Implementing access management in Windows servers
The concept of building a solid access foundation is critical as it relates to server management as part of securing the overall infrastructure. You must consider everything, from the physical access down to protecting unified management consoles that control multiple virtual servers at once. In the next few sections, we will discuss physical access and user access to the infrastructure and the importance of each. Next, we will discuss privileged isolation in AD through a tiered model approach and provide an overview of privileged access management (PAM) and privileged identity management (PIM) solutions for just-in-time (JIT) access. Implementing these tools will provide a robust solution to control server access management. First, let's look at physical access and security.
Physical and user access security
An important factor to consider with the on-premises model is to ensure all physical access to any server location...