?
Solved

Best practices for Hardening Windows Domain Controllers

Posted on 2010-11-26
7
Medium Priority
?
1,565 Views
Last Modified: 2012-05-10
Hello Experts,

I just wondering if you can provide me with some docs, links, and your recommendations in how to hardening Windows DC, and deploy full security on these boxes

Any feedback is really appreciated

Thank you in advance
0
Comment
Question by:Jerry Seinfield
  • 3
  • 2
  • 2
7 Comments
 
LVL 10

Expert Comment

by:moon_blue69
ID: 34217765
Hi one thing I would suggest doing straight away is security configuration and analysis.


and analyse it set it that of hisecdec.inf.
0
 

Author Comment

by:Jerry Seinfield
ID: 34217776
Can you be more specific?

An step by step doc, or link would be really appreciated

Thanks
0
 
LVL 6

Accepted Solution

by:
nipponsoul earned 2000 total points
ID: 34217792
0
What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

 
LVL 6

Expert Comment

by:nipponsoul
ID: 34217812
This looks nice too - checklist .


http://security.utexas.edu/admin/win2003.html
0
 
LVL 6

Expert Comment

by:nipponsoul
ID: 34217825
0
 
LVL 10

Expert Comment

by:moon_blue69
ID: 34217870
0
 

Author Closing Comment

by:Jerry Seinfield
ID: 34218228
Thank you everyone for the fast response
0

Featured Post

Has Powershell sent you back into the Stone Age?

If managing Active Directory using Windows Powershell® is making you feel like you stepped back in time, you are not alone.  For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A procedure for exporting installed hotfix details of remote computers using powershell
The Cyber News Rundown brings you the latest happenings in cyber news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst, and a guy with a passion for all things security. Any more questions? Just ask.
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…
This tutorial will show how to configure a single USB drive with a separate folder for each day of the week. This will allow each of the backups to be kept separate preventing the previous day’s backup from being overwritten. The USB drive must be s…

862 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question