Windows Web site Server security settings

Source: Internet
Author: User
Tags iis log modify backup

There are many people who think that Microsoft has too many loopholes, Microsoft's system security is too poor, the Web server is usually not recommended by the Microsoft system, but if the site maintenance staff is very small, by doing some security configuration in Windows Server can also improve the security of the system, for the site backup, A series of complex operations, such as recovery, can also be implemented in simpler ways, and here are some of the experiences and tips I've summarized for some of the Windows Server Security configuration and backup recovery for your reference.

Windows Server Security Configuration Tips-Windows Server installation, network security Configuration, security template settings, and so on.

Prevent server network card is mistakenly deactivated-the server is generally placed in the IDC room, if we remotely control the Windows Server, accidentally disabled the network card, the consequences of unimaginable.

ASP Blog Security Tips-Take the Z-blog blog system as an example to introduce the system security settings of a stand-alone host that can be configured (hosted, leased, or leased).

The skills of mass file copying and backup-mass file service techniques, with permission file copying (permissions for individual files) skills.

Modify Telnet 3389 Port-as we all know, remote Terminal Services is based on port 3389. Intruders usually scan the host open ports first, and once they are open to port 3389, the next step is to invade, so we just need to modify the default port to avoid the eyes and ears of most intruders.

Five tips for remotely managing Windows Servers-tips for managing your servers effectively.

IIS Pit Dad's backup recovery-Windows IIS has a very "pit Daddy" backup restore feature, unlike most backup restores, this service does not support backup restores between different computers by default, and if users reload windows, even if they back up IIS related files, When you restore, you are prompted for "invalid signature", which causes this IIS to fail to recover.

Windows IIS Log File Analyzer-Windows Server has event logging capabilities that include the following information in its IIS log files: who visited your site, what visitors viewed, and so on. By periodically checking these log files, site administrators can detect which areas of the server or site are vulnerable or have other security implications.

Google kmz/mkl file Settings-the MIME type of KML file in Google Earth is Application/vnd.google-earth.kml+xml,kmz file MIME type is application/ Vnd.google-earth.kmz.



Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.