Windows Server Security Maintenance note eight points

Source: Internet
Author: User
Tags modify sql sql injection system log access
The maintenance project is only for servers on the Windows operating system platform. The above services are related to the installation of software, copyright issues by the customer to resolve themselves. Modify and write only the part of the code that is involved in the code of the Customer website, and do not modify and write other parts of the code of the Customer website.

Windows Server Security Maintenance note eight points

1, check the code of the website, check whether the hacker placed the Web Trojan and ASP trojan, website code whether there are backdoor procedures.

2, the site code security checks to check whether there are SQL injection vulnerabilities, upload file vulnerabilities and other common harm to the site security vulnerabilities.

3, the server operating system log analysis, check whether the system was invaded, to see whether the Trojan installed by hackers and what changes to the system.

4, the server operating system to play the latest patches, reasonable configuration and installation of commonly used applications (such as firewalls, anti-virus software, databases, etc.), and the server's software to update the security, stability, compatibility of a good version.

5, reasonable configuration and optimization of the server operating system, cancellation of unnecessary system components, stop unnecessary dangerous services, disable the dangerous port, by running the smallest service to achieve maximum security.

6, to the Common application service port and the prompt information, carries on the concealment and the forgery, prevents the hacker to use the scanning tool to obtain the server information.

7, reasonable configuration permissions, each site is configured with a separate Internet Guest account, restrict access to Internet Guest account, only allow it to read and execute the program required to run the site, only the site Directory of party A has read and write permissions, prohibit access to other directories, and limit its execution of dangerous commands, so that even if the hacker has the means to upload the Trojan horse program to the directory of the site, also can not be implemented, and will not cause harm to the system.

8, reduce the SQL database, Serv-u FTP and other application software services to run permissions, delete the MSSQL database unnecessary, dangerous stored procedures, to prevent hackers exploit vulnerabilities to further intrusion and elevation of authority, and through effective settings to prevent unknown overflow attacks.



Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.