Windows Server 2003

1. WINDOWS SERVER 2003 2. Windows Server 2003 different Versions 3. Hardware requirement for Windows Server 2003 4. HCL - Hardware Compatibility List 5. Keep following points in mind before Upgrade Migrate 6. Upgrade from previous OS 7. WINDOWS SERVER 2003 INSTALLATION 8. Windows Server 2003 Activation 9. MANAGING LICENSING 10. Administrating License Logging Services 11. Managing Software Installation and Maintenance 12. Essential Administration Tools 13. Difference between RAID & WINDOW BACKUP 14. RAID Redundant Array of Inexpensive DISK 15. Disk Mirroring & Disk Duplexing 16. Disk partition and File System FAT, FAT32, NTFS 17. Remote Desktop for Administration & Terminal services 19. To connect to Remote Desktop Pc from Client PC do as follow 20. Remote Assistance 21. Difference between RAID & WINDOW BACKUP 22. SYSTEM STATE DATA 23. IP-ADDRESSING and IPV4 24. IPV6 [Internet Protocol Version 6] 25. Signed & Unsigned Driver 26. Hardware Profile 27. CHKDSK.EXE (Check Disk) 28. Disk Defragmenter(DFRG.MSC) 29. Introduction to AD [Active Directory] 30. Difference between WORKGROUP & DOMAIN 31. Operating System that support Active Directory 32. FSMO [Flexible Single Master Operation] 33. GC (GLOBAL CATALOG) Server 34. Site 35. Disk Defragmenter (DFRG.MSC) 36. AD replication 37. AUTHORITATIVE Restore 38. TOOLS to Troubleshoot Active Directory Installation 39. Understanding USER, GROUP & COMPUTER 40.GROUP ACCOUNTS 41. User Profile 42. Roaming User Profile 43. Mandatory User Profile 44. Attrib (Attribute) 45. Taking Ownership 46. Copying and Moving Files and Folders 47. Server Roles for WINDOWS SERVER 2003 48. AVAILABILITY & SECURITY 49. General Server Security Issues 50. OSI MODEL 51. Data Encapsulation 52. TCP/IP or DoD Model 53. Protocol Working at Host to Host (Transport) layer 54. NETWORK MONITOR 55. Internet Information Services 55. Monitoring Tools 54. DNS [Domain Name System] 55. DNS ZONE 56. Remote Access Authentication Process 57. Remote Access
Pr.Pg Next Pg

General Server Security Issues tutorials

 

PHYSICAL SECURITY

  • To prevent physical contact, all servers in an organization should be located in a secure area. In addition, all installation CDs and backup tapes used by the server should be physically secure.

 

Service Packs and Hot-fixes

  • Practically all Windows operating systems have shipped with vulnerabilities or bugs that may be discovered after the software has been released. Once vulnerabilities or bugs have been discovered, manufacturers release Bug Hot-Fixes and when there are many such Hot-Fixes then it is combined in service pack (SP),

Vulnerabilities and Bugs

  • Vulnerabilities are unforeseen weaknesses in the programming code that can be exploited by hackers while bugs are defects that may cause the software to function incorrectly. In terms of security, vulnerabilities are a major concern as it may allow a hacker to gain access to your system.

 

Antivirus Protection

  • Viruses, Trojan horses & other malicious programs are a threat to any organization, especially if the organization is connected to the Internet. If these programs infect a network, data and systems can be damaged or destroyed. To prevent these malicious programs from causing problems, antivirus software should be installed on servers and workstations throughout the network.

 

Accounts and Services

  • Hackers and malicious programs can use insecure elements of a system to acquire access to the network and to cause damage. To keep these entities from exploiting elements of your system, you should disable any services that are not required. By disabling unnecessary services, you can reduce the possibility of attacks without affecting functionality.

  • Windows Server 2003 and previous versions of Windows NT all have an account named Administrator. Because hackers already know the username of this account, they only need to obtain password to achieve this level of Access. The Administrator account cannot be deleted, but it can be disabled or renamed. You can create a new user account and add it to the Administrators group. Then you can disable the Administrator account. Attackers will then not be able to target that account.

  • Another Windows Server 2003 account that is disabled by default is the Guest account. This account is used to provide anonymous access to users who do not have their own account. Because there is the possibility that this account could accidentally be given improper levels of access and could be exploited, it should remain disabled.

 

Secure Passwords

  • Passwords are a key component of the default method of authentication for Windows Server 2003. They are used to prevent unauthorized access to computers and networks by forcing anyone who wants access to provide a password, which should be known only to the authorized user. Hackers often attempt to gain access to a computer or network by cracking the password for a known user account. Strong passwords are more difficult to crack than simple ones.

 

File Systems

  • Windows Server 2003 supports the FAT, FAT32, and NTFS file systems. Of these, NTFS provides the highest level of security. When using NTFS, you can set permissions on individual files and folders; control which accounts have access to file system resources; implement file encryption, which prevents unauthorized users from accessing files and folders; and implement disk quotas, which allows you to control how much hard disk space users may use.

 

Pr.Pg border                                              Next Pg