\14.0\Data
%programfilesx86%\Microsoft Office Servers\14.0\Data
%programfiles%\Microsoft Office Servers\12.0\Data
%programfilesx86%\Microsoft Office Servers\12.0\Data
%systemroot%\Microsoft.NET\Framework\v2.0.50727\Temporary ASP.NET Files
%systemroot%\Microsoft.NET\Framework64\v2.0.50727\Temporary ASP.NET Files
%ALLUSERSPROFILE%\NTuser.pol
%SystemRoot%\System32\GroupPolicy\registry.pol
%windir%\Security\Database\*.chk
%windir%\Security\Database\*.edb
%windir%\Security\Database\*.jrs
%windir%\Security\Database\*.log
%windir%\Security\Database\*.sdb
%windir%\SoftwareDistribution\Datastore\Datastore.edb
%windir%\SoftwareDistribution\Datastore\Logs\edb*.log
%windir%\SoftwareDistribution\Datastore\Logs\Edb.chk
%windir%\SoftwareDistribution\Datastore\Logs\Edbres00001.jrs
%windir%\SoftwareDistribution\Datastore\Logs\Edbres00002.jrs
%windir%\SoftwareDistribution\Datastore\Logs\Res*.jrs
%windir%\SoftwareDistribution\Datastore\Logs\Res*.log
%windir%\SoftwareDistribution\Datastore\Logs\Tmp.edb
---FEP Configuration Manager 2007------------
%programfiles%\Microsoft Configuration Manager\Inboxes\adsrv.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\adsrv.box
%programfiles%\Microsoft Configuration Manager\Inboxes\AIKbMgr.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\AIKbMgr.box
%programfiles%\Microsoft Configuration Manager\Inboxes\amtproxymgr.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\amtproxymgr.box
%programfiles%\Microsoft Configuration Manager\Inboxes\asstdata.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\asstdata.box
%programfiles%\Microsoft Configuration Manager\Inboxes\ccr.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\ccr.box
%programfiles%\Microsoft Configuration Manager\Inboxes\ccrretry.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\ccrretry.box
%programfiles%\Microsoft Configuration Manager\Inboxes\certmgr.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\certmgr.box
%programfiles%\Microsoft Configuration Manager\Inboxes\clifiles.src
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\clifiles.src
%programfiles%\Microsoft Configuration Manager\Inboxes\COLLEVAL.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\COLLEVAL.box
%programfiles%\Microsoft Configuration Manager\Inboxes\coll_out.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\coll_out.box
%programfiles%\Microsoft Configuration Manager\Inboxes\CompSumm.Box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\CompSumm.Box
%programfiles%\Microsoft Configuration Manager\Inboxes\coursend.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\coursend.box
%programfiles%\Microsoft Configuration Manager\Inboxes\dataldr.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\dataldr.box
%programfiles%\Microsoft Configuration Manager\Inboxes\ddm.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\ddm.box
%programfiles%\Microsoft Configuration Manager\Inboxes\ddmnotif.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\ddmnotif.box
%programfiles%\Microsoft Configuration Manager\Inboxes\distmgr.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\distmgr.box
%programfiles%\Microsoft Configuration Manager\Inboxes\dseval.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\dseval.box
%programfiles%\Microsoft Configuration Manager\Inboxes\hman.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\hman.box
%programfiles%\Microsoft Configuration Manager\Inboxes\inventry.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\inventry.box
%programfiles%\Microsoft Configuration Manager\Inboxes\invproc.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\invproc.box
%programfiles%\Microsoft Configuration Manager\Inboxes\mmctrl.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\mmctrl.box
%programfiles%\Microsoft Configuration Manager\Inboxes\objmgr.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\objmgr.box
%programfiles%\Microsoft Configuration Manager\Inboxes\offermgr.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\offermgr.box
%programfiles%\Microsoft Configuration Manager\Inboxes\OfferSum.Box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\OfferSum.Box
%programfiles%\Microsoft Configuration Manager\Inboxes\pkginfo.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\pkginfo.box
%programfiles%\Microsoft Configuration Manager\Inboxes\PkgTransferMgr.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\PkgTransferMgr.box
