Microsoft Highlights Network Quarantine Feature in Wake of Attacks

In the wake of one of the most active weeks for computer worms yet, Microsoft is calling attention to a little-touted new feature of Windows Server 2003 that helps administrators ensure that remote users adhere to company security policies.

The new feature in Windows Server 2003 is called Network Access Quarantine Control, and it essentially puts remote access systems that log into a private network into a quarantine with limited access to the network until an administrator-supplied script can validate that the client system meets the organization's security policies.

Network Access Quarantine Control is not intended as a security measure to keep out attackers who have stolen company credentials. Instead it is intended as a fail-safe to ensure that legitimate users are in compliance with company policies regarding firewalls, anti-virus software, service packs, recent hotfixes and password-protected screensavers.

In the last few days, Microsoft posted a link to a 31-page white paper originally published in late March about Network Access Quarantine on its main TechNet Security page. The white paper can be found here.

Recent obvious benefits of having a Network Access Quarantine policy in place would have been to check systems for enabled firewalls, the MS03-026 patch that blocked the DCOM RPC hole that MSBlast exploited or recent anti-virus signatures protecting against Sobig.F.

"Despite the efforts made within organizations to ensure that computers used internally comply with network policy, those used from employee’s homes for remote access can still present significant risk to the network," Microsoft noted in the white paper.

Microsoft CIO Rick Devenuti discussed Microsoft's internal deployment of the feature on pre-release versions of Windows Server 2003 at the MEC 2002 show last October.

About the Author

Scott Bekker is editor in chief of Redmond Channel Partner magazine.


  • Vendors Issue Patches for Linux Container Runtime Flaw Enabling Host Attacks

    This week, the National Institute of Standards and Technology (NIST) described a high-risk security vulnerability (CVE-2019-5736) for organizations using containers that could lead to compromised host systems.

  • Windows 10 Version 1809 Users May Get Visual Studio Crashes

    Microsoft on Friday issued an advisory for Windows 10 version 1809 users about possible Visual Studio crashes.

  • Standardizing the Look of Outlook's Outbound Messages

    Microsoft typically gives users a blank canvas to compose new e-mails in Outlook. In some corporate environments, however, a blank canvas isn't a good thing.

  • Windows 10 'Semiannual Channel Targeted' Goes Away This Spring

    Microsoft plans to slightly alter its Windows servicing lingo and management behavior with its next Windows 10 operating system feature update release, coming this spring.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.