Solved

Windows 2008 - Server Security

Posted on 2011-09-13
2
236 Views
Last Modified: 2012-05-12
Hello Experts,

I have a Windows 2008 server that serves web pages to around 30 users throughout a normal day.

I am looking for a little advice on securing my server. I noticed that there is often attempts to connect to my server using RDC. Is there any software that can block these attempts or maybe limit the RDC to an IP Range?

My experience is very limited when it comes to Windows servers, so any security advice would be much appreciated.

Thank you,


David
0
Comment
Question by:NewFourWalls
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 13

Accepted Solution

by:
Govvy earned 500 total points
ID: 36532055
Example of how to configure Windows Firewall rule from command line (alternatively access WinFW seetings via Administrative Tools):

>netsh advfirewall firewall add rule name=”RDP Test” dir=in action=allow remoteport=3389 enable=yes remoteip=157.60.0.0/16,LocalSubnet profile=domain

0
 

Author Closing Comment

by:NewFourWalls
ID: 36718289
Sorry for the delay, that worked fine, thank you :)
0

Featured Post

Does Powershell have you tied up in knots?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

We recently had an issue where out of nowhere, end users started indicating that their logins to our terminal server were just showing a "blank screen." After checking the usual suspects -- profiles, shell=explorer.exe in the registry, userinit.exe,…
I had a question today where the user wanted to know how to delete an SSL Certificate, so I thought that I would quickly add this How to! Article for your reference. WHY WOULD YOU WANT TO DELETE A CERTIFICATE? 1. If an incorrect certificate was …
This tutorial will walk an individual through locating and launching the BEUtility application and how to execute it on the appropriate database. Log onto the server running the Backup Exec database. In a larger environment, this would generally be …
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question