By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Anyone connecting to the machine -- again, assuming there are accounts configured on the machine and it wasn't secured solely by the fact it was in its own network -- will be prompted for credentials.
If not, just add some user accounts for only the people who need to access the server and remove anonymous access. You don't mention which operating system this server is running on or what services this server has provisioned (is it only a file server? Or is there server software for a particular accounting program?), so I can't give specific advice, but this general suggestion should pave the way.
Dig Deeper on Network intrusion detection and prevention and malware removal
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.