Solved

Windows 2000 security lockdowns?

Posted on 2003-11-05
6
161 Views
Last Modified: 2013-12-04
Hi,

Does anyone know of a few sites where I can get some lists of ways to secure my windows 2000 server?    It is a webserver on a hosted by a company that I have 'Remote Desktop Connection' access to.

I need to secure the server from hacking etc...the IIS.

I dont have a firwwall, software or hardware, and have no budget to get one.


I need to know the best ways to lock the server down?


With thanks,
Caspar

0
Comment
Question by:CasparUK
6 Comments
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9687947
0
 
LVL 49

Assisted Solution

by:sunray_2003
sunray_2003 earned 125 total points
ID: 9687988
0
 
LVL 13

Accepted Solution

by:
Gnart earned 125 total points
ID: 9694491
Get the security guide from the NSA:  http://www.nsa.gov/snac/index.html
It contains the best practice used by security specialists.

cheers
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 
LVL 12

Expert Comment

by:gidds99
ID: 9695044
Will a hosting company allow you sufficient admin access to make this type of changes?
0
 
LVL 1

Author Comment

by:CasparUK
ID: 9738695
gidds99 - I have a dedicated server, which I access through remote desktop connection.  I have complete control over the server and you would over a localhost.

sunray_2003 - thank you the list provided was useful

Gnart - Blimey, the NSA archive looks pretty good, cheers!

0
 
LVL 12

Expert Comment

by:gidds99
ID: 9745984
I use RDP connections at work everyday but what I meant was will they have you as a member of the local administrators group.  As if for example they just set you up as an ordinary user with IIS admin rights then you would not have the required level of access to make many of changes suggested in the answers.  
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Join & Write a Comment

Suggested Solutions

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now