Our cybersec team are getting onto us about all our servers having web browsers installed.
Posted by stone500@reddit | sysadmin | View on Reddit | 587 comments
I work for a large org. We have thousands of Windows servers across our enterprise. Our cybersec team is freaking tf out lately because I was having a conversation with one of the cybersecurity analysts (who isn't technical at all) and corrected her when she tried to say none of our Windows servers have web browsers installed.
I informed her that Edge is a core component of Windows and isn't easily removed, and honestly it would probably cause more issues if we did. This clearly induced anxiety with them and now we've had multiple meetings about the fact that we have web browsers installed on our Windows servers.
Have you guys had these convos? What's your take on this?
My feeling is that since a web browser, whether that's IE or Edge (depending on Windows version), is a core component of the OS, then removing those could result in larger issues with certain tools and utilities not working.
Our systems are largely locked down so only admins can access them. We have MFA with Entra and our admin accounts have rotating passwords every few hours.
Am I off base here? What am I missing in this conversation?
Barrerayy@reddit
presumably your servers have no internet access besides whatever you use for security/updates etc? So who cares if it has web browsers?
lectos1977@reddit
It is an extra potential attack vector to patch, secure, and maintain that isn't necessary for operation. It is usually neglected and is an easy in for hackers. Is that a large risk? Not really. But if you are neglecting web servers, what else are you neglecting? You and I both know that it isn't that big of an issue, but it is still an issue and should be addressed with a control even if that is a documented "so what?"
GelatinousSalsa@reddit
Web browser and web server is not the same thing
lectos1977@reddit
Are you stupid? Open port 80 iis that isn't used is a risk.
thatvhstapeguy@reddit
Edge unfortunately has to say since it's in the OS. Generally speaking nothing else should be installed just to reduce the attack surface as much as feasible with the application workload of the server
maxlan@reddit
Please go join a sub relevant to your skill level. Grown ups are talking here.
thatvhstapeguy@reddit
Server Core would be a great option if we had less legacy crap
enigmait@reddit
Invoke-WebRequest has entered the chat.
DullNefariousness372@reddit
Firefox has a CVE every freaking week it seems. Sooo stick to edge bruh
amajorblues@reddit
Our Cybersecurity people just point at the output of all the tools they've purchased and say "can you fix that?"
Does anyone have a GOOD Cybersecurity team? what does that even look like?
KickedAbyss@reddit
Underrated comment right here. "The tool says vulnerable" okay but context, friend.
Same with exploits that require console access - like my guy if they have console access, we're already in trouble.
planedrop@reddit
This is why people need stronger backgrounds before getting into infosec and why I will die on this hill.
There are plenty of posts about people saying you don't need networking or other background to get into infosec and it's just wrong, without the background knowledge you can't judge things as accurately.
Everyone who has worked as an admin in a Windows environment knows removing Edge is a big no no, so clearly this person doesn't have the background they really should.
This also makes things harder if you work in like a SOC and have to check EDR alerts and shit, if you don't know core things about Windows, you won't be able to judge when an alert is higher priority or not.
Secret_Account07@reddit
It’s really bad. It should be a requirement to work in infra of some kind. So many folks say things but if you put em in front of a computer don’t know what the hell they are doing.
Like yes, let’s block port 443 everywhere, Ted. Brilliant
planedrop@reddit
No we MUST block everything by default, minimum access, I need per domain whitelisting! lol
But yeah 100%, having some background in infra is incredibly important for most other facets of IT IMHO. infosec, developers, devops, whatever it may be.
ihaxr@reddit
Zero trust baby. We do this on all our Prod servers. It's just easier from a security perspective and, as long as your network/security teams are somewhat responsive, it's not a big deal.
planedrop@reddit
I mean if you PROPERLY do zero trust, yes, but my joke was mentioning per domain whitelisting because absolutely no one does that and shouldn't.
Like, for a normal client device subnet, yeah no you won't get away with manually whitelisting everything lol.
But yeah, proper zero trust is the way to go, or at the very least actual segmentation (which so many places don't have) and then microsegmentation if you can.
But full ZTNA or SASE, yeah that's the dream, if you can afford it.
PhilipLGriffiths88@reddit
Identity-first, zero trust connectivity, using on authenticate-before-connect (not connect then authenticate, which unfortunately is how the majority of solutions work) is the way forward... and it should not just be for human access, but also non-human connectivity across servers, OT, agentic AI, APIs, and more.
Also, while not 'free', open source of this does exist, so it doesnt have to be an unaffordable dream.
planedrop@reddit
Yeah I agree with this. I mean, even as much as I hate agentic AI, I still completely agree lol.
It's absolutely the way to go. I still think the price is high for some orgs though, and that's even with open source stuff, simply because you gotta pay someone that actually understands this stuff to set it up. I'll just put it this way, I'm not cheap lol.
PhilipLGriffiths88@reddit
Yeah, totally fair. The people cost is real - and honestly that’s part of the point I keep coming back to. If “zero trust” means manually redesigning routes, firewalls, VLANs, NAT, ACLs, DNS and per-domain allowlists, it becomes expensive fast (I call this the 'connectivity tax').
The better architecture, IMO, is to make the default state “nothing is reachable,” then let identity/policy create only the specific service connections needed. That reduces both attack surface and the amount of specialist underlay/network plumbing required (which means we can net save lots of cost).
It still needs competent people, no question. But the goal should be fewer bespoke tickets and less artisanal network surgery every time a new app, API, workload, site, or agent needs to talk to something. That’s where I think identity-first connectivity can make ZT less of a luxury project and more operationally scalable.
Happy to share to share the open source if you're interested.
planedrop@reddit
Yeah this is actually a really good point, I agree with basically everything you've said here lol.
PhilipLGriffiths88@reddit
Glad you agree... and note, for me, the connectivity tax is typified by pretty much every topology based control, whether applying it with zero trust principles or not (though evyer vendor would tell you they implement ZT nowadays).
fwiw, I work with NetFoundry and open source OpenZiti, if you're interest - https://netfoundry.io/docs/openziti/
Secret_Account07@reddit
One of our customers hired a “security expert” who gets paid 100k to patch vulnerabilities through Qualys. Everytime I work with him it makes me realize how clueless some SecOps folks are.
Last time we talked he asked me what an Active Directory is.
planedrop@reddit
I've dealt with some very very similar people myself so I totally get what you mean.
I had someone "with infosec experience" who is now higher up in the org than I am who said it wasn't important for us to patch our domain controllers lol.
Cheomesh@reddit
Nah UDP 123 is the promove
bankroll5441@reddit
Our CIO mentioned in a recent meeting that we need to "Make sure we are insulated from Open Source as a threat model". I almost barfed
planedrop@reddit
LMAO that's just lovely, a clear misunderstanding of how this stuff works.
Probably gets lots of vendor handouts too lol.
Cheomesh@reddit
Yeah, I was never an especially high-spec sys admin or anything, but I'm glad that's where my career started. Even if I'm not directly familiar with a system or piece of software I can usually fall back on my other experience to frame it while I get up to speed.
nickerbocker79@reddit
Our network and security team just block internal servers from accessing the web and just whitelist what is needed. No need to remove the browser.
Cmd-Line-Interface@reddit
"cyber security analyst- who isn't technical' , that is a little worrisome.
There really isn't a need for a browser on a server.
bigbearandy@reddit
Yep, that's a compliance guy. Compliance person should also know there's mitigating settings on Windows server to control browser policy so it can remain as part of the OS but control outbound web connections. It's just a setting you turn on, completely compliant.
ITaggie@reddit
I like to call them the "insurance adjusters of IT"
red_fury@reddit
It evokes memories of that video where the building inspector is loosing a technical argument with the builder on a roof and then just falls off the roof when he walks away from the argument.
admiralspark@reddit
It pays so well, I'd take the flak for that.
starrdlux@reddit
I wish more people would take the time to explain this instead of making grc the butt of every joke
bolunez@reddit
Compliance officers and auditors. Where the spreadsheets are always right and brains don't matter.
FluxMool@reddit
Oh these are good ones. Keep em coming lol
GamerDude290@reddit
I mean to be fair, most cyber security analysts aren’t technical. Their job is mostly reading logs, articles, and etc then create tickets for the actual technical people to look at it
stone500@reddit (OP)
I feel relieved/mortified that this seems to be common. Our CSE analysts basically send of bleepingcomputer.com articles and say "address this" without understanding what they read.
Expensive_Plant_9530@reddit
We have a guy on staff in an adjacent department that does stuff like that but he says “does this apply to us?” And leaves it to us. Which is appreciated and doesn’t step on our toes.
He’s also not a CSE, just a guy who likes to read security blogs.
I can see the merit in limiting web browsers or preventing third party ones on a server. Less software means less attack surface in general.
But if someone told us to remove web browsers from all our servers I’d look at them funny. Heck, some of those servers run software that needs a browser to access management, and sometimes you’ll need to use that locally on the server itself.
NysexBG@reddit
Why dont you just ask him to spend some time with you so that he gets to learn the infrastructure. This is what we do in our company with new engineers. They go to support and spend time there.
Expensive_Plant_9530@reddit
He knows enough for his work and neither of us have time for me to teach him something outside of his job.
glotzerhotze@reddit
Browser on a server?
laughs in linux
Sinister_Nibs@reddit
Linux in a browser?
gokarrt@reddit
all fun and games until they tell you to yoink curl
NotEvenNothing@reddit
Right? I think OP's cybersec team has a point, but it has to be tempered with the reality of the Windows Server world. I would also suggest that Windows sysadmins should be thinking about the implications of running a browser on a server.
I can honestly say that not one of the Linux servers that I am responsible for has a web browser installed. I've just never had the need to use a web browser from a Linux server, although I nearly always have a browser open on my local workstation, sitting right next to the remote shell. The tools make a browser on a Linux server unnecessary.
I lot of our Linux servers probably don't even have enough RAM to run a browser without starving their main function.
But on our Windows servers... Ya. They all have browsers and I use them occasionally. I just grabbed SQL Server Express and 7-Zip through a browser on a Windows server this morning.
bartoque@reddit
I don't expect that many linux servers even have a windows manager/desktop experience at all, so having graphical client applications like browsers also don't make as much sense (not that they couldn't be used, just not as likely that you need to run it on a server, that is what you typically use management or jumphost systems for).
On Desktop linux clients however...
akkruse@reddit
Graphical client applications like browsers?
laughs in Lynx
trimalchio-worktime@reddit
you're installing special software just for webpages?
laughs in curl
akkruse@reddit
Special packages just for web requests?
laughs in telnet
Zoddo98@reddit
Wait until the cybersec team hear that curl can be used to ""access"" the web and freak out.
*/s
...or not*
trimalchio-worktime@reddit
If people don't stop piping curl to bash I'm going to wind up agreeing with them.
glotzerhotze@reddit
laughs in winget
NotEvenNothing@reddit
That's fair. That would get rid of 90% of my browser on Windows Server usage.
Speeddymon@reddit
If you use curl, there's still a browser.
(Sorry if I missed that this was the joke)
mcmatt93117@reddit
Pft, just about 3 hours ago was using lynx on a Nutanix CVM to grab some info from some not externally exposed (outside of the CVM itself) web pages. Coulda just passed it over port forward via ssh, but lynx is there and easy enough.
LesbianDykeEtc@reddit
I only use lynx every once in a blue moon, but god damn is it useful when you need it.
xylarr@reddit
I browse using curl
blaktronium@reddit
People can be dumb with linux you know, ive seen a router with a desktop gui running before
Sinister_Nibs@reddit
Remove all web components from the IIS server.
Arkios@reddit
I hate people that do that. They’re effectively saying, “I don’t understand this, can you drop whatever you’re doing and read this and then explain it to me? Also, if you don’t read this and it does apply to us, I’m going to blame you because I asked you to look at it and you dropped the ball.”
It’s the worst combination of incompetence and CYA all bundled into one sentence.
itishowitisanditbad@reddit
"Hey, take time and the liability of my job all the time, i'll take the pay, thanks!"
bayridgeguy09@reddit
Last year Cyber said we need to disable NTLM by end of week. Guess whats still running due to legacy apps. These people have no clue what they are doing.
AGenericUsername1004@reddit
Whats wild in the companies I've worked at the cyber guys get paid a lot more than the sysadmins who keep the place running and all they do is run nessus scans and write acceptable use policies (most likely using templates or AI to do so).
lordjedi@reddit
CyberSecurity in general gates paid more. Management is going to come after the CyberSecurity guys first if they have a scanner for finding vulnerabilities. It's the cyber guys job to let the sysadmins know where the vulnerabilities are so they can be patched/filled.
Assuming the cyber guys let the sysadmins know, management then goes to the sysadmins in the event of a breach. Sometimes the cyber guys have access to tools they can use to mitigate the vulnerabilities, but often times they don't (patching servers is best made automatic anyway).
Most sysadmins don't have the time to do system admin AND vulnerability scanning/management. That's the reason they're two separate roles.
Simmery@reddit
We had a guy tell us we need to immediately disable and stop using all service accounts. It took an hour or two to get up the chain for the CEO to understand this would shut down the business.
lordjedi@reddit
What was the reason though? I can't think of a single vulnerability program that will flag a service as bad. They're usually listed so you can check them and if something looks funny, investigate.
My_Legz@reddit
I love this. I know exactly where they got this and how they misinterpreted it to come to that conclusion. Perfectly aligned shit storm
jimicus@reddit
Let me guess - they’re confusing service accounts with generic login credentials that are shared among several people?
My_Legz@reddit
Worst case it would be that.
It is also likely it is the fact that service accounts are a clear vector for attack and therefore have to be fenced, monitored, properly documented, and reviewed if they are needed on a regular schedule. They probably read that and concluded that is sounded like a lot of work and a high operational risk without understanding what those accounts actually do and that most of that job is (hopefully) already done by the team. Many such cases
OzymandiasKoK@reddit
Could be, but people who don't know what they are talking about often object to things without having to confuse them with anything else.
PhillAholic@reddit
Where? I’m curious
AHipsterFetus@reddit
Could be Hayabusa. Not sure. NTLM really shouldn’t be used though lol. You can restrict what accounts use NTLM to only those who need it.
The problem is non-technical cyber people won’t be able to help recommend mitigations. I’d rather switch to NTLMv2 where possible and enforce Kerberos elsewhere. OK, best is enforce Kerberos everywhere. Second best is switch to NTLMv2 and Kerberos as much as possible.
CeleryMan20@reddit
Were they saying to change the service accounts from user-objects having passwords to gMSA’s? Noble goal, but hard in practice.
What does one do with all the applications that are essentially “type username and pass into two text boxes and hit save”? Ideally you would at least untangle the accounts used for registered services from those used by the applications, but even that can be difficult.
Expensive_Plant_9530@reddit
Did they have some kind of replacement suggestion for the service accounts?
Simmery@reddit
Nope. It was just an angry idiot telling us to do stuff. And he was good at sucking up to the CIO, so it didn't matter that we all thought he was an asshole.
lordjedi@reddit
Yuck. What's the mitigation? Document it and move on? Spin up a separate server specifically for those apps?
I'm dealing with some of this stuff right now and it's crazy how much legacy shit is out there.
EugeneBelford1995@reddit
JMHO, but NTLM isn't by itself bad per se as long as
But others are right, most of the "cyber folks" I have worked with don't even know what half the stuff listed above is let alone how to implement it.
commissar0617@reddit
People actually use smartcards?
