Solved

Best practices for Hardening Windows Domain Controllers

Posted on 2010-11-26
7
1,496 Views
Last Modified: 2012-05-10
Hello Experts,

I just wondering if you can provide me with some docs, links, and your recommendations in how to hardening Windows DC, and deploy full security on these boxes

Any feedback is really appreciated

Thank you in advance
0
Comment
Question by:Jerry Seinfield
  • 3
  • 2
  • 2
7 Comments
 
LVL 10

Expert Comment

by:moon_blue69
ID: 34217765
Hi one thing I would suggest doing straight away is security configuration and analysis.


and analyse it set it that of hisecdec.inf.
0
 

Author Comment

by:Jerry Seinfield
ID: 34217776
Can you be more specific?

An step by step doc, or link would be really appreciated

Thanks
0
 
LVL 6

Accepted Solution

by:
nipponsoul earned 500 total points
ID: 34217792
0
What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

 
LVL 6

Expert Comment

by:nipponsoul
ID: 34217812
This looks nice too - checklist .


http://security.utexas.edu/admin/win2003.html
0
 
LVL 6

Expert Comment

by:nipponsoul
ID: 34217825
0
 
LVL 10

Expert Comment

by:moon_blue69
ID: 34217870
0
 

Author Closing Comment

by:Jerry Seinfield
ID: 34218228
Thank you everyone for the fast response
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
How to resolve user quota error? 13 65
extended monitor print screen 8 31
RDS2012 vs RDS2008 4 33
Windows Services - Run a Program Grey Out 3 15
Provide an easy one stop to quickly get the relevant information on common asked question on Ransomware in Expert Exchange.
One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
This tutorial will walk an individual through the steps necessary to enable the VMware\Hyper-V licensed feature of Backup Exec 2012. In addition, how to add a VMware server and configure a backup job. The first step is to acquire the necessary licen…
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …

786 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question