Windows Server Security Settings

  
1. Cancel Folders and Hide Shares By default, Windows 2000/XP will open hidden shares for all partitions. Select from the “Control Panel/Administrative Tools/Computer Management” window. Share Folder/Share & rdquo;, you can see that each partition name on the hard disk is followed by a “$”. But as long as you type "computer name or IPC$", the system will ask for the username and password. Unfortunately, most individual user system administrator passwords are empty, and the intruder can easily see the contents of the C drive. It brings great hidden dangers to network security. How to eliminate the default share? The method is very simple, open the registry editor, go to "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetSevicesLanmanworkstationparameters", create a new double-byte value called "AutoShareWKs", and set its value to “0”, then re Start the computer so the sharing is cancelled. Turning off & ldquo;file and print sharing> File and print sharing should be a very useful feature, but it is also a good security hole for hacking when it is not needed. So in case there is no need to "file and print share", we can turn it off. Right-click on “Network Neighborhood>, select “Properties", and then click the <quo;File and Print Sharing" button to bring up the two checksums in the <quo;File and Print Sharing” dialog box that pops up. The hook in the box can be removed. 2. Prohibit the establishment of an empty connection Open the Registry Editor and go to “HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\Lsa” and change the key value of the DWORD value “RestrictAnonymous” to “ldquo;1””. Third, delete unnecessary protocols For the server, only installing TCP /IP protocol is enough. Right click on the “Network Neighborhood” and select “Attributes”, then right click on “Local Area Connection” and select “Attributes” to uninstall unnecessary protocols. NETBIOS is the root cause of many security flaws. For hosts that do not need to provide file and print sharing, you can also disable NETBIOS bound to TCP/IP protocol to avoid attacks against NETBIOS. Select “TCP/IP Protocol/Properties/Advanced", go to the “Advanced TCP/IP Settings” dialog box, select the “WINS” tab, check ““Disable NETBIOS on TCP/IP” and close it. NETBIOS. Disable unnecessary services: Automatic Updates Computer BrowserDHCP ClientDNS ClientMessengerPrint SpoolerRemote Registry Server Scheduler TCP/IP NetBIOS HelperThemes (Desktop Theme) Windows AudioWindows TimeWorkstation V. Changing the Administrator Account The Administrator account has the highest system privileges. Once the account is used, the consequences are unimaginable. One of the common ways to hack is to try to get the password for the Administrator account, so we have to reconfigure the Administrator account. The first is to set a strong and complex password for the Administrator account (personal recommendation at least 12), then we rename the Administrator account, and then create an Administrator account without administrator privileges to deceive the intruder. In this way, it is difficult for an intruder to figure out which account actually has administrator privileges, which reduces the risk to a certain extent. 6. Disable the guest and other unused accounts. There are many intrusions that are further managed through this account. Password or permission. If you don't want to give your computer a toy, it's forbidden. Open the Control Panel, double-click “Users and Passwords", click the “Advanced" tab, and then click the “Advanced” button to bring up the Local Users and Groups window. Right-click on the Guest account and select Properties. On the “General” page, select “Account is disabled”. In addition, changing the name of the Administrator account can prevent hackers from knowing their own administrator account, which will largely guarantee the security of the computer. Seven, prevent Trojans Trojans will steal useful information from the embedded computer, so we must also prevent hackers from implanting Trojans, commonly used methods are: ● When downloading files, first put them in their new folder, Use anti-virus software to detect, play a preventive role in advance. ● In the “Start & rdquo;→“Programs & rdquo;→“Start & rdquo; or "Start”→“Program”→“Startup” option to see if there are any unknown running projects, If so, delete it. ● Delete all suspicious programs prefixed with “Run” and “HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run” in the registry. Eight, if you open the Web service, you also need to configure the IIS service security: (1) Change the Web service home directory. Right click on “Default Web Site → Properties & Rarr; Home Directory & Rarr; Local Path & rdquo;, “ Local Path & rdquo; point to other directories. (2) Delete the original installed Inetpub directory. (Or change the file name) (3) Delete the following virtual directories: _vti_bin, IISamples, Scripts, IIShelp, IISAdmin, IIShelp, MSADC. Nine, open the audit policy Windows default installation does not open any security audit, so you need to enter [my computer] & rarr; [control panel] & rarr; [management tools] & rarr; [local security policy] & rarr; [audit strategy] open corresponding Review. The system provides nine types of auditable events, each of which can indicate whether the audit success event, the failure event, or both audit policy changes: successful or failed login events: successful and failed object access: failure event process tracking: Select directory service access as needed: Failed event privilege use: Failed event System event: Successful and failed account login event: Success and failure Account management: Success and failure 10. Install the necessary security software We should also install and use the necessary software on the computer Anti-blackware, anti-virus software and firewalls are all necessary. Open them when you are online, so even if a hacker attacks our security, it is guaranteed. Of course, we should not install some unnecessary software, such as: QQ some chat tools, so as to provide hackers with fewer backdoors. Finally, we recommend that you patch your system, Microsoft's endless patches are still very useful. .
Copyright © Windows knowledge All Rights Reserved