Wednesday, March 7, 2012

How is security different on server roles?

I am in need of help here and was thinking that maybe some of you more knowledgeable people out there in the yahoo answers community can hopefully assist me. I am having a hard time trying to figure out and/or come up with some solutions as to how would security be different on the different server roles? What about coming up with as many different roles as possible, then trying to come up with general security configurations that would work well in those roles? Any and all help as always will be greatly appreciated, thanks in advance.How is security different on server roles?
Server security is basically one of the initial security requirements when you install any server operating system. Servers have to be physically secure from physical threats such as physical unauthorized access. Physical security prevents an individual from physically accessing your server, and performing malicious actions.



A few guidelines and recommendations for implementing physical server security are detailed below:



All servers should be secured in a locked server room.



Only those individuals that need access should be permitted to access the server room using a key or security code. You can also implement a mechanism that monitors who enters and leaves the server room.



All hubs, routers and switches should be placed in a wiring closet, or in a locked cable room.



You should use case locks on your servers. You can also install case locks on other systems that can be physically accessed.



You should restrict access to the floppy drive as well.



Set a BIOS password on all systems. This would prevent an unauthorized person from accessing the BIOS.



You should change the operating system selection timeout interval to 0 in order for Windows to boot automatically.



When you are setting up Windows, disconnect the server from the Internet.



Install Windows operating systems to a NTFS partition.



Ensure that you use a strong local administrator password during setup

No comments:

Post a Comment