Solved

Win2K3 Server Security Recommendation

Posted on 2006-06-15
6
213 Views
Last Modified: 2010-04-18
I am working to setup a Windows Server 2003 with the following funcitonality accessible to the outside world:
-Web Server
-DNS Server
-Exchange Email Server(front end)
-VPN Server

The server is going to be exposed to the public internet.

Can you give me your suggestions on structuring the accessible server for maximum security? What features should I include on the server? What features should I be careful to ensure are not running on the server.
0
Comment
Question by:tiggermt
  • 3
  • 3
6 Comments
 
LVL 48

Accepted Solution

by:
Jay_Jay70 earned 250 total points
ID: 16916275
no doubt that this is going to be a popular Q so i will just drop in a quick link that will show you some integrated security you can play with
http://www.windowsecurity.com/articles/Security-Configuration-Wizard-Windows-Server-2003-SP1.html
0
 

Author Comment

by:tiggermt
ID: 16916315
Great resource. Thank you!
0
 
LVL 48

Expert Comment

by:Jay_Jay70
ID: 16916326
no problem at all

there are plenty of additional options as well, such as ISA server for proxy and firewall etc etc, that link above is just integrated security

there is a TA purely for security if you want more ideas..
0
U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

 

Author Comment

by:tiggermt
ID: 16916393
Thanks. I checked out the Security topic, but didn't see to much directly applicable to Server security. How secure do you feel with a Windows Server 2003 compared to a Linux solution? (should I open a new topic for this)?
0
 
LVL 48

Expert Comment

by:Jay_Jay70
ID: 16916405
personally i dislike linux but thats beause i have only ever touched on it lightly and windows is a lot user friendly so i can't really make a good comment on that for you, however, many many people ae big fans of linux security
0
 

Author Comment

by:tiggermt
ID: 16916645
Understood. Thanks!
0

Featured Post

Control application downtime with dependency maps

Visualize the interdependencies between application components better with Applications Manager's automated application discovery and dependency mapping feature. Resolve performance issues faster by quickly isolating problematic components.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I guess it is not common knowledge to most Wintel engineers/administrators: If you have an SNMP-based monitoring system in your environment (and it's common to have SNMP or Syslog) it's reasonably easy to enable monitoring of the Windows Event logs,…
Many of us need to configure DHCP server(s) in their environment. We can do that simply via DHCP console on server or using MMC snap-in on each computer with Administrative Tools installed in a network. But what if we have to configure many DHCP ser…
In this video I am going to show you how to back up and restore Office 365 mailboxes using CodeTwo Backup for Office 365. Learn more about the tool used in this video here: http://www.codetwo.com/backup-for-office-365/ (http://www.codetwo.com/ba…
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

27 Experts available now in Live!

Get 1:1 Help Now