To not be compliant you'd have to do something like run it on the default port with the guest user enabled.

Although I will admit that the truth is sometimes stranger than you could imagine. We were called in after a penetration that got some attention in various parts of the world.

Turns out that a low-level network admin un-racked the wrong equipment, and then bypassed the firewall. Little wonder the network was found, thoroughly penetrated, and then the servers were re-tasked to run an entire segment of a bot-network.

Short form is that you can take a nominally secure platform, and make it mess.


Indy
"Boss"

Indy's Blog

www.BestForYourPractice.com
Our Name is Our Creed