My PCI-DSS compliance scan reported the following:
Security warning found on port/service "imap (143/tcp)"
Category "Useless services "
Priority "Medium Priority "Synopsis : The rsh service is running. Description : The remote host is running the 'rsh' service. This service is dangerous in the sense that it is not ciphered - that is, everyone can sniff the data that passes between the rsh client and the rsh server. This includes logins and passwords. Also, it may allow poorly authenticated logins without passwords. If the host is vulnerable to TCP sequence number guessing (from any network) or IP spoofing (including ARP hijacking on a local network) then it may be possible to bypass authentication. Finally, rsh is an easy way to turn file-write access into full logins through the .rhosts or rhosts.equiv files. You should disable this service and use ssh instead.
Solution : Comment out the 'rsh' line in /etc/inetd.conf
The only thing that's got anything to do with port 143 on this box (to my knowledge) is hMailServer. Since we're in a Windows environment, telling me to tweak /etc/inetd.conf isn't terribly helpful. Is there something I could/should configure in hMS?