Summary

Services running on Windows Server 2008 (and Windows Vista) have improved significantly over previous versions of Windows. Services now run in least-privilege modes, with service-specific SIDs, isolated in Session 0, with restricted network access, and with DEP and ASLR protections. Administrators can help minimize malicious risk from services by removing unneeded services from their environment, and following a least-privilege model for services they design and purchase. Although Windows will always be a target for malicious hackers, least-privileged services will make it tougher for them to succeed.

Get Windows Server® 2008 Security Resource Kit now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.