{"id":7571,"date":"2020-02-04T14:26:04","date_gmt":"2020-02-04T13:26:04","guid":{"rendered":"http:\/\/elementor.itaf.eu\/?p=7571"},"modified":"2023-10-03T11:00:55","modified_gmt":"2023-10-03T09:00:55","slug":"6-important-steps-in-implementing-the-windows-server","status":"publish","type":"post","link":"https:\/\/www.itaf.eu\/en\/6-important-steps-in-implementing-the-windows-server\/","title":{"rendered":"6 Steps in Implementing the Windows Server"},"content":{"rendered":"<p>Everyone knows that an out-of-the-box Windows server may not have all the necessary security measures in place to go right into production. Specific best practices differ depending on need, but addressing these 6 Steps in Implementing the Windows Server before subjecting a server to the internet will protect against the most common exploits.<\/p>\n<p>Many of these are standard recommendations that apply to servers of any flavor, while some are Windows-specific, delving into some of the ways you can tighten up the Microsoft server platform.<\/p>\n<h2>1. User Configuration and Network Configuration<\/h2>\n<p>Modern Windows Server editions force you to do this but make sure the password for the local Administrator account is reset to something secure. Furthermore, disable the local administrator whenever possible. There are very few scenarios where this account is required. With that account out of the way, you need to set up an admin account to use. You can either add an appropriate domain account, if your server is a member of an Active Directory (AD), or create a new local account and put it in the administrator&#8217;s group.<br \/>\nDon&#8217;t forget to protect your passwords. If your server is a member of AD, the password policy will be set at the domain level. Stand-alone servers can be set in the local policy editor. Either way, a good password policy will at least establish the following:<\/p>\n<ul>\n<li>Complexity and length requirements &#8211; how strong the password must be<\/li>\n<li>Password expiration &#8211; how long the password is valid<\/li>\n<li>Password history &#8211; how long until previous passwords can be reused<\/li>\n<li>Account lockout &#8211; how many failed password attempts before the account is suspended<\/li>\n<\/ul>\n<h3>1.1 Windows Server Network Configuration<\/h3>\n<p>Production servers should have a static IP so clients can reliably find them. This IP should be in a protected segment, behind a firewall. Configure at least two DNS servers for redundancy and double-check name resolution using nslookup from the command prompt. Ensure the server has a valid A record in DNS with the name you want, as well as a PTR record for reverse lookups. Note that it may take several hours for DNS changes to propagate across the internet. Finally, disable any network services the server won\u2019t be using, such as IPv6.<\/p>\n<h2>2. Windows Features, Roles Configuration, and Update Installation<\/h2>\n<p>Microsoft uses roles and features to manage OS packages. Roles are basically a collection of features designed for a specific purpose, so generally, roles can be chosen if the server fits one. Two equally important things to do are: 1) make sure everything you need is installed (NET framework version or IIS);\u00a0 2) uninstall everything you don\u2019t need. Extraneous packages unnecessarily extend the attack surface of the server and should be removed whenever possible. Servers should be designed with necessity in mind and stripped lean to make the necessary parts function as smoothly and quickly as possible.<\/p>\n<h3>2.1 Update Installation of Windows Server<\/h3>\n<p>The best way to keep your server secure is to keep it up to date. There are different kinds of updates: patches tend to address a single vulnerability; roll-ups are a group of packages that address several, perhaps related vulnerabilities, and service packs are updates to a wide range of vulnerabilities, comprised of <a class=\"jshlink\" href=\"https:\/\/www.itaf.eu\/en\/services\/security-services\/\" target=\"_blank\" rel=\"noopener\">dozens or hundreds of individual patches<\/a>. Keep in mind that the version of the OS is a type of update too, and using years-old server versions puts you well behind the security curve. If your production schedule allows it, you should configure automatic updates on your server. It\u2019s much more dangerous, however, to leave a production system unpatched than to automatically update it. If at all possible, the updates should be staggered, so test environments receive them a week or so earlier, giving teams a chance to observe their behavior.<\/p>\n<h2>3. NTP Configuration and Firewall Configuration<\/h2>\n<p>A time difference of merely 5 minutes will completely break Windows logons. Servers that are domain members will automatically have their time synched with a domain controller upon joining the domain, but stand-alone servers need to have NTP set up to sync to an external source so the clock remains accurate.<\/p>\n<h3>3.1 Firewall Configuration on Windows Server<\/h3>\n<p>If you\u2019re building a web server, for example, you\u2019re only going to want web ports (80 and 443) open to that server from the internet. If the server has other functions such as remote desktop (RDP) for management, they should only be available over a VPN connection.<br \/>\nThe Windows Server firewall is a decent built-in software firewall that allows the configuration of port-based traffic from within the OS. On a stand-alone server, the Windows Server firewall will at least provide some protection against network-based attacks.