To create a powerful and secure server, you must focus on the security of every detail from the very beginning. The new server should be installed on an isolated network to eliminate all possible channels of attack until the operating system's defenses are completed.
In the initial steps of starting the installation, you will be asked to choose between FAT (File Allocation Table) and NTFS (New Technology File System). At this point, you must choose the NTFS format for all disk drives. FAT is a relatively primitive file system designed for early operating systems. NTFS emerged with the advent of NT, which provides a security feature not available in FAT, including Access Control Lists (ACLs) and File System Journaling. File System Logging Any changes to the file system. Next, you need to install the latest Service Pack (SP2) and any popular patches available. While many of the patches in the Service Pack are quite old, they can fix several known vulnerabilities that can cause threats, such as denial of service attacks, remote code execution, and cross-site scripting.
After installing the system, you can sit down and do some more detailed security work. The easiest way to improve the immunity of Windows Server 2003 is to use the Server Configuration Wizard (SCW), which guides you through the process of creating a secure policy based on the role of the server on the network.
SCW is different from the Configure Your Server Wizard. SCW does not install server components, but monitors ports and services and configures registration and auditing settings. SCW is not installed by default, so you must add it via the Add/Remove Programs window of the Control Panel. Select the "Add/Remove Windows Components" button and select "Security Configuration Wizard" and the installation process will start automatically. Once installed, SCW can be accessed from the Administrative Tools.
Security policies created through SCW are in XML file format and can be used to configure services, network security, specific registry values, audit policies, and, if possible, IIS. The configuration interface allows you to create new security policies or edit existing ones and apply them to other servers on the network. If the policy created by an operation creates a conflict or instability, you can roll back the operation.
SCW covers all the basics of Windows Server 2003 security. Running the wizard, the first thing that appears is the Security Configuration Database, which contains all the roles, client features, management options, services, ports, and more. SCW also includes a broad knowledge base of application knowledge. This means that when a selected server role requires an application -- client functions such as automatic updates or management applications such as backup -- the Windows Firewall will automatically open the required ports. The port is automatically blocked when the application is closed.
Network security settings, registry protocols, and Server Message Block (SMB) signature security increase the security of critical server functions. The Outbound Authentication setting determines the level of authentication required to connect to external resources.
The final step in SCW is related to the audit strategy. By default, Windows Server 2003 only audits successful activities, but for an enhanced version of the system, both successful and failed activities should be audited and logged. Once the wizard is executed, the created security policy is stored in an XML and can be used by the server immediately, for later use, and even by other servers. Servers that do not perform the first step of the hardening process during server installation can also install SCW.
From the moment you press the server's power button, until the operation starts and all services are active, the malicious behavior of the threat system still has a chance to damage the system. In addition to the operating system operating system, a healthy server should start with a password-protected BIOS/firmware. In addition, as far as the BIOS is concerned, the server's power-on sequence should be set correctly to prevent booting from unauthorized other media.
Immediately after starting the computer, press the F2 key, and you will be taken to the BIOS setup page. You can use Alt-P to move back and forth on the various settings tabs of the BIOS. On the Boot Order tab, set the server startup preference to Internal HDD. On the Boot Order tab, there are three options for hard disk passwords: Primary, Administrative, and Hard.
Similarly, features that automatically run external media, including CDs, DVDs, and USB drives, should be disabled. In the registry, enter the path HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Cdrom (or other device name) and set the Autorun value to 0. The autorun feature has the potential to automatically launch malicious applications carried on portable media. This is an easy way to install Trojan, Backdoor, KeyLogger, Listener and other malware (see Figure 4).
The next line of defense is about how the user logs into the system. While alternative technologies for authentication, such as biometrics, tokens, smart cards, and one-time passwords, can be used to protect systems in Windows Server 2003, many system administrators, whether local or remote, use The combination of username and password is used as the verification code for the login server. But many times, they all use the default password, which is obviously asking for trouble. Previous 12 3 4 Next Read more
1. Remote Desktop Licensing Remote Desktop Licensing (RD Licensing), formerly known as Terminal Ser
Windows Server 2008, Windows Server licenses are more important than ever. With this license, you ca
Multi-system computer chooses boot mode. In the long run, uefi is more advanced. Traditional bios co
Since the first introduction of the cluster in Windows NT 4.0 Enterprise Edition, users have been co
Windows Server 2008 for small businesses is fully parsed
Windows Server 2008 turns off the idle IDE channel
Win2008 LAN can not see the shared resource solution at some time
How to migrate Windows 2003 to Windows 2008
Hyper-V's multiple Win2008 installation methods
Resolve Windows Server 2008 Recycle Bin Cannot Empty Faults
The use of Windows Server 2008 R2
By means of IIS to build an internal Web-based file sharing platform
Details of six aspects of Windows Server 2008 security deployment
Basic Configuration of Windows Server Core Network
Pros and cons of three types of Windows 8 installation methods
The reason why the win10 system is activated but the key input window still pops up and the solution
XP System No Vulnerabilities Perfect System Security Ten Tips
What if the Win10 10102 preview is not compatible with EasyBCD?
Solution for slow opening of web pages in Win7 system