Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Server

Planning Your Small Business Server 2011 Network : Choosing Naming Conventions & Planning for Security

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
7/17/2011 3:59:42 PM

1. Choosing Naming Conventions

Creating naming conventions makes choosing names for computers, shared folders, and users easier and lends consistency to the network. This consistency results in a more user-friendly network.

1.1. Choosing a Domain Name for the Network

The domain name is the most important and politically sensitive name on the network, and it is one you can’t change without starting all over and completely rebuilding your network. Do not make this decision without consulting everyone who has a stake in the result. By getting others involved in the process, you’ll have a much greater chance of acceptance.

Some questions to ask when choosing a domain name include

  • Is the name easy to remember, and does it make sense for the company? This could be the company name in its most common form or an abbreviation.

  • Is the name 15 characters or shorter? Use only letters, numbers, the underscore, and a hyphen in the name to ensure DNS and NetBIOS compatibility.

  • Is the name available? If the name is already in use as an Internet domain name for another company, you’ll have to either choose a different name or have a different internal and external domain name.

  • If you already have an Internet website, use the same name, without the extension, for your internal domain name. For example, if the company uses www.example.com for its Internet website, use example for the domain name. The Windows Small Business Server 2011 Standard Installation Wizard will automatically add a .local extension to the name you choose.

  • As soon as you choose a domain name, register it (preferably with .com, .net, or .org) on the Internet so that another company can’t purchase it.


Warning:

IMPORTANT Changing your internal domain name is impossible without a complete re-installation, so picking a name that will last is critical.


REAL WORLD: Internal Domain Name vs. Internet Domain Name

There are two domain names you need to worry about when setting up your network: the Internet domain name that the outside world sees for your company and email, and the internal domain name that Windows Small Business Server uses. They are usually related but not identical. The public, Internet domain name needs to be globally unique, officially registered with a Domain Naming Service, and clearly identifiable as your company. The internal, Windows name can be anything at all, though it usually is the same as the external, public one, but with a different top-level domain.

So if your company is Example Widgets and your public Internet domain name is example.com, your internal Windows domain name could be something like example.local. This makes it easy to keep track of, and it gives you complete control over managing the internal DNS of your Windows Small Business Server network while allowing you to have a reliable third party manage your public DNS records.

Although it is technically possible to change your public name, it’s neither easy nor painless, and it’s virtually impossible to change your internal name without having to completely rebuild your network from scratch. So it’s worth spending time up front to make sure you’re choosing a name that is appropriate and has the support of all parties.

Another possibility is to choose a completely generic name for your internal domain that has nothing whatsoever to do with your company name. This works great if you change your public name because nothing has to change on your network. But it’s not an approach we like. We’ve always preferred naming based on the company name—it’s just easier for everyone to understand and remember.


1.2. Naming Computers

It’s easy for you to keep a map of what the different clients and servers are called and where they are on the network, but if you make life hard on users, you pay in the long run. So naming all the computers after Shakespearean characters or Norse gods might make sense to you, but it isn’t going to help users figure out that Puck is the Windows Small Business Server computer and Odin is the desktop used for payroll.

On the other hand, using Srv1 for the SBS server tells everyone immediately which computer it is. When naming computers, use a consistent convention and sensible names, such as the following:

  • SRV1 or SBSSRV for the Windows Small Business Server 2011 Standard computer

  • FrontDesk for the receptionist’s computer

We’ll be using a somewhat more complicated naming convention that identifies the physical host computer, the role of the computer, and the IP address of the computer. Thus our SBS server is hp160-SBS2011, signifying that it’s running on the Hewlett-Packard DL 160 G6 server, and that it’s running Windows Small Business Server 2011 Standard. There are several virtual machines running on that HP server, so it gets a fair workout.

Our naming convention is more complicated than most small businesses need, but it serves our needs where we are continually building and rebuilding test environments for writing projects. Ultimately, it doesn’t matter what you name your computers, as long as everyone understands the convention and can find the resources they need.

