Solved

Best practices for Hardening Windows Domain Controllers

Posted on 2010-11-26
7
1,516 Views
Last Modified: 2012-05-10
Hello Experts,

I just wondering if you can provide me with some docs, links, and your recommendations in how to hardening Windows DC, and deploy full security on these boxes

Any feedback is really appreciated

Thank you in advance
0
Comment
Question by:Jerry Seinfield
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
  • 2
7 Comments
 
LVL 10

Expert Comment

by:moon_blue69
ID: 34217765
Hi one thing I would suggest doing straight away is security configuration and analysis.


and analyse it set it that of hisecdec.inf.
0
 

Author Comment

by:Jerry Seinfield
ID: 34217776
Can you be more specific?

An step by step doc, or link would be really appreciated

Thanks
0
 
LVL 6

Accepted Solution

by:
nipponsoul earned 500 total points
ID: 34217792
0
Why You Need a DevOps Toolchain

IT needs to deliver services with more agility and velocity. IT must roll out application features and innovations faster to keep up with customer demands, which is where a DevOps toolchain steps in. View the infographic to see why you need a DevOps toolchain.

 
LVL 6

Expert Comment

by:nipponsoul
ID: 34217812
This looks nice too - checklist .


http://security.utexas.edu/admin/win2003.html
0
 
LVL 6

Expert Comment

by:nipponsoul
ID: 34217825
0
 
LVL 10

Expert Comment

by:moon_blue69
ID: 34217870
0
 

Author Closing Comment

by:Jerry Seinfield
ID: 34218228
Thank you everyone for the fast response
0

Featured Post

Increase your protection from Zero Day threats!

Running two Antivirus' is never a good idea.
Taking advantage of Multiple Security layers on the other hand can often save your hide.
See which top notch security software brands have been proven to happily coexist together.
Reduce your chances of becoming a statistic.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.
One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
This tutorial will show how to push an installation of Backup Exec to an additional server in both 2012 and 2014 versions of the software. Click on the Backup Exec button in the upper left corner. From here, select Installation and Licensing, then I…
This tutorial will give a an overview on how to deploy remote agents in Backup Exec 2012 to new servers. Click on the Backup Exec button in the upper left corner. From here, are global settings for the application such as connecting to a remote Back…

737 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question