IIS Running?
To check for the presence of a web server (IIS) on a local machine listening on port 80, open up an
internet browser (Internet Explorer) and type:
If you see The webpage cannot be found
a web server is not running on the machine.
By default, files are displayed from folder C:\inetpub\wwwroot,
which after installation contains Default document file iisstart.htm.
Unless otherwise configured, the document displayed follows this priority of display
(the top file is displayed, if defined):
- Default.htm
- Default.asp
- index.htm
- iistart.asp
- Default.aspx
Local IIS Service Install
Most people now use
Microsoft Web Platform Installer, wpilauncher.exe (113 KB).
As of May, 2014, the spotlight is on the Azure cloud rather than local instances.
Click on Products, Server, Name. Scroll down. Note IIS is already Installed.
Click on Recommended Configuration.
IIS Express is required for use with WebMatrix.
IIS comes with Windows, so the service is installed from Start icon > Control Panel.
- Programs and Features (previously Add or Remove Programs)
- Turn Windows Features on or off (previous Add or Remove Windows Components)
- Expand Internet Information Services
- Expand World Wide Web Services
- Expand Application Development Features
- Select ASP and ASP.NET
- Expand Common HTTP Features
- Select Default Document, HTTP Redirection, and Static Content
- Click OK to close the dialog.
Start icon > right-click on Computer > select Manage.
Within Computer Management, the Services and Applications tree.
IIS Component Installation
Components can be added after initial installation in Control Panel
-> Add/Remove Windows Components.
Upon initial installation, iistart.asp is shown because other files are not supplied by the IIS installer.
Configure this list and other IIS web server control options from Control Panel -> Administrative Tools -> Internet Information Services.
A web form can also be selected as the Start Page by right-clicking on it.
For better security (to prevent directory traversal attacks),
do not add cutom web page files in the default wwwroot folder but
create a virtual folder on another drive by
right-clicking on the "Default Web Site" folder and selecting "New" then "Virtual Directory.".
REMEMBER: The "WWW" service must be "bounced" (stopped and restarted) after changes to any virtual directory.
|
|
|
|
|
Lockdown Web Services Configuration
Rather than making changes manually, I prefer using the
Microsoft IIS Lockdown Tool/Wizard to reduce the attack surface available to attackers.
It writes changes to log file \WINNT\System32\inetsrv\oblt-log.log
used for undos (which is automatic when you run Islockd.exe a second time).
So if you configure a virtual directory as an application root after running IIS lockdown, that change is lost when you run IISLockdown again.
The extracted IISLockd.exe launches the IIS Lockdown Wizard based on the
template specified in IISlockd.ini.
|
|
|
|
|
Anonymous Connections
Run this command to test whether a Windows NT/2000/XP "myserver"
supports anonymous connections through the ipc$ hidden administrative share:
net use \\myserver\ipc$ "" /u: ""
If you see this complete successfully, it's vulnerable to anonymous information gathering.
To disable support in Windows NT
- Backup your registry
- Run Regedt32
- Open HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA
- Choose Add Value from the Edit menu.
- Enter the following information in the Add Key dialog box:
Value name: RestrictAnonymous
Data type: REG_DWORD
Value: 1
- Exit the Registry editor
- Reboot
To disable support in Windows 2000
- Invoke the Local Security Policy tool (or the Domain Policy tool if you're using a domain),
- Select Local Policies (or Domain Policies).
- Double-click Additional Restrictions For Anonymous Connections
- Choose No Access Without Explicit Anonymous Permissions.
- Close the policy tool. (There's no need to reboot)
- Disable the PROPFIND service by setting "deny all" ACL on httpext.dll.
|
|
Additional Lockdown Configuration
Setup a Host header entry for each FQDN in DNS associated with each website / TCP port on the same server.
Secure communications.
IP and domain name restrictions.
Apply NTFS permissions to website folders and files.
|
|
|
|
|
TCP/IP Registry to Withstand DDoS
To make TCP/IP stacks more resistant to DDoS, here are the settings from
Security Configuration Tool template hisecweb.inf
recommended by
this Microsoft Knowledge Base article
Registry Key | Recommended Value |
Tcpip\Parameters\SynAttackProtect | 0 |
Tcpip\Parameters\TcpMaxHalfOpen | 100 (500 on Advanced Server) |
Tcpip\Parameters\TcpMaxHalfOpenRetried | 80 (400 on Advanced Server) |
Tcpip\Parameters\EnablePMTUDiscovery | 0 |
| NetBt\Parameters\NoNameReleaseOnDemand | 0 |
Tcpip\Parameters\EnabledDeadGWDetect | 0 |
Tcpip\Parameters\KeepAliveTime | 300,000 |
Tcpip\Parameters\Interfaces\PerformRouterDiscovery | 0 |
Tcpip\Parameters\EnableICMPRedirects | 0 |
|
|
.
|
|
|
Advanced Configuration and Power Interface
AWE
Data Link Control
De-militarized Zone between the public and internal networks
Group Policy Object
Internet Printing Protocol
Line Printer Daemon
Network Bootstrap Program
Preboot Execution Environment
Trivial File Transfer Protocol
User Datagram Protocol
Portions ©Copyright 1996-2010 Wilson Mar. All rights reserved. | Privacy Policy |
Last updated
Related Topics:
ASP Programming
Website Security
Win2000 Install
Active Directory
Win2000 Admin
WinNT4 Install
Keyboard Shortcuts
Free Training!
Tech Support