?
Solved

Hosting a 2000 server

Posted on 2006-07-11
1
Medium Priority
?
305 Views
Last Modified: 2010-03-19
I'm hosting a 2000 server for a friend on my network and I need some simple recommendations on security.

The server is being hosted on the optional port of a sonicwalll tz170.  The only way they are accessing it is via RDP, which is the only port allowed through the firewall.  I have disabled the guest account and turned off file and print sharing.

Any other recommendations?

Thanks,
Matt
0
Comment
Question by:mkarnofel
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 6

Accepted Solution

by:
DaMaestro earned 375 total points
ID: 17084017
There is a setting that would force a certain level of encryption on RDP/Terminal Services, I would probably bump it up.
MS has a link at http://support.microsoft.com/kb/306561/EN-US/ I have also seen the setting in Group Policy, but can't confirm it's exact location where I am now.

I would also set the subnet broadcast settings so it doesn't try to talk to the other computers on your network, just the router. Is your firewall limiting connections from just the outside, or is it limiting connections from the rest of your network to this guest machine as well?
0

Featured Post

Percona Live Europe 2017 | Sep 25 - 27, 2017

The Percona Live Open Source Database Conference Europe 2017 is the premier event for the diverse and active European open source database community, as well as businesses that develop and use open source database software.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Make the most of your online learning experience.
This article is in regards to the Cisco QSFP-4SFP10G-CU1M cables, which are designed to uplink/downlink 40GB ports to 10GB SFP ports. I recently experienced this and found very little configuration documentation on how these are supposed to be confi…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Suggested Courses

801 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question