Second, set the security mechanism of IIS
1. Security issues should be noted during installation
(1) Avoid installing on the primary domain controller
Installation After IIS, the IUSR_Computername anonymous account will be generated on the installed computer, and the account will be added to the domain user group, thereby providing the access rights applied to the domain user group to each anonymous user accessing the Web server, which not only brings IIS There is a huge potential danger, and it may also implicate the security of the entire domain resources, as much as possible to avoid installing IIS on the domain controller, especially the primary domain controller.
(2) Avoid installing on the system partition
Putting IIS on the system partition will make the system file and IIS also face illegal access, which is easy for illegal users to invade the system partition. (www.002pc.com)
2. User Controlled Security
(1)Anonymous User
Anonymous User IUSR_Computername (Private Password Generated) Generated After IIS Is Installed, Its Anonymous Access Brings to Web Server Potential security issues should be controlled by their authority. If there is no need for anonymous access, you can cancel the anonymous service of the web. Specific methods:
1 start ISM (Internet Server Manager);
2 start WWW service property page;
3 cancel its anonymous access service.
(2) The general user
manages the general user account by using the password combined with the number (including capitalization), increasing the frequency of changing the password, blocking the failed login attempt, and the lifetime of the account.
3. Login authentication security
IIS server provides three forms of identity authentication for users.
Anonymous access: No need to interact with users, allowing anyone to access the site anonymously, with the lowest security in all three authentications.
Basic verification: In this mode, the user name and password entered by the user are transmitted in clear text on the network. Without any encryption, illegal users can intercept the data packet through online monitoring and obtain the user name and password from it. The safety performance is average.
Windows NT request/response mode: The browser communicates with the IIS server through encryption, which effectively prevents eavesdroppers and is a highly secure form of authentication. The disadvantage of this method is that it is only supported by IE3.0 and above.
First, the software introduction 1, Apache is one of the most popular web server software. Fast, re
Domain-Based Virtual Web Hosts Virtual Web Hosting refers to running multiple Web sites on
Method 1: 1, open our IIS manager, find the shared configuration in the function view, and then dou
When using Windows NT 4.0, IIS has become a popular web server platform. IIS 4.0 is released
How to use IIS to establish a high-security Web server
Web Farm and Network Load Balancing Overview and Architecture Examples
IIS builds a highly secure web server
IIS installation and solutions to common problems
Set gzip page compression in iis
Web Farm NLB Cluster for IIS Web Server
How to set up a router on the external network to access the local IIS site
IIS server backup and porting skills
64-bit win2008 IIS does not open 32-bit support causes the DLL to fail to load
Network Server Architecture Overview
Automatically install scripts for configuring httpd virtual hosts
Some users report that Surface Pro 2 can't install the latest update
Teach you to enhance the security performance of Vista and Windows 7 system
Windows XP 19 technology FAQ solution big collection
WP8 version of WeChat 5.1.4 beta version update: increase network agent
How to modify the Hosts of Windows 7 system to obtain administrator rights
Let Windows 8 update your computer's desktop background