Establishing IT infrastructure and defense systems are generally made by evolutionary methods. We insert newer and newer sub-systems, services to the existing environment according to the current needs, usually in scarce financial and time constraints. In these cases we usually tend to prefer functionality over operational security. When it occurs with time shifts, in insufficiently documented system environments, maybe with changing IT staff, it is almost sure that the basic infrastructure, the defense sub-systems will contain planning, implementing or configuration errors.