<\/p>\n<h2>4. Remote Access and Service Configuration<\/h2>\n<p>As mentioned, if you use RDP (Remote Desktop Platform), be sure it is only accessible via VPN. Make sure RDP is only accessible by authorized users. All administrators can use RDP once it is enabled on the server. Additional people can join the Remote Desktop Users group for access without becoming administrators.<br \/>\nIn addition to RDP, various other remote access mechanisms such as Powershell and SSH should be carefully locked down if used and made accessible only within a VPN environment.<\/p>\n<h3>4.1 Service Configuration on Windows Server<\/h3>\n<p>Windows server has a set of default services that start automatically and run in the background. Following the same logic as the firewall, we want to minimize the attack surface of the server by disabling everything other than primary functionality. Older versions of MS server have more unneeded services than newer, <a class=\"jshlink\" href=\"\/en\/microsoft-ends-support-for-windows-7-users-in-january-2020\/\" target=\"_blank\" rel=\"noopener\">so carefully check<\/a> any 2008 or 2003 (!) servers.<br \/>\nFinally, every service runs in the security context of a specific user. For default Windows services, this is often as the Local System, Local Service or Network Service accounts. This configuration may work most of the time, but for application and user services, best practice dictates setting up service-specific accounts to handle these services with the minimum amount of access necessary.<\/p>\n<h2>5. Further Hardening<\/h2>\n<p>Microsoft provides best practices analyzers based on role and server version that can help you further harden your systems by scanning and making recommendations \u2013 server security patching. Although User Account Control (UAC) will prevent applications from running without your consent. This prevents malware from running in the background and malicious websites from launching installers or other code. Leave UAC on whenever possible.<br \/>\nCommon Microsoft server applications such as MSSQL and Exchange have specific security mechanisms that can help protect them against attacks like <a class=\"jshlink\" href=\"\/en\/how-to-protect-your-business-from-ransomware\/\" target=\"_blank\" rel=\"noopener\">ransomware<\/a>, be sure to research and tweak each application for maximum resilience. If you\u2019re building a web server, you can also follow our hardening guide to improve its internet-facing security.<\/p>\n<h2>6. Logging and Monitoring<\/h2>\n<p>Logging works differently depending on whether your server is part of a domain. Domain logins are processed by domain controllers, and they have the audit logs for that activity. Stand-alone servers will have security audits available and can be configured to show passes and\/or failures.<br \/>\nLog defaults are almost always far too small to monitor complex production applications. As such, disk space should be allocated during server builds for logging, especially for applications like MS Exchange. Logs should be backed uplink to back up and disaster recovery landing according to your organization\u2019s retention policies and then cleared to make room for more current events. Consider a centralized log management solution if handling logs individually on servers gets overwhelming. Like a Syslog server in the Linux world, a centralized event viewer for Windows servers can help speed up troubleshooting.<\/p>\n<p>Whether you use the built-in Windows performance monitor or a third-party solution that uses a client or SNMP to gather data, you need to be gathering performance info on every server.<\/p>\n<h2>Windows Server Setup and How Can ITAF Help You?<\/h2>\n<p>Each one of these 6 Steps in Implementing the Windows Server can take some time to implement. But by establishing a routine of initial server configuration and infrastructure, you can ensure that new machines in your environment will be resilient. For any query related to your server-to-server communication setup, please<a class=\"jshlink\" href=\"\/en\/contact-us\/#contactform\"> contact us<\/a> and we will be glad to help you.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Everyone knows that an out-of-the-box Windows server may not have all the necessary security measures in place to go right into production. Specific best practices differ depending on need, but addressing these 6 Steps in Implementing the Windows Server before subjecting a server to the internet will protect against the most common exploits. Many of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":35185,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ngg_post_thumbnail":0,"footnotes":""},"categories":[92],"tags":[],"class_list":["post-7571","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-support"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>6 Steps in Implementing the Windows Server - ITAF IT Partner<\/title>\n<meta name=\"description\" content=\"Learn how 6 important steps in Implementing the Windows Server to the internet will protect against the most common exploits\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.itaf.eu\/en\/6-important-steps-in-implementing-the-windows-server\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"6 Steps in Implementing the Windows Server - ITAF IT Partner\" \/>\n<meta property=\"og:description\" content=\"Learn how 6 important steps in Implementing the Windows Server to the internet will protect against the most common exploits\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.itaf.eu\/en\/6-important-steps-in-implementing-the-windows-server\/\" \/>\n<meta property=\"og:site_name\" content=\"ITAF IT Partner\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ITAF.eu\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-04T13:26:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-03T09:00:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.itaf.eu\/wp-content\/uploads\/2020\/02\/implementing-windows-server.