11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 16: Securing Your <strong>Web</strong> Server 469Table 16.4 Snapshot of a Secure <strong>Web</strong> Server (continued)ComponentCharacteristicsCode Access <strong>Security</strong>Code Access <strong>Security</strong> Code Access <strong>Security</strong> is enabled for the machine.caspol -s OnLocalIntranet_ZoneInternet_ZoneLocal intranet zone has no permissions:PermissionSet=NothingInternet zone has no permissions:PermissionSet=NothingStaying SecureYou need to monitor the security state of your server <strong>and</strong> update it regularly to helpprevent newly discovered vulnerabilities from being exploited. To help keep yourserver secure:● Audit group membership.●●●●Monitor audit logs.Stay current with service packs <strong>and</strong> patches.Perform security assessments.Use security notification services.Audit Group MembershipKeep track of user group membership, particularly for privileged groups such asAdministrators. The following comm<strong>and</strong> lists the members of the Administratorsgroup:net localgroup administratorsMonitor Audit LogsMonitor audit logs regularly <strong>and</strong> analyze the log files by manually viewing them oruse the technique describe in Microsoft Knowledge Base article 296085, “How To: UseSQL Server to Analyze <strong>Web</strong> Logs.”

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!