Solved

How do I secure a Windows Server 2003/2008 Fileserver?

Posted on 2011-03-06
3
469 Views
Last Modified: 2012-05-11
What are the steps most systems administrators take for securing file servers? What security monitors do you set etc?
0
Comment
Question by:victor2008
  • 2
3 Comments
 
LVL 5

Expert Comment

by:sykojester
ID: 35048168
Proper permissions is one of the biggest things for a file server.  Antivirus is also a big thing as client computers can be notorious for becoming infected and spreading via shares which gets other client machines infected.

I don't quite understand what you are referring to by security monitors.  Possibly audit logs?
0
 

Author Comment

by:victor2008
ID: 35048293
yes, i meant audit logs.  do you use the built in security auditing or third party? how would a virus infect a share and then spread to other computers?
0
 
LVL 5

Accepted Solution

by:
sykojester earned 500 total points
ID: 35048350
I generally don't audit file/folder access on shares for small business.  Usually the issue is the user modifies or deletes a file and needs the previous version which is where previous versions, shadow copy, & backups come in handy.

You can enable domain or local policies for audit tracking on who accesses files and folders including when they read and modify them.

If you're doing this on the file server itself it can be done via Local Security Policy / Audit Policy / Audit Object Access.  You can audit both success and/or failure.

Some viruses do spread via network shares, esp. mapped drives.  Some create autorun.inf's with the shares as well as drop files within the share for users to execute.  They can also attach to existing file formats depending on the virus/malware such as .exe, .doc, xls, .pdf, and so on.  I've finally eliminated this within my environment as I've recently gotten a new job.  Fun Fun.
0

Featured Post

IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
Recently, I read that Microsoft has analysed statistics for their security intelligence report. It revealed: still, the clear majority of windows users do their daily work as administrator. An administrative account is a burden, security-wise. My ar…
To efficiently enable the rotation of USB drives for backups, storage pools need to be created. This way no matter which USB drive is installed, the backups will successfully write without any administrative intervention. Multiple USB devices need t…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now