Export (0) Print
Expand All

Plan for security (Search Server 2008)

Search Server 2008

Updated: July 13, 2009

Applies To: Microsoft Search Server 2008

 

Topic Last Modified: 2009-08-07

NoteNote:
Unless otherwise noted, the information in this article applies to both Microsoft Search Server 2008 and Microsoft Search Server 2008 Express.

This article contains a methodical approach to building stronger security into your solution design for Microsoft Search Server 2008. This approach is based on a foundation of the following security guides, which are provided in Microsoft patterns and practices:

These guides explain practical and secure configurations for specific server roles. The guidance for each server role includes recommended security settings for the network, the operating system, and the installed applications. This includes Internet Information Services (IIS), Microsoft ASP.NET Framework, and Microsoft SQL Server.

The information in this article supplements the Microsoft patterns & practices security guidance in several ways:

  • Provides recommendations for each server role in a server farm.

  • Identifies additional networking, operating system, and application settings that are appropriate for server roles.

  • Provides recommendations for securing the specific applications and features that are installed by Search Server 2008.

  • Targets security recommendations to environments that are common for Search Server 2008 solutions.

Plan for improved security by using the following steps:

  1. Plan the security environment. The security guidance that is recommended for your organization depends on which environment best matches your intended use of Search Server 2008. Use the following article to help plan the security environment:

  2. Plan server farm security. Plan how to secure individual servers in a server farm. The Microsoft patterns & practices security guides are used as a foundation for securing Search Server 2008 environments. Use the following articles to help plan server farm security:

  3. Plan secure configurations for features. Plan how to configure Search Server 2008 features in a more secure manner. Use the following article to help plan more secure configurations:

    • Plan secure configurations for Search Server 2008 features provides recommendations for more securely configuring Search Server 2008 features. The recommendations in this article are usually configured by using Central Administration, instead of in in the network, operating system, IIS, or .NET Framework.

  4. Plan environment-specific security. Plan security targeted to the specific environment. Use the following articles to help plan environment-specific security:

  5. Plan security roles. Use the following article to plan for and design security roles:

Was this page helpful?
(1500 characters remaining)
Thank you for your feedback
Show:
© 2014 Microsoft