O'Reilly logo

Microsoft® Lync® Server 2013 Unleashed Second Edition by Randy Wintle, Alex Lewis, David Ross, Tom Pacyk

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

As shown in this chapter, properly securing a Lync Server 2013 implementation is a valuable process because it protects the servers from potential exploitation. By utilizing existing technologies such as firewalls and proxies, one can greatly reduce the attack surface of Lync Server 2013. Through the use of limited rights and managed service accounts, one can greatly reduce the possibility of unauthorized users gaining access to the new system.

Configuring protective features in the operating system is a relatively painless process that can go a long way toward securing the overall implementation. Tasks as simple as limiting rights to shares and controlling services will also serve to reduce the attack surface of a Lync Server 2013 deployment. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required