Solved

Best practices for Hardening Windows Domain Controllers

Posted on 2010-11-26
7
1,490 Views
Last Modified: 2012-05-10
Hello Experts,

I just wondering if you can provide me with some docs, links, and your recommendations in how to hardening Windows DC, and deploy full security on these boxes

Any feedback is really appreciated

Thank you in advance
0
Comment
Question by:Jerry Seinfield
  • 3
  • 2
  • 2
7 Comments
 
LVL 10

Expert Comment

by:moon_blue69
ID: 34217765
Hi one thing I would suggest doing straight away is security configuration and analysis.


and analyse it set it that of hisecdec.inf.
0
 

Author Comment

by:Jerry Seinfield
ID: 34217776
Can you be more specific?

An step by step doc, or link would be really appreciated

Thanks
0
 
LVL 6

Accepted Solution

by:
nipponsoul earned 500 total points
ID: 34217792
0
Don't lose your head updating email signatures!

Do your end users still have the wrong email signature? Do email signature updates bore you or fill you with a sense of dread? You can make this a whole lot easier on yourself by trusting an Exclaimer email signature management solution. Over 50 million users do...so should you!

 
LVL 6

Expert Comment

by:nipponsoul
ID: 34217812
This looks nice too - checklist .


http://security.utexas.edu/admin/win2003.html
0
 
LVL 6

Expert Comment

by:nipponsoul
ID: 34217825
0
 
LVL 10

Expert Comment

by:moon_blue69
ID: 34217870
0
 

Author Closing Comment

by:Jerry Seinfield
ID: 34218228
Thank you everyone for the fast response
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
This tutorial will show how to push an installation of Backup Exec to an additional server in both 2012 and 2014 versions of the software. Click on the Backup Exec button in the upper left corner. From here, select Installation and Licensing, then I…
This tutorial will walk an individual through the steps necessary to configure their installation of BackupExec 2012 to use network shared disk space. Verify that the path to the shared storage is valid and that data can be written to that location:…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now