Microsoft Windows 2016 Nano Server

Microsoft Windows 2016 Nano Server.

Der Microsoft Windows Server kann nicht nur mit grafischer Oberfläche betrieben werden. Hier schildert unser Techniker George Maric kurz die Entwicklung und die Beweggründe, warum man auf die GUI verzichtet:

Mit Windows Server 2008 führte Microsoft den Core Server ein. Der Name spiegelte den Gedanken wieder, den Server auf Kernmerkmale zu reduzieren. Diese so reduzierten Server boten eine derart reduzierte Angriffsfläche des Betriebssystems, dass 70% der Sicherheitslücken der vorhergegangenen 5 Jahre Core Server nicht betroffen hätten.

Bis einschließlich Server 2012 R2 konnte man zwischen Server Core und Server mit GUI umschalten. Dies ist in Server 2016 nicht mehr ohne weiteres möglich. Doch dies nur am Rande, denn die eigentliche Neuerung ist die dritte Installationsmöglichkeit.

Neben Core Server und Desktop Experience (vollständige Installation inklusive GUI) bringt Server 2016 den Nano Server. Dieser besitzt ähnlich dem Server Core keine GUI, ist aber noch weiter reduziert.

Der Nano Server ist optimiert für Hyper-V, Clustering, Storage, Networking, Common Language Runtime, .NET und beinhaltet auch nur die dafür benötigten Komponenten.

Der Nano Server bietet im Vergleich zum Core Server eine weiter reduzierte Angriffsfläche, einen geringeren Bedarf an Updates und damit einhergehend weniger Neustarts.

Der Bootvorgang ist in Relation zu den anderen Installationsoptionen deutlich schneller:

Nano Server – 9 Sekunden boot

Server Core – 85 Sekunden boot

Vollständig (Desktop Experience) – 135 Sekunden boot

Der Nano Server wird entweder lokal über PowerShell oder über das Netzwerk mithilfe der  Remote Server Management Tools konfiguriert und administriert.

Bei Fragen zum Thema Microsoft-Lösungen stehen wir gerne für Sie bereit:

DSC_2012 klein
Frank Erlinghagen
02261 9155055
erlinghagen@oberberg.net
Daniel Wenzlau
02261 9155054
wenzlau@oberberg.net
DSC_2022 klein
Jörg Wegner
02261 9155052
wegner@oberberg.net

In plain sight: Credential and data stealing adware

By Veronica Valeros Adware has been around for a while now. In principle, displaying advertising in order to finance your software is not necessarily something bad. Users are used to seeing advertising everywhere: newspapers, magazines, and websites. When advertising was introduced to software, users had a surprisingly high tolerance for it. Later, adware applications became more aggressive. Publishers started bundling more applications and taking advantage […]

Source:: Cisco Security Notice

In plain sight: Credential and data stealing adware

By Veronica Valeros Adware has been around for a while now. In principle, displaying advertising in order to finance your software is not necessarily something bad. Users are used to seeing advertising everywhere: newspapers, magazines, and websites. When advertising was introduced to software, users had a surprisingly high tolerance for it. Later, adware applications became more aggressive. Publishers started bundling more applications and taking advantage […]

Source:: Cisco Security Notice

Microsoft Patch Tuesday – December 2016

By Talos Group The final patch Tuesday of 2016 has arrived. Today, Microsoft has released their monthly set of security bulletins designed to address security vulnerabilities within their products. This month’s release contains 12 bulletins addressing 48 vulnerabilities. Six bulletins are rated critical and address vulnerabilities in Internet Explorer, Edge, Microsoft Graphics Components, Microsoft Uniscribe, and Adobe Flash […]

Source:: Cisco Security Notice

Microsoft Patch Tuesday – December 2016

By Talos Group The final patch Tuesday of 2016 has arrived. Today, Microsoft has released their monthly set of security bulletins designed to address security vulnerabilities within their products. This month’s release contains 12 bulletins addressing 48 vulnerabilities. Six bulletins are rated critical and address vulnerabilities in Internet Explorer, Edge, Microsoft Graphics Components, Microsoft Uniscribe, and Adobe Flash […]

Source:: Cisco Security Notice

Vulnerability Spotlight: Joyent SmartOS

By Talos Group Vulnerability discovered by Tyler Bohan Overview Talos is disclosing a series of vulnerabilities in Joyent SmartOS, specifically in the Hyprlofs filesystem. SmartOS is an open source hypervisor that is based on a branch of Opensolaris. Hyperlofs is a SmartOS in-memory filesystem that allows users to map files from various different locations under a single namespace. […]

Source:: Cisco Security Notice

Vulnerability Spotlight: Joyent SmartOS

By Talos Group Vulnerability discovered by Tyler Bohan Overview Talos is disclosing a series of vulnerabilities in Joyent SmartOS, specifically in the Hyprlofs filesystem. SmartOS is an open source hypervisor that is based on a branch of Opensolaris. Hyperlofs is a SmartOS in-memory filesystem that allows users to map files from various different locations under a single namespace. […]

Source:: Cisco Security Notice