2. Planning for Security

It is far easier to implement effective security measures to protect your SBS network if you plan for security before you actually start installing software. In the following sections, we’ll cover some of the most common attack vectors and the preliminary steps you can take in this planning stage to prepare your defenses:

  • Careless or disgruntled employees and former employees Internal users and former users are the biggest risk factors to data loss and data theft on most computer networks. Whether from laziness, disregard of security policies, or outright malice, the internal user is often the most dangerous on your network. 

  • Internet hackers All computers and devices attached directly to the Internet are subject to random attacks by hackers. According to the Cooperative Association for Internet Data Analysis (CAIDA), during a random three-week time period in 2001 more than 12,000 DoS attacks occurred: 1200–2400 were against home computers and the rest were against businesses. If your organization has a high profile, it might also be subject to targeted attack by hackers who don’t like your organization or who are engaging in corporate espionage.

  • Wireless hackers and theft of service Wireless access points are exposed to the general public looking for free Internet access and to mobile hackers.

  • Viruses and worms Networks are subject to virus exposure from email attachments, infected documents, and worms such as CodeRed and Blaster that automatically attack vulnerable servers and clients.

2.1. Ensuring Physical Security

Although security is not something that can be achieved in absolute terms, it should be a clearly defined goal. The most secure operating system and network in the world is defenseless against someone with physical access to a computer. Evaluate your physical environment to decide what additional security measures you should take, including the following:

  • Place servers in a locked server room. And control who has keys!

  • Use case locks on your servers, and don’t leave the keys in them.

  • Place network hubs, routers, and switches in a locked cable room or wiring closet.

  • Install case locks on client systems or publicly accessible systems.

  • Use laptop locks when using laptops in public.

  • Use BitLocker to encrypt the data on laptops that contain sensitive data.

2.2. Securing Client Computers

Even a highly secure network can be quickly compromised by a poorly secured client computer—for example, a laptop running an older version of Windows with sensitive data stored on the hard drive. To maximize the security of client computers, use the following guidelines :

  • Use a secure operating system Use Windows Vista or Windows 7 on all client computers, with a strong preference for Windows 7 on laptops.

  • Use NTFS, file permissions, BitLocker, and EFS Use NTFS for all hard drives, and apply appropriate file permissions so that only valid users can read sensitive data. Encrypt sensitive files on laptop computers using the Encrypting File System (EFS), and encrypt at least the system drive on laptops using BitLocker. (BitLocker is available only on Enterprise and Ultimate versions of Windows Vista and Windows 7.)

  • Keep clients updated Use the Automatic Updates feature of Windows to keep systems updated automatically. Ideally, use the Windows Software Update Service (WSUS), integrated into SBS 2011, to centrally control which updates are installed.

  • Enable password policies Password Policies is a feature of SBS 2011 that requires user passwords to meet certain complexity, length, and uniqueness requirements, ensuring that users choose passwords that aren’t trivial to crack.


    Note:

    Remembering passwords has become an increasingly difficult prospect, leading to the resurgence of the yellow-sticky-note method of recalling them. It’s important to discourage this practice, and encourage the use of distinctive but easy-to-remember passphrases. See the Under The Hood sidebar Beyond Passwords—Two-Factor Authentication for an alternative to annoyingly complex passwords.


  • Install antivirus software Antivirus software should be installed on the SBS 2011 computer as well as on all clients. The best way to do this is to purchase a small-business antivirus package that supports both clients and the server. There are good third-party solutions specifically designed for the SBS market from several vendors.

  • Install antispyware software Antispyware software should be installed on all client computers on the network and configured for real-time monitoring and daily full scans.

  • Keep web browsers secure Unpatched web browsers are a significant security issue. Always keep web browsers updated with the latest security updates.

UNDER THE HOOD: Beyond Passwords—Two-Factor Authentication

Password policies are a difficult subject for many small businesses. Serious security using only passwords requires long and complex passwords, changed regularly and never repeated. That’s a nice goal, but it’s also not something users are going to be all that happy with. If your network contains sensitive information—and whose doesn’t these days?—you should consider providing an additional layer of security beyond simple passwords.

