Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Best practices for Hardening Windows Domain Controllers

Posted on 2010-11-26
7
Medium Priority
?
1,555 Views
Last Modified: 2012-05-10
Hello Experts,

I just wondering if you can provide me with some docs, links, and your recommendations in how to hardening Windows DC, and deploy full security on these boxes

Any feedback is really appreciated

Thank you in advance
0
Comment
Question by:Jerry Seinfield
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
  • 2
7 Comments
 
LVL 10

Expert Comment

by:moon_blue69
ID: 34217765
Hi one thing I would suggest doing straight away is security configuration and analysis.


and analyse it set it that of hisecdec.inf.
0
 

Author Comment

by:Jerry Seinfield
ID: 34217776
Can you be more specific?

An step by step doc, or link would be really appreciated

Thanks
0
 
LVL 6

Accepted Solution

by:
nipponsoul earned 2000 total points
ID: 34217792
0
Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
LVL 6

Expert Comment

by:nipponsoul
ID: 34217812
This looks nice too - checklist .


http://security.utexas.edu/admin/win2003.html
0
 
LVL 6

Expert Comment

by:nipponsoul
ID: 34217825
0
 
LVL 10

Expert Comment

by:moon_blue69
ID: 34217870
0
 

Author Closing Comment

by:Jerry Seinfield
ID: 34218228
Thank you everyone for the fast response
0

Featured Post

Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
After seeing many questions for JRNL_WRAP_ERROR for replication failure, I thought it would be useful to write this article.
This tutorial will give a short introduction and overview of Backup Exec 2012 and how to navigate and perform basic functions. Click on the Backup Exec button in the upper left corner. From here, are global settings for the application such as conne…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…

618 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question