How to make Windows Server 2008 system solid

  
 

Although the security performance of the Windows Server 2008 system is unparalleled, it does not mean that the system itself has no security holes. For the Internet or LAN hackers, the security vulnerabilities in the Windows Server 2008 system are still abound, but their concealment is relatively strong; if we can not be important The privacy vulnerability is blocked in a timely manner, and “hackers” can still exploit these vulnerabilities to attack the Windows
Server 2008 system. To this end, we need to take action and take practical measures to block privacy loopholes. Guarding Windows





Virtual Memory Vulnerability

When we enable the virtual memory function of Windows Server 2008 system, this function supports the default saving of the memory page to the local disk when the memory page is not used. In this way, some illegal users with access to the system page file may be able to access the private information stored in the virtual memory. In order to block the virtual memory vulnerability, we can force the Windows Server 2008 system to automatically clear the virtual memory page file when the system is shut down. Therefore, some private information that appears during this operation will not be sneaked by illegal users. Is the specific steps to block the system virtual memory vulnerability:

First click on the Windows Server 2008 system desktop, click "Start", "Run" & rdquo; command, in the pop-up system run dialog box Enter the string command <;gpedit.msc”, click the Enter key to open the Group Policy Console window of the corresponding system;

Secondly expand the “ computer in the list area on the left side of the console window Configure the node branch, and then click “Windows Settings>,“Security Settings>,“Local Policies>,“Security Options" in the corresponding “Security Options" In the right list area, find the target group policy "Shutdown: Clear virtual memory page file” option.

Then right-click the "Shutdown: Clear Virtual Memory Page File" option and execute the "Properties" command from the pop-up shortcut menu to open the target group policy attribute as shown in Figure 1. Set the window, select the "Allowed" option, and click the "OK" button to save the above settings, so that Windows Server 2008 system will automatically save in virtual memory before shutting down the system in the future. When the privacy information is cleared, other users cannot steal the operating privacy of the local system by accessing the system page file.

2, blocking system log vulnerability

If the Windows Server 2008 system is not used for the server system, but only as a normal computer, we need to beware of the corresponding system log vulnerability, because The system's logging function will automatically save our every move, including when the system is started, when it is closed, what applications the user ran during the startup process, what websites were visited, and so on. For example, to view a user's online record, we simply open the Server Manager window of the Windows Server 2008 system, expand the Event Viewer node option from it, and find the event record from RemoteAccess under the "System" Then, double-click the event logging option with the mouse, and then we can see the specific online time of the target user in the window that appears later. In order to block the system log vulnerability, we can set up the Windows Server 2008 system by following the steps below:

First click on the Windows Server 2008 system desktop, click "Start", /"Program”/&ldquo The "Administrative Tools" dialog box is displayed in the Server Manager console window that pops up, and then expand the "Configure" option to expand the "Services" branch option.

Secondly, in the pop-up service configuration window, double-click the Windows Event Log system service, open the target system service property setting window as shown in Figure 2, click the “stop” button, The target system service is forcibly stopped, and finally click the “OK” button to save the above settings, so that we can successfully block the Windows Server 2008 system log vulnerability.


3. Blocking application vulnerabilities

Windows Server 2008 system security " IQ" is very high when we attempt to run an application downloaded from the Internet During the program, the firewall program in the system may prompt that the target application has a security vulnerability. In order to prevent this application vulnerability from being illegally exploited by network viruses or Trojans, many friends often mistakenly believe that the Windows Server 2008 system is online as soon as possible. Updates can block application vulnerabilities; in fact, updating system vulnerabilities can only block vulnerabilities in Windows Server 2008 itself, and can not block application vulnerabilities. In order to run the target application properly and prevent application exploits from being exploited illegally, we can block the application vulnerability as follows:

First click on the Windows Server 2008 system desktop. Start ”/“Program”/“Administrative Tools”/“Server Manager” command, in the list area on the left side of the pop-up Server Manager console window, expand “Configure”,&ldquo "Advanced Security Windows Firewall" branch option, click on the "Inbound Rules" option from the target branch;

Second from the corresponding "Inbound Rules" "Operations" Click on the “New Rule” item. At this time, the system will automatically pop up the New Inbound Rules Wizard window, select the “Program” option, and click the “Next” button to set the window. “ This program path & rdquo; option is selected, then enter the specific path of the application with security holes in the application path text box, of course we You can also select and import the target application by clicking the "Browse" button to open the file selection dialog;

Next, the Inbound Rules Wizard will pop up a prompt asking us what to do, we must "block" Connect & rdquo; project selected, continue to click the "Next" button, set the applicable conditions of the current inbound rules, we try to select the "public", "private" & rdquo;, & ldquo; domain & rdquo; To ensure that the Windows Server 2008 system is connected to any different network, any illegal program can not exploit the vulnerability of the target application to attack the Windows Server 2008 system through the network;

After completing the above setting operation, we only need to set The name of the current new rule, and click the “Complete” button to save the above creation operation, so that we can use the target application to access the Internet normally, but the Trojan or spyware cannot exploit the target application vulnerability. And attack the local computer system through the network.

Copyright © Windows knowledge All Rights Reserved