Discover server security hardening, include the articles, news, trends, analysis and practical advice about server security hardening on alibabacloud.com
Shutting down unnecessary services, ports, and Accounts makes Windows Server 2003 impregnable.
Hackers typically access servers through unused (not configured or insecure) ports and services, such as Internet Information Services (IIS). To limit entry points, server hardening includes blocking unused ports and protocols while aborting unnecessary services. Micro
Apache1. Hide ServerTokens ProductOnlyServerSignature Off or ServerTokens ProdServerSignature Off2. Disable symbolic link 3. Run nobody4 with a specific user and specify the listening port and ip address (for example, you do not need to provide services with multiple ip addresses) 5. root directory permissions 6. mod_security is an open-source web Application Security Program (or web application firewall) that integrates intrusion detection and defens
change the clsid value.HKEY_CLASSES_ROOT/Shell. Application/CLSID/project value
HKEY_CLASSES_ROOT/Shell. Application/CLSID/project valueYou can also delete the Trojan to prevent its harm.Disable Guest users from using shell32.dll to prevent calling this component.2000 run the command cacls C:/WINNT/system32/shell32.dll/e/d guests.2003 run the command cacls C:/WINDOWS/system32/shell32.dll/e/d guests.
Note: All operations take effect only after the WEB Service is restarted.Use cmd.exeDisable the
ObjectiveIn fact, in the server security settings, although I have some experience, but there is no research, so I write this article when the heart is very not practical, always afraid to say wrong will be mistaken for others.This article is more focused on the prevention of ASP vulnerabilities, so the server black and other aspects of the explanation may be sli
Vps security settings, server security dog
It is suitable for new users and friends who have access to VPS. It focuses on VPS security.
Prohibit ROOT login to ensure security;
Use DDoS deflate to defend against attacks;
Iftop Linux traffic monitoring tool;
Automatically back
In fact, many friends often search for some information about 2003 will come to the cloud habitat community but the lack of a series of articles list, later we will be the topic of the way to organize, the following for you to share the security of Win2003 server settings considerations and procedures.
First, the security of the
content is placed in this section)
Administrators all permissions
D:\FreeHost (if this directory is used to place user site content)
Administrators all permissions
SERVICE Read and run
From a security perspective, we recommend that Webeasymail (Winwebmail) be installed on separate disks, such as E:
E:\ (if Webeasymail is installed on this disk)
Administrators all permissions
System Full Permissions
iusr_*, default Internet Guest account (or dedicate
the best way.
Authentication
From the implementation mechanism, asp.net1.1 is consistent with the asp.net2.0 security model. First configure the Web site for Forms authentication mode, after which the user accesses the site's url,forms The authentication system redirects unauthenticated requests to the specified login page. The user enters the credentials (user name password) and submits the page. If the validator verifies that the user's identit
, intrusion can use FTP client program using anoymously Anonymous account login, and then check whether/etc/passwd for anonymous set Read permission, if there is a backup to use software decoding.
2. In some systems, the/cgi-bin directory will have a file called PHF, if you are ready to invade the server, it will be more convenient. Since PHF allows users to read remote files in the Web site system, the user can use the browser to crawl the P asswd fi
Original: SQL Server R2 Security Topic (i): Security principlesThis series is mainly focused on SQL Server 2005 after the DBMS, because I work with the R2, so now for the R2 to explain:On the principle of protecting SQL Server security
Content of the Web server Security Configuration1 Terminal Services default port number: 3389.Reason for change: Do not want to allow illegal users to connect to the server for logon experiments. When this server is hosted outside the more do not want to happen this situation, hehe, has not forgotten 2000 of the input
ToolsLocate local security settings. Local Policy. User Rights Assignment1. From the network access to the computer inside the general default has 5 users, in addition to admin outside we delete 4, of course, we have to build a own ID2. Forced shutdown from remote system, Admin account also deleted, no one left3. Deny access to this computer from the network remove ID4. Access this computer from the network, admin can also delete if you do not use si
WEB security is one of the most common services provided by the system. The main vulnerabilities of WEB security servers include:Physical path LeakageCGI Source Code LeakageDirectory TraversalExecute any commandBuffer OverflowDenial of ServiceCross-Site lactic acid executionThe WEB server software used on Windows is IIS. No matter which operating system platform,
Recently, I made some adjustments to the server's security. First, I shut down unnecessary ports. This is easy to use IPsec, and it is easy to use Windows Firewall.
For remote desktop, I have not changed the port. I just made a preliminary security record first.
The procedure is as follows:
1. log on to the server with administrator. I prefer to use commands,
If your Linux server is exposed to unauthorized users (such as servers in the public room, public office), then its security will have serious problems.
Using Single-user mode to enter the system
Boot after Linux startup: When prompted, use a special command, such as Linuxsingle or Linux 1, to enter Single-user mode (single-user modes). This command is useful, such as forgetting the Super User (root) pass
hardening projects that control IT spending should take precedence over servers. The third article discusses the important role of multi-core processors and 64-bit servers in today's server security consolidation.
64-bit server technology, multi-core processors, virtualized operating systems, and operating system lice
, local policy--> user Rights Assignment
Shutdown system: Only Administrators group, all other delete.
Deny login via Terminal Services: Join guests, user group
Allow login via Terminal Services: Only join Administrators group, all other delete
C, Local policy--> security options
Interactive login: Do not display last user name enabled
Network access: Do not allow anonymous enumeration of SAM accounts and shares to enable
Network access: Enable for n
. Running the wizard starts with the Security configuration database, which contains all the roles, client features, management options, services, and F1, and so on. Configuration SCW also contains a broad knowledge base of application knowledge. This means that when a selected server role requires an application, client features such as Automatic Updates or administrative applications such as backup Window
Document directory
Windows SQL Server Security Check List
Windows SQL Server Security Check List
1. confirm that the latest patches for NT/2000 and SQL server have been installed. Needless to say, you should have installed them, but I think it is best to remind you here.
Windows 2003 Server Security Settings
First, close unwanted ports
I'm more careful, I turn off the port first. It only opened 3389, 21, 80, 1433, some people have been saying what the default of 3389 unsafe, I do not deny, but the use of the way can only one of the poor lift blasting, you have changed the password set to 66, I guess he will break for several years, haha! Method: Local Connection--attribut
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.