Security Recommendations
We provide a comprehensive list of vulnerabilities and remediation options on this page for our visitors’ reference. However, we would like to inform you that EireaNet, Inc. offers a free of charge automated mitigation service to our monthly subscribers. This service is designed to detect and remediate any vulnerabilities or other security issues on your system.

Our mitigation service is constantly updated with the latest threats and vulnerabilities, ensuring that our subscribers are always protected against the latest security threats.

Protect your business with our free mitigation services:
In addition to the automated mitigation service, EireaNet, Inc. also provides personalized consulting for businesses that require a more tailored approach to their security needs. Our team of experts can conduct thorough security assessments and provide customized recommendations to address specific vulnerabilities within your system.
Covered Categories.
-

Accounts
To prevent potential risks of unauthorized access to locally cached passwords or credentials, consider disabling the local storage feature. This can be achieved through two remediation options: enabling a specific group policy or setting a registry value to restrict the storage of passwords and credentials for network authentication. Read more
Last Modified:
-
Network
The LAN Manager authentication level should be set to ‘Send NTLMv2 response only. Refuse LM & NTLM’ to mitigate the potential risk of attackers sniffing traffic to reproduce user passwords. Disable the installation and configuration of Network Bridge, as it can allow unauthorized access between network segments. Additionally, disable IP source routing and require digitally… Read more
Last Modified:
-

Application (MS Edge | IE)
The content highlights the importance of disabling running or installing downloaded software with an invalid signature to prevent potential security risks. It emphasizes that an invalid signature may indicate tampering, enabling attackers to insert malicious code. The reference material also stresses the need to block outdated ActiveX controls to maintain Internet Explorer’s security. Keeping ActiveX… Read more
Last Modified:


















