Windows Server Security Solution

xiaoxiao2021-03-06  54

Windows Server Security Solution

The server, Windows Server is a certain proportion, but the Microsoft has not proposed a relatively possible solution due to the highlighted security issues of Windows Sever, just launching this one of the patches, making the user of Windows Server I am afraid all day.

After a long-term exploration and exquisite, we have organized the zero fragile security document of the network, summed up a set of solutions, as follows:

solution:

First, system installation

1. Disk partition format

1) A Windows Server to be used as a network server, the partition format of the hard disk must be NTFS, NTFS partition format is much secure than the FAT partition format, in the NTFS format, users can set different folders The permissions, enhance the security of the server.

2) At another point, we should pay attention to the partitioning of the hard disk. It is best to divide the partition into the NTFS format. Please be divided into the FAT format, which is easy to cause the system, and even crash. .

3) Due to the particularity of the NTFS partition format, the user cannot activate anti-virus through the floppy disk, so you must remind the user, you must do a good job of systematic anti-virus work.

2. Operating system installation

1) Operating system installation, be sure to install only one system installed, and will not give people a bad person to have a machine, adding the safety hazard of the server.

2) When the operating system is installed, the system file should not be installed in the default directory (Winnt), choose to install a new directory for installation; web directory and system do not place the same partition, prevent someone from vulnerability through Web, access system files ,folder.

3) Install the operating system, be sure to update the necessary patch until no patch can be updated.

4) Use less software that is not related to Web services.

Second, the system settings

Account settings

1) As few effective accounts, don't use it, more accounts will be more security hazards.

2) There are two management accounts to prevent your password, or modified your password, and then standby.

3) To strengthen account management, do not give special permissions easily.

4) Rename the management account, do not keep the default name, this is easy to guess. Other non-managed accounts also try to follow this principle.

5) Disable the guest account to a complex name and add a password, then delete it from the guest group.

6) Account password rules, all accounts (except system accounts) The password is preferably 8 or more, the password is preferably special symbols, numbers, and uppercase letters. Do not avoid using words.

7) The account password should be changed regularly. The password is best to be kept in the brain. Do not make records elsewhere;

8) Adding an account error login to the number of times to prevent continuous login attempts, and effectively improve administrator's vigilance.

2. Network settings

1) Only the TCP / IP protocol is retained, and all other deletes.

2) NetBIOS is often the scanning target of online hackers, here we have to disable it.

Operation method: Network connection -> Local connection properties -> Advanced -> WINS Options -> Disable NetBIOS-> OK on TCP / IP.

3) only allows some necessary ports

Such as:

21 TCP FTP

25 TCP SMTP

53 TCP DNS

80 TCP HTTP

1433 TCP SQL Server

3389 TCP TERMINAL SERVICES

5631 TCP PCANYWHERE

Some common ports. Special reminder: Installing the Blunt Domain Virtual Host Relationship System Requires Open 19888 Port.

4)

3. Delete unnecessary shares and improve security

How to operate: Runregit,

(1) Add a value under HKEY_LOCAL_MACHINE / SYSTEM / CURRENTCONTROLSET / SERVICES / LANMANSERVER / Parameters

Name: AutoShareServer

TYPE: REG-DWORD

Value: 0

(2) Add a value under HKEY_LOCAL_MACHINE / SYSTEM / CURRENTCONTROLSET / CONTROL / LSA

Name: restrictanonymous

TYPE: REG_DWORD

Value: 0

4. Modify the permissions

Windows 2000 Server NTFS partition default permissions are EVERYOF full control, which gives a certain security hazard. We recommend that all NTFS partitions are only fully controlled to administrators and system. A directory with special permission requirements can be set separately.

5. Modify some of the computers

Operation method: Control Panel -> System -> Advanced -> Startup and Fault Recovery -> Cancel Display Operating System List -> Cancel Send Alert -> Cancel Write Timeture -> Complete.

6. Disable some unnecessary services.

Specific operation position: Control Silver Edition -> Management Tools -> Services

Services you need to stop, for example: Alert, Computer Browser, Distributed File System, Intersite Messaging, Kerberos Key Distribution Center, Remote Registry Service, Routing and Remote Access, etc.

7. Safety log

Win2000's default installation is not to open any security audit!

Then please go to the local security policy -> In the audit strategy to open the corresponding audit, the recommended audit is:

Account management success failed

Successful failure

Object Access failed

Strategy change successfully failed

Privilege failure

System event success failure

Directory Service Access Failure

Account login event success failure

The shortcomings of reviewing projects are that if you want to see that there is no record, it is not a matter; the audit project will not only take up system resources, but will cause you to see it at all, this will lose the meaning of review. Related to it:

Set in the account policy -> password policy:

Password complexity requirements are enabled

Password length minimum 6 bit

Forced password history 5 times

Up to 30 days in the longest deposit period

Set in the Account Policy -> Account Lock Policy:

Account lock 3 error login

Lock time 20 minutes

Reset lock count 20 minutes

Similarly, Terminal Service's security log is also not open, we can configure security audits in Terminal Service Configration -> Permissions -> Advanced Chinese configuration

8. IIS settings

Only the manager, public documentation, and WWW service are installed.

Try to minimize the unnecessary mapping in IIS, most users only leave ASP, and ASA is OK.

The web directory requires IUSR read and write permissions, only open read permissions in IIS.

Effectively use IS in IIS to prohibit access lists.

Improve the log function to find problems and strengthen monitoring. 9. FTP settings

It is forbidden to access anonymous access to FTP.

Pay attention to the opening of user privileges.

转载请注明原文地址:https://www.9cbs.com/read-113755.html

New Post(0)