tailieunhanh - The Best Damn Windows Server 2003 Book Period- P11

The Best Damn Windows Server 2003 Book Period- P11:The latest incarnation of Microsoft’s server product,Windows Server 2003, brings many new features and improvements that make the network administrator’s job chapter will briefly summarize what’s new in 2003 and introduce you to the four members of the Windows Server 2003 family: the Web Edition, the Standard Edition, the Enterprise Edition, and the Datacenter Edition. | 66 Chapter 3 Planning Server Roles and Server Security Terminal Servers Terminal servers allow remote access to applications using thin-client technology. A benefit of Terminal Services is that users can run programs that they might otherwise be unable to use. For example a user running an older version of Windows might need to use Office XP but she doesn t have the minimal requirements install it. Through Terminal Services she can connect to and be presented with a Windows Server 2003 desktop. If Office XP is installed on the terminal server the user can open and use the application. Because all processing occurs on the server the user can run applications that are impossible to install on her local system. There are a wide variety of clients that can use Terminal Services. Client software is available for Windows and later as well as Macintosh and UNIX. Internet Explorer can also be used to access a terminal server using the Web client software. Terminal Services can also interact with Citrix clients. Planning a Server Security Strategy The only truly secure network is one that is totally inaccessible. Security is always a trade-off between usability and protection. When planning security you need to find an acceptable balance between the need to secure your network and the need for users to be able to perform their jobs. In creating a security plan it is important to realize that the network environment will never be completely secure. The goal is to make it difficult for intruders to obtain unauthorized access so it isn t worth their time to try or continue attempting to gain access. It is also critical to protect servers from potential disasters and to have methods to restore systems if they become compromised. A good security plan considers the needs of a company and tries to balance it with their capabilities and current technology. As you ll see in the sections that follow this means identifying the minimum security requirements for an organization .