lumpusmaximus
MIS
I need to harden my server security. Windows Server 2003 R2, SP2, single domain. 1 DC, 1 Exchange, 3 Terminal Servers. The Administrator account is active, I am the only one with the password (famous last words). I am the only user in Domain Admins and Enterprise Admins. There are 2 users in the Local Admins group and the Print Operators group. Yes, I should deactivate the Administrator account and/or give it a randomly generated, long, case sensitive alpha-numeric password and never use it.
Physical security aside, I want to prevent someone from bypassing or changing that account's password or any password used to lock the servers with things like BartPE,
KNOPPIX, ubcd etc. Since Linux is less susceptible to these methods, am I dreaming or is there a way to boot to a Linux partition first which then loads Windows?
Any suggestions? Things like auditing bad logon attempts or other things, using arcane GPs, 3rd party apps, VX nerve agent, etc to prevent this from happening would be appreciated.
"Just because youre paranoid, doesnt mean people arent out to get you.
Physical security aside, I want to prevent someone from bypassing or changing that account's password or any password used to lock the servers with things like BartPE,
KNOPPIX, ubcd etc. Since Linux is less susceptible to these methods, am I dreaming or is there a way to boot to a Linux partition first which then loads Windows?
Any suggestions? Things like auditing bad logon attempts or other things, using arcane GPs, 3rd party apps, VX nerve agent, etc to prevent this from happening would be appreciated.
"Just because youre paranoid, doesnt mean people arent out to get you.