Mundane-Ad-5536@reddit
Good luck with implementing one of those as long as…
CeleryMan20@reddit
I’ve done five of your eight points. Guess I need to add an audit for accounts having Kerberos pre-auth disabled now. Sigh.
(Wouldn’t AS-REP and Kerberoasting still apply without NTLM running on the wire, so long as unsalted NT-hashes are still being stored in AD?)
EugeneBelford1995@reddit
Well ASREPRoasting isn't a thing against the default settings in AD 'out of the box' so it's only there if you misconfigured things. Even then it's not going to get anyone anywhere without passwords that can be cracked.
Hence why smartcards are so awesome.
One can Kerberoast without RC4 being allowed, it just takes longer. The trick again is to not have anything that be cracked, hence why gMSAs are awesome.
JMHO but strong passwords > disabling NTLM and smartcards are > than almost any other single mitigation. After all a phisher can't phish a password that the user themselves doesn't know.
FreeK200@reddit
Smart cards used to be a pita to auth against, but after updating the software stack to apps that support modern auth and throwing everything at your idp of choice, it's so much better. Before it was a crap shoot whether an app would support smart cards. Now we just federate via saml/oidc, with the idp configured to essentially act as middleware between the app and Active Directory.
We use Keycloak. Not a fan of ADFS, but it's also not too hard to get going, with the small caveat that you have to open an additional port for cert authentication. I just think KC is more flexible.
twitchd8@reddit
To their credit, Microsoft has announced a few years ago that they were deprecating NTLM. I was waiting for the proverbial shit to hit the fan at my old job before they let me go because I essentially kept bringing bad news to my manager.
OzymandiasKoK@reddit
They announce things ahead of time, but not everyone pays attention and there are an awful lot of super sloppy app vendors, never mind organizations still on ancient version X that no longer supported, isn't paid for, the niche app vendor went out of business, etc.
Dabnician@reddit
i had a auditor claim i was phished because i used the Report > Report phishing feature in outlook, the issue is that will cause whatever you forward it to to open the email links, the ip that opened the email was in redmond, washington while i work out of michigan.
I was even able to show them the sent item that forwarded the email to microsoft and they still wouldn't back down.
the same auditor was asking me if i thought network+ would be useful to someone that was "nessus certified".
in my experience most if not almost all auditors are stupid
CornBredThuggin@reddit
I worked with a guy who did that. He would copy and paste articles and then get tripped up. He had no clue what he was talking about.
TheGenericUser0815@reddit
I'va had similar experiences with external auditors. They gave me scripts to exec on out db servers, that weren't even running, because they had mistakes in them. I corrected and ran them, then they compared the results with a list and then this was it. They clearly had no clue what all that meant.
heapsp@reddit
IT security was pitched as a good career path so every grifter on the planet with no skills moved into the field,and every leadership team member is old and out of touch plus they want to hire 'analysts' not engineers to save a ton of money. This results in a bunch of people with liberal arts degrees getting an entry level security cert and being thrown right onto a team who is making this type of request.
Sorry you are dealing with it.
ddesla2@reddit
Yeh, that is pretty shitty. I guess I never thought of the actual difference between cybersec analyst and engineer other than the pay rate and slight skill gap... But I've always expected being extremely technical and ready to research from my analysts.
You see some kind of vuln or concern in a blog or some site online? Figure out the CVE it maps to (hopefully it has one by the time it's being widely advertised online lol), whether or not it affects our tech stack, who/what team is responsible for maintaining that thing/service/area and engage them to validate with the vendor or manually themselves, then have them patch it or otherwise implement some form of compensating control to mitigate until remediation can take place. That doesn't seem all THAT technical to me but more bare bones, minimum you should do.
heapsp@reddit
what you described is covered completely by products like wiz or orca though, which really means analysts could be replaced.
mightyyoda@reddit
Agreed. Having worked in IT before moving to cybersecurity, this thread can be summed up by a lot of reactive expansion in cyber teams due to incidents giving the profession a bad name and a lot of people in IT not understanding what's cyber teams actually do or the remit of different pillars mostly because of the former. There are a variety of roles to be filled with varrying needs of technical knowledge in cyber, but generally IT knowledge and experience is a prerequisite to the field for high performing teams.
ZealousidealTwo4660@reddit
Yeah this is what Wiz does. It handles all that automated scanning and compliance checking so we don't have to manually hunt for every little thing like browsers on servers. Frees up the analysts to actually dig into the interesting stuff instead of arguing about Edge being baked into Windows
Subject_Scholar9542@reddit
Yeah this is what Wiz does. It handles all that automated scanning and compliance checking so we don't have to manually hunt for every little thing like browsers on servers. Frees up the analysts to actually dig into the interesting stuff instead of arguing about Edge being baked into Windows
ddesla2@reddit
Well of course. Anything can be replaced by automation to some degree. I didnt mean for my comment to seem 'all inclusive' as if that's the only thing they would be doing. Simply replying in kind and on the same subject matter as the OP to keep it all relevant.
lordjedi@reddit
LOL. That's kinda scary actually. As a CyberSecurity professional, I always try to find the relevant portions of those articles so our teams can address it if necessary.
There's nothing worse than someone sending a link with "address this" and it's like "address what? WTF am I suppose to do with this?!"
fadinizjr@reddit
At least your analysts address the right platform?
Because mine don't, I work just with Microsoft environments and sometimes I got tickets for Linux CVEs and the Linux Teams get tickets for Microsoft ones.
Really good work.
terminal-admin@reddit
That sounds painful. Bleeping computer has so many articles per day I don’t even entertain reading them.
fnordhole@reddit
They didn't read it.
GuyWhoSaysYouManiac@reddit
Just because many of them suck at this job doesn't make it acceptable.
lordmycal@reddit
That depends on if they're expected to do the technical work, or if they're on the compliance/auditing side of the house.
GuyWhoSaysYouManiac@reddit
I'm not suggesting they need to do the work to fix the problem, but what their role should include is analyzing their findinga to determine whether it's an actual risk to the business and if it's something that needs to be prioritized. If they are blindly just forwarding all alerts or summaries some tool spits out, they are less useful than an AI.
TexasPerson0404@reddit
Depends on the environment. I’m a sysadmin who works closely with the cyber team and they basically do all the boring paperwork while I get to do the fun stuff. If they give me a stupid ticket, I just tell them and close it out.
I don’t really mind it.
RoloTimasi@reddit
A previous job had a CISO and a team of 2 cybersecurity staff below them. They were all non-technical and would just implement policies for IT to implement without a good understanding of the practical implications. Unfortunately, IT reported through CISO as well so I could only push back so much. I have never understood how someone can be in cybersecurity without a requisite tech background to lay the foundation.
Novel_Fault9705@reddit
Due to high demand, colleges began offering cyber degrees and companies ate up the cheap labor. My company’s the same. It bewilders me how a cyber team cannot care/understand why our network topology needs redesign for better segmentation.
Western_Gamification@reddit
Well, tchnicallybit does make it acceptable, as it is the norm.
glotzerhotze@reddit
THIS!
itguy9013@reddit
I have serious issues with Cybersecurity Analysts being a thing who don't have any other background.
The local community college system where I live has a dedicated CyberSecurity program and programs like that do a huge disservice to the profession.
If you work in Cyber you should have at least some experience in another discipline like Networking, Infrastructure, Development etc.
Miserable-Quail-1152@reddit
I asked a few couple guys on my college CTF team if they were gonna get a help desk like I was and they said “naw we are gonna wait until we get into cybersecurity jobs”. Getting a help desk job has been great, i could not imagine trying to jump straight into cybersec without interacting with systems
TexasPerson0404@reddit
Definitely a dumb comment on their end, but I’d imagine the folks participating in CTFs are far more technical than most compliance cats
tankerkiller125real@reddit
IMO cyber security should be a masters program only, OR, require hands on technical experience to register for the degree program.
ALL of the current bachelor degree cyber security programs that accept fresh from high school students are doing a massive disservice both to the profession as a whole, and to their students.
Palorim12@reddit
My best friend is a Senior CyberSeC Analyst, but he's been killing it in that role because he came from a Tech Support background, and now he's considered one of the top in the state.
ISeeDeadPackets@reddit
As someone in a hiring role, I have met very few people who went straight from high school to a cybersecurity degree that has a clue what they're talking about. The few exceptions are people who had home labs and did independent study because they realized they weren't being well prepared. I don't care if you can recite the entireity of NIST CSF 2.0 off of the top of your head if you don't know what any of it means or how it applies to the environment you're working in.
Comfortable-Side1308@reddit
> what any of it means or how it applies to the environment you're working in.
When we brought on ISO27001 and SOC2 controls in the beginning I remember how vague and abstract everything sounded. Now my brain gets it.
robofl@reddit
I worked in compliance for a few years. The manager of the department who listed about 5 sets of certs after his title seemed to know the least.
waynemr@reddit
Cybersecurity guy here with 20+ years security operations experience. Yes, it is a HUGE problem that "cybersecurity" is overrun with non-technical analysts. That being said, systems engineers and other technical people are absolute trash about regulatory compliance and don't have the experience, language skills, or fortitude to deal with contracts or laws. You can always tell the "good" cybersecurity folks who can maintain a very high level of specificity in their language skills. If they mix up having web browsers versus having web daemons, and the particulars of the security controls for the two cases, they need to GTFO.
timbotheny26@reddit
Correct me if I'm wrong, but wouldn't contracts and/or laws only apply to cybersecurity personnel working in the GRC side of things, or do even threat hunters, researchers, blue/red/purple teamers, and other technical roles also need to know that stuff?
waynemr@reddit
You are not wrong. Cybersecurity has sub-specializations. When you use the term "cybersecurity analyst" typically you are looking at GRC (risk & compliance folks). Cyber-operations (SOC folks) & cyber-intelligence (observability folks) are typically advanced system engineer types. Then there is cybersecurity architecture & design (secure solution design folks). The analysts can function without knowing the technical details, as long as they understand the tools they use to understand the risks and threats fed to them by the intelligence & operations teams. Analysts will use that data to forecast risk and then (hopefully) make informed recommendations about mitigating controls. That is where it breaks down in reality, though. The analysts, like project managers to some degree, need to come up with solutions that make sense for the business (non-tech folks) to match the risk tolerance of the business owners. So the analysts need to be able to communicate effectively with non-technical people all the time about seriously complex technical risks. Unfortunately, most people doing the hiring for cybersecurity analysts are not technical, so they end up hiring people they can communicate with better and not the technical experts. This is why I said you can tell good cyber analysts because they will be able to quickly and correctly communicate and translate between cyber-ops, system engineers, and business owners. What you described in your original post was clearly someone who has a knack for skimming quasi-security articles for the public (usually selling FUD for the views and likes) and then promoting that FUD into action. There are waaaay too many of those people saturating the cyber analyst field right now because hiring managers are bad at their jobs (something we can all agree on).
If you want to fix your issue, start a continuous cyber-security improvement function, where once a month you review incidents, remediations, and recommendations for their success/failure. Use that platform to chip away at the credibility of shitty cyber-analysts. If you do not confront them, they will fester and multiply. By putting time and effort into this continuous improvement process (I'm not gonna lie, it is extra work) however, you gain experience understanding the language used by your business partners and decision makers. Then one day, you can transition into one of the good cyber-analysts with good technical skills.
timbotheny26@reddit
Thanks for the response! Just heads-up though - I'm not the original person you replied to, just a curious passerby.
(And I don't want to be a dick, but could you please break up your first paragraph a bit? It's so long it makes it uncomfortable to read.)
waynemr@reddit
Yep, I started to answer your post first, but then delved into a response to the OP. Shit happens when you're drunk, like formatting. You seem to have made it through the block of text ok and without harm though. So, good job. :pats you on the back:
stone500@reddit (OP)
Help me understand what the functions of a cybersec analyst and a system engineer should be. I understand that as the engineer, it's my job to have the technical knowledge and experience to help implement whatever action we decide to take. I don't want the analysts or hell even the cybersec engineers (usually) to be going in and changing my systems.
However, I always thought that the analysts should be able to outline the risks, provide solution paths (with input from system engineers), and perhaps provide a checklist of security checkmarks that we should be following to adhere to whatever security standards we've decided on.
In my experience I don't feel like we really get that. We get links to bleepingcomputer.com articles concerning products we don't have (for example, I was sent an article about concerns with Youtube Vanced, which she interpreted as simply being Youtube. I had to explain to her what it was). If they send me a concern and I have follow up questions, I literally get a Copilot response.
I guess my question is, what is a cybersecurity analyst's role supposed to actually be?
Tricky_Fun_4701@reddit
I've been a system engineer for 35 years.
Because of various factors many people making decisions about security don't know anything about security.
Hell- they don't even know anything about networking or servers.
But they can read and force an engineering department to do something (Like "Remove Edge") which makes no sense from a technical standpoint and may even damage the server.
This is why I recommend people avoid the IT field in the context of the current day.
hgst-ultrastar@reddit
You have to be tactical in order to digest those things to know what to filter… I’m hoping it is one of the first to be automated by AI—all they do is export reports to PDF and say “pls fix”
Aggravating_Refuse89@reddit
What an absolute useless job
fdeyso@reddit
Some of them doesn’t even know what’s DNS and how it works, they keep calling our AD certs “self signed” because they do not understand.
discgman@reddit
They should disable DNS for security
Parking_Ocelot_6893@reddit
Its simpler to manage everything in the hosts files anyway
discgman@reddit
You just gave me host files flashbacks. Do the younger guys even understand?
Parking_Ocelot_6893@reddit
I have so many flashbacks I could share with you. I think the young’uns would understand what a hosts file is but as for manipulating and using it like we did 10 years ago that’s pretty much out the window
discgman@reddit
I think I had to use them to get to mapped drives
fdeyso@reddit
I know you were joking, but i already went through this: onpremAD with DNS and forwarders to public; we got an alert from our SOC that one of our DC’s were used to visit a certain site, code brown, our cyber person immediately calls me to stop the servers (domain controllers) immediately because they’re infected, it took way too long to explain that a client on-site used it as its DNS resolver and if they just shit the F up for 3 minutes i’ll find in the logs and they can have a go at that person+ our firewall blocked the https request to the site anyway….
hubbyofhoarder@reddit
Is this really the case in most other places? I'm a cybersec manager with a small crew, and when we make security recommendations, more than half the time we're the ones doing the work to implement them. I don't think I've ever made a finding/recommendation without knowing how to do it myself and being able to clearly explain it to my colleagues on the admin crew if they're going to be doing it.
jptechjunkie@reddit
When our cyber team does this we require them to bring us the remediation steps. Found a problem? Bring the solution often goes better than saying fix this with nothing.
OEAXTAIL_SOUP@reddit
How do you intend to read a Windows event log if you have zero knowledge of Windows internals?
FlickKnocker@reddit
How you could read a log file and not be technical... I'd even go as far as say technical with dev experience for a lot of logs as raw output can sometimes just be whatever the native logging facilities are for whatever it is that's generating the logs.
Shazam1269@reddit
Right? If you don't understand how the plumbing is configured, how can you understand what the logs are telling you? It's some real Idiocracy sh!t going on.
"I pushed a button on the thing and it says your ts all *ed up."
yahuei@reddit
How exactly are you assesing these logs and articles when you have no clue whats going on. These non technical people constantly waste everyones time.