Windows Small Business Server 2011 Standard sets reasonable, if somewhat minimal, password policies, but even the best of password policies is a balancing act between making the password difficult to crack and making it easy for users to remember and use so that they aren’t tempted to write it down on the back of their keyboards. The four kinds of authentication methods or factors are

  • Something you know (password)

  • Something you have (token or physical key)

  • Something you are (biometric)

  • Somewhere you are (location)

Of these, only the first three are realistic and usable in a small business environment, though the fourth—location—is starting to be used by banks as one factor to be sure that the person trying to access your bank account is actually you.

Passwords alone are a single-factor authentication method—in this case, something you know. Two-factor authentication requires two of the main three factors, and it provides a definite improvement in the surety that the person authenticating to your network is really who he claims to be. By enabling a second authentication factor, your need for overly draconian password policies is greatly reduced.

For a second authentication factor, we like the simplicity, moderate cost, and effectiveness of a one-time password (OTP). Generated automatically by a token you carry around with you, the combination of the token, a personal identification number (PIN), and your SBS password provides an additional level of security. Requiring administrators and all remote users to use two-factor authentication is a good way to improve the overall security of the sensitive data on your network.

Third-party providers of OTP tokens include AuthAnvil (http://www.authanvil.com), CryptoCard (http://www.cryptocard.com), and RSA SecureID (http://www.rsa.com). Of these, only AuthAnvil is focused on the small business market, with a suite of products that are fully integrated into SBS. Plus their soft tokens run on our users’ phones, greatly simplifying token management and deployment. We use AuthAnvil on our SBS network for all laptops and servers, and for all remote users.


2.3. Securing Wireless Networks

Wireless networks using the 802.11b, 802.11a, 802.11g, and 802.11n standards are very convenient but can also introduce significant security vulnerabilities if not properly secured. To properly secure wireless networks, follow these recommendations:

  • Change the default password of all access points.

  • Change the default SSID. Pick a name that doesn’t reveal the identity or location of your network.

  • Enable 802.11i (WPA2) encryption on the access points.

  • If the access points don’t support WPA2-Enterprise, don’t use them on your internal network.


    Note:

    WPA2 provides two methods of authentication: an “Enterprise” method that makes use of a RADIUS server, and a “Personal” method known as WPA2-Personal that uses a Pre-Shared Key (PSK) instead of a RADIUS server.


  • Disable the ability to administer access points from across the wireless network.

2.4. Securing Internet Firewalls

Most external firewall devices are secure by default, but you can take some additional steps to maximize the security of a firewall:

  • Change the default password for the firewall device! We know this seems obvious, but unfortunately, it is all too often ignored.

  • Disable remote administration, or limit it to responding to a single IP address (that of your network consultant).

  • Disable the firewall from responding to Internet pings. OK, we admit this is controversial. It’s certainly a best practice, but it can also make troubleshooting a connectivity issue remotely a lot harder.

  • Enable Stateful Packet Inspection (SPI) and protection from specific attacks, such as the Ping of Death, Smurf, and IP Spoofing.

  • Leave all ports on the firewall closed except those needed by the SBS 2011 server.

  • Regularly check for open ports using trusted port-scanning sites. We use http://www.dslreports.com.

  • Require two-factor authentication for all access to the firewall.

  • Keep the firewall updated with the latest firmware versions, which are available for download from the manufacturer’s website.

Other -----------------
- Microsoft Dynamics GP 2010 : Developing connections with Internet User Defined fields
- Microsoft Dynamics GP 2010 : Getting clarity with User Defined fields
- Performing Daily Exchange Server 2003 Monitoring and Maintenance (part 3) - Configuring Diagnostic Levels and the Monitoring And Status Utility
- Performing Daily Exchange Server 2003 Monitoring and Maintenance (part 2) - Event Viewer & The Monitoring And Status Utility
- Performing Daily Exchange Server 2003 Monitoring and Maintenance (part 1) - Daily Monitoring Tasks
- SharePoint 2010 Search : Search Extensions - Taxonomy, Ontology, and Metadata Management
- SharePoint 2010 Search : Search Extensions - iFilters
- Windows Server 2008 R2 : Add and Remove DNS Servers (part 2) - Add Query Forwarding & Configure a Caching-Only DNS Server
- Windows Server 2008 R2 : Add and Remove DNS Servers (part 1)
- Microsoft SQL Server 2008 Analysis Services : Monitoring usage
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server