Tips for maintaining Windows web server security

  
The malicious network behavior of the network server includes two aspects: one is malicious attack behavior, such as denial of service attack, network virus, etc. These actions are designed to consume server resources, affect the normal operation of the server, and even the network where the server is located. p> The malicious network behavior of the network server includes two aspects: one is malicious attack behavior, such as denial of service attack, network virus, etc. These actions are designed to consume server resources, affect the normal operation of the server, and even the network where the server is located. The other is a malicious intrusion. This kind of behavior will lead to the leakage of sensitive information on the server. The intruder can do whatever he wants and destroy the server. Therefore, we must ensure that the security of the network server is to minimize the impact of the network server on these two behaviors.


How to avoid malicious attacks

(a) build up your hardware security defense system

choose a good security system model. A comprehensive security model should include the following necessary components: firewall, intrusion detection system, routing system, and so on.

The firewall plays a security role in the security system, which can largely guarantee illegal access from the network and data traffic attacks, such as denial of service attacks; the intrusion detection system plays the role of a monitor. Monitor your server portals and intelligently filter out those that are intrusive and offensive.


(2) Use English operating system

You must know that Windows is something of Microsoft in the United States, and Microsoft’s things have always been known for bugs and patches. The Chinese version of the Bug is far more than the English version, and the Chinese version of the patch has always been later than the English version, that is, if your server is loaded with the Chinese version of the Windows system, after the Microsoft vulnerability is announced, you still It takes a while to get a patch, and maybe hackers and viruses use this time to invade your system.

How to prevent hacking

First of all, there is no absolutely secure system in the world. We can only avoid being invaded as much as possible to minimize the number of casualties.


(1) Using the NTFS file system format

As we all know, the file system we usually use is FAT or FAT32. NTFS is a series operation of Microsoft Windows NT kernel. A disk format supported by the system specifically designed for management security features such as network and disk quotas, file encryption, and more. In the NTFS file system you can set individual access permissions for any disk partition. Put your own sensitive information and service information on separate disk partitions. In this way, even if the hacker gains access to the disk partition where your service file is located by some means, you need to find ways to break through the security settings of the system to further access sensitive information stored on other disks.


(B) make system backup

As the saying goes, & ldquo; & rdquo ;, although be prepared for who do not want the system to suddenly destroyed, but not afraid Ten thousand, I am afraid that if you do a backup of the server system, you can recover it in time if it is damaged.

(c) shut down unnecessary services, and only the open ports

Close unnecessary open service, good local management and group management. Windows system has a lot of default services, it is not necessary to open, it can even be said to be dangerous, such as: the default shared remote registry access (Remote Registry Service), the system a lot of sensitive information is written in the registry, such as Encrypted passwords for pcanywhere.


Close those unnecessary ports. Some seemingly unnecessary ports can indeed disclose sensitive information of many operating systems to hackers. For example, the IIS service that Windows 2000 server opens by default tells the other party that your operating system is Windows 2000. The port 69 tells the hacker that your operating system is extremely It may be a linux or Unix system, because 69 is the port used by the default tftp service under these operating systems. Further access to the port can also return some information about the software and its version on the server, which is a great help for hackers. In addition, open ports are more likely to be the gateway for hackers to enter the server. In short, doing a good job of TCP/IP port filtering will not only help prevent hackers, but also help prevent viruses.


4) Software firewall, anti-virus software

Although we already have a hardware defense system, but "something" is not a bad thing.


(five) to open your event log

Although the open log services, though said to prevent hackers and has no direct effect, but through his records The hacker's whereabouts, we can analyze what the intruders have done on our system, what damages and hidden dangers have been caused to our system, what kind of backdoors hackers have left on our system, our servers in the end There are also security vulnerabilities and so on. If you are a master, you can also set up a canister, wait for the hacker to invade, and catch him when he invades.


Copyright © Windows knowledge All Rights Reserved