Recommended Posts

Hi,

As you all might know uPnP ships by default, disabled in Windows Server 2003. The problem is that I can't find the place where i can enable it, it says to look in Help for instructions on how to enable it but the tab is hidden in the Services/Add Remove Progs.

I was wondering if anyone knows how to enable it.

The reason is that we are behind a Microsoft Wireless Base Station and the stupid thing requires uPnP compatable programs and the service to be installed for it to work properly (DMZ doesn't always work). I believe it was fine with erlier builds but for the final product they decided to shut it off by default and i need to know how to get it back on so i can work easily.

Thanks

Link to comment
https://www.neowin.net/forum/topic/76874-enable-upnp-in-windows-server-2003/
Share on other sites

  silly_walk said:
Considering it was a large security hole in XP, it would surprise me if they shipped it in a server, especially one they were trying to make more secure.

it was a hole over 18months ago been long sinced patched.

uPnP was removed because you can't really find a need to require this when its only needed for certain desktop applications, like windows messenger.

Any others? i don't think so, none that I know of.

  Jon said:
uPNP is destined for more than ms messenger support through routers lol.

http://msdn.microsoft.com/library/default....p_framework.asp

Theres some good info.

i know, like duh.

I don't need a microsoft article to explain what it is, thank you. :rolleyes:

  Jon said:
Obviously you do, given the only application of uPNP you could identify was 'windows messenger' :)

that MOST Desktop people use. the main program people ask about when they have a router, is MSN / Windows Messenger, how they can't do this or that, behind their NAT.

Therefore, I Associate Windows / MSN Messenger with uPnP. However, uPnP is used for many other functions.

Like i said, i don't need a web page. Thanks. :)

heh you're not convincing me tbh. I posted the URL as a follow up to your post, which seemed to miss the point of uPNP, and your reason for removal was wrong.

It wasn't removed because of a lack of support at all, if anything support will increase. It was removed because its a huge security risk on a server, a server should be a static entity, not something that automatically adjusts itself to the hardware found on the network. Huge potential to cause trouble with it.

//edit: I am assuming it actually WAS removed here. I've not used 2k3 server yet, but its bloody obvious why it would be removed.

Edited by Jon
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Posts

    • It funny how in a few short years Intel has become the budget brand. I just had to do an unexpected platform swap on my main system due to memory stability issues that suddenly developed. I went with a 9800X3D, but seeing these prices making me regret not at least considering this direction. I really don't need top-tier performance, and between a cheaper CPU and cheaper board, the Intel option looks like it would have been $300-400 cheaper. I already have a 360 AIO, so the extra heat wouldn't have been a big deal. Oh well, live and learn. I normally am the kind of person that will consider something like this for weeks, but I needed to move quickly and my decision point was "9800X3D is a fantastic chip, and Ultra-200 is basically a joke" which is true, but what I didn't consider is a CPU like this 265K is still worlds head of my 5800X, and I really don't need more than that. Its just the enthusiast mindset :-)
    • The only compelling reason for 99% of people will be Windows 10's end-of-support on October, nothing more.
    • This thread has run its course. The complaint has been noted and we'll handle things on our side.  Again, for future reference please report a post that you have an issue with and we will investigate.  <Thread closed>
    • AMD Ryzen 9000, 8000, 7000 CPUs have a vulnerable TPM-Pluton, major firmware fix released by Sayan Sen Last week, the Trusted Computing Group (TCG), which is the developer of the Trusted Platform Module (TPM) security standard, alerted the press and AMD about a new TPM vulnerability on Ryzen processors. Tracked under ID "CVE-2025-2884" (AMD is tracking it as "AMD-SB-4011"), the vulnerability allows an attacker to exploit the vulnerability by sending malicious commands to read data stored in the TPM via an information disclosure flaw or potentially impact TPM availability on systems through a denial of service attack. This is a type of out-of-bound read security flaw. The TCG notes that the flaw occurs in the CryptHmacSign function due to improper validation of a message digest or hash via the hash-based message authentication code (HMAC) signature scheme, leading to an out-of-bounds situation. TCG explains in its VRT0009 advisory: The Common Vulnerability Scoring System (CVSS) score of the flaw is 6.6 indicating a medium level of severity. This is typically the case for most local-level attacks as in order to exploit such a flaw, the threat actor must have physical access to a device. Regardless, AMD has issued firmware to patch the vulnerability on Ryzen 7000, 8000 (Zen 4) and Ryzen 9000 (Zen 5) parts. AMD has confirmed that AGESA (AMD Generic Encapsulated Software Architecture) firmware Combo PI (Platform Initialization) 1.2.0.3e mitigates the flaw. The company notes that the said firmware fixes "ASP fTPM + Pluton TPM" issue. If you are wondering, ASP refers to AMD Secure Processor which is "a dedicated hardware component embedded in every system-on-a-chip." AMD's motherboard vendor partners like Asus and MSI have already begun rolling out the firmware update. MSI has a blog post about the 1.2.0.3e Combo PI as it mentions several new upcoming features including support for new CPUs, better memory compatibility, and more. MSI writes: Interestingly, Asus notes that this firmware update is irreversible as it is a major release. Thus one would hope that it is a very stable release and given that this is the "e" stepping of the firmware, there are pretty good chances of that. Other vendors like Gigabyte and ASRock are yet to release their updates.
    • Really?? Having a sense of humor is a sign of intelligence...what does that say about someone who totally misses the joke and can only respond by parroting a political talking point they heard others make?
  • Recent Achievements

    • Apprentice
      Wireless wookie went up a rank
      Apprentice
    • Week One Done
      bukro earned a badge
      Week One Done
    • One Year In
      Wulle earned a badge
      One Year In
    • One Month Later
      Wulle earned a badge
      One Month Later
    • One Month Later
      Simmo3D earned a badge
      One Month Later
  • Popular Contributors

    1. 1
      +primortal
      604
    2. 2
      ATLien_0
      281
    3. 3
      +FloatingFatMan
      179
    4. 4
      Michael Scrip
      151
    5. 5
      Steven P.
      111
  • Tell a friend

    Love Neowin? Tell a friend!