What Microsoft documents and what Microsoft suggests can be different
things because Microsoft is a large company. Most everyone (inside and
outside of MSFT) who has any clue about AD and AD security will tell you
to minimize the attack vector surface area on a DC because DCs are the
bastion of security for your entire network. You will find occasional
comments in webinars and PPTS and other things from MSFT that speak to
this but you won't get an overall you shouldn't do it this way for two
reasons
1. MSFT wants to sell as much product as possible and if you want to set
yourself up insecurely, that is your issue, not theirs.
2. MSFT has the SBS product which has everything in the world loaded on it.
The unofficial recommendations from MSFT to not have other components,
especially Back Office has been around for as long as I have been doing
Windows which is the mid 90's.
This goes for any machine though that offers security for you so it
would affect PKI machines for instance as well. The whole idea is to
have as few holes in the machine as possible for attack. The less you
have running, the less chance a hole will pop up.
Usually when you hear someone demanding to see actual MSFT documentation
for something it means they don't actually comprehend the situation and
why the recommendations are being made.
joe
--
Joe Richards Microsoft MVP Windows Server Directory Services
Author of O'Reilly Active Directory Third Edition
www.joeware.net
---O'Reilly Active Directory Third Edition now available---
http://www.joeware.net/win/ad3e.htm