• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 168
  • Last Modified:

Windows Server 2003 Security

On windows server 2003, Ive ran into a few problems, first off, I was an idiot, setup a mail server, and did not secure it. That was stupid I know, Anyways, several unknown items happened...pretty much someone or someone(s) is using my mail server to send out spam...Ok, I went in a fixed it, so that wont happen any more, but after that little incident I started wondering how secure server 2003 really is. Im needing to know away to test every corner of my severs to see what exactly someone could do to it, if they happened to come accross. Open for any suggestions. Thanks.
0
miketech04
Asked:
miketech04
  • 2
  • 2
1 Solution
 
mikeleebrlaCommented:
Well what all is your server used for?  Do you have a firewall in place?  The most simple thing to do is ONLY open the ports that you absolutely have to.  IE  if it is a web server, only open port 80.  Are you NATing at all or does your server have a public IP address directly assigned to it?
0
 
miketech04Author Commented:
server1 - Only use DNS

server2 - Web server, dns2, ftp, and mail

Using a linksys router atm, no 100% hardware firewalls in place though...
0
 
mikeleebrlaCommented:
if server 1 is used for EXTERNAL dns resolution (ie you host your own public DNS) then only port 53 needs to be open

server 2 needs ports 80, 20,21, and 25 open. again 53 but only if you host external dns on it.

if you are hosting secure email like outlook web access with ssl you will need port 443 open as well.
0
 
miketech04Author Commented:
Cool, Thank you for the info
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

  • 2
  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now