News

Microsoft Highlights Network Quarantine Feature in Wake of Attacks

In the wake of one of the most active weeks for computer worms yet, Microsoft is calling attention to a little-touted new feature of Windows Server 2003 that helps administrators ensure that remote users adhere to company security policies.

The new feature in Windows Server 2003 is called Network Access Quarantine Control, and it essentially puts remote access systems that log into a private network into a quarantine with limited access to the network until an administrator-supplied script can validate that the client system meets the organization's security policies.

Network Access Quarantine Control is not intended as a security measure to keep out attackers who have stolen company credentials. Instead it is intended as a fail-safe to ensure that legitimate users are in compliance with company policies regarding firewalls, anti-virus software, service packs, recent hotfixes and password-protected screensavers.

In the last few days, Microsoft posted a link to a 31-page white paper originally published in late March about Network Access Quarantine on its main TechNet Security page. The white paper can be found here.

Recent obvious benefits of having a Network Access Quarantine policy in place would have been to check systems for enabled firewalls, the MS03-026 patch that blocked the DCOM RPC hole that MSBlast exploited or recent anti-virus signatures protecting against Sobig.F.

"Despite the efforts made within organizations to ensure that computers used internally comply with network policy, those used from employee’s homes for remote access can still present significant risk to the network," Microsoft noted in the white paper.

Microsoft CIO Rick Devenuti discussed Microsoft's internal deployment of the feature on pre-release versions of Windows Server 2003 at the MEC 2002 show last October.

About the Author

Scott Bekker is editor in chief of Redmond Channel Partner magazine.

Featured

  • Microsoft Offers Support Extensions for Exchange 2016 and 2019

    Microsoft has introduced a paid Extended Security Update (ESU) program for on-premises Exchange Server 2016 and 2019, offering a crucial safety cushion as both versions near their Oct. 14, 2025 end-of-support date.

  • An image of planes flying around a globe

    2025 Microsoft Conference Calendar: For Partners, IT Pros and Developers

    Here's your guide to all the IT training sessions, partner meet-ups and annual Microsoft conferences you won't want to miss.

  • Notebook

    Microsoft Centers AI, Security and Partner Dogfooding at MCAPS

    Microsoft's second annual MCAPS for Partners event took place Tuesday, delivering a volley of updates and directives for its partners for fiscal 2026.

  • Microsoft Layoffs: AI Is the Obvious Elephant in the Room

    As Microsoft doubles down on an $80 billion bet on AI this fiscal year, its workforce reductions are drawing scrutiny over whether AI's ascent is quietly reshaping its human capital strategy, even as official messaging avoids drawing a direct line.