cancel
Showing results for 
Search instead for 
Did you mean: 

IIS shortname scanner vulnerability for IIS Based Distributed Repository

Jump to solution

Our Internal Security Scanner found that our dedicated Windows IIS Servers for internal facing HTTP Distributed Repositories are exposed to IIS ShortName scanner vulnerability:

https://github.com/irsdl/iis-shortname-scanner/

The fix seems to be as easy as to run

  • fsutil 8dot3name set 1
  • fsutil 8dot3name strip /s /f D:\IIS

But setting 8dot3name to disable is the reverse of typical ePO Server installation best practice (for VSE AP Long filename/short file name resolution).

Question is... is this safe for EPO Managed Distributed Repository?

I think so but I want to make sure.

Thanks,

Young-

Labels (1)
1 Solution

Accepted Solutions
Hawkmoon McAfee Employee
McAfee Employee
Report Inappropriate Content
Message 2 of 3

Re: IIS shortname scanner vulnerability for IIS Based Distributed Repository

Jump to solution

Hi youngpae1,

Yes, the repository should be OK.

I offer the following  as information.
This article as it has a rather good description (in the 'Cause' section) of 'issues' '8 dot 3' can cause if its not accounted for correctly.

Unable to log on to the ePO console after migrating ePO to a new server
Technical Articles ID: KB84177

Was my reply helpful?

If this information was helpful in any way or answered your question, will you please select Accept as Solution in my reply and together we can help other members?

View solution in original post

2 Replies
Hawkmoon McAfee Employee
McAfee Employee
Report Inappropriate Content
Message 2 of 3

Re: IIS shortname scanner vulnerability for IIS Based Distributed Repository

Jump to solution

Hi youngpae1,

Yes, the repository should be OK.

I offer the following  as information.
This article as it has a rather good description (in the 'Cause' section) of 'issues' '8 dot 3' can cause if its not accounted for correctly.

Unable to log on to the ePO console after migrating ePO to a new server
Technical Articles ID: KB84177

Was my reply helpful?

If this information was helpful in any way or answered your question, will you please select Accept as Solution in my reply and together we can help other members?

View solution in original post

cdinet McAfee Employee
McAfee Employee
Report Inappropriate Content
Message 3 of 3

Re: IIS shortname scanner vulnerability for IIS Based Distributed Repository

Jump to solution

It is not required for a distributed repository, only for the epo server itself.

Was my reply helpful?
If this information was helpful in any way or answered your question, will you please select Accept as Solution in my reply and together we can help other members?

You Deserve an Award
Don't forget, when your helpful posts earn a kudos or get accepted as a solution you can unlock perks and badges. Those aren't the only badges, either. How many can you collect? Click here to learn more.

Community Help Hub

    New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.

  • Find Forum FAQs
  • Learn How to Earn Badges
  • Ask for Help
Go to Community Help

Join the Community

    Thousands of customers use the McAfee Community for peer-to-peer and expert product support. Enjoy these benefits with a free membership:

  • Get helpful solutions from McAfee experts.
  • Stay connected to product conversations that matter to you.
  • Participate in product groups led by McAfee employees.
Join the Community
Join the Community