Simple ten steps to protect the IIS Web server's security _win server

Source: Internet
Author: User
Tags anonymous iis ntfs permissions
Don't worry, the following 10 simple steps can let you rest assured. The following is the detailed introduction of the article, hope that we draw lessons from.

Use the following 10 steps to protect IIS:

1. Install an NTFS device specifically for IIS applications and data. If possible, do not allow iuser (or any other anonymous user name) to access any other device. If an application fails because an anonymous user cannot access a program on another device, immediately use Sysinternals's Filemon to detect which file is inaccessible, and then transfer the program to the IIS device. If this is not possible, iuser access is allowed and only the file can be accessed.

2. Set NTFS permissions on the device:

Developers = Full (all permissions)

Iuser = Read and execute only (read and Execute permissions)

System and admin = Full (all permissions)

3. Use a software _blank "> firewall to verify that no end user has access to ports other than port 80 on the IIS computer.

4. Lock your computer with the Microsoft tools: IIS Lockdown and URLScan.

5. Enable the IIS event log. In addition to using the IIS event log, if possible, try to enable event logging for the _blank > firewall.

6. Remove the log files from the default storage location and ensure that they are backed up. Create a duplicate copy of the log file to make sure that the copy placed in the second position is available.

7. Enable Windows auditing on your computer, because when we try to track the behavior of those attackers, we always lack enough data. The script then sends a report to the administrator by using the audit log and possibly even having a script to audit for suspicious behavior. This may sound a bit extreme, but if it's important for your organization to be safe, this is the best option. Establish an audit system to report any failed account logon behavior. Also, like the IIS log file, change its default storage location (C:\winnt\system32\config\secevent.log) to another location and make sure it has a backup and a duplicate copy.

8. Generally, do your best to find articles on security (from different places) and follow them in practice. In terms of IIS and security practices, they usually say something better than what you know, and don't just believe what other people (like me) tell you.

9. Subscribe to an IIS defect list message and keep reading it on time. One of the lists is the X-force Alerts and advisories of the Internet Security Systems (Internet Safety System)

10. Finally, make sure that you regularly update Windows and verify that the patches have been successfully installed.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.