Using security best practices, you can configure the computer running Windows Small Business Server 2003 and client computers in a way that helps protect the availability, integrity, and confidentiality of data on your local network.

It is recommended that you implement the following security strategies:

Protecting access to the Windows Small Business Server network from external threats. Helps to eliminate vulnerabilities which assists in protecting your network against intruders and malicious code.

Important

Use the following table to determine when to implement security best practices:

Security Best Practice When to implement
Protecting your network from the Internet by using a firewall Firewall configuration is implemented when you run the Configure E-mail and Internet Connection Wizard. The wizard runs when you click the Connect to the Internet task on the To Do List.
Configuring password policies Implement this security best practice after you have completed the Connect to the Internet task on the To Do List.

Configuring secure remote access to the network Secure remote access is configured when you run the Remote Access Wizard. The wizard runs when you click the Configure Remote Access task on the To Do List.

Renaming the Administrator account Implement this security best practice after completing all the tasks on the To Do List.

Protecting access to the Windows Small Business Server network from internal threats. Helps to ensure that an intruder cannot easily gain access to sensitive information and that key assets are secured and regularly checked for vulnerabilities.

Important

Use the following table to determine when to implement security best practices: Security Best Practice When to implement
Implementing an antivirus solution Implement this security best practice after completing all the tasks on the To Do List.

Managing backups You can configure backup when you complete the Configure Backup task on the To Do List.
If you are using a third-party application for configuring backup, you must implement this security best practice after completing all the tasks on the To Do List.

Updating your software Implement this security best practice after completing all the tasks on the To Do List.
Running security tools Implement this security best practice after completing all the tasks on the To Do List.

Granting access permissions User permissions are assigned when you complete the Add Users and Computers task on the To Do List. You must also implement this security best practice throughout the life cycle of the server.

Educating users Implement this security best practice after completing all the tasks on the To Do List.
Not using your Windows Small Business Server as a workstation Implement this security best practice after completing all the tasks on the To Do List.

Physically securing the server Implement this security best practice as part of the initial physical setup of the server.
Limiting user disk space Limiting user disk space is implemented during Setup. You can modify the allocated disk quotas and mailbox sizes after Setup.

Monitoring for security issues. Continuously monitors for security-related issues and implements solutions as needed.

Important

Use the following table to determine when to implement security best practices: Security Best Practice When to implement
Keeping up-to-date on security information Implement this security best practice after completing all the tasks on the To Do List.

Auditing failed logon events and account lockouts Auditing failed logon events and account lockouts is implemented during Setup. You can view these events by looking at the monitoring reports.
Using monitoring tools You can configure monitoring by completing the Configure Monitoring task on the To Do List.

Mr.B