Microsoft Windows Server 2008

Microsoft Windows Server 2008
  • Expert Rating

    3.00 / 5

Pros

  • Windows Server 2008 is significantly faster than Windows Server 2003; easy to configure and manage host based security

Cons

  • The anticipated feature, the Hyper-V server virtualisation tool, is missing;

Bottom Line

Windows Server 2008 is definitely faster, more manageable and secure. But it's still missing the virtual link.

Would you buy this?

Microsoft's long-awaited Windows Server 2008 delivers advancements in speed, security and management, but its virtualisation and network-access control features come up short.

In our testing of Windows Server 2008 we found that Microsoft has made a number of improvements to its flagship server operating system.

For example, new server administrative role schemes boost security, the Server Manager program improves manageability, Internet Information Server (IIS) Web management functionality is revamped, Active Directory is easier to control, and Windows Terminal Services has been redesigned. Windows Server 2008 is also significantly faster than Windows Server 2003, especially when client machines are running Vista.

Unfortunately, a highly anticipated feature of Windows Server 2008, the Hyper-V server virtualisation tool, is missing. Microsoft includes a beta version of Hyper-V with Windows Server 2008 editions, but it will not release final code until the third quarter of this year.

Also missing is compatibility between non-Windows (and older Windows) clients and Microsoft's Network Access Protection (NAP) scheme, Microsoft's version of NAC.

The Microsoft NAP scheme uses client-side 'health certificates' to either give or deny clients access to the network. An 'unhealthy' client is vectored to remediation servers for necessary antivirus updates or security patches (compare NAC products).

We tested the NAP scheme as implemented in Windows Server 2008 and found that it works as long as the client is running Windows XP or Vista. But it won't let clients running any other brand of operating system have access to its protected resources, thus hampering the potential success of the NAP scheme, because all client types must be vetted for NAC to work effectively.

Rethinking server roles

Microsoft wants administrators of Windows Server 2008 editions (it will ship in the usual flavours of Standard, Enterprise, Data Center and Itanium-specific code) to think of the server as playing certain roles.

Server roles are aggregated objects that suit commonly thought-of services, such as print services, file sharing, DNS, DHCP, Active Directory Domain Controller and IIS-based Web services. Microsoft has defined 18 roles in all.

There's even a minimalist installation called Windows Server Core that can run various server roles (such as DNS, DHCP, Active Directory components) but not applications (like SQL Server or IIS dynamic pages). It's otherwise a scripted host system for headless operations.

There's no GUI front end to a Windows Server Core box, but it is managed by a command line interface (CLI), scripts, remotely via System Manager or other management applications that support Windows Management Instrumentation (WMI), or by Remote Terminal Services. It's also a potential resource-slimmed substrate for Hyper-V and virtualisation architectures.

The services running on any role-based server are partitioned and enabled through Server Manager, Microsoft's renamed, revamped administrative application – either through its GUI or CLI front end.

It's a vast improvement over the 'Configure Your Server' routines found in Windows 2000 and 2003 editions. Once successfully enabled, the roles can be easily changed. The CLI version allows scripted initial or remote role changes for administrators. Server Manager adds an important improvement over prior management applications: it checks application dependencies thoroughly before it effects installation, changes, deletions or other alterations.

We got a nearly immediate taste of higher security these server roles allow when we installed Windows 2008 Server – strong administrative passwords are now required as the default.

Active Directory Certificate Services have been redesigned, and now join with Group Policy settings to allow easier certificate enrolment, discovery and storage. The public-key infrastructure that was formerly very difficult to establish, monitor and maintain in Windows 2003 Server editions has improved dramatically as choices for certificate management (including storage, issuance and certificate vetting) are wider than ever before.

A side benefit is that IPSec encryption can be used with a number of previously unavailable cryptography methods, such as elliptic-curve Diffie-Hellman or Advanced Encryption Standard choices, allowing a simple but heretofore difficult security hole to be patched: Windows 2008 can provide comprehensive network encryption services, network-wide.

In addition to Server Manager, server-based Windows Firewall MMC snap-in helped us configure and manage host based security more easily. Windows Firewall on Windows 2008 Server-based networks can be now controlled by system enforced Group Policy Objects (GPO) within Active Directory.

The ability to enforce Windows Firewall settings within an Active Directory domain provides a hierarchically enforced mechanism that thwarts branch office or subsidiary server settings made by local administrators. It's an iron-fist policy that has teeth, and we really like that.

The GPOs can now define server IP address admittance, allowing servers to simply ignore traffic from all but specific addresses, reducing their attack surface dramatically. Policies for specific routes are inherited by all clients and servers admitted to the Active Directory-controlled network, which then allows possible intruder activity to be more readily discerned from the noise of general traffic.

However, this admittance control alone doesn't reduce the effects of TCP SYN DOS attacks, but other TCP/IP settings shipping with only Windows Server 2008 can be used to reduce the effect of TCP connection-focused distributed denial-of-service (DoS) attacks.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Show Comments

Brand Post

Most Popular Reviews

Latest News Articles

Resources

PCW Evaluation Team

Luke Hill

MSI GT75 TITAN

I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Laura Johnston

MSI GS65 Stealth Thin

If you can afford the price tag, it is well worth the money. It out performs any other laptop I have tried for gaming, and the transportable design and incredible display also make it ideal for work.

Andrew Teoh

Brother MFC-L9570CDW Multifunction Printer

Touch screen visibility and operation was great and easy to navigate. Each menu and sub-menu was in an understandable order and category

Louise Coady

Brother MFC-L9570CDW Multifunction Printer

The printer was convenient, produced clear and vibrant images and was very easy to use

Edwina Hargreaves

WD My Cloud Home

I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.

Featured Content

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?