Verifying That Identified Security Threats are Mitigated

Applies To: Windows Server 2003, Windows Server 2003 R2, Windows Server 2003 with SP1, Windows Server 2003 with SP2

You need to verify that all the identified security threats are properly handled in your new Network Load Balancing solution.

To verify that the identified security threats are mitigated, complete the following tasks:

  1. Connect a client computer to the network such that the clients access the cluster by using the same route path that a typical client computer would use to connect to the cluster.

    For example, when clients connect to the cluster through a series of firewalls and routers to connect to the cluster over the Internet, ensure the client computer used for testing connects to the cluster through the same firewalls and routers.

  2. Log on to the client computer with the user rights identified in your security threats.

  3. For each identified security threat, reproduce the steps that result in the security compromise of the cluster.

  4. Document the results and report the findings to the design team.

  5. With the assistance of the design team, resolve any outstanding security issues.

    Important

    • Resolve all security threats before proceeding further in the deployment process.