1. Check the website code to check whether webpage Trojans, ASP Trojans, and webshell programs are stored by hackers.
2. Check the website code security and check whether there are SQL Injection Vulnerabilities, File Upload vulnerabilities, and other common site security hazards.
3. Analyze the logs of the server operating system, check whether the system has been intruded, check whether the system has been installed by hackers and what changes have been made to the system.
4. install the latest patch for the server operating system, and properly configure and install common application software (such as firewalls, anti-virus software, and databases ), update the software of the server to a safe, stable, and compatible version.
5. Reasonably configure and optimize the server operating system, cancel unnecessary system components, stop unnecessary dangerous services, and disable dangerous ports, you can run the smallest Service to achieve maximum security.
6. Hide and forge the service ports and prompt information of common applications to prevent hackers from using scan tools to obtain server information.
7. Reasonably Configure permissions. Each site is configured with an independent internet Guest Account, which restricts the access permission of the internet Guest Account and only allows it to read and execute the programs required to run the website, only the website directories on the website of Party A are permitted to read and write, access to other directories is prohibited, and Dangerous commands are restricted. In this way, hackers can upload Trojans to the directory of Party A's website, it cannot be executed, and it will not cause harm to the system.
8, reduce the SQL database, SERV-U FTP and other application software service operation permissions, delete MSSQL database unnecessary, dangerous stored procedures, prevent hackers to exploit the vulnerability to further invade and enhance permissions, and prevent unknown overflow attacks through effective settings.
Note: The above maintenance items are only applicable to servers on the windows operating system platform. The copyright of the software involved in the above services shall be resolved by the customer. Only modify and write the part of the client's website code that involves code security, and do not modify or write other part of the client's website code.