Web site to "black" treatment of injury? Web server security should be a concern

Source: Internet
Author: User
Keywords Security

Intermediary transaction SEO diagnosis Taobao guest Cloud host technology Hall

With the frequent occurrence of data security incidents, the safety of Web sites has become the focus of the industry. Mengniu Company was caught in the "dairy quality door" and the hacker attacks by netizens ' extensive attention! According to the December 28, 2011 Evening Sina News, the Chinese dairy giant Mengniu Company official website was hacked at night, calling itself "sit group" hacker attack Mengniu official website, and change its homepage login page , causing a large number of netizens onlookers, so that their web site for a short time into a "paralyzed" state:

  

Mengniu Official Website screenshot

Web site by the phenomenon of black at home and abroad sometimes, can be retrieved: the second half of 2011, Bupt website was black, "the headmaster to become a pig", staged angry shoes farce. November 21, 2011, China's famous CSDN website 6 million users of information leakage, so set off a wave of Web site data leakage was a wave of leaks, after a spate of leaks and false leakage, but again to arouse people's attention to the security of the Web server. and "Peat peat", Mengniu company also because of "dairy quality door", so that angry people black its website, and is known as "the disgrace of the family", attracted an uproar in the industry!

  

Last year 35,000 websites in the territory were hacked

The attack on the Web site is really annoying, but in the anger of the Internet is also to comply with the moral standards, the invasion of black its website or should be condemned by all sides. Web server security has been seriously inadequate, is a variety of web sites are often the main reason for the black. The following summary of how to ensure the security of the Web server measures, I hope that those who are still vulnerable to the server to provide some help.

The article mainly takes the Windows Server operating system server as the target object, because the IIS Web Web site Server is more, the attack situation is more serious.

1. Physical Security

The server should be placed in the isolation room where the monitor is installed, and the monitor should keep the camera record for more than 15 days. In addition, the chassis, keyboard, computer desk drawer to be locked to ensure that others even enter the room can not use the computer, the key should be placed in another safe place.

2. Account Security

  

Rename Admin adminstrator User, enable password security policy, guarantee password length, enable password lock policy, prevent brute force, create new user, join Administrators group, prevent unique Admin user from being locked, deactivate guest user.

3. Stop unwanted services and suggest closing options:

  

Computer Browser: Maintaining network computer updates, disabling

Distributed file System: LAN management shared files, no need to disable

Distributed linktracking client: For LAN update connection information, no need to disable

Error Reporting Service: Prohibit sending errors report

Microsoft serch: Provides fast word search without the need to disable

Ntlmsecuritysupportprovide:telnet Service and Microsoft Serch, no need to disable

Printspooler: If there are no printers to disable

Remote Registry: Disable the registry from being modified remotely

Remote Desktop help session Manager: No distance assistance

3. Close unnecessary ports

Closing the port means reducing the functionality and requiring you to make a decision on security and functionality. If the server is behind a firewall, it will take less risk, but never think you can sit back and relax. Use the port scanner to scan the ports open by the system, and determine which services are open for the first step in preventing hackers from invading your system.

  

The following port refers to the TCP port:

Web services: HTTP port: 80,https port: 443, providing services for software IIS

Windows terminal (Remote Desktop) service: port: 3389.

SSH Service: port: 22.

Telnet Service: Port: 23.

MySQL database: Port 3306.

4. Audit strategy

Enter Gpedit.msc carriage return in run, open Group Policy Editor, select Computer Configuration reinstates settings-security Settings-Audit policy when creating an audit project, it should be noted that if there are too many items to be audited, the more events are generated, the more difficult it is to find a serious event. Of course, if the audit is too small, it will also affect your discovery of serious Events, you need to make a choice between the two depending on the situation.

  

The recommended items to audit are:

Logon event failed successfully

Account Logon event failed successfully

System Event failed successfully

Policy Change failed successfully

Object access failed

Directory Service access failed

Privilege usage failed

5. Open Password Policy

Policy settings

Password complexity requirements Enabled

Minimum password length 6 bits

Enforce password history 5 times

Enforce password history 42 days

6. Open Account Policy

Policy settings

Reset account lockout counter for 20 minutes

Account lockout time 20 minutes

Account lockout threshold 3 times

7. Set access rights for Security records

The security record is not protected by default and is set to only Administrator and system accounts for access.

8. Store sensitive files in another file server

Although the server's hard disk capacity is now large, you should also consider whether it is necessary to put some important user data (files, datasheets, project files, etc.) in another secure server, and often back up them.

9. Do not allow the system to display the last login username

By default, when Terminal Services is connected to the server, the Login dialog box displays the account that was last logged on, and the Local login dialog box is the same. This makes it easy for others to get some user names for the system and then make a password guess. Modify the registry to not allow the dialog to display the last logged in user name

10. Download the latest patches to Microsoft website

Many network administrators do not have the habit of accessing the security site, so that some vulnerabilities have been a long time, but also put the server's loopholes do not supply others as a target. No one can guarantee that millions of lines of code above the system is not a bit of security vulnerabilities, frequent access to Microsoft and some security sites, download the latest service pack and bug patches, is the only way to ensure the long-term security of the server.

11. Anti-Virus Software Installation

Rising, Jiangmin, Jinshan, Norton, Kaspersky always have an anti-virus software is what you need.

12. Prevent SQL injection

SQL database Services try to only allow native connections, rigorously check interactive data on the server side, filter illegal characters, and install IIS security tools.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.