Secure communication is taken for granted in the UNIX world. Thanks to the powerful SSH (Secure Shell) protocol, UNIX administrators have long been able to manage their servers remotely, automate tasks with remote scripting, run batch jobs, control configuration settings, and copy data or files across untrusted networks—all without jeopardizing security.
But until recently, the same could not be said about the Windows world. That’s because Windows lacks a scriptable remote secure shell capability and instead has offered nonsecure tools, such as RDP, which transmit data in the clear. And remote management packages, which are typically bulky to install and run, seem excessive when all that’s really needed is a simple, secure command line prompt.
As Windows servers become more prevalent and are used for more of the data center’s heavy lifting, running SSH on those servers makes more and more sense.
This white paper outlines the primary functions of SSH and describes how it works with Windows servers. The Attachmate SSH solution, Reflection for Secure IT, is referenced throughout the paper for demonstration purposes. By the time you’re done reading, you’ll know the most common uses of SSH and how to put it to work in Windows environments.
Open the PDF to read the full brief.