Unit-3 Study Materials
Unit-3 Study Materials
Server management is the process of monitoring and maintaining servers to operate at peak
performance. Server management also encompasses the management of hardware, software,
security, and backups. The primary goals of an effective server management strategy are to:
Virtual servers—also known as virtual machines—can help increase efficiency by enabling more to be
done with less hardware. They can be more complex to manage than physical servers, but the same
server management principles apply to both. Anyone who manages servers needs to be familiar with a
wide range of IT topics like physical vs. virtual servers to understand what environment is best to meet
organizational needs.
Server Management Basics
Server management basics include management of hardware, software, security, and backups. The
following are important elements of effective server management any IT strategy or software solution
should help address:
Hardware Management
Keeping hardware performing well is the foundation of effective server management. Without reliable
hardware, business productivity can be affected, so it’s important to continuously monitor at least five
primary components to help ensure server hardware performance. These hardware components
include:
1. Central Processing Unit (CPU): The CPU is the brains of a server, performing all the
calculations to make programs run. CPUs should be constantly monitored to avoid overuse. A
CPU running close to 100% utilization for an extended period is overtaxed, meaning there’s no
excess capacity for users to perform additional tasks, risking everything depending on the
server slowing to a crawl.
To deal with an overused CPU, you may need to upgrade the chip, add more CPUs, or halt
unnecessary programs taking up system resources. A more complex option is tuning the
performance of other system elements to put less stress on the CPU.
2. Random Access Memory (RAM): RAM is a server’s working memory. This form of temporary
storage runs faster than permanent hard disks. Programs running from RAM will perform better
given this speed advantage.
The more RAM your server has, the better its potential performance. You should keep an eye
on RAM usage and consider adding more when it nears capacity.
3. Hard Drive: The hard drive (also referred to as a hard disk) is a server’s permanent storage.
Programs and data are saved here even when the machine is shut down. Performance can
degrade when a hard drive nears maximum capacity.
You need to keep track of hard drive storage space, adding new drives or deleting unnecessary
data when they fill up (or deciding to invest in a cloud storage solution for more storage
capacity). The guide I wrote on how to check your hard drive health also explains how to know
when a hard drive is bad.
4. CPU Temperature: Servers can generate a great deal of heat. Most physical servers come
with wired thermometers to help you gauge whether the CPU temperature is in the normal
range. If the CPU temperature gets too high, shut down the server immediately and assess the
problem.
Cooling fans are another critical component of a physical server. These fans draw in cool
outside air and expel hot air warmed by the CPU. If a fan fails, the server can overheat and
cause permanent damage. Make sure to monitor fan speeds to avoid temperature spikes.
5. Operating Environment: In addition to the inside temperate of a server, you should also pay
attention to the operating environment where the server is located. A server room must be
kept at the proper temperature and humidity—with air flows maintained—for peak server
performance and reliability.
When choosing server hardware, it’s important to carefully consider the server specifications you’ll
need. It’s best to build in some excess storage and processing capacity, so the server has room to
grow with the needs of the business. However, choosing components far beyond your current
requirements may result in unnecessary hardware costs in addition to energy usage.
Software Management
Just like hardware, server software needs monitoring and regular maintenance. Make sure you
understand the software dependencies within your infrastructure, so you can better locate and tune
any performance issues.
Also, remember to use basic best practices with application management—existing software, firmware,
and operating systems should be regularly updated for both performance and security, as poor
performance can drag down other parts of the system and potentially create vulnerabilities that
cyberattackers can use to enter your network. It’s also good practice to uninstall old software you’re
no longer using.
Security
An important component to server management is maintaining a secure network. These security
policies can differ depending on the needs and industry type of the business. Common server security
solutions include:
So if you’re a Managed Service Provider (MSP), we recommend checking out N-able Backup. This
solution makes it easy to manage backups for hundreds of clients if necessary, and protect them from
errors, hacks, and data loss.
If your enterprise has enough personnel, managing your own servers can provide the advantage of
having total control of your server environments. Of course, it’s crucial for team members who
manage servers to have the right server monitoring tools at their disposal. Several server
management tools exist for system administrators, who rely on features like automated reports and
preemptive alerts to stay on top of server health. While some tools simply track performance, other
server management software options have more sophisticated abilities to help streamline workflow
and even allow for a more proactive approach to server management.
Firewalls come in both hardware and software forms, and they work by inspecting data packets and
determining whether to allow or block them based on a set of rules. Organizations can configure these
rules to permit or deny traffic based on various criteria, such as source and destination IP addresses, port
numbers, and protocol type.
Traditionally, firewalls regulate traffic by forming a secure perimeter around a network or computer. This
prevents anyone from accessing network resources if they aren’t authorized to do so. Without this
protection, virtually anybody could enter and do as they please.
