Tips for maintaining Windows web server security

  
        

The malicious network behavior of the network server includes two aspects: one is malicious attack behavior, such as denial of service attack, network virus, etc. These actions are designed to consume server resources, affect the normal operation of the server, and even the network where the server is located. The other is a malicious intrusion, which will lead to the disclosure of sensitive information on the server, and the intruder can do whatever he wants and vandalize the server. Therefore, we must ensure that the security of the network server is to minimize the impact of the network server on these two behaviors.

How to avoid malicious attacks

(1) Build your hardware security defense system

Choose a good security system model. A comprehensive security model should include the following necessary components: firewall, intrusion detection system, routing system, and so on.

The firewall plays a security role in the security system, which can largely guarantee illegal access from the network and data traffic attacks, such as denial of service attacks; the intrusion detection system plays the role of a monitor. Monitor your server portals and intelligently filter out those that are intrusive and offensive.

(2) Use English operating system

You must know that Windows is something of Microsoft in the United States, and Microsoft's things have always been known for bugs and patches. The Chinese version of Bug is far away. Far more than the English version, and the Chinese version of the patch has always been later than the English version, that is, if your server is loaded with the Chinese version of the windows system, you still need to wait a while after the Microsoft vulnerability is announced. Patched, maybe hackers, viruses use this time to invade your system.

How to prevent hacking

First of all, there is no absolutely secure system in the world. We can only avoid being invaded as much as possible to minimize the number of casualties.

(1) Using NTFS file system format

As we all know, the file system we usually use is FAT or FAT32. NTFS is supported by a series of operating systems of Microsoft Windows NT kernel. A disk format designed for management security features such as network and disk quotas, file encryption, and more. In the NTFS file system you can set individual access permissions for any disk partition. Put your own sensitive information and service information on separate disk partitions. In this way, even if the hacker gains access to the disk partition where your service file is located by some means, you need to find ways to break through the security settings of the system to further access sensitive information stored on other disks.

(2) Do a good job of system backup

As the saying goes, "I am prepared", although no one wants the system to be suddenly destroyed, but not afraid of 10,000, I am afraid, in case A good server system backup can be restored in time if it is damaged.

(3) Turn off unnecessary services, only open the port that is open

Close those services that are not necessary, and do local management and group management. Windows system has a lot of default services, it is not necessary to open, it can even be said to be dangerous, such as: the default shared remote registry access (Remote Registry Service), the system a lot of sensitive information is written in the registry, such as Encrypted passwords for pcanywhere.

Close those unnecessary ports. Some seemingly unnecessary ports can indeed disclose sensitive information of many operating systems to hackers. For example, the IIS service that Windows 2000 server opens by default tells the other party that your operating system is Windows 2000. The port 69 tells the hacker that your operating system is extremely It may be a linux or Unix system, because 69 is the port used by the default tftp service under these operating systems. Further access to the port can also return some information about the software and its version on the server, which is a great help for hackers. In addition, open ports are more likely to be the gateway for hackers to enter the server.

In short, doing a good job of TCP/IP port filtering not only helps prevent hackers, but also helps prevent viruses.

4) Software firewall, anti-virus software

Although we already have a hardware defense system, but "something" is not a bad thing.

(5) Open your event log

Although opening the log service does not directly affect the hacker's invasion, but by recording the hacker's whereabouts, we can analyze the intruder. What have been done on our system, what damages and hidden dangers have been caused to our system, what kind of backdoors hackers have left on our systems, and what security vulnerabilities exist in our servers. If you are a master, you can also set up a canister, wait for the hacker to invade, and catch him when he invades.

Copyright © Windows knowledge All Rights Reserved