Share via


Overview of a Secure Windows Server 2003 Environment

Applies To: Windows Server 2003, Windows Server 2003 R2, Windows Server 2003 with SP1, Windows Server 2003 with SP2

Secure IT environments are the result of careful planning from the time you decide to deploy a new feature or service to the moment when responsibility for those features and services is handed over to those responsible for the day-to-day operation of the network. To ensure a secure IT environment, security must be addressed in every possible area of network design and planning, including such diverse areas as the Active Directory® directory service, networking, and client configuration. Even then, the best security plans and designs in the world cannot protect an organization if security is not an essential part of their operating procedures.

Every organization has its own unique mix of clients, servers, and user requirements that make planning a comprehensive, secure environment a major challenge. Without a consistent approach to security, some areas of the network might benefit from extremely rigorous security while others are only minimally secured.

Fortunately, the Microsoft® Windows® Server 2003, Standard Edition; Windows® Server 2003, Enterprise Edition; Windows® Server 2003, Datacenter Edition; and Windows® Server 2003, Web Edition operating systems, and the Microsoft® Windows® XP Professional operating system provide many features and capabilities that you can use to configure and maintain a secure network operating environment. In fact, there are security capabilities in nearly every area of Windows Server 2003 and Windows XP Professional. Many of these security features and capabilities have been added or enhanced since the introduction of the Microsoft® Windows® 2000 Professional and Windows® 2000 Server operating systems.

This Windows Server 2003 security planning process is based on a high-level view of the security configuration options and capabilities. This security planning process is based on two organizing principles:

  • Users need access to resources. This access can be very basic, including only desktop logon and the availability of access control lists (ACLs) on resources. This access can also include optional services such as remote network logons, wireless network access, and access for external users, such as business partners or customers.

  • The network requires a secure shared IT infrastructure. This infrastructure includes security boundaries, secure servers and services, secure networking, and an effective plan for delegating administration.

Together, these building blocks of network operating system security can provide the trust and integrity needed in today’s complex operating environments. By analyzing the security requirements of your organization by using a security planning process, you can establish a high-level security framework for your Windows Server 2003 deployment.

Important

  • This security planning process is not intended to replace a detailed assessment of existing security systems, gaps, and solutions. For more information about designing and deploying a secure Windows Server 2003 environment you need to complete the assessment, design, and planning steps that are described throughout the Microsoft® Windows® Server 2003 Deployment Kit. You might also have to assess the non-operating system software, such as messaging, database, and office suite programs, that are used in your environment.