UnderwaterB0i@reddit
It's not creating tickets for actual people to work on it, it's putting the actual work into the hands of the people who manage the servers. Cybersecurity employees should NOT be logging in to servers and installing patches. That should be done by a server management team. They should provide potential risk and remediation, allow stakeholders to decide what their risk appetite is, then that combined is given to a server team to execute the plan.
mimes_piss_me_off@reddit
GTFO with your thoughtful and reasonable contribution. We'll have nothing but tar and feathers around these parts, commie.
BokehJunkie@reddit
Much the way many cyber folks don’t understand IT, many IT people don’t understand Cyber.
OkAssistance7072@reddit
As the IT people at a medium sized org.... that cyber guy is a dick and makes my job way harder.
As the cyber folk at the same medium sized org.... that IT guy is awesome and makes my job so easy.
cbowers@reddit
Seems odd. Our SOC was built with extremely technical analysts. With “full stack” all role IT experience, networking, firewall, infrastructure, etc. They previously did any/all IT roles. That’s how they not only understood the user behaviours, but the environment, the strengths and weaknesses, the constraints.
It’s how you triage faster with background insight and people/systems understanding.
To the browser issue. My worry is if they’re worried enough to be yanking browsers the SIEM coverage for [parent]processes, command line strings isn’t where it needs to be. If it was: - they wouldn’t be surprised where browsers were and weren’t. They’d know every process on every device and what those processes were doing. - they’d have process telemetry to know the baseline expected vs unexpected behavior and detections to stop the things they’re worried about. - they’d don’t have sufficient DNS monitoring and controls on the servers.
If those are true… uninstalling browsers on server aught not to give them comfort, and the discomfort should be directing their efforts and dollars on better SIEM insight, monitoring and controls.
The more normative issue seen on servers is where third party browsers are installed with no patch process. They sit dormant and unpatched as a potential risk score escalating on the Vulnerability Management dashboards.
The pressure from SecOps then becomes “implement app patching along with the OS patching, or uninstall the software until it’s going to be used and maintained.”
olcrazypete@reddit
Last gig we had a 'security' team. They had their own scanning setup, i'm blanking on the name of it now. They would scan and verify. Fine.
Except the company had the habit of buying competitors and keeping their legacy products going with no plan to update them or migrate the users into their main software. So there was every version of linux from RH 5 to Oracle to Ubuntu in every flavor of release, multiple versions of Java, Windows 2003 servers still running in 2024. You name the scary old tech - it was in use.
So they had a pointless job they couldn't enforce because company policy was 90% putting out fires with old shit and whatever you do don't update it.
Left there after a year. Last I saw they got aquired shortly after.
ISeeDeadPackets@reddit
You can't possibly govern something you don't understand. Security analyst is very much a governance related position. That doesn't mean they have to know how to implement a new system but they had better understand what the major components are and how they interact with other systems and networks. If you don't have that insight, maybe you can work on some very specialized task, but you're not qualified to be telling IT what to do. I don't know how you can call yourself cybersecurity anything if you don't know what an ACL is.
GreenBurningPhoenix@reddit
Um, reading logs requires a lot of technical expertise, lol. You need to understand what you've read to act on that properly. How somebody without tech expertise can even do it? It sort of makes me mad because I sit on the job for which I'm grossly overqualified, but I can't get a more technically advanced job because my current job position is an 'inadequate experience'. Are you saying that there are sec analysts out there who read logs without understanding them?
ZAlternates@reddit
Jesus. Im glad I don’t work in this environment. Sounds painful.
Mental_Beginning_698@reddit
Yea, but if you don't have some cursory knowledge of the stuff, couldn't you accidentally put the fuel hose in the front window and start pumping gas and then email a team later saying "smells like a treat"
I-baLL@reddit
What's more worrisome is that after a conversation with just the single analyst, the ENTIRE cybersecurity team freaked out. So NONE of their cybersec team is technical if they're freaking out like this.
Ngumo@reddit
Wait. You can have technical cybersecurity teams?
babywhiz@reddit
^ see the subreddit you are in? Yea, we are all teams.
Spike-White@reddit
Sure. A lot of our cybersecurity engineers that review our Linux servers have a background in Windows administration.
We spend most of our meetings explaining how it doesn’t work that way in Linux. Case in point — we don’t install web browsers but the CLI clients are available— curl, wget.
NysexBG@reddit
I work for a company where we have 1 Security guy currently and look for a second ( EU ). How do you distinct between analyst and technicals ?
I am classical sysadmin btw, i do take interest in hardening and security overall but nothing too deep like certs or red team.
AppointmentIll9358@reddit
Those are the people that skipped A+ cus and Net+ cus they thought they were too good for it
jnkangel@reddit
Sounds more like an auditor/compliance team than a cybersecurity team.
They probably have an actual cybersecurity team, just called something else
1stUserEver@reddit
Their job is to check a checkbox on a form. They will ride your ass until they can check that box.
Hypersion1980@reddit
No you ride their ass until they check the box.
1stUserEver@reddit
I do ride my ass all day. Aren’t we all sec ops at this point?
cloverdung@reddit
Or, maybe they ARE the cyberinsecurity team.
ddesla2@reddit
Emphasis ON the wrong words baby. Took me a minute.
1stUserEver@reddit
I would be too if I were in cyber sec
Tireseas@reddit
Yep. Either that's the auditor or the auditor is riding the security team to get their ass in compliance and thus the security guys are riding you. Doesn't matter what you know, doesn't matter what you think All that matters is you are demonstrably in compliance with the expected standards.
MotionAction@reddit
Sound like highly paid CISO who knows enough to talk management speak, but when real incident hit and technical stuff start happening they grasp anyone on the team or 3rd party team to do the operation work. After the incident the CISO goes on vacation or goes on conference paid by company or some other vendor. I got to give it up to CISO know how to get other people to do the work (most of the time it is Mendoza Line work)
Namikis@reddit
Can you get a degree in cyber security without a solid tech base? Seems impossible/implausible for that to be true, it would be a worthless degree/cert. This analyst will end up looking stupid.
bod101@reddit
As a cyber Sec Analyst that is technical, it's annoyingly common. Very very common.
fnordhole@reddit
"cyber security analyst- who isn't technical' , that is typical.
Sinister_Nibs@reddit
Almost as good as the CIO who spent their entire career in sales and marketing.
gokarrt@reddit
that's the only kind they make nowadays
0zer0space0@reddit
I think my most fun with cybersec was when they had run their web vuln scanner tool(s) against some of our hosted web apps, which found some vulns, and that they (rightfully so) wanted closed, but closing them would require a developer to rewrite portions of the website code, and they couldn’t understand that a sysadmin is not a developer, and that the appropriate path is to submit a finding to the vendor/developer of said web app, and we patch when they release one. I offered to mitigate until then by taking the website offline. 😂
dan-theman@reddit
When my previous company was bought out by a larger corporation, we were audited by their security team. After talking with them I realized, most of them were originally in accounting. I guess those skills of running a tool and analyzing spreadsheets were more important to the job than actually having a deeper understanding of the technology.
Yeah_Nah_5875@reddit
Don’t be surprised, currently working with a client who’s lead Cyber analyst didn’t even know their DNS server IPs
Industry seems thin on actual skills and orgs filling seats with meat sacks
Novel_Fault9705@reddit
Boy do I have news for you
hgst-ultrastar@reddit
Yeeeah our entire team of like 25 cybersecurity maybe has one person who could tell you what SSH is. It’s just become a career full of non technical people who don’t have any passion for technology and push their workload elsewhere. An “IT flavored” legal department staffed by overpaid ClickOps
coomzee@reddit
I feel your pain
helloitisgarr@reddit
i also feel your pain
pc_jangkrik@reddit
Reading that made me puke a little
_DeathByMisadventure@reddit
I remember back in the early 2000s. I worked at a startup bank, and we had 2 infosec guys who were... amazing. We willingly went to them when we were working on designing things, to get their input on doing things securely. All the sysadmins learned a ton from them on building things the right way.
Yeah, my boss the CTO fired them and replaced them with his buddies from his previous job. You all know what they were like.
lordjedi@reddit
Yes and no. The industry is littered with them. They get a report from a vulnerability scan that says "Web Browser - Recommended action: remove" and don't think twice about it.
Yes, they need more education, but the tools need to be better. Any tool that flags Edge as a problem on a Windows server needs to be beaten with a stick.
Deadpool2715@reddit
After being in my current position for about 6 years I spoke to a CS specialist whose been with the org for over 10. When explaining the setup I was planning I mentioned "they'll be in the same network as the XYZ domain devices, but not domain joined".. their response of "we have more than just the 1 ABC domain, oh good to know" derailed my entire train of thought
Maro1947@reddit
Have you not dealt with Cybersecurity before?
StrategicBlenderBall@reddit
You must be new here. I’ve been in the cybersecurity field for over a decade, most “cybersecurity analysts” are just compliance checkers. They’re typically not technical.
They might know what a RHEL STIG check is, and they can tell you a certain package has an open vulnerability, but they won’t know why you can’t update/modify/remove those packages without breaking the system.
Cmd-Line-Interface@reddit
To Reddit? To the field, nah. I’ve spent the last 15yrs in the tech. All the analyst I’ve worked with have been technical. How are you suppose to isolate or upgrade security tools if you’re arnt technical? The thought blows my mind. I guess I’m “new” then.
StrategicBlenderBall@reddit
I think it depends on where you work too. The vast majority of my career has been in the defense sector, and most “analysts” I’ve worked with were non-technical, many straight out of college. A lot of the time the technical work, running STIGs, scans, patching, etc., were glorified sys admins or security engineers.
whiskeytab@reddit
our are like this too, I ask them pointed questions in email chains and make them explain themselves in front of everyone when they suggest something stupid
NoobensMcarthur@reddit
We’ve got one of those where I work. Their lack of understand causes a shit load of work for my team trying to explain to the executives why security is wrong. If they had their way there wouldn’t be any logs to review because no one could get any work done on fully locked down machines.
guitpick@reddit
We had one of those. If you can't show me how to fix it or work with me to fix it, then don't tell me to fix it.
pegz@reddit
I doubt these "non-technical cybersecurity analysts" even know that windows server has a non GUI version too. So it's they read some pointed article about how browsers are the most dangerous attack vector and ran with the the silly idea as gospel with varience.
BriefComputer3220@reddit
A lot of the cybersecurity boot camps, and cybersecurity college programs I’ve seen have been based in non-technical curriculum. It’s off-putting to say the least. My org has been seeing an increase in these kinds of things, and it’s exhausting.
wraithscrono@reddit
My wife is doing a degree in cybersec... it has 2 networking classes and the rest are theory of what things could happen but nothing deep about what is actually going on. One Linux class and she learned how to run a trace and arp-a... it's all fluff
Taftimus@reddit
A lot of cyber security analysts that I’ve come across just jumped on the whole ‘cyber security is a great career that makes a lot of money’. They don’t know shit outside of their niche.
_bx2_@reddit
Friend, they exist. I have them on my infosec team also.
japanfrog@reddit
Welcome to the new world order where the tech sectors within companies have been overtaken by VC, HR, C-Suite, Nepotism, and MBAs who still struggle opening a word document.
niomosy@reddit
That's just the standard I'm used to at this point. There's some rather sharp ones in security but most of our security team are button pushers and report generators.
I_COULD_say@reddit
I haven’t meant a whole lot that are actually technical, tbh.
The highly technical analysts aren’t working in a SOC / handing out mandates to sysadmins lol
They’re somewhere at a firm tearing these exploits apart, etc.
techw1z@reddit
most trained "cyber security analysists" are clueless about acutal tech, they just learn all the common terms and how to click through a bunch of SIEMs and then get a certificate.
which is why most of them are completely useless 😄 (huh, reddit has automatic emojis now?)
IMO, people shouldn't be allowed to go into cyber security unless they have at least 10 years experience of managing actual IT systems and networks.
Shazam1269@reddit
It's the equivalent of that scene from Idiocracy:
"This one goes in your mouth, this one goes in your ear, and this one goes in your butt. Wait... no... this one goes in your butt."
coomzee@reddit
Woo how did you get them picking up SIEM alerts.
Library_IT_guy@reddit
This is about to be the entire fucking state of Ohio, where I work. Mandatory cybersecurity audits for all local gov and political subdivisions. Every gov agency in every county needs to have a cybersecurity audit every year. Who does the auditing? Why, the state auditor's office of course! You know, the guys that audit our financial stuff!
Extremely limited guidance on what they are auditing for and what requirements we need to meet other than "NIST, but scaled down to your organizations size and needs". Thanks, NIST wasn't already vague enough, now I need to decide how to scale it. I'm an IT generalist that makes $50k per year ffs.
RansomStark78@reddit
They are all like this at the start.
Save me
A_Nerdy_Dad@reddit
Yup.
Sorry, can't be that kind of analyst or professional in that space if you aren't technical. Full stop.
charleswj@reddit
Tell me you've never worked in the DOD without telling me you've never worked in the DOD
theballygickmongerer@reddit
It seems to be the norm based on our cyber ops team. Sysadmins are their point for escalation.
Ok_Enthusiasm_758@reddit
It's apart of the job 🤣
daschande@reddit
I saw a job posting on indeed for a SOC 2 auditor. Their experience requirements were someone who's taken an intro to IT 101 class and nothing else. They stressed how it was a great way to get your foot in the door with an IT career.
thecravenone@reddit
"Cyber security analyst whose expertise I will put down because it is not the same as mine" doesn't roll of the tongue so easily.
Sh3llSh0cker@reddit
okay so i did read the same thing. not sure how that works but like i’ve said before funny world…it’s these folks who have jobs 🙁😟
fdeyso@reddit
Welcome to the new “normal”
ConsistentLove1915@reddit
🙃😂😅
abstractraj@reddit
That’s what we have also. I get the feeling these are more process people. Not technical people
RonDiaz@reddit
par for the course really
Responsible_Minute12@reddit
This is an issue, and is in fact a big issue and MSFT has guidance on how to remove or lock down browsers. I am sure that analyst is next to useless in that they could not explain why this is an issue and ask probing questions about additional mitigations, but this is an issue and only the required services and components should be running on a server.
Sqooky@reddit
Not off base. They need to provide a clear, and accurate risk. Tell them to pound sand.
hkusp45css@reddit
Yeah if "browser is installed = true" is a security threat of a magnitude that it needs remediation, the whole world is just proper fucked.
After-Vacation-2146@reddit
Doesn’t need remediation but it does need mitigation. Last thing we want is Joe Admin installing a backdoored notepad++ because that’s what he browsed to with the web browser on the server. Ideally servers are cut off of direct internet access except for known external domains and IPs.
Test-NetConnection@reddit
And what's stopping joe admin from copying malicious copy of notepad++ into the server from a network share or via rdp? Locking down browser access is a solution in search of a problem.
MBILC@reddit
Risk assessment and determine if that is a threat, a solution.
First problem would be how was Joe Admin able to download a malicious copy of notepad++, that is the first failure on the device that was allowed to download it and not detect it as malicious.
Test-NetConnection@reddit
You are making my point for me. If you already have controls that prevent joe Admin from downloading a malicious copy of notepad++ then you don't need to inconvenience the people doing actual work by disabling the web browser on servers. People in the real world need to go to moanmyip.com to make sure the network guys did their bloody jobs and created the damn NAT rule that was approved by the change board 2 months ago.
MBILC@reddit
Agree, being told to remove the browser from a server is silly, so long as you are blocking / controlling the internet access for said servers in some other way.
