M A Global Network LogoM A Global Network
Back to Blog
Security10 min read

Cloud Server Security Best Practices – A Practical Checklist for Indian Businesses

Change default passwords, restrict RDP to specific IPs, enable account lockout after 5 failed attempts, apply patches monthly, and test backup restoration quarterly. This practical checklist covers every security control that matters for Indian business cloud servers.

M A Global Network

Cloud Infrastructure Experts · Indore, India

Trusted by 1,000+ Businesses

The Security Checklist That Addresses 95% of Real-World Threats

Cloud server security incidents affecting Indian SMEs are not caused by nation-state attacks or zero-day exploits. They are caused by a predictable set of misconfigurations and omissions that affect thousands of servers simultaneously through automated scanning. This checklist addresses every control that eliminates or severely reduces the most common threat categories.

On M A Global Network's managed hosting, every item on this checklist is implemented and maintained by our technical team as part of the managed service. This guide serves both as a verification checklist for current customers and as an evaluation framework for businesses assessing any hosting provider.

Network Layer Controls

Network Security Checklist

✓  RDP restricted to authorised IPs only — IP-whitelisting at firewall level, not Windows Firewall
✓  All other inbound ports blocked — minimum exposure; only required services accessible
✓  Outbound restrictions where applicable — limit outbound connections to required services
✓  DDoS protection active — hardware-level protection at data centre
✓  Connection attempts logged — audit trail for unauthorised access attempts

IP-whitelisting is the single most impactful network control. An internet-facing Windows Server without IP restriction on RDP receives thousands of brute-force attempts daily from automated tools that cycle through password lists. Whitelisting reduces this to zero attempted connections from unknown sources.

Authentication Controls

ControlRecommended SettingWhy It Matters
Password complexityMinimum 12 characters, mixed case + numbers + symbolsBrute-force resistance — longer is exponentially harder
Account lockout threshold5 failed attempts → 30-minute lockoutPrevents automated password guessing
Account lockout reset time30–60 minutesLimits sustained attack attempts
Administrator account renamedRename "Administrator" to a non-obvious usernameAutomated attacks target "Administrator" by default
Default guest accountDisabledNo anonymous access pathways
Network Level Authentication (NLA)Enabled — required for all RDP connectionsAuthentication before session establishment — blocks certain attack types
Two-factor authenticationRecommended for accounts with admin accessCredential theft alone is insufficient to gain access

OS and Software Patching

Patch CategoryFrequencyManaged by M A Global Network
Windows Security UpdatesMonthly (Patch Tuesday + emergency patches)✓ Scheduled, managed
Windows cumulative updatesMonthly✓ Included
Tally / Busy application updatesWhen available from vendor✓ Coordinated with client
Antivirus definitionsDaily automatic update✓ Included
The Cost of Skipping Patches

EternalBlue (the exploit behind WannaCry ransomware) targeted a Windows vulnerability that Microsoft patched two months before the global outbreak. Organisations that applied patches on schedule were protected. Organisations that deferred patching for "stability" were not. Patch management is not optional — it is the primary defence against the most common ransomware vectors.

Backup Controls

Backup ControlRequirementM A Global Network Standard
Backup frequencyDaily minimumDaily automated
Storage locationOff-site — physically separate from primary serverGeographically separate storage
Retention period7 days minimum7-day retention
Backup completion monitoringAlerts on failure — not just scheduledMonitored — failures alert team
Restoration testingQuarterly test restorationPeriodic testing included
Backup encryptionEncrypted at rest and in transitEncrypted

Monitoring and Audit

  • Windows event logs enabled and retained — failed logins, privilege escalations, and account changes logged for post-incident investigation
  • Failed login alerts — unusual patterns of failed authentication trigger investigation
  • Server uptime monitoring — automated alerts when server is unreachable
  • Storage utilisation monitoring — alerts before storage fills and causes service disruption
  • Backup job completion monitoring — failures trigger immediate investigation

User Access Controls

  • Principle of least privilege: Each user account has only the Windows permissions needed for their role — no unnecessary administrator access
  • Separate accounts per user: No shared Windows accounts — individual accounts provide individual accountability and easy revocation
  • Immediate account deactivation: When a staff member leaves, their Windows account is disabled same day — they cannot connect after departure
  • Tally user-level security: Tally's built-in access control restricts which companies, voucher types, and reports each user can access — configured within Tally independently of Windows access

Frequently Asked Questions

Should I be concerned about antivirus on the cloud server?+

Yes. Windows Defender is included in Windows Server 2022 and configured on all M A Global Network hosted servers. For environments with specific antivirus requirements (compliance, corporate policy), third-party antivirus can be installed. The IP-whitelisting firewall significantly reduces the attack surface through which malware typically enters, but antivirus provides an additional layer of protection against threats introduced via email attachments or file uploads within legitimate RDP sessions.

How does M A Global Network handle a staff member who leaves my organisation?+

When you notify M A Global Network's support team that a staff member has left, their Windows user account on the server is immediately disabled — they can no longer connect via RDP. This is a same-day action on a support request. Additionally, if the departing staff member knew the Tally company password, you should change it within Tally's security settings as well. We can guide you through both steps simultaneously.

Every Item on This Checklist — Managed for You

₹700/user/month + 18% GST. Contracted yearly. 7-day risk-free guarantee

Ready to get started?

Fully managed cloud hosting, 99.9% uptime, NVMe SSD, 24/7 support.

Trusted by 1,000+ Indian businesses — based in Indore, MP.