%programfiles%\Microsoft Configuration Manager\Inboxes\policypv.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\policypv.box
%programfiles%\Microsoft Configuration Manager\Inboxes\polreq.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\polreq.box
%programfiles%\Microsoft Configuration Manager\Inboxes\rcm.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\rcm.box
%programfiles%\Microsoft Configuration Manager\Inboxes\replmgr.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\replmgr.box
%programfiles%\Microsoft Configuration Manager\Inboxes\RuleEngine.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\RuleEngine.box
%programfiles%\Microsoft Configuration Manager\Inboxes\schedule.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\schedule.box
%programfiles%\Microsoft Configuration Manager\Inboxes\sinv.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\sinv.box
%programfiles%\Microsoft Configuration Manager\Inboxes\sitecomp.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\sitecomp.box
%programfiles%\Microsoft Configuration Manager\Inboxes\sitectrl.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\sitectrl.box
%programfiles%\Microsoft Configuration Manager\Inboxes\SiteStat.Box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\SiteStat.Box
%programfiles%\Microsoft Configuration Manager\Inboxes\smsbkup.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\smsbkup.box
%programfiles%\Microsoft Configuration Manager\Inboxes\statmgr.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\statmgr.box
%programfiles%\Microsoft Configuration Manager\Inboxes\swmproc.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\swmproc.box
%programfiles%\Microsoft Configuration Manager\Inboxes\WSUSMgr.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\WSUSMgr.box
%programfiles%\Microsoft Configuration Manager\Inboxes\wsyncmgr.box
%programfiles(x86)%\Microsoft Configuration Manager\Inboxes\wsyncmgr.box
------FEP Domain Controller -----------------
%systemroot%\ntds\ntds.dit
%systemroot%\ntds\EDB*.log
%systemroot%\ntds\Edbres*.jrs
%systemroot%\ntds\EDB.chk
%systemroot%\ntds\TEMP.edb
%systemroot%\ntds\*.pat
%systemroot%\SYSVOL\domain\DO_NOT_REMOVE_NtFrs_PreInstall_Directory
%systemroot%\SYSVOL\staging
%systemroot%\SYSVOL\staging areas
%systemroot%\SYSVOL\sysvol
-----FEP DHCP Server-----------------
%windir%\System32\DHCP\*.mdb
%windir%\System32\DHCP\*.edb
%windir%\System32\DHCP\*.pat
%windir%\System32\DHCP\*.log
%windir%\System32\DHCP\*.jrs
%windir%\System32\DHCP\*.chk
%windir%\System32\DHCP\backup\*.mdb
%windir%\System32\DHCP\backup\*.log
%windir%\System32\DHCP\backup\*.chk
----FEP DNS Server ----------------
%windir%\System32\DNS\*.dns
%windir%\System32\DNS\*.scc
----- FEP Exchange 2007-2010 -------------
%ExchangeInstallPath%\Mailbox
%ExchangeInstallPath%\GroupMetrics
%ExchangeInstallPath%\TransportRoles\Logs
%ExchangeInstallPath%\Logging
%ExchangeInstallPath%\ExchangeOAB
%ExchangeInstallPath%\Mailbox\MDBTEMP
%SystemDrive%\DAGFileShareWitnesses\*
-------FEP Hyper-V Host Server -------------
%ProgramData%\Microsoft\Windows\Hyper-V
%Public%\Documents\Hyper-V\Virtual Hard Disks
%ProgramFiles%\Hyper-V
%SystemDrive%\ClusterStorage
------------ IIS -------------------------
%systemroot%\System32\LogFiles
%systemroot%\SysWow64\LogFiles
-------------- Operations Manager 2007 --------------------
%programfiles%\System Center Operations Manager 2007\Health Service State\*
----------------FEP SharePoint 2010 ----------------
%systemroot%\Temp\WebTempDir
%programfiles%\Common Files\Microsoft Shared\Web Server Extensions\14\Logs
%programfiles%\Common Files\Microsoft Shared\Web Server Extensions\12\Logs
%programfiles%\Microsoft Office Servers\14.0\Logs
%programfilesx86%\Microsoft Office Servers\14.0\Logs
%programfiles%\Microsoft Office Servers\12.0\Logs
%programfilesx86%\Microsoft Office Servers\12.0\Logs
%programfiles%\Microsoft Office Servers\14.0\Data
%programfilesx86%\Microsoft Office Servers\14.0\Data
%programfiles%\Microsoft Office Servers\12.0\Data
%programfilesx86%\Microsoft Office Servers\12.0\Data
%systemroot%\Microsoft.NET\Framework\v2.0.50727\Temporary ASP.NET Files
%systemroot%\Microsoft.NET\Framework64\v2.0.50727\Temporary ASP.NET Files
Monday, August 30, 2010
A summary of DLL hijacking - what did I do...
Workaround 1
1. Install the patch 2264107 and set CWDIllegalInDllSearch=0xFFFFFFFF
Benefit
Could mitigate the risk to very low level.
