Solved

Windows Server 2003 Security

Posted on 2004-10-07
4
159 Views
Last Modified: 2013-12-04
On windows server 2003, Ive ran into a few problems, first off, I was an idiot, setup a mail server, and did not secure it. That was stupid I know, Anyways, several unknown items happened...pretty much someone or someone(s) is using my mail server to send out spam...Ok, I went in a fixed it, so that wont happen any more, but after that little incident I started wondering how secure server 2003 really is. Im needing to know away to test every corner of my severs to see what exactly someone could do to it, if they happened to come accross. Open for any suggestions. Thanks.
0
Comment
Question by:miketech04
  • 2
  • 2
4 Comments
 
LVL 25

Expert Comment

by:mikeleebrla
ID: 12251149
Well what all is your server used for?  Do you have a firewall in place?  The most simple thing to do is ONLY open the ports that you absolutely have to.  IE  if it is a web server, only open port 80.  Are you NATing at all or does your server have a public IP address directly assigned to it?
0
 

Author Comment

by:miketech04
ID: 12253068
server1 - Only use DNS

server2 - Web server, dns2, ftp, and mail

Using a linksys router atm, no 100% hardware firewalls in place though...
0
 
LVL 25

Accepted Solution

by:
mikeleebrla earned 500 total points
ID: 12253120
if server 1 is used for EXTERNAL dns resolution (ie you host your own public DNS) then only port 53 needs to be open

server 2 needs ports 80, 20,21, and 25 open. again 53 but only if you host external dns on it.

if you are hosting secure email like outlook web access with ssl you will need port 443 open as well.
0
 

Author Comment

by:miketech04
ID: 12253135
Cool, Thank you for the info
0

Featured Post

Superior storage. Superior surveillance.

WD Purple drives are built for 24/7, always-on, high-definition security systems. With support for up to 8 hard drives and 32 cameras, WD Purple drives are optimized for surveillance.

Join & Write a Comment

Suggested Solutions

Recently, a new law in my state forced us to get a top-to-bottom analysis of all of our contract client's networks. While we have documentation, it was spotty at best for some - and in any event it needed to be checked against reality. That was m…
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now