Today's cybersecurity landscape demands a layered approach. While firewalls remain a cornerstone of
network defense, advanced threats require additional security measures. The rise of cloud computing and
hybrid work environments further highlights the need for comprehensive security solutions.
Fortunately, cutting-edge firewall technologies with AI-powered services are bringing network security up
to speed. Combining the strengths of traditional tools with the innovative capabilities of new solutions,
modern firewall vendors help organizations defend against even the most complex attack strategies.
What Does A Firewall Do?
Firewalls protect against malicious traffic. They’re strategically positioned at the network edge or in a data
center, allowing them to closely monitor anything attempting to cross this boundary.
This visibility also allows a network firewall to granularly inspect and authenticate data packets in real
time. This involves checking the data packet against predefined criteria to determine whether it poses a
threat. If it fails to meet the criteria, the firewall blocks it from entering or leaving the network.
Firewalls regulate both inbound and outbound traffic, protecting the network from:
External threats such as viruses, backdoors, phishing emails, and denial-of-service (DoS) attacks.
Firewalls filter incoming traffic flows, preventing unauthorized access to sensitive data and thwarting
potential malware infections.
Insider threats like known bad actors or risky applications. A firewall can enforce rules and policies to
restrict certain types of outgoing traffic, which helps identify suspicious activity and mitigate data
exfiltration.
Scope: Antivirus software is primarily an endpoint solution, meaning it’s installed on an individual device.
Firewalls mainly deploy at the network level, but some organizations install hosted firewalls directly on an
endpoint for extra protection.
Functionality: Firewalls monitor traffic, blocking malicious data before it enters the network (or endpoint).
Antivirus tools scan the local environment for signs of malware, ransomware, and other infectious attacks.
Enterprises normally deploy both firewalls and antivirus programs. As complementary solutions, they
each provide essential protective layers for safeguarding business assets.
NAT
NAT changes the destination or source addresses of data packets as they pass through a firewall. This
allows multiple devices to connect to the internet using the same IP address, which helps protect the
private network from direct exposure to external threats.
In an office environment, each employee uses their own computer or mobile device to access the internet
for browsing, emailing, and accessing cloud services. Despite each device having its own private IP
address within the company's internal network, all outbound traffic appears to external networks as
originating from the same public IP address assigned to the company. As a result, it’s harder for potential
attackers to identify and target individual devices.
VPN
A VPN is a type of proxy server. Therefore, it serves as a barrier between a computer or
network and the internet, receiving all web requests before forwarding them to the network.
VPNs are common and extend the private network across a public one, such as the internet.
This allows users to securely transmit data as if their devices were directly connected to the
private network. The connection establishes an encrypted tunnel between remote devices and
the corporate network, enabling secure access.
This function is especially useful in a hybrid environment. Remote employees can leverage
VPNs to access corporate networks and critical applications regardless of where or how they’re
working.
1. First-generation firewalls began in 1989 with the packet filtering approach. These firewalls
examine individual data packets, making decisions to allow or block them based on predefined
rules. However, these were unable to identify if those packets contained malicious code (i.e.,
malware).
2. Second-generation firewalls began in the early 2000s. Otherwise known as stateful firewalls,
these track the state of active connections. By observing network traffic, they use context to
identify and act on suspicious behavior. Unfortunately, this generation also has its limitations.
3. Third-generation firewalls emerged in the latter half of the early 2000s. Often called proxy
firewalls or application-level gateways, these act as intermediaries between a client and server,
forwarding requests and filtering responses.
4. Fourth-generation firewall, also known as next-generation firewall (NGFW), started in 2010.
NGFWs combine traditional capabilities with new, advanced features such as intrusion
prevention (IPS), application-layer filtering, and advanced threat detection.
Although each generation improved upon the last, many earlier iterations are still in use today.
Let’s review the benefits of each firewall in more detail.
Stateless firewalls
A stateless firewall protects the network by analyzing traffic in the transport layer
protocol — the place where devices communicate with one another. Rather than store
information about the state of the network connection, it inspects traffic on a packet-by-
packet basis.
Then, it decides to block or allow the traffic based on the data located in the “packet
header.” This may include source and destination IP addresses, port numbers,
protocols, and other information. Altogether, this process is called packet filtering.
Despite being fast and inexpensive, stateless firewalls have their vulnerabilities.
Critically, they have zero visibility into packet sequencing. That means they can’t detect
illegitimate packets, which may contain attack vectors or not have a corresponding
request.
Likewise, they only have insight into the packet header — not its actual contents. This
makes it impossible for a stateless firewall to detect malware hidden within a packet’s
payload.
Statefull firewalls
Stateful firewalls track the most recent or immediate status of active connections. Monitoring the
state and context of network communications can help identify threats based on more insightful
information.