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dejan Janosevic\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ITAF_IT_partner\" \/>\n<meta name=\"twitter:site\" content=\"@ITAF_IT_partner\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dejan Janosevic\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/6-important-steps-in-implementing-the-windows-server\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/6-important-steps-in-implementing-the-windows-server\\\/\"},\"author\":{\"name\":\"Dejan Janosevic\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#\\\/schema\\\/person\\\/76d18fd2e3c2d369c9b20b96217208c2\"},\"headline\":\"6 Steps in Implementing the Windows Server\",\"datePublished\":\"2020-02-04T13:26:04+00:00\",\"dateModified\":\"2023-10-03T09:00:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/6-important-steps-in-implementing-the-windows-server\\\/\"},\"wordCount\":1339,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/6-important-steps-in-implementing-the-windows-server\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/implementing-windows-server.jpg\",\"articleSection\":[\"IT Support\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.itaf.eu\\\/en\\\/6-important-steps-in-implementing-the-windows-server\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/6-important-steps-in-implementing-the-windows-server\\\/\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/6-important-steps-in-implementing-the-windows-server\\\/\",\"name\":\"6 Steps in Implementing the Windows Server - ITAF IT Partner\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/6-important-steps-in-implementing-the-windows-server\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/6-important-steps-in-implementing-the-windows-server\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/implementing-windows-server.jpg\",\"datePublished\":\"2020-02-04T13:26:04+00:00\",\"dateModified\":\"2023-10-03T09:00:55+00:00\",\"description\":\"Learn how 6 important steps in Implementing the Windows Server to the internet will protect against the most common exploits\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/6-important-steps-in-implementing-the-windows-server\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.itaf.eu\\\/en\\\/6-important-steps-in-implementing-the-windows-server\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/6-important-steps-in-implementing-the-windows-server\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/implementing-windows-server.jpg\",\"contentUrl\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/implementing-windows-server.jpg\",\"width\":1080,\"height\":600,\"caption\":\"6 Steps in Implementing the Windows Server\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/6-important-steps-in-implementing-the-windows-server\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"6 Steps in Implementing the Windows Server\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/\",\"name\":\"ITAF IT Partner\",\"description\":\"Reliable IT support\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#organization\",\"name\":\"ITAF is een IT partner voor KMO's, grote bedrijven en overheid: IT support, ICT infrastructuur, Cloud oplossingen, Managed IT services en software ontwikkeling\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/ITAF-Geniki_logo_512px-1.webp\",\"contentUrl\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/ITAF-Geniki_logo_512px-1.webp\",\"width\":512,\"height\":166,\"caption\":\"ITAF is een IT partner voor KMO's, grote bedrijven en overheid: IT support, ICT infrastructuur, Cloud oplossingen, Managed IT services en software ontwikkeling\"},\"image\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ITAF.eu\",\"https:\\\/\\\/x.com\\\/ITAF_IT_partner\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/itaf-eu?trk=tyah&trkInfo=clickedVerticalcompanyidx2-2-7tarId1429703363595tasitaf\",\"https:\\\/\\\/www.youtube.com\\\/@ITAFICTPartner\\\/\",\"https:\\\/\\\/www.instagram.com\\\/itaf.eu\\\/\",\"https:\\\/\\\/www.threads.net\\\/@itaf.eu\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#\\\/schema\\\/person\\\/76d18fd2e3c2d369c9b20b96217208c2\",\"name\":\"Dejan Janosevic\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/author\\\/dejan-janosevic\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"6 Steps in Implementing the Windows Server - ITAF IT Partner","description":"Learn how 6 important steps in Implementing the Windows Server to the internet will protect against the most common exploits","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.itaf.eu\/en\/6-important-steps-in-implementing-the-windows-server\/","og_locale":"en_US","og_type":"article","og_title":"6 Steps in Implementing the Windows Server - ITAF IT Partner","og_description":"Learn how 6 important steps in Implementing the Windows Server to the internet will protect against the most common exploits","og_url":"https:\/\/www.itaf.eu\/en\/6-important-steps-in-implementing-the-windows-server\/","og_site_name":"ITAF IT