Identifying Nonessential Services and Protocols
Identify nonessential services and protocols and take the appropriate action.
There it is, your shiny new server sitting in the rack, completely preconfigured by the manufacturer to your specifications. It has more RAM than the first 10,000 computers ever built put together. When the eight CPUs on its motherboard begin to process, you can feel the breeze from the cooling system. It is just waiting to be plugged in and brought online. It is tempting to do that, but there's a nagging voice telling you to go through and check it out (if you can't hear the voice yet, you will by the time we're done with you).
New computer systems (especially servers) come from the manufacturer loaded to the gills with ...
Get Security+ Training Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.