Impact
1). The patch 2264107 seems to interfere with the Wireless cards, specific to the models: E6400, Wireless Card: 1510
2). May break some applications. Potential affected software list could be found in the attachment: “Potentially vulnerable applications.docx”. you can also find it online: http://www.corelan.be:8800/index.php/2010/08/25/dll-hijacking-kb-2269637-the-unofficial-list/
--------------------------------------------------------------
Workaround 2
2 .Install the patch 2264107 and set CWDIllegalInDllSearch=1
Benefit
Prevent an application from loading a library from a WebDAV location.
Impact
1). The patch 2264107 seems to interfere with the Wireless cards, specific to the models: E6400, Wireless Card: 1510
2). Still vulnerable for Remote file share.
---------------------------------------------------------------
Workaround 3
3. Install the patch 2264107 and set CWDIllegalInDllSearch=2
Benefit
Prevent an application from loading a library from both a WebDAV, as well as a remote UNC location
Impact
1). The patch 2264107 seems to interfere with the Wireless cards, specific to the models: E6400, Wireless Card: 1510
2). Cannot prevent the local dll attack.
---------------------------------------------------------------
Workaround 4
4. Block any outbound connection to a smb/webdav share. Ports are 445 and 135.
Benefit
Prevent the outside attack.
Impact
1). It is not possible to block smb/webdav share in internal network because users need it.
---------------------------------------------------------------
Real world DLL Hijacking samples: (from http://digitalacropolis.us/?p=113)
1. Using a SMB/WebDav shared folder
This is perhaps the most common way dll hijacking is being used, probably because it can be exploited remotely. It works by putting together a malicious dll and a clean file that triggers it inside a share and then making your target open this clean file. Remember a shared folder link always starts with double slashes like \\123.45.67.890. 1.
1). Attacker sends a shared folder link to a victim. Victim opens and sees some .html files and double-clicks one of them. When a vulnerable browser or application opens this file it loads a dll directly from this share, and victim is now infected.
Workaround: Combine workaround 1 and 4. Or Combine Workaround 3 and 4.
2). Attacker posts a link in a forum that looks like an http link but redirects victim to a shared folder. Victim opens a simple .pdf file and gets infected.
Workaround: Combine workaround 1 and 4. Or Combine Workaround 3 and 4.
3). Attacker gains access to a trusty website and puts iframes or redirects to his share. Victim trusts this site and opens an mp3 file inside the shared folder and… gets infected as well.
Workaround: Combine workaround 1 and 4. Or Combine Workaround 3 and 4.
4). Attacker uses the .lnk bug or any browser vulnerability together with any of above examples and thus increase his infect rate.
Workaround: Combine workaround 1 and 4. Or Combine Workaround 3 and 4.
5). Inside attacker put a clean file and a malicious dll to internal file share.
Workaround: 1 or 3.
----------------------------------------------------------
2. A compressed package (.zip, .tar.gz, .rar etc)
This vector can be exploited by putting together a bunch of clean files and a malicious dll inside a compressed folder/package. Target will extract these files and open one of them, getting attacker’s dll loaded.
1). Attacker compresses 30 jpg pictures and a dll in a zip file. Victim extracts everything to a folder and double-clicks one of the pictures. Infected.
Workaround:
1). Workaround 1.
2). Education: Before opening any kind of file, specially downloaded from the internet, check if there’s any dll file in the same directory. Don’t forget to enable show hidden files and show all extensions on your Folder Options. It’s also recommended to move only the files you need to open to another directory created by you. This should make you safe.
--------------------------------------------------------------
3. Torrents
This one is kind of nasty and can be very effective to contaminate large amounts of people. A torrent can contain large numbers of files and can be used to get a malicious dll downloaded together with clean files without being noticed. This is very dangerous, especially if a big torrent tracker or database can be compromised.
1). Attacker posts a custom torrent in a public tracker, which contains a pack of mp3′s and a malicious dll. Victim goes listen it’s new song album and get infected.
2). Attacker gains admin access to a torrent database (this actually happened to ThePirateBay not so long ago) and changes a legitimate high-traffic torrent for an infected one. This could cause a massive infection in a matter of minutes.
Workaround: Do not allow BT and P2P on the perimeter firewall.
----------------------------------------------------------
4. Exploiting multiple application hijacks
Increasing attack success rate for putting multiple dlls to exploit the same file type.
1). Attacker shares a folder which contains a bunch of .avi files and three malicious dlls: one for VLC, other for MediaPlayer Classic and, finally, the last one for Winamp. Attacker can now exploit three apps in the same attack, increasing the chance of victim getting infected.
Workaround: Combine workaround 1 and 4. Or Combine Workaround 3 and 4.
1. Install the patch 2264107 and set CWDIllegalInDllSearch=0xFFFFFFFF
Benefit
Could mitigate the risk to very low level.
