In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-30 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)06/01 Report--
This article mainly shows you "how to achieve IIS security configuration", the content is easy to understand, clear, hope to help you solve your doubts, the following let the editor lead you to study and learn "how to achieve IIS security configuration" this article.
The IIS server is closely integrated with the Windows NT server to ensure that network administrators and application developers have the same security, network, and management functions as the Windows NT server. In addition to using familiar Windows NT server tools and functions, IIS servers have built-in features to help manage secure Web sites and develop and configure server-intensive Web applications.
1. IIS security configuration needs to delete unnecessary virtual directories
After IIS installation is completed, some directories are generated by default under wwwroot, including IISHelp, IISAdmin, IISSamples, MSADC and so on. These directories have no practical effect and can be deleted directly.
2. IIS security configuration requires the removal of dangerous IIS components
Some IIS components installed by default may pose security threats, such as Internet Service Manager (HTML), SMTP Service and NNTP Service, sample pages and scripts, which you can decide whether or not to delete according to your own needs.
3. IIS security configuration requires setting permissions for file classification in IIS
In addition to setting the necessary permissions for IIS files in the operating system, set permissions for them in the IIS Manager. A good setting strategy is to create directories for different types of files on the Web site and assign them appropriate permissions. For example, static file folders allow read and deny write, ASP script folders allow execution, deny write and read, and executable programs such as EXE allow execution and deny read and write.
The above is all the contents of the article "how to do IIS Security configuration". Thank you for reading! I believe we all have a certain understanding, hope to share the content to help you, if you want to learn more knowledge, welcome to follow the industry information channel!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.