For example, state-aware firewalls block or allow traffic by analyzing where it’s coming from,
where it’s going, and the contents of its data packets. Moreover, they evaluate the behavior of
data packets and network connections, cataloging patterns and using this information to
improve future threat detection.
This approach offers more protection compared to packet filtering but takes a greater toll on
network performance because it conducts a more in-depth analysis. Worse yet, attackers can
trick stateful inspection firewalls into letting harmful connections sneak through. They exploit
network rules and send malicious packets using protocols the firewall believes to be safe.
Application-Level Gateways
Application-level gateways, or proxy firewalls, act as an intermediary
between internal and external systems. Notably, they operate at Layer 7 of
the Open Systems Interconnection (OSI) model — the application layer.
As the closest layer to the end-user, Layer 7 applications include web
browsers, email clients, and instant messaging tools.
Proxy firewalls intercept and analyze all incoming and outgoing traffic,
applying granular security policies to control access and protect the
network. They offer packet filtering, application-level inspection, URL
filtering, and more.
Next-Generation Firewall
NGFWs protect businesses against emerging cyber threats. They blend all the best parts of
past firewall technologies with the advanced capabilities required to mitigate modern
cyberattacks. For example, these include:
Deep Packet Inspection (DPI), a method of examining the contents of data packets as they
pass through network checkpoints. DPI analyzes a larger range of information, allowing it to find
otherwise hidden threats.
Intrusion Prevention (IPS), a system that monitors traffic in real time to proactively identify
threats and automate response.
Data Loss Prevention (DLP), a cybersecurity solution that blocks intentional and accidental
data disclosures.
NGFWs combine the protection of previous generations with the advanced security capabilities
mentioned above. They can be deployed as software or hardware and can scale to any location:
remote office, branch, campus, data center, and cloud. NGFWs can simplify, unify, and
automate enterprise-grade protection with centralized management that extends across
distributed environments. These capabilities include:
When the user needs access to specific resources, such as applications or files, the
administrator assigns the appropriate permissions. These permissions dictate what the
user can and cannot do within the organization's network. For instance, a marketing
manager might access marketing tools and data, while a sales representative may only
access customer data relevant to their role.
Recent trends show that there is a sure shift to cloud-based IAM, granting
administrators greater access and control over digital assets management.
Cloud services extend user accounts management to cloud infrastructure, web
applications, and non-Windows devices as well.
Through UM, IT administrators can manage resources and access based on need,
thereby keeping digital assets more secure. This also ensures a frictionless experience
for the end-user, significantly improving the user experience.
User management can help organizations plan their budgets by identifying areas of
potential software spends. Through UM, companies can discover which areas or users
require new licenses and when.
This also helps companies know when users are no longer in need of a certain piece of
software and thereby mark it for recycling or for leasing it to other users in need.
User authentication involves the process of verifying the identity of a user who is
attempting to access a system. This can be done through several methods such as
passwords, biometrics, or two-factor authentication.
Once a user's identity has been confirmed, authorization determines what actions the
user is allowed to perform within the system.
Access control is the process of defining and managing user access to specific
resources and data within the system. This includes managing permissions for different
levels of users, such as administrators, employees, or customers.
Other key elements of user management include user provisioning and deprovisioning,
which involves creating and removing user accounts as needed, and user activity
monitoring, which helps to detect and prevent unauthorized access or suspicious
behavior.
What is a VPN?
VPN stands for Virtual Private Network. It is a type of network you can connect to
which will help you protect your online security and privacy.
A VPN acts as a tunnel through which all your data goes from your location to your
destination. It's all properly encrypted and secure so that any outside party can’t
see what data you are transferring.
Privacy
Anonymity
Security
Encryption
When you use a VPN, it encrypts all your data on the client side. Then after the data
is encrypted, it's passed through a VPN tunnel which others can’t access, and then
it reaches the internet.
But before going through the VPN tunnel, the request is first sent to your ISP, but as
it's encrypted, ISP can’t figure out what you are trying to access. So it forwards your
request to your VPN server. Then the VPN sends the request to your desired IP
address or website.
These websites may include social networking sites, movie downloading websites,
or any kind of media streaming websites.
In these cases, a VPN will help you bypass all the blocking filters and let you access
the websites that you wish to access without anyone’s help and others will have no
idea what you're accessing.
If you're in one of these places and still want to access these blocked websites, then
a VPN can help by bypassing all the regional restrictions. You'll be able to access all
the restricted or blocked content without letting the government know about your
activity.
But sometimes you may need to hide your browsing history/activity from your local
network/ISP. In that case, using a VPN can help you keep all your records encrypted,
and your ISP will have no idea what you are doing with your internet. All your
internet browsing activity will be masked by the VPN.
A VPN can help keep your identity anonymous so you don't need to worry about
identity leakage or any kind of tracking activity.
