11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

774 <strong>Improving</strong> <strong>Web</strong> <strong>Application</strong> <strong>Security</strong>: <strong>Threats</strong> <strong>and</strong> Countermeasures4. Click Start scan. Your configuration is now analyzed. When the scancompletes, MBSA displays a security report, which it also writes to the%Userprofile%\<strong>Security</strong>Scans directory.5. Review the failed checks, <strong>and</strong> fix vulnerable configuration settings.Click Result details next to each failed check for more information about whythe check failed. Click How to correct this, for information about how to fix thevulnerability.For more information about using MBSA, see “How To: Use Microsoft Baseline<strong>Security</strong> Analyzer (MBSA),” in the How To section of this guide.Evaluate Your Configuration CategoriesTo evaluate the security of your workstation configuration, review the configurationcategories shown in Table 6. Start by using the categories to evaluate the securityconfiguration of the base operating system. Then apply the same configurationcategories to review your IIS, SQL Server, <strong>and</strong> .NET Framework installation.Table 6 Configuration CategoriesConfiguration Category MethodologyPatches <strong>and</strong> updates Setup Automatic Updates. Use MBSA or Windows Updates to verify thatthe latest updates are installedServicesProtocolsAccountsFiles <strong>and</strong> directoriesSharesPortsRegistryAuditing <strong>and</strong> loggingDisable unused services.Check that SMB <strong>and</strong> NetBIOS over TCP are removed if your workstationis not a member of a domain.Check that all local accounts use strong passwords.Be sure your workstation uses only NTFS partitions.Enumerate shares, remove unnecessary ones, <strong>and</strong> secure theremaining ones with restricted permissions.Ensure that unused ports are closed by disabling the service that hasthe port open. To verify which ports are listening use the netstat –n –acomm<strong>and</strong>.Disable null sessions.Audit failed Windows attempts to log on <strong>and</strong> log failed actions acrossthe file system.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!