{"id":54362,"date":"2012-03-22T17:58:33","date_gmt":"2012-03-22T21:58:33","guid":{"rendered":"http:\/\/www.bu.edu\/tech\/?p=54362"},"modified":"2013-03-13T13:40:37","modified_gmt":"2013-03-13T17:40:37","slug":"security-alert-for-microsoft-windows-users","status":"publish","type":"post","link":"https:\/\/www.bu.edu\/tech\/2012\/03\/22\/security-alert-for-microsoft-windows-users\/","title":{"rendered":"Security Alert for Microsoft Windows Users and VPN Required for RDP"},"content":{"rendered":"<p>There are two important consequences of a recent critical vulnerability announced by Microsoft last week:<\/p>\n<ol>\n<li>IS&amp;T is implementing a policy change regarding the use of Windows\u00e2\u20ac\u2122 Remote Desktop feature (RDP). If you use RDP to remotely access computers present on the BU campus, starting on Tuesday, April 3<span style=\"font-size: 11px;\">rd,<\/span> 2012, \u00c2\u00a0you will need to VPN into BU (<a href=\"http:\/\/vpn.bu.edu\/\">http:\/\/vpn.bu.edu<\/a>) before connecting.\u00c2\u00a0<a href=\"\/tech\/services\/cccs\/remote\/vpn\/use\/\">Learn more about using the VPN<\/a>.<\/li>\n<li>Those managing their own Windows computer should confirm that their computer has been updated. Details for making sure you computer is up to date can be found below.<\/li>\n<\/ol>\n<p>If your computer is managed by IS&amp;T\u00e2\u20ac\u2122s Desktop Services or one of our IT Partners, it is likely your work computer is up to date, and no further action is required besides following this policy after April 3<span style=\"font-size: 11px;\">rd<\/span>. If you have any questions about this policy, have questions about how your computer is configured, or if you have trouble remotely connecting to a computer on campus after April 2<span style=\"font-size: 11px;\">nd<\/span>, you may contact the IT Help Center by phone at 617-353-HELP (4357), <a href=\"mailto:ithelp@bu.edu\">email<\/a>, or <a class=\"myhelp_activate\" href=\"\/tech\/contact\/\">web<\/a> for assistance.<\/p>\n<h2><strong>Impact<\/strong><\/h2>\n<p>An exploit has already been released that will cause a Blue Screen of Death on Windows 7 and a Denial of Service on Windows XP. It is expected that another exploit will soon be released that will allow an attacker to have complete control of the computer. After that, the next expected step is that a self-replicating worm will be released that will automatically jump from host to host, granting the attacker access to the system and taking any other action the attacker may wish.<\/p>\n<h2><strong>Solution<\/strong><\/h2>\n<p>If IS&amp;T or one of our IT partners manages the computer you use, no further action is required other than following the new RDP policy starting April 3rd. If you are personally responsible for patching your computer and keeping it up to date (or if \u00c2\u00a0you would like to know how to better secure your home computer), there is some additional information you should know regarding the vulnerability identified by Microsoft. Below, we have some recommended actions for you to take to ensure your computer is protected.<\/p>\n<h4><strong>What IS&amp;T and the IT Partners are Doing<\/strong><\/h4>\n<ul>\n<li>IS&amp;T and the IT Partners have been working to install this patch on the servers at BU.<\/li>\n<li>Due to the serious nature of this vulnerability, IS&amp;T will be blocking RDP access at the BU firewall within the next few days. This block is necessary because it is common for people to disable the automatic update functionality.\u00c2\u00a0 It can reasonably be expected that many systems will remain unpatched for an extended period of time.\u00c2\u00a0 If we take no action to block access to RDP through the firewall, exploit code could significantly impact the stable operation of computers at BU or otherwise compromise BU operations or protected information.\u00c2\u00a0 (For reference, as of Monday (3\/19) there were over 3000 computers at BU that had RDP up and operating.)<\/li>\n<\/ul>\n<h4><strong>Action Required for all Microsoft Windows Users<\/strong><\/h4>\n<p><strong> <\/strong><\/p>\n<ol>\n<li>If you are running Microsoft Windows and you do not have it  set to Automatically Update, you should <a href=\"\/tech\/services\/cccs\/desktop\/removal\/security\/safe-computing\/autoupdate\/\">run Windows Update immediately<\/a> and confirm that you have the correct patches using the instructions below.<\/li>\n<li><strong>If you <em>do <\/em>have Automatic Updates turned on, you should have   received the patch last Tuesday and you are all set &#8211; no further action is required. <\/strong>If you would like, you can <a href=\"https:\/\/www.bu.edu\/tech\/services\/cccs\/desktop\/removal\/security\/safe-computing\/autoupdate\/\">confirm that you are updating automatically<\/a>.<strong> <\/strong><\/li>\n<li>If you use Microsoft Windows Remote Desktop (RDP) to  connect to a BU computer from outside of BU, <strong>you will need to connect to the VPN prior to connecting via RDP &#8211; login at <a href=\"http:\/\/vpn.bu.edu\">http:\/\/vpn.bu.edu<\/a>.