Discover server security hardening, include the articles, news, trends, analysis and practical advice about server security hardening on alibabacloud.com
Server Security Dog Linux V2.5 is launched to make the user server more secureAre you still not used to using Linux? Are you still struggling to integrate Apache and Nginx? Server Security Dog Linux V2.5 is transformed. A new protection software that combines
I wrote this article when the heart is very not practical, always afraid to say wrong will be mistaken for other people's things. Oh, here we go.
This article is more focused on the prevention of ASP vulnerabilities, so the server black and other aspects of the explanation may be slightly too little.
Basic server security Settings
Install Patches
After installin
1, Security settings recommendations
(1) Check whether the SP2 patch has been installed! Change to daily 3:00 Automatic Update patching!
(2) When the firewall and port restrictions function settings, please be careful to avoid the loss of remote administrative rights!
------Right-click > properties in the Network Neighborhood advanced, open Win2003 Firewall feature, set to allow only 20,21,25,80,110,1433,3306, Remote Desktop 3389,33000~33003 (FTP PAS
, click "Do not use this device (deactivate)" Under the General tab, as shown in Figure 3, after you click the OK button to reboot.
② Close the UDP123 port: Click start → settings → control Panel, and then double-click Administrative tools → services to stop the Windows Time service. Turn off the UDP 123 port to protect against certain worm viruses.
③ Close the UDP1900 port: In the Control Panel, double-click management tools → services to stop SSDP Discovery service. Turn off this
Because of the ease and ease of use of IIS (that is, the Internet Information Server), it makes it one of the most popular Web server software. However, the security of IIS has been a concern. How to use IIS to build a secure Web server is a topic that many people are concerned about.
Construct a
With the increasing popularity of computer network today, computers security not only requires preventing and controlling computer viruses, but also to improve the system's ability to resist hacking, and to improve the confidentiality of remote data transmission, so as to avoid being illegally stolen in transit. This article only discusses some of the situations that may occur when constructing a Web server
This article is more focused on the prevention of ASP vulnerabilities, so the server black and other aspects of the explanation may be slightly too little.
Basic server security Settings
Install Patches
After installing the operating system, it is best to install the patch before hosting, configure the network, if it is 2000 to determine the installation of th
file format and record all the record categories such as the customer IP address and user name on an hourly basis. The logs should be reviewed every day and can be read using a diary tool. (IIS logs should not be stored on the default C disk. We recommend that you change the path of the non-system disk logs and set the log access permission to only allow the administrator and system to be Full Control ).7. Program security:1) programs involving user
\documents and Settings\All Users\Application Data Directories give only Administrators and system permissions;
The system disk \ Windows directory only gives Administrators, system, and users permissions;
System Disk \windows\system32\ Net.exe,net1.exe,cmd.exe,command.exe,ftp.exe,netstat.exe,regedit.exe,at.exe,attrib.exe,cacls.exe file only gives Administrators permission (if feel useless to delete it, for example, I deleted the Cmd.exe,command.exe, hehe. );
Other disks, which are run by the i
Construct a security system
To create a secure Web server, you must implement dual security for Windows 2000 and IIS because the user of IIS is also a user of Windows 2000, and the permissions of the IIS directory depend on the permissions control of the NTFS file system of Windows. So the first step in securing IIS is to secure the Windows 2000 operating system:
What, you think the security settings are complicated? It doesn't matter, with the three ways we've described IIS server security settings, it's a good way to protect against attacks.
Basic settings Good patch Delete share
Personal owners often use Windows servers, but we often do not have specialized technicians for securit
For the enterprise, the importance of the server is self-evident. So administrators tend to maintain the stability and efficiency of the server as their work goals, but the security of the server is often considered less, at least for some administrators.
Recently, the author of a
Hkey_classes_root\shell.application\clsid\ the value of the project
Hkey_classes_root\shell.application\clsid\ the value of the project
It can also be deleted to prevent the harm of such Trojans.
Prevents the guest user from using Shell32.dll to prevent calls to this component.
2000 use command: cacls c:\winnt\system32\shell32.dll/e/d Guests
2003 use command: cacls c:\windows\system32\shell32.dll/e/d Guests
Note: The operation will not take effect until the Web service is restarted.
Iv. Call Cm
Tags:. com enable use Manage gem Note Stored procedure server classSQL Server 2008 reported the following error when configuring the Distribution Wizard: Use the agent XPs option to enable SQL Server Agent extended stored procedures on this server. If you disable this option, SQL
1, back door to prevent basic skillsYou must first turn off ports that are not in use on this machine or allow only specified port access; Second, to use the software to kill Trojans, in order to effectively prevent the backdoor; the third is to learn to process operations, always pay attention to the operation of the system, to see if there are some unknown process is running and in a timely manner to terminate the unknown process.
2. Security Conf
Everyone in the use of the server, just landed on the desktop can not download software, because of the IE default options, you can set the following several methods.
Text version:
For security, the Windows Server defaults to disabling security options for downloading files from the Web. This error is present here,
Primary safety Articles
1. Physical Security
The server should be placed in the isolation room where the monitor is installed, and the monitor should keep the camera record for more than 15 days. In addition, the chassis, keyboard, computer desk drawer to be locked to ensure that others even enter the room can not use the computer, the key should be placed in another safe place.
2. Stop Guest Account
Th
1. Physical Security
Physical security is to prevent accidental events or man-made damage to specific physical devices, such as servers, switches, routers, cabinets, lines and so on. The key of the machine room and cabinet must be managed well, do not let irrelevant personnel enter the computer room at will, especially the network Center room, prevent man-made deliberate destruction.
2. Set up
Server security Settings
1, the system disk and site placement disk must be set to NTFS format, easy to set permissions.
2, the system disk and site placement disk in addition to administrators and system user rights are removed.
3, enable Windows with a firewall, only to retain useful ports, such as remote and Web, FTP (3389, 80, 21), and so on, there are mail ser
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.