By preventing the use of unnecessary protocols, you reduce the surface area of attack. Configure SQL Server to support only clients that connect using the TCP/IP protocol. Disable all other protocols, unless required.
In this step, you:
Restrict SQL Server to TCP/IP .
Harden the TCP/IP Stack .
By enforcing the use of TCP/IP you can control who connects to the server on specific ports using IPSec policies or TCP/IP filtering. To support IPSec or TCP/IP filtering, your SQL Server should support client connections over TCP/IP only.
Task To configure SQL Server network protocol support
In the Microsoft SQL Server programs group , start the Server Network Utility.
Make sure that TCP/IP is the only SQL Server protocol that is enabled as shown in Figure 18.3. Disable all other protocols.
Figure 18.3: Disabling all protocols except TCP/IP in the SQL Server Network Utility
Windows 2000 allows you to control many parameters to configure its TCP/IP implementation. Some of the defaults are geared toward server availability and specific features.
For information about how to harden the TCP/IP stack, see "How To: Harden the TCP/IP Stack" in the "How To" section of this guide.
To further improve your database server security, disable NetBIOS and SMB. Both protocols can be used to glean host configuration information, so you should remove them when possible. For more information about removing NetBIOS and SMB, see "Protocols" in Chapter 16, "Securing Your Web Server."
Also consider using IPSec to restrict the ports on which your database server accepts incoming connections. For more information about how to do this, see "How To: Use IPSec for Filtering Ports and Authentication" in the "How To" section of this guide.