After-Vacation-2146@reddit
There is always going to be pathways to compromise and it’s a losing battle to get them all. The goal is close as many as possible to prevent likely scenarios.
Also my entire career has been in F100s and FAANGs. Any server I’ve ever interacted with has not had internet connectivity via the browser ever.
hkusp45css@reddit
Blocking the internet except for known valuable endpoints is the mitigation. If you're removing software to manage the risk, you're remediating.
MBILC@reddit
This.
Servers should have outbound default block all anyways, and any server that does require Inet is routed via a perimeter device / proxy and in a DMZ. Patches and such should be managed via a central system.
sdoorex@reddit
Just wait until they learn about Invoke-WebRequest and Curl!
Ssakaa@reddit
I mean, two things can be true at once. It's not a reasonable expectation for full removal as a mitigiation (although I do wonder how much of Edge is around on a proper core install)... but the world is also just proper fucked...
hkusp45css@reddit
You had me in the first half...
lordmycal@reddit
The proper mitigation is to block web browsing traffic coming from these servers that isn't needed, not to try gimping the servers so they're more likely to break during the monthly patch cycle.
redyellowblue5031@reddit
This is the approach we’ve taken. Only necessary destinations are allowed for servers. Keeps it simple.
lexbuck@reddit
So out of curiosity what do you do then if you need software on the server? Allow the destination? If your servers are like ours, no one is ever actively web browsing for fun on them and if that’s the case and you’re going to add a domain to the destination allow list when needed anyway, then what’s the point of blocking all others in the first place?
420GB@reddit
Is this a joke? If you need software on a server you install it from your company-internal software repository. That doesn't require the internet or a browser.
redyellowblue5031@reddit
Software is centrally deployed, so it’s never downloaded from the web during an interactive session.
Our goal is to block network access for servers except for the bare minimums it needs to fulfill its duties and update.
lexbuck@reddit
Gotcha. Thanks
Vino84@reddit
If you need the software, you package and deploy the software if you can, manually install it from your DML if you can't package it, and then add it to the allow list in your app control software (if you use it). That's standard practice for ACSC Essential 8 compliance in Australia. I don't know how that fits into other security frameworks, but it ticks the boxes for us.
bfodder@reddit
Edge, like Chrome, doesn't get updated if you never launch it. So their vulnerability reports are likely full of servers with outdated versions of Edge included.
Splask@reddit
It gets updated if you update it the riggt way,, no opening required. Can't say the same for Teams...machine-wide installer leaving old versions tucked unto unused profiles.
Cheomesh@reddit
Correct. Though, I do occasionally remember Server 2019 having issues where I would witness updates get installed but our scanner (ACAS) would still return it as a finding until it was opened. It not being consistent across all our servers was odd and made me think it was an ACAS issue, though. It came up too uncommonly for me to really dive into the cause.
PTCruiserGT@reddit
Yeah, this happens if someone installed (Chrome) to their user profile without admin rights.
In such a case, it only updates when that user logs in and opens Chrome.
DominusDraco@reddit
Thats not really true if you are deploying and patching your browsers as opposed to letting them update themselves.
Master-IT-All@reddit
Any code beyond what is required to operate is a risk.
iamtechspence@reddit
What Sqooky said
reparadigm@reddit
Cyber risk guy. I’m not going to care or be surprised that Edge is woven into Windows server.
I will start to care if admins are logging into the servers interactively and using those browsers with escalated privileges.
I think the best argument in your defense here will be describing what checks and balances are in place to prevent that from happening.
amajorblues@reddit
Just talking with people about how all security analysts can do is point at what some tool says and say "fix that"
Smart-Confidence749@reddit
Edge can be easily uninstalled from win servers. I do it for all our servers, and where necesarry I use portable versions of browsers, since my servers only access LAN
egamma@reddit
Sounds like they want you to switch to the "Core" install of Windows Server. You could suggest doing so in a pilot program to work out all the gotchas--for example, error pages are commonly set to be viewable "local only", so you'd be unable to see that troubleshooting information without changing the web.config file.
killjoygrr@reddit
Just go full blown windows server core. No pilot, it will be fine.
What could possibly go wrong when you remove the gui from an OS designed to be run in a GUI.
I’m sure Microsoft provides plenty of documentation on how to work from the console…
stone500@reddit (OP)
I actually did suggest to my team that we should be utilizing Core. I had some talks with the Cybersec team and they're concerned that some of their security scanning tools may not work on Core, which is hilariously ironic
Few-Presence5088@reddit
Honestly, I tried the core route but so many apps/systems don’t support it so I found it nearly useless except for something like a dc. Then you have admins that freak out accessing core systems. Just wasn’t worth the hassle.
Glass_Call982@reddit
Have you tried it with the app compatibility add on they have had for a bit now? I haven't found much that won't run on it now. Most of our servers are core, even exchange and sql clusters.
NoobensMcarthur@reddit
This pisses me off so much. I recently had to bypass multiple conditional access polices in Entra due to a cloud audit. One of the findings was that our conditional access policies weren’t strong enough.
Mother fuckers, unless you’re a break glass account you can’t get into ANYTHING unless you are within specific IP ranges on an intune compliant device. We have more CA policies than that, but without those satisfied, you’re not getting into anything.
Darkhexical@reddit
Either switch to core or vlan off the device so it can't access anything but internal sites and windows updates and any other needed services.
Lukage@reddit
This sounds like the security audits that say "please open all your ports for our audit" when you'd think that the security audit should go "hey we can't access RDP publicly" and you go "good, so we passed?"
They should be telling you what they need access to from what, just so they can perform their job to perform those scans.
ISeeDeadPackets@reddit
Whitebox testing can be valuable to look for potential configuration issues, but it needs to be acknowledged as such. If it's even gray then they shouldn't be asking you to change a darn thing.
DevNopes@reddit
Also, these audits should not be seen as "pass" or "fail". Its a hardening cooperation, not a competition.
ISeeDeadPackets@reddit
Agreed. Especially for pen tests, I hire the best people I can get. I very much want them to find things we can fix, why else would I bother paying them? Doing it to check the compliance box and not getting any useful data out of it is just stupid, but hire one of those firms that run nessus for a day and then spit out the executive summary if that's all you want.
bjc1960@reddit
Could it be "some of their security scanning tools may not work on Core, because they need a web browser?" That would be even funnier.
Computer-Blue@reddit
If they can’t scan it it won’t create tickets!
Strahd414@reddit
Last gig, about 6 or 7 years ago, we defaulted to installing Core by default, and made it up to the requestor to justify why they needed a Full GUI on a server. Of course, we had good instrumentation, and used remote management tools extensively. It _did_ expose a few vendors whose documentation was a bit short on dependencies 😃.
It started with us installing Server Core any time we replaced a Domain Controller. Finally forced helpdesk to install and use RSAT instead of just RDPing into a DC whenever they needed to make a change.
TerrificVixen5693@reddit
Jesus Christ. You guys let the help desk log into a domain controller directly?
I don’t even want RSAT tools installed so that bad actors can’t use them to “live off the land”.
Frothyleet@reddit
This is not a real security mitigation. There's no realistic scenario where an attacker would be foiled by the lack of RSAT tools on an endpoint, where they wouldn't otherwise gain access.
Cheomesh@reddit
They brought their own RSAT from home
Strahd414@reddit
Note: we _did_ allow that. The migration to Core was part of a larger process to limit our attack surfaces.
For example, before then, helpdesk was all Domain Admins. We removed that and moved over to granular, delegated permissions (this was pre-PAM/IGA deployment). We were also strict about the controls over a person's "admin" account vs their "user" account.
Cheomesh@reddit
What were you using for PAM? I've messed with Delegation of Authority before but never needed to move beyond that.
ISeeDeadPackets@reddit
Depends a lot on the size and complexity of the organization, but if helpdesk is more than 2-3 people then yeah.
Frothyleet@reddit
I hope you also took away domain admin privileges and instead gave them delegated privileged accounts limited to the access they actually needed?
jdptechnc@reddit
>> Finally forced helpdesk to install and use RSAT instead of just RDPing into a DC whenever they needed to make a change.
Whoever allowed this practice in the first place is fired.
sparkyblaster@reddit
Next they will freak over them having network access.
loweakkk@reddit
Issue isn't on the browser but egress control. Do you allow your server to access internet? Filtered? Whitelist mode? That's how they should address this issue and not on a component being installed or not.
kshot@reddit
Where I work we don't have web browsers installed on our Windows servers. Not because web browsers are too risky, but to prevent a sysadmin to use web browser on access a compromised website directly from a critical server. So the browser risk is low and probably acceptable, but the user risk is kind of high if you allow sysadmins to browse the public web from prod/critical servers.
cyber_r0nin@reddit
This is why you have test servers. If something has to be downloaded it can be done to a file server then shared to a resident server that needs the file, but only after testing it in test. Right?...right?! Crowd strike anyone? Bueller? Bueller
Darkk_Knight@reddit
Wow. Browsers on servers aren't a problem long as it's not being used to surf the INTERNET.
k8line@reddit
Looks like with the power of internet. Everyone is an expert. Write to microsoft, big org have microsoft support for this. Bring them in, have a sit down with your “cybersec team”. Let microsoft support handles them. Big org likes these meetings.
NoTheme2828@reddit
Edge is not a core component of Windows Server and can (and should!) easyly be removed!
CeC-P@reddit
Most cybersecurity "professionals" have degrees from 15 years ago and no idea how OSes or hardware or security or networking work and just read results from automated tools and go to overpriced conferences.
So this surprises me exactly zero.
EnDR91-EC@reddit
That's why we have gpo hardening & tiers and CA for entra and azure policy.
Not that great security consultant imo.
no-dupe@reddit
I agree with her. You should just run a script and install Linux server on all of those machines. You may not be able to run what you need, but I assure you a cli experience will bring you no browsers.
Lost_Drunken_Sailor@reddit
Work cybersecurity for a very large gov organization. Browsers were removed from nearly all servers. If they haven’t been, we know which ones and we bug the crap out of those sys admins until it’s corrected.
Some of my colleagues are very VERY annoying so I’m sure it gets done.
Picotrain79@reddit
Just put a fake proxy address in!
N_I_N@reddit
This is why using core is a good idea sometimes. Also, IE should be removed on EVERYTHING. Period. Edge? Sure but keep it patched like everything else. I would still prefer that we could uninstall Edge and still be in a supported state.
TinderSubThrowAway@reddit
Have them explain why they think having the browser is a problem, once they explain that, then you can explain whatever mitigating controls you have in place to prevent that from being a problem.
In general, the browser itself isn't the problem.
publicdomainadmin@reddit
> I informed her that Edge is a core component of Windows and isn't easily removed
*group policy left the conversation*
TuxAndrew@reddit
Disabling and blocking it from reinstalling can break future updates in the US however the EU instances of Windows have different settings which require that Microsoft allows the browser to be permanently uninstalled.
ManyHatsAdm@reddit
And this is why I'm scratching my head thinking what the heck are this lot talking about, just go to appwiz.cpl and uninstall it like I have, no Edge on any of my servers and IE is removed via a dism command.
TuxAndrew@reddit
Absolutely baffling that it’s an “integral” part of the system in the US even though past lawsuits here frowned upon this exact activity.
ManyHatsAdm@reddit
I mean the fact that's it possible in Europe just proves it's NOT an integral part of the OS, and why would it be anyway, it's just another Chromium browser!
MairusuPawa@reddit
A reminder that United States of America v. Microsoft Corporation, 253 F.3d 34 (D.C. Cir. 2001) isn't a EU thing.
TuxAndrew@reddit
I never said it was?
publicdomainadmin@reddit
You don't need to disable edge, you need to prevent it from running outside of a select few options. There are GPOs that cover this.
TuxAndrew@reddit
Correct you don't need to do that at all but we're talking about what Security thinks should happen, they should do due diligence and assess the risk correctly so their remediation solution isn't to remove Edge.
publicdomainadmin@reddit
To be honest I think OP is either being pedantic or the rep sucked. I'd like to see paperwork reflecting that browsers be removed vs sandboxed and secured. I see many audits and CySa agreements and terms and what not, I have never seen anything indicating that edge or IE be "removed", let alone any other browsers.
Definitely heard of not having access to them as a user on the server.
TuxAndrew@reddit
This happened at my public university back when IE hit EOL. That being said we don't allow any other browser to be installed unless there's an actual use case.
Illustrious_Try478@reddit
Windows Server Core does not include Edge, only "Desktop Experience" Windows Server.
publicdomainadmin@reddit
Why are you telling me this?
FarmboyJustice@reddit
Probably because you used the word "core" in your comment.
publicdomainadmin@reddit
I quoted it from OP, which had nothing to do with the OS. Even if it was relevant advice it can't be even considered without an OS reinstall. Was a useless comment to add.
_UberGuber@reddit
You alright?
FarmboyJustice@reddit
Wheeeeeeeeeeeeeeeeeeeee!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Illustrious_Try478@reddit
Because you're reinforcing OP's misconception. It may not be feasible advice, but it's still relevant, especially going forward for new servers.
Separate-Fishing-361@reddit
You probably have embedded web servers in your hardware, as well as internal management platforms. In my old environment, the proxy config wasn’t pushed to servers. External access was logged, and external access by admin accounts was flagged.
johnyakuza0@reddit
Why aren't you using Windows Datacenter 2016 or 2019? They don't have any browsers installed by default except IE.
msavage960@reddit
Is this sarcasm?
Rude_Strawberry@reddit
What an awful comment
Mental_Beginning_698@reddit
Ours used to get on to us about running BGP on our WAN routers. Its like they were simply reading from a screen. And then they would ask for a reason.
Frothyleet@reddit
I mean, assuming that happened once, that's totally fair. We don't have an AS to advertise in our org, so if BGP was enabled on our edge devices, I would be questioning it.
In most compliance frameworks, all of your services and applications are documented, including the reason for their implementation.
Mental_Beginning_698@reddit
ok in retrospect, fair point on the documentation. You probably don't want that side of the house assuming anything.
GoogleDrummer@reddit
Based on my experience that's all they're doing. They have all these fancy tools and dashboards, and if any of them go red they panic and tell me to fix it. No idea about why it's red; just, "Red bad. Fix red."
Aero077@reddit
I had one that made a lot of noise about our routers "broadcasting our routes to other networks" (via a bgp connection). I hit reply-all and mocked him hard. He hated me and never spoke to me again.
Mental_Beginning_698@reddit
I'd love to but often had to stay on the diplomatic since too many are cc'd. or maybe thats the point.
japanthrowaway@reddit
This made me spit my coffee out. Thanks for the laugh
jocke92@reddit
If you don't have edge you'd have internet explorer. That's worse.
What matters is to block internet access for those servers that does not need it. And only permit the required services for those who need it
decoy713@reddit
Enjoy uninstalling all the browsers just to reinstall them, as you end up needing browser most of the time
libertyprivate@reddit
No. Our security team knows how computers work
viking_linuxbrother@reddit
Hardening is the standard not removal. Edge is used for Out of band patching, webview2 dependencies, many of the latest management tools and the official Microsoft support stance is that it is a System App.
Many JR Security folks and (some Senior security folks) aren't as technical, spend all their time preparing for the worst and are stuck in a doom and gloom news feed pumping out fortress mentality ptsd to make the world safer. Its always the same vein of ideas, and they often work in isolated use cases, but don't work across the board. Give them a gentle correction where they are wrong, educate them if you can and be up front about the detrimental effects this "security measure" would cause. Much of the time their suggestions come from scans, tools and the "fix" links their reports suggest.