Impact
1). The patch 2264107 seems to interfere with the Wireless cards, specific to the models: E6400, Wireless Card: 1510
2). May break some applications. Potential affected software list could be found in the attachment: “Potentially vulnerable applications.docx”. you can also find it online: http://www.corelan.be:8800/index.php/2010/08/25/dll-hijacking-kb-2269637-the-unofficial-list/
--------------------------------------------------------------
Workaround 2
2 .Install the patch 2264107 and set CWDIllegalInDllSearch=1
Benefit
Prevent an application from loading a library from a WebDAV location.
Impact
1). The patch 2264107 seems to interfere with the Wireless cards, specific to the models: E6400, Wireless Card: 1510
2). Still vulnerable for Remote file share.
---------------------------------------------------------------
Workaround 3
3. Install the patch 2264107 and set CWDIllegalInDllSearch=2
Benefit
Prevent an application from loading a library from both a WebDAV, as well as a remote UNC location
Impact
1). The patch 2264107 seems to interfere with the Wireless cards, specific to the models: E6400, Wireless Card: 1510
2). Cannot prevent the local dll attack.
---------------------------------------------------------------
Workaround 4
4. Block any outbound connection to a smb/webdav share. Ports are 445 and 135.
Benefit
Prevent the outside attack.
Impact
1). It is not possible to block smb/webdav share in internal network because users need it.
---------------------------------------------------------------
Real world DLL Hijacking samples: (from http://digitalacropolis.us/?p=113)
1. Using a SMB/WebDav shared folder
This is perhaps the most common way dll hijacking is being used, probably because it can be exploited remotely. It works by putting together a malicious dll and a clean file that triggers it inside a share and then making your target open this clean file. Remember a shared folder link always starts with double slashes like \\123.45.67.890. 1.
1). Attacker sends a shared folder link to a victim. Victim opens and sees some .html files and double-clicks one of them. When a vulnerable browser or application opens this file it loads a dll directly from this share, and victim is now infected.
Workaround: Combine workaround 1 and 4. Or Combine Workaround 3 and 4.
2). Attacker posts a link in a forum that looks like an http link but redirects victim to a shared folder. Victim opens a simple .pdf file and gets infected.
Workaround: Combine workaround 1 and 4. Or Combine Workaround 3 and 4.
3). Attacker gains access to a trusty website and puts iframes or redirects to his share. Victim trusts this site and opens an mp3 file inside the shared folder and… gets infected as well.
Workaround: Combine workaround 1 and 4. Or Combine Workaround 3 and 4.
4). Attacker uses the .lnk bug or any browser vulnerability together with any of above examples and thus increase his infect rate.
Workaround: Combine workaround 1 and 4. Or Combine Workaround 3 and 4.
5). Inside attacker put a clean file and a malicious dll to internal file share.
Workaround: 1 or 3.
----------------------------------------------------------
2. A compressed package (.zip, .tar.gz, .rar etc)
This vector can be exploited by putting together a bunch of clean files and a malicious dll inside a compressed folder/package. Target will extract these files and open one of them, getting attacker’s dll loaded.
1). Attacker compresses 30 jpg pictures and a dll in a zip file. Victim extracts everything to a folder and double-clicks one of the pictures. Infected.
Workaround:
1). Workaround 1.
2). Education: Before opening any kind of file, specially downloaded from the internet, check if there’s any dll file in the same directory. Don’t forget to enable show hidden files and show all extensions on your Folder Options. It’s also recommended to move only the files you need to open to another directory created by you. This should make you safe.
--------------------------------------------------------------
3. Torrents
This one is kind of nasty and can be very effective to contaminate large amounts of people. A torrent can contain large numbers of files and can be used to get a malicious dll downloaded together with clean files without being noticed. This is very dangerous, especially if a big torrent tracker or database can be compromised.
1). Attacker posts a custom torrent in a public tracker, which contains a pack of mp3′s and a malicious dll. Victim goes listen it’s new song album and get infected.
2). Attacker gains admin access to a torrent database (this actually happened to ThePirateBay not so long ago) and changes a legitimate high-traffic torrent for an infected one. This could cause a massive infection in a matter of minutes.
Workaround: Do not allow BT and P2P on the perimeter firewall.
----------------------------------------------------------
4. Exploiting multiple application hijacks
Increasing attack success rate for putting multiple dlls to exploit the same file type.
1). Attacker shares a folder which contains a bunch of .avi files and three malicious dlls: one for VLC, other for MediaPlayer Classic and, finally, the last one for Winamp. Attacker can now exploit three apps in the same attack, increasing the chance of victim getting infected.
Workaround: Combine workaround 1 and 4. Or Combine Workaround 3 and 4.
Subscribe to:
Posts (Atom)