A terminal server’s security and stability are important to its success in a corporate environment. This chapter will therefore focus on security and shed some light on different security aspects. Naturally, a system configuration that has been optimized for security significantly contributes to system stability. For this reason, some procedures that enhance system stability will be described at the end of this chapter, as well. This chapter will enable you to do the following:
Find out about the most important mechanisms for safe terminal server operation.
Examine the different Microsoft Windows Server 2003 logon processes and options, especially as they relate to Terminal Services.
Get acquainted with the powerful concepts that have been developed in the context of terminal server security policies, including both Local Computer Policy and Group Policies in an Active Directory domain.
Discover how to secure access to a terminal server’s desktop and applications in such a way that no unauthorized activities can take place, taking into account software restriction policies and how the AppSense Application Manager can assist you in this respect.
Learn about the file system security options that exist to protect a terminal server, supported by SysInternal’s File Monitor tool.
Look at the connection options between a terminal server and its clients from a different angle—network security.
See how modern concepts (such as firewalls, virtual private networks, public- key infrastructure, Internet protocol security, and smart cards) enable powerful access control on terminal servers at the network level.
Find out about important relevant hardware components for configuring a stable terminal server environment.