A few recent discussions off the time of my head:
Denver80211@reddit
This is less about justifying a problem and more about justifying themselves. I feel like security teams are just make-work groups. And by that I mean they make work for other people, rarely themselves.
somerandomguy101@reddit
That's how it should be?
Security's job is security, not maintenance. They should be able identify and prioritize when something needs a patch or a configuration change. They should absolutely not be logging into servers and running updates or changing configurations. That's the job of whoever administers that machine.
FreeK200@reddit
This is all organization specific, but whenever I see this train of thought, I'm always tempted to ask "what is the value add here?"
Effectively, you're arguing that cyber's job is to spit out a vulnerability report at someone. Why are groups of people getting paid to delay getting vulnerability report into actionable hands while they sort by CVSS scores?
It's always been something I've seen to justify otherwise unnecessary positions. Shipping those reports directly to the appropriate teams should allow the teams themselves to do everything you just said, sans 18 emails about how this patch was backported two product releases ago and how it isn't applicable to our environment.
Obviously a small group of people should serve as oversight over this process. They're there to ensure all assets are being scanned with no gaps in coverage, reports / artifacts aren't being fakes, and should be working with configuration management to do so. Likewise, they should be configuring the reports and validating these claims against external sources, and calling out BS when they see it.
It's just asinine that I'm left with a team of four administrators to accomplish tasks, with 9 "cyber security" personnel providing us conflicting guidance every step of the way.
On that some note, this may be specific to my environment, but I always find it laughable that the mentality is that their team exists to audit our own. So many of the things that cyber security asks us for could very easily be validated themselves if they were interested. Instead, they open themselves up to the possibility of data being fudged while in transit to themselves. In that sense, I've always been an advocate of a separate, controlled account through which they can validate the live state of configurations themselves. Shockingly, they prefer me to do it.
I've always found this contradiction fairly funny, especially when I've yet to have an outside auditor take me at my word. Instead, they're much more interested in having their own (temporary) admin accounts for whiteboxing, or to hover over my shoulder while I pull up the relevant configuration. Im certain I'd be laughed at if I sent them an excel spreadsheet or a text transcript of a terminal output, but that's considered ideal by people within my org...
somerandomguy101@reddit
The valueadd is that with a 9 person team, patch management is just part of one persons job. The job is less "Just run windows update", but tracking how patching is going and prioritizing when something needs to be patched asap. In any large organizations, there's always stray assets where patches don't apply properly, and there are always services where version updates are a non-trivial effort.
The rest of the team is probably busy doing other stuff that you aren't seeing. They likely have people working on identity/access management, phishing, EDR, and a whole bunch of other things that you may or may not see.
Cheomesh@reddit
Up until recently I've always been both lol
Denver80211@reddit
Probably. And I'm probably just venting because all these people do is bitch. I suppose that's their job but they do it in such an authoritative voice that are really great to me especially when they have no concept of what they're asking for.
ilkinandr92@reddit
I think this might have to do with them reading about Firefox using anthropic AI to patch 271 zero day vulnerabilities that were exposed. Where other browsers do not have them patch and pose a security risk. Also there are tools to remove edge. It wouldn’t cause any major issues just some annoyances with windows depending on what you do. But for production it shouldn’t have any effects. Always have a backup to revert to if you want to test.
Sh3llSh0cker@reddit
your servers have GUi? interesting. CLI only and anyone else who says otherwise… all do respect they playing sysadmin they aren’t actual sysadmins. i can see the downvotes already which is fine.
i get big orgs that are to integrated with the shitty Microsoft ecosystem and some sysadmin inherit such garbage and need to deal with it but Linux is the only true and real way.
All the worlds HA systems & infra is Either Debian or RHEL like Rocky Linux. i dont any HA system thats running windows if you guys do point it out to me.
also your CyberTeam seems to be reading off of a checklist vs being actually CyberSec folks…this is a common trend i see😫
blackwarlock@reddit
I will agree with you that linux is better but windows server has its place and is required for a lot of things.
Sh3llSh0cker@reddit
fair point. i won’t argue that. these days even on the Enduser side fedora and Ubuntu have come a long way and integrate well with Windows based Domain Controllers but to your point windows is still heavily used
blackwarlock@reddit
Yeah until I have to trouble shoot on how to get Ubuntu to auth properly with our windows print servers lol. Thats more of an issue with are setup I think.
Sh3llSh0cker@reddit
ahh fair again i didn’t mean to offend the community in anyway, but yeah depends on the config and setup, for sure worth investigating but i get budgets, time, costs, downtime, etc etc. you guys have a big fleet of MFDs/printers ?
GelatinousSalsa@reddit
Sadly a lot of back end business logic apps runs on Windows, so not always easy to go Linux only.
Sh3llSh0cker@reddit
damn so many downvotes but i get it, i would say just depends on the org. I use to work for large software companies saas based and we did away with everything Microsoft and it was amazing, mind you the migration was a long process, I get not all orgs can do that. also i mainly speaking at HA level, large orgs use a blend of both windows and linux. to achieve this
Ashamed_Emu_4289@reddit
It is likely this person is just misarticulating the issue.
The only browser installed on a server should be Edge and it should be validated by a VMDR platform that it is being patched successfully. The browser should be configured to operate in a highly restricted manner that has at a minimum account login / password caching / history disabled.
My guess is that their VMDR platform flagged for several browser installs in user directories that have sat stagnant for years as a result of troubleshooting by a sysadmin.
russellvt@reddit
We don't even bother installing the X libraries on any servers.
maxlan@reddit
Kids these days probably have no idea what you mean.
I used to work somewhere we did install X libraries and apps, but not the server, on the server.
Because the X server is actually on the clients...
russellvt@reddit
I've also gome so far as diskless clients, at one point, as well... though, then you have the aforementioned issue in that the server (and libraries) generally provide a path of potential privilege escalation.
budlight2k@reddit
Yeah I've had this exact conversation with infused, had to shut them down because its stupid.
goatsinhats@reddit
They are applying a Linux standard to a Windows Server.
Best solution would be to find a reason it’s required, second would be make sure it’s really expensive to remove.
Select_Reporter1911@reddit
Do these servers have internet access. What is the risk with having an internet browser installed on the server. What attack surface is being considered with a internet browser installed?
If you are protecting the server via industry best practices, then bring that evidence to that team. Push back on the security team on their reasoning. Come up with an alternative to secure the server.
Have you had an outside firm do a security review of your infrastructure? Have they exploited the web browser in some way? If so the report would have some recommendations on how to secure that.
If the security team is just saying Uninstall web browsers just because ask them why, have them provide industry resources on the reasoning and how to secure the web browsers.
I would also ask if they understand the infrastructure and how its secured.
Unless all the servers have internet access the browser to my knowledge isn't an attack surface.
0hurtz@reddit
We block browsers from opening via GPO and use core editions so no browser
birdy9221@reddit
I can run curl/wget. UNINSTALL THE SHELL!
jrussbowman@reddit
The question you need to ask is what are the risks they are concerned about?
Some security professionals like to suggest their preferred solution to minimize risk, but there are usually other equally acceptable solutions. The goal needs to be to change the discussion topic to the actual risk so then you can have a conversation about options.
Sure you can suggest as other people have network controls and stuff out the gate. But security current is focused on the browser. You shift their focus to the risk presented by the browser it's easier to discuss alternatives. We all get tunnel vision and have a lens through which we view our infrastructure depending on our role. Good collaboration starts with putting effort into mutual understanding.
instadit@reddit
who's paying these non technical cybersec analysts? what exactly do they do?
jwb206@reddit
Servers should not be able to access the general internet. Where possible everything should go through a locked down proxy. In a truly secure world no one should be able to log into servers, everything built via code.... Dats next level shit for ya
Beautiful_Tower8539@reddit
Anyone can work in cybersec these days, honestly they have some of the least technical people who couldn't tell you the basics of how a network functions
thefold25@reddit
I say you take off and nuke the entire site from orbit, it's the only way to be sure.
tankerkiller125real@reddit
I'm both the IT Guy implementing changes, and the security guy protecting the infrastructure (hurray Solo Admin!) the first thing I do with every new windows server is strip it of it's browser. And then I run the automated hardening scripts and tools.
Does it make life more difficult sometimes? Yes it does.
Is that extra security worth it? Yes, it helps me sleep at night.
SirDerpingtonTheSlow@reddit
I bet you also think blocking ICMP Pings is some revolutionary security technique.
maxlan@reddit
What's your ip address? I've got a couple of places I can swamp you with icmp floods from.
Hopefully there isn't another zero day in the icmp stack any time soon...
If you need ping in your life, please go get a job where your skills are relevant. Maybe as a landscape gardener or something.
SirDerpingtonTheSlow@reddit
Okay, pumpkin. lmao
tankerkiller125real@reddit
LOL, no, it's a valuable network diagnostic tool. Doesn't stop me from limiting the types of ICMP packets coming in, nor requiring outgoing initiation for them.
xendr0me@reddit
I mean, "wget" is also likely installed as well as "ftp" but you don't just remove them, you just restrict them from running via applocker or firewall rules, VLAN isolation, etc.
You aren't offbase, they just have a lack of knowledge and understanding of the integration level of the browser and other tools already installed in the OS that can negotiate similar access.
I wouldn't rely on just MFA/Entra though, go further and restrict as mentioned above and come to a middle ground with them. Accomplish the same outcome in a different manner.
MrYiff@reddit
also Curl is now shipped in Windows as a non-removable component, and it's binaries are different to the Windows ones provided by the curl devs so when a CVE is announced you can't just drop in the updated .exe and have to wait for an MS patch.
freedomlinux@reddit
I've been at places that do indeed remove "ftp" and only install it on request after discussion.
No one should have an FTP server so there's no need for an FTP client, riiiiiight?
Burnsy2023@reddit
Indeed. You can't uninstall it, but you should be restricting use of browsers to prevent lateral movement.
HeKis4@reddit
Wait until they find out every windows server has RDP and/or remote-pssession enabled.
420GB@reddit
It doesn't though, at least not by default.
Ubermidget2@reddit
Yep - Wait until they work out that every Windows Server will execute arbitrary code in a .exe. The Horror!
The solve here isn't removing parts of the OS, it's firewalling the bad stuff out.
ReptilianLaserbeam@reddit
Wget is only installed from 2025 forwards.
mikeputerbaugh@reddit
God help any server that still has vanilla FTP installed in 2026
shadow1138@reddit
This is the way.
Restrict the system in accordance with least priv / least function. Harden the browsers based on this (firewall rules, smart screen, CIS or other agency benchmarks/STIGs, and patch it.)
Add an administrative control of 'priv users with access to the server OS shall not use any web browser functionality for common web activities (e.g. web surfing)'
And round it out with a risk register statement saying 'yep there's a risk, but we've taken all reasonable measures to mitigate it.'
rayjaymor85@reddit
A "non technical" cyber security analyst.
That is the dumbest f***ing thing I have ever heard in my life.
bigDOS@reddit
Most of our servers have edge because we use to interface with apps hosted on those servers. But the servers themselves are largely only explicitly allowed to communicate with our internal network and if it’s online then everything is managed through threat locker access control policies and the firewalll. Patches are managed and we work with cyber security to update policies if new network paths are required due to updates etc. It’s laborious and can cause outages but it’s the only way and it works pretty well.
IWantsToBelieve@reddit
Just block the internet from servers and move on.
maxlan@reddit
I don't know if you're trying to be funny but yes.
Even a web server on the internet should have no internet access in or out.
All valid inbound requests should go via a proxy with interfaces in the internet and private networks. The private network should not be able to route packets to the internet.
And servers should get their updates etc from a staging server, which only receives the updates after they've been tested. (Which should have prevented crowdstrike from being such a massive fuckup).
And all the testing, uploading, etc should be automated.
If you can't achieve all the above, then get out of the sysadmin sub and go join a sub for post turtles.
Grinds my gears that people call themselves sysadmins and are incapable of these sort of basics. Or want to blame time or money or whatever else for doing a shitty job.
Rude_Strawberry@reddit
Often comes down to cost
spitecho@reddit
Disable the browsers for all admins in AppLocker, use GPOs to whitelist browser extensions and apply a framework of other secure settings to create a baseline. Or just let them uninstall a core component for curiosity and entertainment's sake.
MairusuPawa@reddit
Ah but see, Microsoft has to claim otherwise since United States of America v. Microsoft Corporation, 253 F.3d 34 (D.C. Cir. 2001). Are you saying that MS is lying? Weird.
tsutton@reddit
We leave Edge on Windows Servers because like you said, it's core of the operating system. No Chrome, Firefox or whatever. Then we 100% block Internet access and only whitelist a few like Azure, Windows Updates, etc.
maxlan@reddit
You let your servers talk direct to the internet?
Did you learn nothing from Crowdstrike? All updates should be automatically downloaded into a test env, tested, moved to an internal distribution server and installed from there. Simple.
tzigon@reddit
Do you trust the people who have access to the desktop of the server not to go to non business related web pages?
Secure rdp access as needed to meet that condition.
maxlan@reddit
You trust _anyone_ with access to your production servers??
????
sysadmin really still is in the 1980s.
Instead:
Using Iac: build an image of the server, remove everything it doesn't need to run.
Get the Iac reviewed.
Use the Iac with CICD to deploy servers into production as needed.
The days of "logging in" to production servers are from the olden times.
420GB@reddit
If you are such heavy Windows Server users why are you not utilizing Server Core? Thousands of servers, dedicated Cybersecurity team - but GUI + browsers on all machines? That is pretty stupid.
rose_gold_glitter@reddit
So we have the same issue with compliance and, full disclosure, I am the compliance person.
This happens in audits - we get told servers may not have a browser and also "domain admin" accounts may not have access to the internet. Every single audit this comes up and I have to explain that, as a fully cloud based, Entra ID org, it's impossible to comply with this and, as a result, we have controls in place to mitigate the risk and every single audit, I have to have the same argument with someone who does not understand the technical issue and is simply following a script.
I feel your pain.
Aggravating_Refuse89@reddit
An example of what security has become. Box ticket theater and non technical people dictating technical policy. I am actually starting to hate this field sometimes. With all its pointless bureaucracy. But I am not good at anything else so I will endure the hellish bureacracy until retirement.
DerZappes@reddit
Well, that‘s Windows. They can accept Microsoft‘s design choices or switch to a proper server OS, but they don‘t get to pick cherries, feature-wise.
maxlan@reddit
This thread is quite funny. We have 2 main groups of people:
And I feel like one group are professionals and the other group are just playing at IT and clicking buttons in GUIs until things work.
battletux@reddit
I've yet to come across a Wintel admin that uses the core editions of Windows Server.
It only seems to be the *nix admins who are forced to support Wintel stuff that use Windows core.
battletux@reddit
Threat and Vulnerability Management person here.
Your cyber teams reaction shows that they need someone with better technical knowledge in charge. As this reaction is reserved for an immature department that is very knee jerk in reacting to issues.
They should understand that Edge is built into the core of Windows Server these days and that removing or disabling it is not easy and can break too much.
I get that best practice is to only run the bare minimum on a system to support it's applications but Microsoft doesn't agree and what's to share their bloat with everyone.
