In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-18 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)05/31 Report--
This article mainly introduces the relevant knowledge of "what is the method of Windows server host reinforcement". The editor shows you the operation process through an actual case. The operation method is simple, fast and practical. I hope this article "what is the method of Windows server host reinforcement" can help you solve the problem.
First, disable Guest accounts and unrelated accounts
The Guest account opens a convenient door for hackers to invade, and hackers can use the Guest account to lift rights. Disabling the Guest account is the best option. Operation procedure: go to "Control Panel-> Administrative tools-> computer Management-> Local users and groups-> users-> Guest" account disabled "check box to enable reinforcement:
II. Password policy strengthening
The operating system and user identity authentication information should not be easily used, and the password should be changed regularly according to the complexity requirement. Operation procedure: go to "Control Panel-> Administrative tools-> Local Security Policy", and click "account Policy-> password Policy".
"password must meet complexity requirements" is set to "enable", "password length minimum" is set to "8 characters", "password maximum age" is set to "90 days", "Force password history" is set to "remember 5 passwords", "Save password with recoverable encryption" setting to "disabled"
Before reinforcement:
After reinforcement:
III. Strengthening the account locking strategy
For devices using static password authentication technology, it should be configured to lock the account used by the user when the user fails more than 5 times in a row (excluding 5 times). Operation procedure: go to "Control Panel-> Administrative tools-> Local Security Policy", and click "account Policy-> account lockout Policy":
The account amount locking threshold is set to 5 times and the account locking time is set to 15 minutes. The reset account locking counter is set to 15 minutes.
Before reinforcement:
After reinforcement
Fourth, set up security audit
Set the log audit policy operation process on the host's audit policy: go to "Control Panel-> Administrative tools-> Local Security Policy", and set the log audit policy on the host's audit policy in "Local Policy-> Audit Policy":
Audit account login events: success, failure audit account management: success, failure audit directory service access: success, failure audit login event: success, failure audit object access: success, failure audit policy change: success, failure audit privilege use: success, failure audit system events: success, failure audit process tracking: success, failure
Before reinforcement:
After reinforcement:
5. Set not to display the last user name
The last used user name is not displayed when the local security setting system logs in. Go to Control Panel-> Administrative tools-> Local Security Policy, and go to Local Policy-> Security options.
Interactive login: do not show last user name set to enabled
Before reinforcement:
After reinforcement:
6. Enable the "clear virtual memory page before shutdown" of the host security option
To enable the host security option, clear the virtual memory page before shutdown: go to Control Panel-> Administrative tools-> Local Security Policy, and click Local Policy-> Security options.
Shutdown: clear virtual pagefile memory set to enabled
Before reinforcement:
After reinforcement:
7. Configure log file size
Configure log file capacity to avoid unexpected deletions, modifications, or overwrites: go to "Control Panel-> Administrative tools-> computer Management-> event Viewer-> windows Log" and configure before reinforcement:
After reinforcement:
VIII. Disk quota configuration
Disk quota can limit the disk space that can be used by a specified account. This can prevent other users from being unable to work properly or even affect the operation flow of the system due to the excessive use of disk space by one user: go to "my computer-> disk C-> Properties-> quota".
"enable disk management" setting to enable "disk space limit to" set to "90GB" set warning level to "set to" 90GB "log event (G) when user exceeds quota limit" check enable "log event (V) when user exceeds warning level" check enable
Before reinforcement:
After reinforcement:
IX. Remote session strategy
By default, the remote Desktop service allows users to connect from a remote Desktop service session without having to log out and end the session. If this policy setting is enabled, the disconnected session operation flow will be deleted from the server after the specified time is reached: enter "run-> gpedit.msc- > computer configuration-> Administrative templates-> wondows components-> remote Services-> remote Desktop session Host-> session time limit"
"set time limit for disconnected sessions" to "enabled" and "end disconnected sessions" to 5 minutes
Before reinforcement:
After reinforcement:
This is the end of the content about "what is the method of Windows server host reinforcement". Thank you for your reading. If you want to know more about the industry, you can follow the industry information channel. The editor will update different knowledge points for you every day.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.