Server security inspection guide-routine maintenance instructions

Source: Internet
Author: User

 

 

















2. Deployment Environment



3.1. Check the McAfee VirusScan Console

 

  

  

  

  

  

  


3.2. Check McAfee HIP Firewall

  

 

  

 

If you want the server to be safer, you can enable the application policy function. In this way, authorization is required to run any software on the server. Although this is troublesome, the system is more secure and reliable, you can test the settings on a virtual machine.

  


3.3. Check Windows Firewall

  

  


3.4. Check IIS settings and website Directory Access Permissions

  


  



  


Normal InformationIf you have time, take a look at the operations that have passed the firewall rules, check whether the intrusion has been successful (for example, check whether the IP addresses that normally access the background are in other regions, and check the background logs to check whether the IP addresses are operated by the colleague ).



  


3.7. Check IIS website access logs.

  

 

FTP logs mainly check whether someone is attempting to intrude, what account is used to try, whether the login is successful, and what operations have been done.


3.9. Check website logs


3.10. Check the processes running on the server


 


2. You can use various hacking tools on a regular basis to try to attack your server and check whether the vulnerability exists. Seriously study various attack techniques on major forums and websites. Only by understanding the attack methods of competitors can we do a good job of protection.
3. During the check, if you find any unfamiliar settings have changed, you need to contact relevant colleagues for consultation to ensure server security.
4. In terms of server settings, all operations prompted by the firewall are disabled first. When a service or something cannot be run, the firewall will not open unnecessary ports on the server.

6,

 

 

Copyright:

This article is published by AllEmpty in the blog Garden. The copyright of this article is shared by the author and the blog garden. You are welcome to reprint this article. However, you must keep this statement without the consent of the author and provide the original article link clearly on the article page, if you have any questions, you can use 1654937 # qq.comThank you very much for contacting me.

 

As long as you are interested in learning and making progress together, you can add Q group: 327360708 or Email to me (1654937 # qq.com, as I am very busy, please leave a message if you have any questions. Please forgive me for not replying in time.

 

For more information, visit the blog:

 

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.