Sorry you are in this situation all I can suggest is looking at other possible controls that can keep your cyber team calm. For example specific monitoring of application usage or edge in your siem and to make sure that edge is patched monthly (and maybe report on it specifically if it will make them happy).
mangeek@reddit
My goodness. I'm a cybersecurity engineer and know that every Linux system can be expected to have cURL, wget, and probably a dozen libraries that can grab stuff off the web via HTTP just as easily as a browser to an attacker, and that Windows is inseparable from at least two web libraries that can be called from a script.
The answer isn't to 'remove the browser', it's to have guidelines that prohibit their use backed by controls that enforce them, and tools to measure what does go in and out.
maxlan@reddit
Curl wget and other libraries being run as an unprivileged user will not run any javascript or code or anything else that browsers do now. (Unless you ask it to)
Hell, curl won't even follow a 302 redirect unless you ask it to.
And even if they do run something you have to consciously ask it to run as root to do any harm.
Browsers in windows run loads of stuff automatically and set cookies and run plugins etc etc... and there are usually a few unpatched bypasses to let them get full admin controls.
All those controls you speak of are blown away because anyone administering a server is probably good enough to ignore them and all your monitoring etc. (and if they aren't that good, you don't want them on your server!)
Pravobzen@reddit
Hot take:
The real issue isn't technical. You fucked up by talking to someone in your org's ~~cybersecurity~~ IT risk management group (tribe) and failing to recognize that they operate based on their own self-serving interests.
Empty_Funny9290@reddit
Amazing view.
TheGenericUser0815@reddit
Well you could operate most servers as core installation and use WAC on a few GUI machines for administration.
Marty_McFlay@reddit
Last place I worked didn't have usable web browsers on any servers. Like sure the shortcut was there but it had a policy to run in the most restricted mode with the most filtering, couldn't open pages or download anything. The only way it would get updates is once a month my wds server would send it approved updates from upstream in the org. You couldn't rdp into any of them, you couldn't ftp, you couldn't install software. I would spin up the server, load what it needed to do as a server, set up service accounts and services, and once it was stable it would get locked down. DRAC was about the only way to manually put something new on it. Local admin access was done through a portal, you could take it out of the policy group to make changes, generate a password, that would work for 72 hours or so, and then once every two weeks any servers would get auto removed from the "exempt" policy group and locked back down. This was about 5 years ago, I don't remember all the nuts and bolts but like, it's 'kindof' doable just not literally doable.
StreetLeader5036@reddit
Cybersecurity analyst that isnt technical..
TravisVZ@reddit
Technically, your security team is correct. For example, Edge can be used as a tool in a LOL-based attack.
That said, though, there's other tools available for the same purposes anyway, and you're right that it will cause issues to try to remove Edge (or IE) from a Windows server. Blocking outbound TCP 80/443 from the servers - along with anything else nonessential - at the firewall is a far more effective control than trying to rip out the guts of the OS itself.
stone500@reddit (OP)
I really didn't want to bring up Powershell remote commands for this very reason lol
Test-NetConnection@reddit
The most secure system is locked in a closet with no keyboard, monitor, or network connectivity. Yes, we can harden a server by ripping out powershell and edge. No, it's not a good idea and will make my life painful.
Cheomesh@reddit
Wouldn't interacting with an HTTPS website require 443 outbound as well?
TravisVZ@reddit
If your server needs to then yes - ideally restricted just to whatever remote service it needs. But a server shouldn't need to have free access to Google or Facebook! At most an API or two is all.
Cheomesh@reddit
Yeah fair point
bobsbitchtitz@reddit
That also means your server can’t connect to any other external services it may need. Now the dev team either needs to white list all ips that it would outbound to or some dns updates to allow some domains. Either that or a proxy in network. Both are good to have but thats a lot of overhead all for keeping a browser installed.
Frothyleet@reddit
Well... yeah, you should really be doing that, irrespective of the browser question. Ideally for the network as a whole, but absolutely for any server infrastructure.
bobsbitchtitz@reddit
Should be and what is on the road map are two different animals
reader4567890@reddit
If they're that arsed a simple solution would be to block internet access to them and use some squid proxies to let traffic out to whitelisted locations.
Test-NetConnection@reddit
A better solution is blocking the security people. Then you don't need to listen to stupid ideas!
WaterOwl9@reddit
I would ask: what's the risk? What capability of the browser can be problematic? In what situation? A security practitioner should be able to explain it without freaking out. Then you can decide how much attention this is worth and what's the cheapest step to lower that risk.
Test-NetConnection@reddit
Ask them for a formal risk assessment detailing their concerns with having a browser installed. If they actually produce said assessment then challenge it.
iheartrms@reddit
"Edge is a core component of Windows and not easily removed"
Reason #682,385,960 why nobody should be using Windows as a server.
Making the OS dependent on a browser is just dumb and anti-user. We first saw this back when MS tried to claim that IE was integral to the OS and that they weren't just exploiting their monopoly in one area to acquire a monopoly in another area via illegal bundling.
Just like with IE, Edge isn't really integral to the OS. IE was able to be removed and so can Edge. Theydo go out of their way to make it difficult. But Edge has nothing to do with the OS multitasking or memory management or hardware drivers etc.
e_karma@reddit
Welcome 😁, I had an analyst asking me to shutdown DNS service on our DNS server ..The reason why in insist Cyber Analysts should have at least some time doing admin/networking work, but people accuse me of gate keeping
oni06@reddit
InfoSec should be the next level up after sysadmin / netadmin.
Going straight to security with zero ops experience is annoying at best.
I have other words but they aren’t appropriate
Consistent_Memory758@reddit
Well, if you set up your network properly, you have no use for them. By properly I mean restrict internet access and allow access to resources the server needs
Lucky__Flamingo@reddit
That's what you need. You can't easily remove Edge because of library dependencies, but you can keep it from being leveraged by malware to download payload from the Internet.
FarmboyJustice@reddit
Since when does malware need a browser to download anything?
Lucky__Flamingo@reddit
Why would you make it one step easier.
FarmboyJustice@reddit
It doesn't make it one step easier. Invoking a browser to download a file is adding extra steps. There are plenty of good reasons for locking down browsers, preventing someone from downloading a file is pretty low down that list.
OptimalCynic@reddit
The new hotness - malware that has to distribute a full Python environment with selenium to work.
ISeeDeadPackets@reddit
It's like "securing" a server with MFA, as if attackers are going around using interactive logins to exploit systems. Is it useful as part of an overall strategy, sure, but it's hardly the golden ticket people who don't know what they're talking about portray it as.
tankerkiller125real@reddit
I've stripped edge/ie from every server I've ever operated. I have yet to have anything complain except the one absolute garbage enterprise application, which resulted in said product getting tossed to the curb entirely and a different vendor chosen.
stone500@reddit (OP)
That's honestly my perspective. We definitely do not have the firewall policies in place that we should. We've offered to work with our CSE and netsec team to determine what access our servers will actually need and then develop network policies. The netsec team is not looking forward to the amount of work that'll be required.
Strassi007@reddit
That‘s why it‘s confusing to me why they want to restrict installed Browsers in the first place.
FartInTheLocker@reddit
Haha maybe like 10% of orgs out there have actually got this in place, not disagreeing by any means, just no way it’s happening
slackjack2014@reddit
10% might even be a bit generous.
Ok_Wasabi8793@reddit
I guess I’d be concerned why you aren’t primarily using windows server core, which doesn’t have edge, but I have no idea what the servers workload is.
SarcasticNut@reddit
If they have time to be worried about that? Sounds like a sweet gig.
DenseDepartment8317@reddit
The browser just sit there and does nothing. With the right firewall rule that disallows the browser exe from reaching external resources this is mitigated.
Someone doesn't know what she's talking about
Nagroth@reddit
Wait until they find out about the Linux servers can do with curl.
ntwrkmstr@reddit
Wait till they find out about Invoke-WebRequest!
StephenM222@reddit
Wait until they realise that they are making network connections. Active directory or databases seem obvious connections.
But ... firewalls exist for a reason.
Famished_Atom@reddit
Please see r/ShittySysadmin
mercurygreen@reddit
Many of the interfaces work through Edge, even if it doesn't look like it.
HoosierLarry@reddit
You control that vulnerability by not giving dedicated admin accounts Internet access.
mfaine@reddit
In my experience, security is never rational. They are so used to just banging the security hammer that they aren't used to having to justify anything they say.
gerowen@reddit
The problem isn't the browser, it's the temptation by admins to use the browser for browsing the web on a sensitive machine. You wouldn't be the first crew to get pwned by visiting pornhub or something on your domain controller.
Sad-Bottle4518@reddit
They have a tick box in an outsourced scanning platform that says browsers are a "Security risk" so they need to be uninstalled.
ItsCoolDani@reddit
Insane choice by Microsoft to ship a server OS with a web browser installed, let alone embedded.
Mountain-eagle-xray@reddit
You should have some endpoint security disallowing admin to browse the internet. Pretty easy to implement.
Surface13@reddit
Even if you installed Windows Server Core, Edge is still part of the OS by default. And like another user said, rather than trying to remove Edge to reduce the attack surface, it should be managed by limiting internet/network access
ChemistAdventurous84@reddit
Wait until they find out PowerShell isn’t disabled.
lordjedi@reddit
CyberSecurity professional here:
Our policy is no web browser other than Edge on any server unless it's a Terminal Server. Terminal Servers get Chrome installed (we're a Google shop). If someone needs another browser (not wants, actually needs) then another browser gets installed. This will typically be a finance person using a banking site that is broken (ie doesn't work with Edge or Chrome, but works with FireFox).
No IE on anything and no one else gets an alternative browser unless they can demonstrate Edge or Chrome not working with a web site they need.
This keeps the extra software on a server to a minimum as well.
bdashrad@reddit
"We don't install any third party web browsers on the servers"
smpreston162@reddit
Windows server core
Buenodiablo@reddit
The core problem with cyber security teams.
Chernikode@reddit
The onus is on the cybersec team to demonstrate the risk, and cite the industry norms. They're the ones raising it. I'd recommend avoiding complex conversations on the topic until they can do that. You'll need your management org on your side for this though.
Obvious_Troll_Me@reddit
Wait until she hears about powershell and psexec.
Vivid-Combination310@reddit
So your security team are idiots who don't understand risk, but let me explain what's driving them.
Lacking a technical background they've probably bought some (expensive) tool that scans servers/containers for any installed software with a known vulnerability in it, and that tool then gives them a happy little list of vulnerabilities across the fleet, sorted into a nice report they can show up the line.
Lacking real technical skills this is a fine substitute for actually doing the work of understanding the environment.
Make them write up a formal risk, which shows how the risk could really cause an issue first - and then you can have it prioritised vs other risks to be dealt with as it deserves.
No need to argue with them, that's just feeding the bear, work the risk prioritisation process and let that show what the real security risks are (i.e. not this bullshit).
It's generally too hard to convince incompetent cyber groups that something is not a risk, so instead focus on showing something is a bigger risk and as a bonus you can then use the risk to get funding to solve the real problem!
VoodooKing@reddit
These cybersec people can go suck ass, that's my take on it.
AgingTrash666@reddit
"Have you guys had these convos?"
Yes, as part of CMMC compliance (NIST 800-171 rev2) discussions around technical controls to keep admin accounts off the Internet beyond just policy and/or the requirements around unnecessary software removal.
"What's your take on this?"
If you've done literally everything else you can think of to be more secure, I suppose this is just that one more thing. Unless there becomes a compliance requirement, the juice isn't really worth the squeeze.
BrilliantJob2759@reddit
This sounds pretty normal to me. Our security team is currently going through GPO recommended settings and are having to sit down with us to discuss what's ideal to them vs what it's going to do to the users vs other systems. We're all fortunate that we all recognize there's a balance to be struck, and that they need us for understanding the real world impact.
mughal71@reddit
The issue may not be the technical risk of the browser itself on the servers. The more fundamental issue is what assertions the cybersecurity team has made to auditors, clients and maybe even signed into legal contracts that hold to that commitment that browsers are not on servers.
I’d suggest trying to understand their position and to try to work with them to get to a state that’s acceptable. Maybe the commitment is soft enough where you can have controls in place that leaves the browser installed but limit who can run or /how they are run?
blorbschploble@reddit
I am generally a fan of not running browsers on servers, and certainly not logged in as an admin, but this is one of those rare instances where an administrative control beats a technical control as long as it’s paired with useful logging…
BWMerlin@reddit
You could always run Windows Server core edition (I am not sure what the current branding of this is) removing all the GUI components.
I would point out to your security team that many applications installed onto a server require a browser to do initial configuration. You could look at doing firewall rules to restrict to localhost or local VLAN.
YourRedditUser@reddit
Probably just to restrict them from being able to go out to the Internet unless required on very specific ports. Outbound on 443 as a default allow is not what I’m talking about. Our servers, over 3,500, generally don’t have any Internet access. Maybe that’s a better approach.
F0rkbombz@reddit
Are security teams really like this?
I work in security and assuming this isn’t “fuck IT Security” rage bait, this blows my mind.
DevinSysAdmin@reddit
The real answer is that you should have DNS/VLANS/rules filtering at the Firewall only allowing them to reach exactly what they need on the internet & internally, and also have a DNS agent on the servers, along with EDR/SIEM.
They are looking to reduce risk, but they have no experience in IT Operations, which is why they are giving you the "uninstall the core browser" type response.
bobdobalina@reddit
they're going to fuck pwsh next
RIP IWR
archcycle@reddit
Edge is not a core component on my windows server core installs
r-NBK@reddit
Our servers we don't care if they have browsers on them, they are are zero trust, the browser can't be exploited if it can only browse 127.0.0.1
JH6JH6@reddit
The correct answer is to write a software restriction policy or applocker and tag it to internet explorer and edge, then tie that to all users of the computer. Done.
The app exists you can't use it.
normalbot9999@reddit
Wait until they they find out about LOLBINS XD
CAMx264x@reddit
Easy, just move to Linux and restrict text based browsers. /s
Disorderly_Chaos@reddit
If you tell them that you applied a group policy to remove edge… how long would it take this “non technical” person to find out?
But for my non r/shittysysadmin solution, we just put in a dead proxy server to most machines and made the start page say something along the lines of “be careful”.
rdldr1@reddit
Just use Edge. Not unusual.
letmefrolic@reddit
Some security teams need to learn what exceptions are and move onto things that actually matter.
SikhGamer@reddit
I've learnt not to offer information nor correct when a situation works in my favour.
I'm amazed at how much power "security" gets without any kind of pre-req for technical skill set.
_bx2_@reddit
As long as patches are being applied and vulnerabilities monitored its fine. The stupid thing is when IT staff start to deploy Chrome to servers so then now you have double the browsers to manage with vulnerabilities and GPO. Yes it can be easy-ish but if you have great incompetence within your team, its a challenge.
bdwy11@reddit
Let me guess… Wiz and remediable CVEs? These are some of the most frustrating conversations that happen seemingly like a broken record as the copy paste police send out the fix its to dev teams. It gets even worse then because then the app teams use that as an excuse to blame all the other CVE crap their app layered on on the base image too… Then you’ve got stuff popping up in CloudWatch agent etc.
I just have a cookie cutter thing saying our images are patched and hardened to the best and latest of what’s available and any vendor software preinstalled (monitoring) is the latest variant and that the Wiz remediation available is not always correct.
Duck_Diddler@reddit
Pretty common.
