B
Brian J
Guest
I have been asked to investigate a Windows server. The server is unknown to
me but is 2003.
The client suspects rogue user activity. The user was a support technician
with administrator privileges. The activity occurred some weeks ago. I
have few details but the activity included, but was not necessarily limited
to, a large number of outbound e-mails generated automatically by a program.
The client has firewall, anti virus and anti spam software installed but I
do not know which programs.
Please can anyone suggest ...
.... any post incident strategies for finding or tracing rogue activity
.... utilities that verify the integrity of System files and folders
.... further reading on the internet
--
Regards,
Brian
me but is 2003.
The client suspects rogue user activity. The user was a support technician
with administrator privileges. The activity occurred some weeks ago. I
have few details but the activity included, but was not necessarily limited
to, a large number of outbound e-mails generated automatically by a program.
The client has firewall, anti virus and anti spam software installed but I
do not know which programs.
Please can anyone suggest ...
.... any post incident strategies for finding or tracing rogue activity
.... utilities that verify the integrity of System files and folders
.... further reading on the internet
--
Regards,
Brian