Unsolved
This post is more than 5 years old
1 Message
0
5073
September 14th, 2010 19:00
Installing a terminal server on an existing server
I have a Dell PowerEdge T410. I am wanting to add a terminal server that will be accessed by remote users however instead of buying an additional piece of hardware just to house the terminal server is it okay to installing terminal server services on my existing server to cut costs. Are there any differences in efficiency or security issues when installing a terminal server on an existing server compared to having separate servers for the files and a terminal server. Any information that can be provided would be greatly appreciated. Links to additional information supporting either way would also be great. Thanks ahead of time :)
No Events found!



Dev Mgr
4 Operator
•
9.3K Posts
0
September 15th, 2010 07:00
I am not familiar with terminal services (I know what it does, but don't know how to set it up, what it needs (memory, processor power, disk space, etc) and such).
A server can easily run multiple applications, assuming you have processor power and memory to spare and have configured your harddrives (raid) in a way that doesn't cause performance bottlenecks if you do run multiple different applications/services.
pcmeiners
4 Operator
•
1.8K Posts
0
September 15th, 2010 10:00
Actech....
Using a server with critical apps/data as a TS is not a good idea, if it is a Domain controller it borders on insanity.
Terminal servers use and need a good deal of ram and CPU power.
Each logged on user requires appreciable resources, slowing down the regular server functions. The amount of ram and CPU power required is dependent upon the number of simultaneous logged in users.
TS need users to be able to log on locally, a serious security breach. Admins can provide tight security for a dedicated TS, but very difficult for a server, even more so for a Domain controller.
Inherited a couple clients which allowed users to RDP to there servers, both had >40 viruses/malware. Upon arrival, one was severely hacked, and the hacker had all passwords, credit card and bank pins from users via multiple key-logger; the hacker also infected every workstation, Basically had to rebuild the servers and wks involved.