Their job is to get onto you. Just set up policies
Icy_Pineapple_4456@reddit
The CIS Benchmark for Microsoft Edge on Windows Server is currently at version 4.0.0… that would be a great place to start…
Awkward-Candle-4977@reddit
You can configure edge update channel to Extended Stable using group policy. It's the real stable version.
https://ma-zamroni.blogspot.com/2025/10/set-windows-office-onedrive-to-real.html#zzzbrowser
japanfrog@reddit
Wait till they learn that your server has a network driver. Or better yet, don't tell them.
CheeksMcGillicuddy@reddit
You are not a cyber security team if your aren’t technical. That’s just silly.
zero_z77@reddit
I had to reread your post because i first read it as web server. Because having active web servers on everything can be a significant cybersecurity risk if you aren't maintaining them very well. That makes perfect sense.
But a browser? That's not a threat, unless your sysadmins are routinely doing naughty shit on the internet while logged into a server, and that's a management issue. I mean even if you still had IE floating around, on windows server it's already locked down to the point of being basically unusable by default. By the time a threat gets far enough into your system to compromise a web browser on a server, you have much bigger problems already.
If it's that big of a deal, just block outbound traffic on 80 & 443, better yet, just whitelist what you need and block the rest. But, the devil on my shoulder desperately wants you to ask these "non technical" cybersecurity people feel about copilot & recall since we're talking about windows.
longmountain@reddit
Have the heard of a firewall?
joedotdog@reddit
Only if it's on the audit checklist, lmao.
gregkun@reddit
An example, you want a hybrid config, you need to be able to sign into Entra.. aka need a browser. That doesn't make sense.
catwiesel@reddit
Oh dont worry, there is no screen and keyboard or mouse attached to those servers. no one can use them. and we deleted the desktop icon.
BFGoldstone@reddit
Hire cyber security folks that are technically competent
Burgergold@reddit
Wait until they find curl is part of windows server and probably an old version
Same for some ssl lib
jhdore@reddit
Windows server core doesn’t install a gui, and you have none of the desktop-based crap that comes with the stupid desktop codebase. No Edge, no Bing Maps Service, no Copilot shite, nowt. And hopefully, a lot less to update and updates to cache. Run your network properly and you really don’t need a browser on a server.
mikeyvegas17@reddit
this is the way for windows server. core for everything unless there's a need a gui, which i've yet to really find.
Frothyleet@reddit
There are, sadly, a few Windows Server features that actually require a GUI to work.
Off top of my head, WDS is the one I remember, but that's on the deprecation train now.
JaffaCakeStockpile@reddit
Your servers may also have a 3rd party electricity dependency which is a core risk you should alert your cyber security team to
Frothyleet@reddit
I bet that would REALLY shock them.
Get it? SHOCK them?
Guys?
cbass377@reddit
Channel your inner Cybersecurity analyst and ask copilot how to uninstall edge from windows server. It should tell you that it is unsupported/dumb idea if you have your context set right. Then it will give you a couple ways to disable it, then a couple ways to remove it.
djDef80@reddit
Went till they learn about living off the land binaries.
cyberman0@reddit
I got a good belly laugh from this. Not to mention that they have managed to remove edge from windows but it super broke so many things. I think it was just a standard windows pro, but so many little things are tied to it.
Interesting_Debate57@reddit
The problem is that you have two options: join Microsoft's religion completely (which will have its own security protocols and people that they claim are the best) or start migrating to real servers (corporation-independent technologies) like every other serious tech company has done over the last three decades.
RAVEN_STORMCROW@reddit
These fucks don't understand that it's part of the OS?
mattyyg@reddit
This seems like someone that is bored and trying to solve a problem that doesn't exist. And then claim victory. I'd be careful of these people.
natflingdull@reddit
I would just block external network access from the machine, it won’t harm anything on the OS, its just a bit of a PITA.
My entire career has been plagued by overzealous, imperious, non technical cybersecurity people so I feel your pain here. Can’t tell you how many times Ive been handed project level work for vulnerabilities that can’t actual be exploited via an “analyst” that just forwarded me a nessus report and told me to figure it out. Like shit, I can run tenable scans too dude, what exactly is your job here? Forwarding automated emails? I worked one place where the SOC team demanded they had a keypad lock on their door and also refused to talk to anyone, work with anyone, or even look at the ticketing system.
That being said at my current org we have a great cyber team and we meet regularly, figure out mitigation strategies, determine remediation, etc. its been a huge breath of fresh air and I feel like I work in an environment that is actually secure as it could be for once in my life, so please don’t think all cybersec teams are like this. My fellow admins at this gig bitch about them all the time, I should show them this post to make them see just how good they have it…
Secret_Account07@reddit
Easy fix - firewall request to block internet access and figure out what vulns they want fixed.
Did they even provide a Qualys report or…. Anything?
SN6006@reddit
My old philosophy was “no web browsing on servers”, and I was a stickler about anything other than IE being installed. Now with edge being baked in, and not have enhanced security mode… I still don’t want people browsing the web on servers, but I have less control unless I want to be a pain to my department.
musiquededemain@reddit
You're not wrong. It's concerning that the entire cybersecurity team is freaking out about a web browser being installed on servers, especially one that's a core component of Windows.
Do your servers have internet access? If so, I think that's more of a concern.
atw527@reddit
Edge/Chromium CVEs can really spike our risk score across the environment because it's multiplied against every endpoint/server.
They are probably just looking for ways to reduce software inventory where feasible. But agree with you in that removing Edge, even from servers, is not feasible. Unless you want to move to Windows Server Core.
icebalm@reddit
I don't see the problem with having browsers installed on servers at all. It's not like they're running and accepting remote connections. You can't really exploit them. What in the world is the reasoning for not wanting them?
Hollayo@reddit
Your cyber security people are stupid. If they don't know that edge comes with windows, they need to be fired
ProperEye8285@reddit
A while back there was a browser free version of "Windows Server Core." Of course, no browser means no GUI since IE/Edge is so intentionally woven into every facet of Explorer. Nobody used it since, if you wanted a command line only server, you'd run Linux.
All of this is hard to explain to bean-counter and button-sorters, excuse me, I meant non-technical Security Analysts. Next I'm taking my car to get an oil change from a Mechanical Analyst who doesn't use wrenches!
LinoWhite_@reddit
Any cybersecurity „something“ without at least 10+ years technical experience is non existent for me. Here you have the best example.
Create script to forcibly rip out Edge, send it to them with instructions how to deploy to all server. Clearly state what it will do and that you are not responsible for anything and let the hell break. CC your boss and again clearly state that you are afainst it but security team wants it this way. And last but most important, get 5-10 days PTO starting with this mail.
rainer_d@reddit
Can‘t you convert everything to server-core? I believe that doesn’t have a Browser installed?
Just plan it with a time and cost estimate and let management take a good night of sleep over it. 😁
Bonus points for suggesting to take the budget for this little stunt from the Cybersecurity department….
Cuhsay@reddit
Having a browser installed is not bad. That said; the servers/elevated accounts should not be used to browse the internet. This is often enforced at the firewall.
Blueline42@reddit
Internet not reachable from any servers unless going through a proxy server is this not standard practice?
I've never been anywhere where this wasn't the case unless it was a small startup or something.
wild-hectare@reddit
as a consultant for nearly 40 years...you'd be surprised what passes for "standard practice" out in the wild
Coupe368@reddit
Windows CORE server does have a smaller attack surface, but you will be doing everththing in powershell. Its probably fine since powershell is easier than the horrible interfaces Microslop keeps putting out.
However, if you aren't running CORE then you can't get rid of Edge AFAIK. Edge is extremely shitty knockoff of chrome, so IDK, seems like a strange request.
hitman133295@reddit
Lol tell them to fuck off.
BeatMastaD@reddit
All cyber compliance related work is based on risk: identifiying it, documenting it, and having the stakeholders do a cost/benefit of remediation, mitigation, or accepting it.
From a cyber perspective they are concerned with whether risks are identified and whether they have been accounted for one way or another. So when they hear 'web browsers are installed on all of our servers because they come with Windows server' their reaction to this is 'we have not documented and applied policy and procedure to managing the risks associated with web browsers on the servers' which, if true, is a glaring error. It's the equivalent of finding out something like 'Oh no we don't store our files on the file server, we just store them on Greg's external hard drive and have his PC mapped to our devices to access it'. That solution isn't wrong, it is working for the business, but it's wrong because it's got so many unaccounted for risks involved: are backups set up to account for this, what if Greg loses his laptop, end devices being connected makes lateral movement from a malicious actor highly likely during compromise, etc.
Now, many cyber peoiple don't have the WISDOM to understand other technical perspectives and realities, so they think this is insane, this is an emergency, this is a 5-alarm fire, what if every server we own is encrypting itself as we speak with ransomware? In reality this is just something that needs to be worked through, documented properly, decisions made, and everyone can move on.
Ok_Discount_9727@reddit
Your security team doesn’t know “poo”
Larsonski@reddit
We have also thousands of servers and security team asked if we could at least get rid of the default Edge/IE MSN.com startpage. So we changed it to a blanc page on our servers. Not perfect, but still better than trying to remove it.
coomzee@reddit
Are they worried about all the CVEs that are showing on their EDR? The browser doesn't get updated until it's opened but if that's not the issue, good luck
doyouvoodoo@reddit
Old guard security team ehh?
https://www.stigviewer.com/stigs/microsoft_edge/2025-05-15/MAC-2_Classified
Here is an easy way to configure edge to meet security in the middle.
modder9@reddit
They are stupid.
Being told to remove Edge is silly. You should make sure it is auto updating tho (and not requiring a launch to initiate the update).
Chrome on servers? Yea, remove it because everything after 2022 has Edge.
badaz06@reddit
There are some hardening requirements I've seen that mandate Web Browsers are removed from Servers..so I'm guessing your ITSec staff is just responding to those.
At the same time, you can't (as ITSec) tighten things down to the point where no one can efficiently do their job, and there are ways to mitigate what people can and can't do, limit what sites they can access, etc.
Instead of taking the "You guys are all idiots" stance, understand that there are Server admins that are pretty naive - and see if there a legit way they can put some controls around things while not impeding your ability to do what you need. If you can justify a need vs a want, along with some sound security controls, that should satisfy them.
In the past I've seen Server Admins download programs from BitTorrent, Freeware sites, and others and installed those applications and totally wrecked systems. Don't even get me started on dumb stuff I've seen application admins do to boxes and apps.
I know this isn't much help, but there is some reasoning behind the requirement.
touchytypist@reddit
Just wait until they learn that the Command Prompt is on servers. gulp
androk@reddit
Have a firewall so browsers can only access internal sites and that should be enough to alleviate the concern.
cwci@reddit
Surely, the risk assessment will determine a sensible outcome?
luckyLonelyMuisca@reddit
Easy: Windows Servers: Server core no ui Linux Servers: well… no problem.
I have not used GUI in a server for a long time. CyberSec team request is reasonable to minimize risk of exploits on browser’s prone to vulnerabilities
osmiumblue66@reddit
This happens with a lot of products. First response is usually "we want it removed". After educating the cyber team, it becomes "we want it disabled". And another round of education until you can land on common ground.
They often just use tools and read scary stories and don't understand the apps or the business. They do add value, but it takes some finesse sometimes to find that value add.
techw1z@reddit
it's simply not possible to completely remove edge. if your cyber sec dude doesn't realize that, you should probably explain to leadership that your cybersec dude is useless and they better search for a replacement.
zoltan99@reddit
Yeah I doubt their qualifications if they don’t understand that without being told and I’d communicate that to leadership
Serapus@reddit
Your non-technical InfoSec person should be familiar with terms like "compensating controls" and "managing risk." There are some thing, like trying to remove core elements of OS, that you don't do, and managing risk through other methods. Like applying an AppLocker policy for msedge.exe that only specific security group members can launch Edge. Then manage the SG appropriately. Because there may be a legitimate need to use a browser on a server on the future.
Just because they are InfoSec doesn't mean they control it. It's a partnership between ideal and what's reasonable to mitigate risk base on risk level.
BoringLime@reddit
I don't believe you can really remove edge. It's a core component to windows backend processes. There is no official uninstaller of it, just a bunch of low-level hack commands. The main issue is if it is removed and it worked today, does it work tomorrow.
Someone would have to show me where that is supported by Microsoft before I would deploy something like that.
thehuntzman@reddit
tl;dr they don't fully understand the risk framework they're basing decisions off of. Web browser installed =/= browsing the web on a server. Put controls in place to prohibit web browsing on the server over RDP and if necessary you can remove edge from the server without breaking anything but IE is still going to remain (in a somewhat unusable state) since it is part of core operating system functionality. You would have to jump through hoops though to get a usable IE window in 2026 (IE COM Object via VBScript) and even still it should be in protected mode regardless.
blackwarlock@reddit
We disable internet traffic when an privileged account is logged into a server. Its annoying but its safe
thehuntzman@reddit
That's definitely one way to go about it. Is it just for the session logged in or does it affect other tooling like XDR, etc? I can see that causing problems if your XDR goes blind to that server until the admin logs off.
blackwarlock@reddit
Just for the logged in the session.
PappaFrost@reddit
"Dear security team, Windows servers include a web browser as core functionality. Removing them is not supported by a vendor. 'IE Enhanced Security Configuration' has been turned on to mitigate the risk."
ManLikeMeee@reddit
Tell them to do a risk management exercise for the browser so we can accurately assess it.
Then tell them to get lost because that's a ridiculous notion to assume just because a browser is installed that it's a threat.
In that case, you may as well have to disable all the network cards on the servers too because they can communicate if it's enabled.
Appolflap@reddit
Just verify your Edge installations are getting updated via Windows Update. You don't want the built-in edge updater. Because then every time you start the browser yoy are working with the old version until the next start (rinse and repeat). I've seen servers highlighted in our vulnerability scanner for this issue (given, those were Chrome installations at the time), and subsequent central security up my *ss for that to resolve when I was a Business ISO.
nefarious_bumpps@reddit
IIRC, you can configure a GPO that blocks the use of Edge on the servers. But IMHO, server admins should be among the most skilled, knowledgeable and trustworthy employees in your company, and as long as you have clear policies and standards against using a web browser on a server, there should be no reason to need to implement technical controls.
thehuntzman@reddit
I have been on both sides of this and really all I can say is this is basic Operational Risk Management. It is a relatively low-effort/low-impact mitigation to reduce your attack surface. Like you said, server admins shouldn't be using the web browser anyway, but to Cyber Liability Insurance, for example, using the honor system to ensure policy adherence holds a lot less weight than using a technical control when it comes time to make a breach claim if the attack vector is discovered to be the web browser.
In reality though - yes you're correct that experienced admins SHOULDN'T use the web browser but that implies every admin the company hires in the future is both experienced and does what they SHOULD be doing.
themastermatt@reddit
"Im the new Cyber Employee and ive got a great background with Internal Audit" is one of the worst phases to hear these days.
Master-IT-All@reddit
Having a GUI and apps installed that are not required for the services hosted adds potential attack points.
Since Windows Server has the Core install mode, for a secure environment it should be the default choice and installations with the desktop experience which includes the Edge browser need to be documented and the risk acknowledged.
Edge is a component of the Desktop Experience, not the OS.
International-Wind22@reddit
Windows servers came for a long time with xbox services installed. It’s just windows being windows
Skyhound555@reddit
We go old school.
Squid proxy to limit browsing capabilities on servers. Easy and effective.
