1. Virtualization
Although virtualization will not occur until the official release of Server 2008, Microsoft Hyper-V virtualization technology is definitely a bright spot, and 75% of large enterprises have applied virtualization technology, Users can leverage virtualization technology without impacting their work-everything is as clear as all applications running on their own computers, with significant cost savings and increased security.
2, Server Core
Server Core is the smallest version of server 2008 that does not contain a GUI, improves stability but provides basic network services such as DHCP,DNS, which significantly reduces maintenance and management time compared to a full version of the system.
3, IIS
IIS 7 is one of the major improvements in 2008, which provides a higher security feature and, in addition, the ability to administer delegation, which saves administrator time considerably.
4. role-based Server Core Installation
Server Core is a fully customizable component system, and you can choose to install only the required Network Services section.
5. Read-only domain controller (RODC)
Minimize the risk of problems, an RODC can help the Active Directory database become read-only, improve reliability and security, and reduce traffic consumption
6. Enhanced Terminal Services
TS REMOTEAPP allows a user to access a central application that looks like it is running locally, and the TS Gateway encrypts HTTP session traffic, and the user no longer needs a VPN to connect to the Internet, and local printing becomes simpler.
7. Network Access Protection (NAP)
Run the firewall and conform to the enterprise security policy. Windows Vista sp1,xp SP3 contains nap from Server 2008, which can be seen as important.
8, Bitlocker
Hardware-based disk encryption technology.
9, Windows PowerShell
The new management approach, based on the. NET technology command-line model, allows administrators to fully control server 2008--without the need for a GUI in a simple way.
10. Higher security
The security of Windows Server 2008 is not just in one respect, security has formed a whole, and almost every piece of the system takes into account the security mechanism that you can feel when you use it. For example, address space Load randomization makes buffer overflow attacks very difficult.
Note : More wonderful tutorials Please pay attention to the triple computer tutorial section, triple Computer office group: 189034526 welcome you to join