Windows Server 2008

1. WINDOWS SERVER 2008 2. WINDOWS 2008 Editions 3. WINDOWS 2008 Server Core 4. APPROX. COST OF WINDOWS SERVER 2008 5. Upgrade / Migrate 6. Upgrade from previous OS 7. WINDOWS SERVER 2008 INSTALLATION 8. Windows Server 2008 Activation 9. Activation Method 10. RAID 11. BACKUP and RECOVERY 12. Wbadmin 13. BACKUP Utility 14. Windows Recovery Environment 15. Server Roles for WINDOWS SERVER 2008 16. IP-ADDRESSING and IPV4 17. IPV6 18. Remote Desktop Connection 19. Steps for Remote Desktop Pc from Client PC 20. Remote Desktops 21. MANAGING SERVER CORE 22. TERMINAL SERVICES (TS) 23. TERMINAL SERVICES MANAGER 24. MANGAING FILE AND PRINT SERVERS 25. Share Folder 26. Attrib (Attribute) 27. Windows Registry 28. Disk Quotas 29. Disaster Recovery Tools 30. MMC 31. Remote Assistance 32. Signed & Unsigned Driver 33. Hardware Profile 34. CHKDSK.EXE(Check Disk) 35. Disk Defragmenter (DFRG.MSC) 36. ACTIVE DIRECTORY REVIEW 37. Introduction to AD 38. TRUST 39. FSMO 40. GC (GLOBAL CATALOG) Server 41. Site 42. AD replication 43. Backup of Active Directory (DC) 44. Understanding USER, GROUP & COMPUTER 45. Create Local User & Multiple Users 46. GROUP SCOPE 47. Public and Private key encryption 48. Trust concept of CA working 49. ETHERNET CARDS 50. Availability and Security 51. General Server Security Issues 52. OSI MODEL 53. Data Encapsulation 54. TCP/IP or DoD Model 55. Protocol Working at Host to Host (Transport) layer 56. NETWORK MONITOR 57. Internet Information Services 58. Monitoring Tools 59. DNS [Domain Name System] 60. DNS ZONE 61. Remote Access Authentication Process 62. Remote Access Interview Question & Answer part 1 Tutorials Interview Question & Answer part 2 Tutorials Interview Question & Answer part 3 Tutorials Interview Question & Answer part 4 Tutorials Interview Question & Answer part 5 Tutorials Interview Question & Answer part 6 Tutorials Interview Question & Answer part 7 Tutorials
Pr.Pg Next Pg

General Server Security Issues tutorials

 

PHYSICAL SECURITY

  • To prevent physical contact, all servers in an organization should be located in a secure area. In addition, all installation CDs and backup tapes used by the server should be physically secure.

 

Service Packs and Hot-fixes

  • Practically all Windows operating systems have shipped with vulnerabilities or bugs that may be discovered after the software has been released. Once vulnerabilities or bugs have been discovered, manufacturers release Bug Hot-Fixes and when there are many such Hot-Fixes then it is combined in service pack (SP),

Vulnerabilities and Bugs

  • Vulnerabilities are unforeseen weaknesses in the programming code that can be exploited by hackers while bugs are defects that may cause the software to function incorrectly. In terms of security, vulnerabilities are a major concern as it may allow a hacker to gain access to your system.

 

Antivirus Protection

  • Viruses, Trojan horses & other malicious programs are a threat to any organization, especially if the organization is connected to the Internet. If these programs infect a network, data and systems can be damaged or destroyed. To prevent these malicious programs from causing problems, antivirus software should be installed on servers and workstations throughout the network.

 

Accounts and Services

  • Hackers and malicious programs can use insecure elements of a system to acquire access to the network and to cause damage. To keep these entities from exploiting elements of your system, you should disable any services that are not required. By disabling unnecessary services, you can reduce the possibility of attacks without affecting functionality.

  • Windows Server 2003 and previous versions of Windows NT all have an account named Administrator. Because hackers already know the username of this account, they only need to obtain password to achieve this level of Access. The Administrator account cannot be deleted, but it can be disabled or renamed. You can create a new user account and add it to the Administrators group. Then you can disable the Administrator account. Attackers will then not be able to target that account.

  • Another Windows Server 2003 account that is disabled by default is the Guest account. This account is used to provide anonymous access to users who do not have their own account. Because there is the possibility that this account could accidentally be given improper levels of access and could be exploited, it should remain disabled.

 

Secure Passwords

  • Passwords are a key component of the default method of authentication for Windows Server 2003. They are used to prevent unauthorized access to computers and networks by forcing anyone who wants access to provide a password, which should be known only to the authorized user. Hackers often attempt to gain access to a computer or network by cracking the password for a known user account. Strong passwords are more difficult to crack than simple ones.

 

File Systems

  • Windows Server 2003 supports the FAT, FAT32, and NTFS file systems. Of these, NTFS provides the highest level of security. When using NTFS, you can set permissions on individual files and folders; control which accounts have access to file system resources; implement file encryption, which prevents unauthorized users from accessing files and folders; and implement disk quotas, which allows you to control how much hard disk space users may use.

 

Pr.Pg border                                              Next Pg