- Getting Started with Windows Server Security
- Santhosh Sivarajan
- 399字
- 2021-07-23 20:25:01
Microsoft Windows Server
The Microsoft Windows Server operating system has gone through several changes over the last decade. One of the major changes that you will notice in the latest versions of Windows is that of the improvement and integration of security. It is clear that server security is essential in one form or another in the enterprise world. Since the latest version of Windows is Windows Sever 2012 R2, I will be using this operating system as my base operating system in this book.
All solutions listed in the book are validated on a Windows 2012 environment. However, most of the methods and configuration details included in this book can also be used in the previous versions of Windows.
According to Microsoft, the Windows Server 2012 operating system is "secure by default". In some aspects, this is true. However, you need to tweak or customize it based on your business and technical requirements to achieve the maximum benefit.
If you are thinking about using the Windows Server 2012 operation system for applications, data, network services, and so on, the actual server hardening or security process starts from the selection of the type of operating system. In Windows Server 2012, you can use the Server Core installation to minimize the security threat. The details and benefits of Server Core can be found at http://msdn.microsoft.com/en-us/library/hh846323(v=vs.85).aspx. Since Server Core installation contains only a few services, processes, and so on, it can minimize the number of malicious attacks (attack surface) on the server. These server attacks can lead to a major enterprise-wide attack. So, if your service runs on the Server Core operating system, it is recommend to select Server Core for this application.
Note
Keep in mind that Server Core can support only a few services. The details of these supported services can be found at http://msdn.microsoft.com/en-us/library/hh846323(v=vs.85).aspx.
The next step in this process is to select the correct (or minimum) server roles for your server. The details of selecting and configuring server roles based on your requirements are included in Chapter 3, Server Roles and Protocols.
From an operating system perspective, in order to achieve maximum security using native and built-in solutions, the security aspect can be summarized using the following diagram:

- JavaScript全程指南
- 大學(xué)計算機(jī)應(yīng)用基礎(chǔ)實(shí)踐教程
- Visual Basic程序設(shè)計(第3版):學(xué)習(xí)指導(dǎo)與練習(xí)
- Instant RubyMotion App Development
- ANSYS Fluent 二次開發(fā)指南
- HTML5與CSS3基礎(chǔ)教程(第8版)
- Node.js:來一打 C++ 擴(kuò)展
- ASP.NET程序開發(fā)范例寶典
- Geospatial Development By Example with Python
- 深度學(xué)習(xí)原理與PyTorch實(shí)戰(zhàn)(第2版)
- 零基礎(chǔ)學(xué)Scratch 3.0編程
- Delphi開發(fā)典型模塊大全(修訂版)
- Flask開發(fā)Web搜索引擎入門與實(shí)戰(zhàn)
- 用Python動手學(xué)統(tǒng)計學(xué)
- 計算機(jī)應(yīng)用基礎(chǔ)(Windows 7+Office 2010)