Enhanced security
As discussed above, using VPN can keep your identity safe and also keeps your data
encrypted while you browse the internet. As a result, it enhances security and the
chances that someone might hack you will be lower.
So, using VPN will keep you safe when you are using any public Wi-Fi or browsing
websites which are not secure.
Disadvantages of VPN
There are some downsides to using a VPN as well:
So – it goes without saying – make sure you don’t use VPNs for any illegal activities.
Use it instead to protect yourself and your identity from malicious hackers.
Even with these risks, cloud computing is often more secure than on-premise computing.
Most cloud providers have more resources for keeping data secure than individual
businesses do, which lets cloud providers keep infrastructure up to date and patch
vulnerabilities as soon as possible. A single business, on the other hand, may not have
enough resources to perform these tasks consistently.
Note: Cloud security is not the same thing as Security-as-a-Service (SECaaS or SaaS), which
refers to security products hosted in the cloud.
An unauthorized user from outside the organization has access to internal data
The goal of a cloud security strategy is to reduce the threat posed by these risks as much as
possible by protecting data, managing user authentication and access, and staying
operational in the face of an attack.
Encryption: Encryption is a way of scrambling data so that only authorized parties can
understand the information. If an attacker hacks into a company's cloud and finds
unencrypted data, they are able to do any number of malicious actions with the data: leak it,
sell it, use it to carry out further attacks, etc. However, if the company's data is encrypted,
the attacker will only find scrambled data that cannot be used unless they somehow
discover the decryption key (which should be almost impossible). In this way, encryption
helps prevent data leakage and exposure, even when other security measures fail.
Data can be encrypted both at rest (when it is stored) or in transit (while it is sent from one
place to another). Cloud data should be encrypted both at rest and in transit so that
attackers cannot intercept and read it. Encrypting data in transit should address both data
traveling between a cloud and a user, and data traveling from one cloud to another, as in
a multi-cloud or hybrid cloud environment. Additionally, data should be encrypted when it is
stored in a database or via a cloud storage service.
If the clouds in a multi-cloud or hybrid cloud environment are connected at the network
layer, a VPN can encrypt traffic between them. If they are connected at the application
layer, SSL/TLS encryption should be used. SSL/TLS should also encrypt traffic between a user
and a cloud (see What Is HTTPS?).
Identity and access management (IAM): Identity and access management
(IAM) products track who a user is and what they are allowed to do, and they authorize users
and deny access to unauthorized users as necessary. IAM is extremely important in cloud
computing because a user's identity and access privileges determine whether they can
access data, not the user's device or location.
IAM helps reduce the threats of unauthorized users gaining access to internal assets and
authorized users exceeding their privileges. The right IAM solution will help mitigate several
kinds of attacks, including account takeover attacks and insider threats (when a user or
employee abuses their access in order to expose data).
IAM may include several different services, or it may be a single service that combines all of
the following capabilities:
Single sign-on (SSO) services help authenticate user identities for multiple
applications, so that users only have to sign in once to access all their cloud
services
Firewall: A cloud firewall provides a layer of protection around cloud assets by blocking
malicious web traffic. Unlike traditional firewalls, which are hosted on-premise and defend
the network perimeter, cloud firewalls are hosted in the cloud and form a virtual security
barrier around cloud infrastructure.
Cloud firewalls block DDoS attacks, malicious bot activity, and vulnerability exploits. This
reduces the chances of a cyber attack crippling an organization's cloud infrastructure.
Proper configuration of security settings for cloud servers: When a company does
not set up their security settings properly, it can result in a data breach. Misconfigured cloud
servers can expose data directly to the wider Internet. Configuring cloud security settings
properly requires team members who are experts in working with each cloud, and may also
require close collaboration with the cloud vendor.
Consistent security policies across all clouds and data centers: Security measures
have to apply across a company's entire infrastructure, including public clouds, private
clouds, and on-premises infrastructure. If one aspect of a company's cloud infrastructure —
say, their public cloud service for big data processing — is not protected by encryption and
strong user authentication, attackers are more likely to find and target the weak link.
Backup plans: As with any other type of security, there must be a plan for when things go
wrong. To prevent data from getting lost or tampered with, data should be backed up in
another cloud or on-premise. There should also be a failover plan in place so that business
processes are not interrupted if one cloud service fails. One of the advantages of multi-cloud
and hybrid cloud deployments is that different clouds can be used as backup — for
instance, data storage in the cloud can back up an on-premise database.
User and employee education: A large percentage of data breaches occur because a
user was victimized by a phishing attack, unknowingly installed malware, used an outdated
and vulnerable device, or practiced poor password hygiene (reusing the same password,
writing their password down in a visible location, etc.). By educating their internal
employees about security, businesses that operate in the cloud can reduce the risk of these
occurrences. (The Cloudflare Learning Center is a good resource for security education.)