Today, when checking McAfee logs, we accidentally found that only the IIS process can be blocked from creating and modifying ASP files. (This document uses ASP files as an example. ProgramThe setting method is basically the same. In this way, we use other methods (such as directly modifying on the server or modifying through FTP ......) Modifying ASP files will not be affected. In this way, this rule intercepts illegal operations without affecting normal use. The rules are shown in the following figure:
In this way, the possibility of a hacker uploading a trojan is cut off without affecting normal use. This method can be used by anyone. It is also suitable for host vendors to install it on their own virtual host servers to ensure the security of users' websites on the server.
Basically speaking, even if the website has any vulnerabilities after this configuration, the website will not be infected with illegal upload Trojans.CodeOr the website is deleted or modified.
Note that this rule will prevent IIS processes from accessing any. ASP file modification. Therefore, if your website uses an Access database, use this rule to change the database to another suffix.
If you are a host provider, You need to inform your users that you cannot change the database suffix to ASP. Otherwise, the database cannot be written.