One, An Hui screen Shield v1 function Manual-Download installation
OK, start the installation
Allow the installer to be such a picture, the following figure
The second step is to authorize the agreement, point "I accept" can.
The next step is to select the installation directory, which is the default.
Then the point starts to install and then just wait a moment!
What is this, Nani?
Cough, kiss, don't get excited.
Since our software is based on IIS or Apache, it detects what environment is installed in your system during the installation process and lets you choose to install the environment components according to the appropriate environment.
Look, IIS is detected by default, so the installer will hook up IIS and install the IIS Network Shield component when the configuration starts. If you are using an Apache environment and are manually configured to draw, IIS does not need you to check out and then choose your Apache directory.
The success of the operation, said all the smooth completion of! yes!
What are you waiting for? Together to discover the mysteries of the An Hui network Shield!
Second, An Hui network Shield v1 function Manual-Safety examination
Hi, dear webmaster, admin, let's take a look at the safety of An Hui screen shield look like it!
Look, this is just going to look like, if immediately come a safety examination can actually find potential threats ...
You see? Security threats have been identified 12 ↓↓↓
These threats contain some of the components that are often used when the Web horse is right, or some such as server sensitive information, what phpinfo, probe files, we all kill!
Then, then there's no then, it's so simple, easy come on, secure you me it! ^_^
Third, An Hui network Shield v1 function Manual-threat scanning
Threat scanning is mainly scanning Webshell (Web Trojan), some common open source Web page program vulnerabilities.
The look of the net horse scan ↓↓↓↓
Pro, in the scan to the net when the horse also please patiently analysis, is not the net horse, the best way is to open a look with Notepad. In order to avoid mistakenly deleted site normal files.
But even if it is mistakenly deleted, we can find it in the Recycle Bin. After processing, there is a recycle bin in the lower right corner, you can choose to restore the deleted file.
There is also an ignored item next to it, meaning that the file you chose to ignore will be placed here. Of course, you can also clear out.
In the Ma Jun is a vulnerability scan, gray is often simple, and the net is very similar. Just a little scanning ...
God horse!!! There's a loophole!
Pro, if you are prompted to have loopholes in your website, this time you need to pay attention to, hurriedly go to the website program (such as Dream weaving, discuz) Official download the latest version or patch repair site it.
This function is one of our attempts, still need to improve, please point out the groove ... :)
There is also a big thing, a custom scan, click on you know!
Four, An Hui network Shield v1 function Manual-Security settings
Welcome to our Security Settings section, where the function is higher on the big, in fact, there are a lot of small knitting do not understand, but generally can see clearly, technical group brother told me, point one key optimization on the finished son!
It's OVER!!! Ha ha!
Other rear settings, amount ... Small series on the simple introduction, really very simple ~
Component security, which is the built-in components of the Management Server, open or disable it, you can also add yourself what you need to disable the components of what ...
Here is the function security, generally speaking. NET and PHP language There are some commonly used dangerous functions, so we will recommend you to disable, of course, one-click Optimization is to do this thing. If you are a technology person, a component function or something is disabled and you cannot run your program, you simply enable the function or component!
This permission security, should be more familiar before, we divided three, upload permissions, before the introduction, usually not in the An Hui network Shield allowed to upload the file type can not upload to your server, you can control which files are allowed to upload to your server. Subsequent IIS execution permissions you'll see things like "%windir%/microsoft.net/framework64/v4.0.30319/vbc.exe", which is actually built by Microsoft, so he has IIS execute permissions. On the contrary, there's no such thing as a few.. NET running security mode is also a security run level built into. NET, and. NET development brother should know this, if you use PHP or something, please ignore!
Here the system is reinforced with some basic server security optimization projects that can be understood literally.
The tuning record is the switch record of what you've done before, and what the function is, including the neglected items, which can be restored back.
Five, An Hui screen Shield v1 function Manual-Security Defense
Security defense This function point, mainly is the active defense record as well as the user can the manual defense function. Look at the map and know:
The first sensitive information protection is also introduced before, An Hui Network Shield Security examination when scanning to sensitive information, you choose to fix this sensitive information will be protected here. Of course, you can also manually add the content you need to protect, the protection effect is not access to these addresses or directories from HTTP.
The following SQL, CC, XSS attacks three basic active defense records, malicious upload is the same, blocking malicious upload behavior.
Focus on the IP black and white list, black and white list better understanding, IP blacklist directly intercept, here is a bright spot, you can directly add IP segment, IP address text, you can directly direct the CC attacks in the IP directly. It should be very convenient!
32 Where is the praise???
Haha, IP White list This is good to understand, General CDN, search engine spiders are inside, so as to avoid the normal use of your site suffered losses, very intimate, there is no!!!
URL white list, this is even simpler, you have to let go of the URL can be added here! The URL to join in, the An Hui Network shield will be for SQL and CC attacks for release processing.
Tips: When you add a URL, do not just fill out the domain name, just fill in the domain name is invalid. The purpose of the release is for a specific URL, all released then you might as well direct the SQL and CC protection to close the reality.