Chapter 3. Server Roles and Protocols
The vulnerabilities of a server can be minimized by controlling the installed application, type of operating system you are using, opened ports, services, and so on. It is generally referred to as Server Hardening. The details and principles can be found at http://en.wikipedia.org/wiki/Hardening_(computing). Microsoft has introduced the server roles concept to address some of these security concerns. To ensure that you can achieve maximum security and minimize the security breaches, the first step should be the selection of correct server type and server roles for your application. Then, you can apply baseline policies and templates to these servers, as mentioned in Chapter 1, Operating System and Baseline Security, and Chapter 2, Native MS Security Tools and Configuration, of this book, to ensure maximum security.
If you remember our conversation from Chapter 1, Operating System and Baseline Security, we started creating the security polices...