No matter how secure your network infrastructure is and no matter what services your server runs, there are certain basic hardening techniques you must apply. In this chapter, we focused specifically on hardening steps that apply to any server. In particular, we discussed the physical security of server resources, followed by disk encryption techniques one can use for on-premises and cloud infrastructure. We have established that almost every server has some sort of internet-facing connectivity and has to be protected by antivirus and malware solutions. To complement these security solutions, we can also harden our servers and adjust local security polices and permissions. Finally, we discussed some server management techniques to restrict access to a specific set of IP addresses for SSH and RDP services.