Windows Server Security Maintenance Needs Attention to Eight Key Points

  
1. Check the code of the website to check if the hacker has placed the webpage Trojan and ASP Trojan, and whether there is a backdoor in the website code. 2, check the security of the website code, check whether there are SQL injection vulnerabilities, upload file vulnerabilities, etc.

1, check the code of the website, check whether the hacker placed the web Trojan and ASP Trojan, website code Is there a backdoor program?

2, check the security of the website code, check whether there are SQL injection vulnerabilities, upload file vulnerabilities and other common hazards that endanger the site security.


3, analyze the log of the server operating system, check whether the system is invaded, check whether the Trojan has been installed by the hacker and what changes have been made to the system.

4, the server operating system apply the latest patch, reasonable configuration and installation of common software applications (such as firewalls, antivirus software, databases, etc.), and server software update for the security, stability A compatible version.


5, reasonable configuration and optimization of the server operating system, log out unnecessary system components, stop unnecessary dangerous services, disable dangerous ports, run through the smallest Service for maximum security.

6. Hide and forge the service port and prompt information of commonly used applications to prevent hackers from using the scanning tool to obtain server information.


7. Reasonable configuration permissions. Each site is configured with an independent internet guest account, which restricts the access rights of the internet guest account. It only allows it to read and execute the website. The program only has read and write access to the website directory of Party A's website, prohibits access to other directories, and restricts its execution of dangerous commands. This way, even if a hacker has a way to upload a Trojan to the website of Party A, it cannot be executed. , it will not cause harm to the system.


8, reduces permission to run SQL database, SERV-U FTP services and other applications, delete MSSQL database unnecessary, dangerous stored procedures, to prevent hackers exploit Further intrusion and elevation of permissions, and through effective settings, prevent unknown overflow attacks.

Note: Maintenance project only for windows server operating system platforms. The software involved in the installation of the above services, copyright issues are resolved by the customer. Only modify and write the code security part of the customer website code, and do not modify or write the rest of the customer website code.

Copyright © Windows knowledge All Rights Reserved