官术网_书友最值得收藏!

Microsoft Windows Server

The Microsoft Windows Server operating system has gone through several changes over the last decade. One of the major changes that you will notice in the latest versions of Windows is that of the improvement and integration of security. It is clear that server security is essential in one form or another in the enterprise world. Since the latest version of Windows is Windows Sever 2012 R2, I will be using this operating system as my base operating system in this book.

All solutions listed in the book are validated on a Windows 2012 environment. However, most of the methods and configuration details included in this book can also be used in the previous versions of Windows.

According to Microsoft, the Windows Server 2012 operating system is "secure by default". In some aspects, this is true. However, you need to tweak or customize it based on your business and technical requirements to achieve the maximum benefit.

If you are thinking about using the Windows Server 2012 operation system for applications, data, network services, and so on, the actual server hardening or security process starts from the selection of the type of operating system. In Windows Server 2012, you can use the Server Core installation to minimize the security threat. The details and benefits of Server Core can be found at http://msdn.microsoft.com/en-us/library/hh846323(v=vs.85).aspx. Since Server Core installation contains only a few services, processes, and so on, it can minimize the number of malicious attacks (attack surface) on the server. These server attacks can lead to a major enterprise-wide attack. So, if your service runs on the Server Core operating system, it is recommend to select Server Core for this application.

Note

Keep in mind that Server Core can support only a few services. The details of these supported services can be found at http://msdn.microsoft.com/en-us/library/hh846323(v=vs.85).aspx.

The next step in this process is to select the correct (or minimum) server roles for your server. The details of selecting and configuring server roles based on your requirements are included in Chapter 3, Server Roles and Protocols.

From an operating system perspective, in order to achieve maximum security using native and built-in solutions, the security aspect can be summarized using the following diagram:

Microsoft Windows Server

Note

Windows Server 2012 operating system installation, configuration, and conversion details can be found in Instant Migration from Windows Server 2008 and 2008 R2 to 2012 How-to, Packt Publishing.

主站蜘蛛池模板: 庆阳市| 巴东县| 虹口区| 崇阳县| 宿迁市| 伊春市| 介休市| 策勒县| 南部县| 凌源市| 军事| 鹰潭市| 乐至县| 浮梁县| 宁海县| 彰化县| 景谷| 平谷区| 商城县| 麟游县| 洛南县| 佳木斯市| 阿勒泰市| 泸州市| 昌吉市| 白银市| 库尔勒市| 泽库县| 洪泽县| 普陀区| 石屏县| 密云县| 噶尔县| 崇文区| 司法| 诏安县| 灌云县| 聂荣县| 科技| 塘沽区| 永和县|