Windows Server 2012 vulnerabilities and security
Keywords: Windows Server 2012, vulnerabilities, CVE, operating systems security
AbstractThis investigation analyses the history of the vulnerabilities of the base system Windows Server 2012 highlighting the most critic vulnerabilities given every 4 months since its creation until the current date of the research. It was organized by the type of vulnerabilities based on the classification of the NIST. Next, given the official vulnerabilities of the system, the authors show how a critical vulnerability is treated by Microsoft in order to countermeasure the security flaw. Then, the authors present the recommended security approaches for Windows Server 2012, which focus on the baseline software given by Microsoft, update, patch and change management, hardening practices and the application of Active Directory Rights Management Services (AD RMS). AD RMS is considered as an important feature since it is able to protect the system even though it is compromised using access lists at a document level. Finally, the investigation of the state of the art related to the security of Windows Server 2012 shows an analysis of solutions given by third parties vendors, which offer security products to secure the base system objective of this study. The recommended solution given by the authors present the security vendor Symantec with its successful features and also characteristics that the authors considered that may have to be improved in future versions of the security solution.
Download data is not yet available.
How to Cite
López, G., Guamán, D., & Caiza, J. (2015). Windows Server 2012 vulnerabilities and security. Enfoque UTE, 6(3), pp. 36 - 51. https://doi.org/https://doi.org/10.29019/enfoqueute.v6n3.67
This work is licensed under a Creative Commons 4.0 License.