Devs hate it, but they're whiny little bitches anyway. It's about reducing attack vectors and devs installing random stuff is the most stressful of attack vectors.
Devs need to learn how to use SCP protocols too.
wrxsti28@reddit
I wouldn't ask to remove edge browser. I think I'd work with you guys to understand what websites are used within your host. Not sure if it would at the firewall level or GPO. I'd also ask edge browsers to be updated on a monthly basis.
Figure the best way to meet you and I half way
bagomojo@reddit
My background 30 years in IT, last 19 I have owned a cybersecurity assessment and advisory. The problem with web browsers are really if they are not kept up to date. And some plugins could potentially access the Os or ad depending on the users creds. Keep them update and permissions in check and you're fine. I wonder if they mean no web servers on domain controllers.
glabel35@reddit
I mean, your golden image should not have edge on it. Remove everything you can from the initial build and add what is required when it becomes required.
bjc1960@reddit
Always great when an Azure Kubernetes incident takes 6 hours to resolve because every troubleshooting tool has been removed.
Empty_Map_4447@reddit
If you're running Windows in the enterprise and have not already locked down all the "telemetry" aka legalized spying and surveillance on your servers, then unused browsers are the least of your concerns.
But they are not wrong. Any bit of software on a system that is not required for it to perform its function is a security risk. The fact the you cannot easily remove Edge from Windows Server editions is a critical defect in the design of the of the OS.
This is why you are better off running Linux. You can install and maintain only the software required for the server to perform it's function and most distros ship with zero "telemetry" out of the box.
RandomXUsr@reddit
Seems fine. Maybe you could disable access to the browser or use a web interface/ssh to access the servers for what you need.
haamfish@reddit
I mean yeah but wait until you log into a server to find brave installed 🤣🤣🤣
jdptechnc@reddit
I prefer a minimalist approach to what is installed on systems - but Edge is a core part of Windows. If the requirement is no browsers on servers, then use Linux.
Late-Marionberry6202@reddit
Just wait until they learn those Linux servers can also access things on the internet with curl or wget
OwenWilsons_Nose@reddit
Networking? I don’t need to learn networking to work on cyber. That’s why it’s called cybersecurity and not cybernetworking. Duh.
BamaTony64@reddit
Most of our Windows servers do not even have a GUI let alone a web browser.
andrea_ci@reddit
Browsers are a security risk... If running and actively used.
On a server? Well..
pnf365@reddit
As long as servers dont have access to the internet (or only to required sites) there’s no issue.
Typical Secops panic reacting to things
Outside-After@reddit
OP - what control are they operating for this and against what accreditation? How is the control worded? That will give you a starting point to understand and tackle. I’ve been in similar pickles and it’s wise to check the same hymn book is being sung from and be aware of the common mitigations for that control.
lotekjunky@reddit
I'm hoping she meant "none of the servers have web ACCESS." That's SOP.
gward1@reddit
How does a browser cause the threat? If anything it's the traffic out that could be. It could also break who knows what if you do that. On our servers we have traffic out blocked for some servers / applications if they don't need Internet access.
PrincePeasant@reddit
All of the disaster recovery docs are in .pdf format:"why is Acrobat Reader installed?"
Few-Presence5088@reddit
We block server Internet access at the firewall only allowing updates, connections from Azure, and MFA system access so MFA prompts work along with whatever it explicitly needs access to. Everything else is blocked. All of our servers have Edge but it’s not used.
Mehitsok@reddit
This is the way. URL restrictions at the FW for restricted servers.
shelfside1234@reddit
Ours are complained about servers having port 22 open
So that’s fun
justaguyonthebus@reddit
Get pedantic on the language.
Did you really "install" browsers on your servers? Of course not. Why would you do that when Windows Server already has Edge built into it?
Now, "do you need a GUI on your windows servers?" is a very different question.
NickBurnsCompanyGuy@reddit
For what it's worth. I'm at a very large enterprise and they blocked web browser access for us years ago.
I don't have any more than that, but this is what we do currently.
Hale-at-Sea@reddit
Oh my god! And curl is installed on the Linux servers, egads!
There's not much a browser can do that can't be done in powershell or vb or jscript or whatever compromised app is theoretically giving access to Edge. Any of your existing controls like edr, web filtering, outbound firewall etc are generally going to be better places to stop the kinds of stuff Edge would be used for
And yeah Edge components like WebView2 are the rendering engine for a ton of applications now. You should never remove it, and ideally opt to use a Core os instead
Rhythm_Killer@reddit
Yeah I’ve had that before.
Always enjoyed our little chats about what date we had to “uninstall internet explorer” from windows by
matt95110@reddit
If your network and perimeter are configured properly it doesn’t matter.
uptimefordays@reddit
My suggestion, generally speaking, is that servers should not have direct internet access. That can be achieved via network segmentation (more restrictive VLANs for servers), restrictive firewall ingress/egress rules for servers, proxies, and host based firewalls.
Basically I would explain to infosec "while our severs include browsers installed as part of a desktop server operating system, we restrict inbound and outbound access to these resources via a layered security approach which ensures they are not making unapproved connections to the internet or any other networks."
qdivya1@reddit
At my previous place of employment, the Chrome Browser was used to download malware onto the server. The culprit was the representative of the vendor that accidently downloaded a infected version of 7Zip to unpack an archive prior to installing it on the server.
In another instance, a malware used the installed browser to "call home" and update itself and potentially exfiltrate data.
This is the reason that Windows versions used to ship with a severely crippled (or restricted) version of Internet Exploder.
Server Class systems with client/user applications also suffer from a lack of maintenances, which means that your Browser will sit there on a long obsolete version that now may have a number of vulnerabilities that haven't been addressed because no updates were performed. The big culprit here used to be Acrobat Reader when all installation and other manuals were shipped in PDF and browsers weren't the preferred way to read these documents.
So, your team definitely has a point, but one that needs to be made with more information and context (and potentially alternatives).
dogcmp6@reddit
Ah yes, they went to a cyber secruity boot camp, and got hired based on the lessons they learned in the boot camp, but they never worked in an IT environment a day in their life...
showerhandles@reddit
I might tell them to f off and get a life
dekogen3057@reddit
Wow, how do they not know your servers need access to the web at times? Fkng pathetic
Inquisitive_idiot@reddit
if they don’t understand the requirement, they’re definitely not gonna understand the technical explanation 😅
Require them to offer a list of potential mitigations for discussion when providing a requirement.
Request that they give you the opportunity to provide feedback on the requirement and mitigation before the meeting
Glassweaver@reddit
A non-technical analyst is alarming, but she's also right.
Best practice is to use server core and manage your servers through powerhshell & the like. Server core does not have a UI, edge, or the overhead and, yes, additional stack surfaces that introduces.
That being said, most organizations worried about something like that have FAR bigger things to worry about, like a 2012 forest functional level, at least one device out there that's keeping you from disabling smbv1 because the risk seems easier to accept than whatever specific exec this effects having to use scan to email, for example, instead.
But yes. Browsers on servers is bad.
eufemiapiccio77@reddit
Jesus. More report readers spouting nonsense. Push back and say give me instructions how to remove them and we will put it in the backlog. Which AI product flagged this as a risk.
ajf8729@reddit
There’s plenty of times where having a browser on a server is needed. Plenty of apps that are installed on servers have web management consoles that are sometimes needed to be accessed locally. You secure things by restricting what browser is used, and locking it out with AppLocker where it isn’t needed. And also make sure it is updated somehow. Standardize on Edge, remove and lock out all other browsers, and lock out Edge where it is never needed.
YSFKJDGS@reddit
All of you are doing this wrong.
You talked about your servers being locked down account wise but make zero mention of how your internet access for them works. Is it yes/no, is it yes with IP's vs no, is it layer 7 firewall with proxy... etc.
You have been through 'multiple' meetings where that ONE fact would have changed the entire conversation, so what are you not telling us?
When you work for a TRUE large scale enterprise, the security team is going to shift much more into risk/policy than 'doers'. In this case, if ANYONE (including you) had half a brain you would be working towards a risk based security approach, where you combine your server and network posture into what it would take to exploit the browser and cause issues.
MS Edge should be patched via wsus/win updates, if you are putting chrome on them for whatever reason then whatever rmm you use can handle it.
99% of this thread is people falling for rage bait thinking their shit doesnt smell and security teams suck. Chances are these same people are not nearly mature enough in their network/security structure either, and are most likely dealing with a 'small' company while acting like it's big.
ISeeDeadPackets@reddit
I hate cybersecurity people with zero IT background. What she's asking you to do violates the CIA triad as it jeopardizes the integrity of the system. The systems are necessary to conduct business (presumably or they wouldn't exist) and if you can't conduct business then there's no point to having security. Instead of asking you to remove the web browsers, anyone competent would simply want to make sure the communications path into and out of the server is restricted down to the necessary ports/protocols required and that they system is adhering to your patch management/vendor access/whatever policy.
arkiverge@reddit
You don’t remove the browser, you restrict it. It’s clear the entire cyber team took the bulldozer training class and nothing else is this is what they think.
dev_all_the_ops@reddit
Your security person is right, you really shouldn't have full desktop environments on your servers.
That's where windows server core comes in.
https://learn.microsoft.com/en-us/windows-server/administration/server-core/what-is-server-core
However, there is always a disconnect between the 'idealist' and the 'realist'.
As an idealist, you shouldn't have graphical interfaces on servers.
As a realist, its going to be a large project to move all your servers from standard windows to windows server core.
A compromise would be to disable all egress from these servers so they can only access essential remote services.
drdrew16@reddit
Too many software packages require desktop experience on Windows Server, especially in the finance sector. It sucks.
Tx_Drewdad@reddit
"yes a browser is installed. No, we do not perform when browsing from the servers."
bigbearandy@reddit
What you are missing (or this compliance person is missing, more to the point) is that Windows Server has compliance settings specifically to control outbound connections when a person launches a remote session in the browser. The compliance settings you can turn on either limit where the browser can browse or require that the administrator click a button before surfing to outbound Internet sites. Those are positive safeguards that make using the browser on Windows Server compliant with various standards. It's crude, but effective.
Shibizsjah@reddit
No. Ours just go crazy for Java
phoenix823@reddit
If you're patching everything on the servers each month and have controls in place preventing internet browsing from the server, I don't know what the problem is.
FastFredNL@reddit
Most cybersecurity analists read an automated report and go apeshit about everything they see that somebody/Copilot once told them 'is not good'.
It's hardly ever realistic.
Jaack18@reddit
Everywhere i’ve worked at has installed chrome on pre-edge servers just so there’s a working browser. Sometimes you need to install applications or updates to current applications. It’s absolutely normal to have a working browser.
Consistent_Memory758@reddit
Really stupid to install Chrome on a server. Totally not needed and a potential security risk
fdeyso@reddit
We had a vendor telling us that something didn’t work because “network”, so we installed a chrome (pre-edge era) and showed it on localhost not working, then they took it serious and fixed it later, but agree now it shouldn’t be the norm to have chrome on a server unless required for a specific reason: e.g.: data science virtual machine running on server OS.
40513786934@reddit
this is laziness or incompetence. it is not "absolutely normal" to install a browser on a server
ziobrop@reddit
your servers shouldn't be able to browse the internet, nor do you want to directly download content from the web directly onto the server. yes people do it, but its a terrible practice. Download elsewhere, and copy to the server.
having a browser on a server is low risk, until you start using it on the internet.
Simmery@reddit
I've had to block Chrome installs on our servers because people kept installing it. I don't know why you'd put unnecessary software on your servers. If anyone needs to download stuff, they can do it from their workstation and copy it to the server.
ProfessionalSea6268@reddit
We just kill internet access to servers that don’t require it. And even then, they get knly the access they need and not open access. So having Edge isn’t an issue because it can’t get anywhere useful.
kerubi@reddit
I would suggest getting all analysts with so low grasp of IT to be replaced by AI. Would do a better job and bean counters would love it, too.
nodiaque@reddit
Server shouldn't have access to internet unless it's required. Then, you're left only with edge installed on auto update
mats_o42@reddit
Simple - you cant remove them. The IE core engine is an integrated part of the OS.
A web browser is no threat, unlimited unfiltered internet access - that's an issue
ChapterBooks@reddit
Soooo we’re grep’ing everything now?
My_Legz@reddit
They are obviously in the wrong here but you could always play with the idea of migrating off of windows systems to Linux. I'm sure that would be appriciated
stone500@reddit (OP)
We have plenty of Linux in our environment too
I_NEED_YOUR_MONEY@reddit
it's a legitimate threat for a cybersec person to call out.
the web browser is not a core component of the OS. applications implement their own network access. this isn't windows ME anymore where the desktop background was actually a webview. you can remove it
nitrobass24@reddit
I mean it’s pretty easy to disable any windows application without uninstalling via GPO.
GameTheory27@reddit
if you have a firewall, who gives a rats ass?
GreenEggPage@reddit
Build an ROI on removing the browser. How many man hours will it take, what functions will it break, will Microsoft just reinstall it later resulting in you removing it all again. All security boils down to cost and level of inconvenience - if you can prove it is too expensive or too inconvenient, you can win.
Lolzebracakes@reddit
I think they’re more worried about the attack surface rather than the browsers themselves. I would remove all third party browsers from the environment but you shouldn’t remove Edge from Windows. It’s part of the OS stack. In some cases I would be willing to be it will reinstall if you remove it.
As a middle ground you should lock it down. Setup GPOs that control downloads/outbound internet connections. There are a ton of options you can configure.
If you have an EDR, you can setup logging to alert on different browser activity.
On top of all of that - maybe establish a policy that states “No browsing of the internet from servers.” From there use jump boxes or bastion hosts to administer your network.
You need to shift the discussion away from “browser = bad” to “how we do we control it.”
Fuzzy_Paul@reddit
Default on server os the browser is disabled for all websites. You have to allow to access it every url when using it.
TuxAndrew@reddit
They can deal with all the failed future updates if they want to block Edge from being reinstalled.
bageloid@reddit
1) crazy they didn’t know what’s installed on the servers
2) it’s not unreasonable to block use of edge on servers and allow only when required. You don’t want someone browsing the internet from a server. You can enforce controls for this on the server or network level and show that the risk is mitigated
CtrlAltDust@reddit
Risk. Assessment.
MaskedPotato999@reddit
Make Core servers your default build. For servers with GUI, update Edge just like others apps, and secure it using Microsoft security baselines. Grant Web browsing access through a on-demand, whitelist workflow and proxify it.
ShadowCVL@reddit
They need to articulate a real risk. As someone who has a dual role security and infrastructure… all our servers have edge or legacy IE for the few 2016 we have left that are on the phase out block over the next few months.
Most of our servers don’t have internet access, heck most of them can’t even talk to each other unless specified.
Next they will be telling you to remove the print spooler.
askoorb@reddit
Technically they also have old Edge and Internet Explorer installed, as both cam be accessed by core Windows APIs. You just can't launch them directly.
OneSeaworthiness7768@reddit
I don’t really do server stuff anymore in my current role but when I did, our admin accounts couldn’t access the internet on servers except for Microsoft pages. That seems fine to me?
merlyndavis@reddit
For some tools, web browsers are the only way to manage them.
I suppose an ask would be why are they so concerned about a web browser on the server. I mean, if she’s afraid someone will use the to browse the internet, just put in a firewall rule to block that.
Make sure any browsing on them is logged (to a different server) and keep access to them audited.