Solved

Windows Server 2003 Security

Posted on 2004-10-07
4
165 Views
Last Modified: 2013-12-04
On windows server 2003, Ive ran into a few problems, first off, I was an idiot, setup a mail server, and did not secure it. That was stupid I know, Anyways, several unknown items happened...pretty much someone or someone(s) is using my mail server to send out spam...Ok, I went in a fixed it, so that wont happen any more, but after that little incident I started wondering how secure server 2003 really is. Im needing to know away to test every corner of my severs to see what exactly someone could do to it, if they happened to come accross. Open for any suggestions. Thanks.
0
Comment
Question by:miketech04
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 25

Expert Comment

by:mikeleebrla
ID: 12251149
Well what all is your server used for?  Do you have a firewall in place?  The most simple thing to do is ONLY open the ports that you absolutely have to.  IE  if it is a web server, only open port 80.  Are you NATing at all or does your server have a public IP address directly assigned to it?
0
 

Author Comment

by:miketech04
ID: 12253068
server1 - Only use DNS

server2 - Web server, dns2, ftp, and mail

Using a linksys router atm, no 100% hardware firewalls in place though...
0
 
LVL 25

Accepted Solution

by:
mikeleebrla earned 500 total points
ID: 12253120
if server 1 is used for EXTERNAL dns resolution (ie you host your own public DNS) then only port 53 needs to be open

server 2 needs ports 80, 20,21, and 25 open. again 53 but only if you host external dns on it.

if you are hosting secure email like outlook web access with ssl you will need port 443 open as well.
0
 

Author Comment

by:miketech04
ID: 12253135
Cool, Thank you for the info
0

Featured Post

Enroll in June's Course of the Month

June’s Course of the Month is now available! Experts Exchange’s Premium Members, Team Accounts, and Qualified Experts have access to a complimentary course each month as part of their membership—an extra way to sharpen your skills and increase training.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
If you’ve ever visited a web page and noticed a cool font that you really liked the look of, but couldn’t figure out which font it was so that you could use it for your own work, then this video is for you! In this Micro Tutorial, you'll learn yo…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question