<\/strong><\/li>\n<li>If you have set up your system to allow remote access, or if you run a server, see the additional instructions below.<\/li>\n<\/ol>\n<h3><strong>Related Instructions<\/strong><\/h3>\n<h4><strong>If you never use RDP:<\/strong><\/h4>\n<ul>\n<li>If you do not need to use RDP, you can disable it. \u00c2\u00a0Instructions are provided below.<\/li>\n<li>If you do need to use RDP, please follow the security best practices published by IS&amp;T:<br \/>\n<a href=\"..\/security\/protect\/bestpractice\/remote-desktop\/\">https:\/\/www.bu.edu\/tech\/about\/security-resources\/bestpractice\/remote-desktop\/<\/a><br \/>\nBest practices include moving RDP away from its standard port to some other port protected by the <a href=\"..\/security\/firewalls\/campus\/\">BU Edge Firewall<\/a>.<\/li>\n<\/ul>\n<h4><strong>If you are running a server:<\/strong><\/h4>\n<ul>\n<li>Patch information can be found here:  <a href=\"http:\/\/technet.microsoft.com\/en-us\/security\/bulletin\/ms12-020\" target=\"_blank\">http:\/\/technet.microsoft.com\/en-us\/security\/bulletin\/ms12-020<\/a><\/li>\n<li>If the system cannot be immediately patched, please see this page for an alternative \u00e2\u20ac\u0153fix it\u00e2\u20ac\u009d option: <a href=\"http:\/\/blogs.technet.com\/b\/srd\/archive\/2012\/03\/13\/cve-2012-0002-a-closer-look-at-ms12-020-s-critical-issue.aspx\">http:\/\/blogs.technet.com\/b\/srd\/archive\/2012\/03\/13\/cve-2012-0002-a-closer-look-at-ms12-020-s-critical-issue.aspx<\/a><\/li>\n<\/ul>\n<h4><strong>Confirm that you have the correct patches:<\/strong><\/h4>\n<h5><strong>Windows 7<\/strong><\/h5>\n<ol>\n<li>Go  to <strong>Start<\/strong> -&gt; <strong>All Programs<\/strong> -&gt; <strong>Windows Update<\/strong> -&gt; <strong>View Update History<\/strong> and confirm that KB2667402 and KB2621440 are installed<br \/>\n<a href=\"\/tech\/files\/2012\/03\/image002.jpg\"><img loading=\"lazy\" class=\"alignnone size-full wp-image-54365\" title=\"image002\" src=\"\/tech\/files\/2012\/03\/image002.jpg\" alt=\"image002\" width=\"433\" height=\"246\" \/><\/a><\/li>\n<\/ol>\n<h5><strong>Windows XP<\/strong><\/h5>\n<ol>\n<li>Go to <strong>Start<\/strong> -&gt; <strong> Microsoft Update<\/strong> -&gt; <strong>Review your update history<\/strong><\/li>\n<li>Confirm that KB2621440 is installed<\/li>\n<\/ol>\n<p><strong> <\/strong><\/p>\n<p><strong> <\/strong><\/p>\n<p><strong> <\/strong><\/p>\n<h4><strong>How to disable RDP if you don&#8217;t use it:<\/strong><\/h4>\n<h5><strong>Windows 7<\/strong><\/h5>\n<ol>\n<li>Go to <strong>Control Panel<\/strong>, click <strong>System And Security<\/strong>, and then click <strong>System<\/strong>.<\/li>\n<li>On the System page, click <strong>Remote Settings <\/strong>in the left pane. This opens the System Properties dialog box to the <strong>Remote<\/strong> tab.<\/li>\n<li>To disable Remote Desktop, select <strong>Don\u00e2\u20ac\u2122t Allow Connections To This Computer<\/strong>,<\/li>\n<li>Also <em>uncheck<\/em> the\u00c2\u00a0 <strong>Allow Remote Assistance box<\/strong> as shown below and then click <strong>OK<br \/>\n<\/strong><a href=\"\/tech\/files\/2012\/03\/image006.jpg\"><img loading=\"lazy\" class=\"alignnone size-full wp-image-54366\" title=\"image006\" src=\"\/tech\/files\/2012\/03\/image006.jpg\" alt=\"image006\" width=\"299\" height=\"333\" \/><\/a><\/li>\n<\/ol>\n<h5><strong>Windows XP<\/strong><\/h5>\n<ol>\n<li>Click <strong>System<\/strong> in Control Panel.<\/li>\n<li>On the <strong>Remote<\/strong> tab, clear the <strong>Allow users to connect remotely to your computer<\/strong> check box, and then click <strong>OK<\/strong>.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>On Tuesday, March 13, Microsoft announced that a critical vulnerability had been discovered in all versions of Windows from XP and up.  This vulnerability affects the Remote Desktop (RDP) feature of Windows.  RDP allows a remote user to connect to the computer and the vulnerability may allow even an unauthorized person to do so. Please review our instructions for installing the Microsoft patch. Also, going forward, VPN will be required for RDP access&#8230;.<\/p>\n","protected":false},"author":1348,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[795,17001],"tags":[],"_links":{"self":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/posts\/54362"}],"collection":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/users\/1348"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/comments?post=54362"}],"version-history":[{"count":26,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/posts\/54362\/revisions"}],"predecessor-version":[{"id":63748,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/posts\/54362\/revisions\/63748"}],"wp:attachment":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/media?parent=54362"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/categories?post=54362"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/tags?post=54362"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}