官术网_书友最值得收藏!

Microsoft Windows Server

The Microsoft Windows Server operating system has gone through several changes over the last decade. One of the major changes that you will notice in the latest versions of Windows is that of the improvement and integration of security. It is clear that server security is essential in one form or another in the enterprise world. Since the latest version of Windows is Windows Sever 2012 R2, I will be using this operating system as my base operating system in this book.

All solutions listed in the book are validated on a Windows 2012 environment. However, most of the methods and configuration details included in this book can also be used in the previous versions of Windows.

According to Microsoft, the Windows Server 2012 operating system is "secure by default". In some aspects, this is true. However, you need to tweak or customize it based on your business and technical requirements to achieve the maximum benefit.

If you are thinking about using the Windows Server 2012 operation system for applications, data, network services, and so on, the actual server hardening or security process starts from the selection of the type of operating system. In Windows Server 2012, you can use the Server Core installation to minimize the security threat. The details and benefits of Server Core can be found at http://msdn.microsoft.com/en-us/library/hh846323(v=vs.85).aspx. Since Server Core installation contains only a few services, processes, and so on, it can minimize the number of malicious attacks (attack surface) on the server. These server attacks can lead to a major enterprise-wide attack. So, if your service runs on the Server Core operating system, it is recommend to select Server Core for this application.

Note

Keep in mind that Server Core can support only a few services. The details of these supported services can be found at http://msdn.microsoft.com/en-us/library/hh846323(v=vs.85).aspx.

The next step in this process is to select the correct (or minimum) server roles for your server. The details of selecting and configuring server roles based on your requirements are included in Chapter 3, Server Roles and Protocols.

From an operating system perspective, in order to achieve maximum security using native and built-in solutions, the security aspect can be summarized using the following diagram:

Microsoft Windows Server

Note

Windows Server 2012 operating system installation, configuration, and conversion details can be found in Instant Migration from Windows Server 2008 and 2008 R2 to 2012 How-to, Packt Publishing.

主站蜘蛛池模板: 达州市| 台东县| 岢岚县| 平利县| 澳门| 全南县| 壤塘县| 木里| 邵武市| 城口县| 神木县| 伊宁县| 加查县| 宣化县| 宣化县| 冷水江市| 奉节县| 衡山县| 慈利县| 兴和县| 托克逊县| 扎鲁特旗| 文安县| 江川县| 翁源县| 崇礼县| 贵港市| 沁阳市| 清河县| 白银市| 大洼县| 营山县| 涞源县| 内黄县| 沙湾县| 福清市| 得荣县| 石家庄市| 长垣县| 蓬溪县| 庆安县|