Skipper128 wrote:Thanks for the response, I am still in the newbie mode for auditing, and yes.. i have no much experience with it. Right now. I'm still on the formulating side on how we can expose scalix to vulnerabilities.. is there any, if i may ask???... anyway.. thing's I can give you much is the user access mode, viruses on attachment, and lastly hardware maintenance. Thanks...
This isn't vulnerabilities, though. What you need to do is formulate a corporate IT security policy. Once you have that in place, you will need to check what is already covered and what not. If you have a virus scanning requirement in the policy, you will need to check where to do such scanning. If your policy addresses clear-text passwords, you will have to look at the various protocols in use and see how/if they violate this. Perhaps you need to use a firewall to limit this.
Since you sound new at this, I would suggest you contact a Scalix partner to help you with this, and to show you how the various things fit together.