11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Contents xliRestricting Server-to-Server Communication.............................................................. 784Using IPSec Tools ................................................................................................... 785Netdiag.exe ........................................................................................................ 785IPSecpol.exe....................................................................................................... 785Additional Resources .............................................................................................. 786How ToUse the Microsoft Baseline <strong>Security</strong> Analyzer 787Applies To .............................................................................................................. 787Summary ............................................................................................................... 787Contents ................................................................................................................ 788Before You Begin .................................................................................................... 788What You Must Know .............................................................................................. 789Scanning for <strong>Security</strong> Updates <strong>and</strong> Patches .............................................................. 789Using the Graphical Interface ............................................................................... 789Using the Comm<strong>and</strong> Line (Mbsacli.exe) ................................................................ 790Analyzing the Output ........................................................................................... 790Scanning Multiple Systems for Updates <strong>and</strong> Patches................................................. 790SQL Server <strong>and</strong> MSDE Specifics .............................................................................. 791Scanning for Secure Configuration............................................................................ 791Performing the Scan............................................................................................ 791Analyzing the Scan.............................................................................................. 792Correcting Issues Found ...................................................................................... 792Additional Information ............................................................................................. 792False Positives From <strong>Security</strong> Update Checks........................................................ 792Requirements for Performing Remote Scans ......................................................... 792Password Scans ................................................................................................. 793Differences Between Mbsa.exe <strong>and</strong> Mbsacli.exe ................................................... 793Additional Resources .............................................................................................. 793How ToUse IISLockdown.exe 795Applies To .............................................................................................................. 795Summary ............................................................................................................... 795What Does IISLockdown Do? ................................................................................... 795Installing IISLockdown............................................................................................. 796Running IISLockdown .............................................................................................. 797Log Files ................................................................................................................ 798Undoing IISLockdown Changes................................................................................. 798Unattended Execution ............................................................................................. 798Pitfalls ................................................................................................................... 799

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!