Partner","article_publisher":"https:\/\/www.facebook.com\/ITAF.eu","article_published_time":"2020-02-04T13:26:04+00:00","article_modified_time":"2023-10-03T09:00:55+00:00","og_image":[{"width":1080,"height":600,"url":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2020\/02\/implementing-windows-server.jpg","type":"image\/jpeg"}],"author":"Dejan Janosevic","twitter_card":"summary_large_image","twitter_creator":"@ITAF_IT_partner","twitter_site":"@ITAF_IT_partner","twitter_misc":{"Written by":"Dejan Janosevic","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.itaf.eu\/en\/6-important-steps-in-implementing-the-windows-server\/#article","isPartOf":{"@id":"https:\/\/www.itaf.eu\/en\/6-important-steps-in-implementing-the-windows-server\/"},"author":{"name":"Dejan Janosevic","@id":"https:\/\/www.itaf.eu\/en\/#\/schema\/person\/76d18fd2e3c2d369c9b20b96217208c2"},"headline":"6 Steps in Implementing the Windows Server","datePublished":"2020-02-04T13:26:04+00:00","dateModified":"2023-10-03T09:00:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.itaf.eu\/en\/6-important-steps-in-implementing-the-windows-server\/"},"wordCount":1339,"commentCount":0,"publisher":{"@id":"https:\/\/www.itaf.eu\/en\/#organization"},"image":{"@id":"https:\/\/www.itaf.eu\/en\/6-important-steps-in-implementing-the-windows-server\/#primaryimage"},"thumbnailUrl":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2020\/02\/implementing-windows-server.jpg","articleSection":["IT Support"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.itaf.eu\/en\/6-important-steps-in-implementing-the-windows-server\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.itaf.eu\/en\/6-important-steps-in-implementing-the-windows-server\/","url":"https:\/\/www.itaf.eu\/en\/6-important-steps-in-implementing-the-windows-server\/","name":"6 Steps in Implementing the Windows Server - ITAF IT Partner","isPartOf":{"@id":"https:\/\/www.itaf.eu\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.itaf.eu\/en\/6-important-steps-in-implementing-the-windows-server\/#primaryimage"},"image":{"@id":"https:\/\/www.itaf.eu\/en\/6-important-steps-in-implementing-the-windows-server\/#primaryimage"},"thumbnailUrl":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2020\/02\/implementing-windows-server.jpg","datePublished":"2020-02-04T13:26:04+00:00","dateModified":"2023-10-03T09:00:55+00:00","description":"Learn how 6 important steps in Implementing the Windows Server to the internet will protect against the most common exploits","breadcrumb":{"@id":"https:\/\/www.itaf.eu\/en\/6-important-steps-in-implementing-the-windows-server\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.itaf.eu\/en\/6-important-steps-in-implementing-the-windows-server\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.itaf.eu\/en\/6-important-steps-in-implementing-the-windows-server\/#primaryimage","url":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2020\/02\/implementing-windows-server.jpg","contentUrl":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2020\/02\/implementing-windows-server.jpg","width":1080,"height":600,"caption":"6 Steps in Implementing the Windows Server"},{"@type":"BreadcrumbList","@id":"https:\/\/www.itaf.eu\/en\/6-important-steps-in-implementing-the-windows-server\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.itaf.eu\/en\/"},{"@type":"ListItem","position":2,"name":"6 Steps in Implementing the Windows Server"}]},{"@type":"WebSite","@id":"https:\/\/www.itaf.eu\/en\/#website","url":"https:\/\/www.itaf.eu\/en\/","name":"ITAF IT Partner","description":"Reliable IT support","publisher":{"@id":"https:\/\/www.itaf.eu\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.itaf.eu\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.itaf.eu\/en\/#organization","name":"ITAF is een IT partner voor KMO's, grote bedrijven en overheid: IT support, ICT infrastructuur, Cloud oplossingen, Managed IT services en software ontwikkeling","url":"https:\/\/www.itaf.eu\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.itaf.eu\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2026\/02\/ITAF-Geniki_logo_512px-1.webp","contentUrl":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2026\/02\/ITAF-Geniki_logo_512px-1.webp","width":512,"height":166,"caption":"ITAF is een IT partner voor KMO's, grote bedrijven en overheid: IT support, ICT infrastructuur, Cloud oplossingen, Managed IT services en software ontwikkeling"},"image":{"@id":"https:\/\/www.itaf.eu\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ITAF.eu","https:\/\/x.com\/ITAF_IT_partner","https:\/\/www.linkedin.com\/company\/itaf-eu?trk=tyah&trkInfo=clickedVerticalcompanyidx2-2-7tarId1429703363595tasitaf","https:\/\/www.youtube.com\/@ITAFICTPartner\/","https:\/\/www.instagram.com\/itaf.eu\/","https:\/\/www.threads.net\/@itaf.eu"]},{"@type":"Person","@id":"https:\/\/www.itaf.eu\/en\/#\/schema\/person\/76d18fd2e3c2d369c9b20b96217208c2","name":"Dejan Janosevic","url":"https:\/\/www.itaf.eu\/en\/author\/dejan-janosevic\/"}]}},"_links":{"self":[{"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/posts\/7571","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/comments?post=7571"}],"version-history":[{"count":2,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/posts\/7571\/revisions"}],"predecessor-version":[{"id":45709,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/posts\/7571\/revisions\/45709"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/media\/35185"}],"wp:attachment":[{"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/media?parent=7571"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/categories?post=7571"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/tags?post=7571"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}