Windows server security basics




















Reporting features allow you to easily understand the changes that are occurring across your Windows Server estate, including applications such as Active Directory and Exchange, and in different easy-to-read formats using pre-configured reports included with the software, so that you can get started quickly.

They also go beyond the auditing capabilities native to Windows Server to help better secure your systems by pulling information from a wider variety of sources, and have extra features such as user activity video recording. Go Up. Netwrix Blog. Monitoring and Auditing Windows Server has built-in tools for monitoring and auditing, such as Event Viewer and some handy PowerShell cmdlets.

Russell Smith. IT consultant and author specializing in management and security technologies. Active Directory Domain services Perhaps the most important of all of the Windows Server roles, Active Directory AD manages authentication of users and devices on the network, enforces security policies assigned to those users and devices, and allows for management and administration of the network.

Many other services and applications are dependent on AD. Because of the critical and foundational nature of AD, organizations tend to set up redundant domain controllers the name for servers running the AD role in case one goes down. DNS is important because it is one of the industry standards that allow people to browse the internet, and it plays a role in filtering out malicious websites.

File and Storage services The File and Storage services role provides services that allow users to store and share files on a given network. Permissions on shares can be configured to allow only certain groups or individuals to access or modify files.

Hyper-V The Hyper-V role in Windows Server provides a virtualization platform that allows organizations to run many virtual machines on a single physical computer in order to more efficiently utilize resources and isolate workloads. Print and document services Print and Document Services is a Windows Server role that provides centralized management of and access to networked printers, so that everyone on the network with the right permissions can connect to these devices.

Difference between roles and features Similar to roles, features are optional Windows Server components that provide helper functionality. Additional Windows Server products Microsoft also provides Windows Server offerings with additional functionality above and beyond what ships with regular versions of Windows Server.

For example: Microsoft Exchange Server - email and calendaring server Microsoft Office SharePoint Server - document and information management platform Microsoft SQL Server - relational database management system that many enterprise applications depend on. What is server redundancy? Difficulty Level: Beginner. Peter Tsai This person is a verified professional. Main Areas of Contribution:. Netwrix Blog. Handpicked related content:. Russell Smith. IT consultant and author specializing in management and security technologies.

Jeff Melnick October 16, Jeff Melnick February 4, Jeff Melnick June 27, Russell Smith June 13, Featured tags. Before you go, grab the latest edition of our free Cyber Chief Magazine — it celebrates National Cybersecurity Awareness Month and comes packed with the resources that organizations need to defend against cyberattacks.

We care about security of your data. The keys carry many more bits than a password and are not easily cracked by most modern computers. The popular RSA bit encryption is equivalent to a digit password. The public key has several copies, one of which remains on the server, while others are shared with users. Anyone that has the public key has the power to encrypt data, while only the user with the corresponding private key can read this data.

The private key is not shared with anyone and must be kept secure. When establishing a connection, the server asks for evidence that the user has the private key, before allowing privileged access. It encrypts data files and your authentication information.

FTPS uses both a command channel and a data channel, and the user can encrypt both. Bear in mind that it only protects files during transfer. As soon as they reach the server, the data is no longer encrypted. For this reason, encrypting the files before sending them adds another layer of security. Secure your web administration areas and forms with Secure Socket Layer SSL that guards information passed between two systems via the internet.

SSL can be used both in server-client and in server-server communication. The program scrambles data so that sensitive information such as names, IDs, credit card numbers, and other personal information is not stolen in transit. Not only does the certificate encrypt data, but it is also used for user authentication.

Therefore, by managing certificates for your servers, it helps establish user authority. Administrators can configure servers to communicate with centralized authority and any other certificate that the authority signs. Unlike open networks which are accessible to the outside world and therefore susceptible to attacks from malicious users , private and virtual private networks restrict access to selected users.

Private networks use a private IP to establish isolated communication channels between servers within the same range. This allows multiple servers under the same account to exchange information and data without exposure to a public space. When you want to connect to a remote server as if doing it locally through a private network, use a VPN.

It enables an entirely secure and private connection and can encompass multiple remote servers. For the servers to communicate under the same VPN, they must share security and configuration data.

Using intrusion prevention software to monitor login attempts is a way to protect your server against brute force attacks. These automated attacks use a trial-and-error method, attempting every possible combination of letters and numbers to gain access to the system. Intrusion prevention software oversees all log files and detects if there are suspicious login attempts.

If the number of attempts exceeds the set norm, intrusion prevention software blocks the IP address for a certain period or even indefinitely.

Every server has a root user who can execute any command. Because of the power it has, the root can be very hazardous to your server if it falls into the wrong hands. It is widespread practice to disable the root login in SSH altogether. Since the root user has the most power, hackers focus their attention on trying to crack the password of that specific user.

If you decide to disable this user entirely, you will put attackers in a significant disadvantage and save your server from potential threats. To ensure outsiders do not misuse root privileges, you can create a limited user account. This account does not have the same authority as the root but is still able to perform administrative tasks using sudo commands. Therefore, you can administer most of the tasks as the limited user account and use the root account only when necessary.

The first thing is to set password requirements and rules that must be followed by all members on the server. Do not allow empty or default passwords. Enforce minimum password length and complexity.



0コメント

  • 1000 / 1000