Secure IIS 6.0
Hi, I have Windows Server 2003 Sp2 R2 x64, installed IIS 6, for running client access role (Exchange 2007 Sp1). This web service is public to internet (Web mail). Recently, I have found that the hacker had been uploaded lots of hack tools to my server using user NT AUTHORITY\SYSTEM (Path C:\windows\system32\inetsrv\). As the guide before, I tried to secure my server. However, when i downloaded and installed Software Restriction Policies in Windows Server 2003, I so confused how to restrict the application that "hacker" use as the tool they had uploaded. So it seems that Software Restriction Policies can't work well. Furthermore, I could not trace the source (IP) that the hacker uploaded tools to the folder "C:\windows\system32\inetsrv" even though we had syslog server using Splunk that monitor our Server. Please tell me how to fix problems. Thank you very much.
May 29th, 2012 5:04am

Use ISA 2006 or ForeFront Threat Management Gateway (TMG) as a reverse proxy in front of Exchange servers (thus your Exchange server(s) aren't accessible directly from the Internet). This is the de facto standard. It will help guard against these types of attacks. You still want to lock down your servers that sit behind ISA/TMG too. Also, have a look at the following URLs. IIS 6 Security Best Practices: http://technet.microsoft.com/en-us/library/cc782762(v=ws.10).aspx Here is a dated but still relevant article on the SANS site about securing IIS 6 from the O/S layer and up: http://www.sans.org/reading_room/whitepapers/windows/securing-iis6-os_1238 Hope that helps! Brian
Free Windows Admin Tool Kit Click here and download it now
May 30th, 2012 3:13am

Hi, For Software Restriction Policies, I'd like to suggest to use Hash Rule: Computer Configuration\Windows Settings\Security Settings\Software Restriction Policies Create new software restriction policies, right click Additional Rules, Create Hash Rule, Click the Browse, Navigate to the Executable/Program you want to stop users using, Click OK, Set the Security Level to Disallowed For something reference: Restricting Software Access and Protecting Computers http://technet.microsoft.com/en-us/library/cc784363(WS.10).aspx In addition, I'd like to suggest to audit the folder to monitor: How to audit user access of files, folders, and printers in Windows XP http://support.microsoft.com/kb/310399 If the issue persist, please provide related event log for our further analysis. Hope this helps! Best Regards Elytis Cheng Elytis Cheng TechNet Community Support
May 30th, 2012 3:15am

Use ISA 2006 or ForeFront Threat Management Gateway (TMG) as a reverse proxy in front of Exchange servers (thus your Exchange server(s) aren't accessible directly from the Internet). This is the de facto standard. It will help guard against these types of attacks. You still want to lock down your servers that sit behind ISA/TMG too. Also, have a look at the following URLs. IIS 6 Security Best Practices: http://technet.microsoft.com/en-us/library/cc782762(v=ws.10).aspx Here is a dated but still relevant article on the SANS site about securing IIS 6 from the O/S layer and up: http://www.sans.org/reading_room/whitepapers/windows/securing-iis6-os_1238 Hope that helps! Brian
Free Windows Admin Tool Kit Click here and download it now
May 30th, 2012 3:17am

Thanks for you help. I will try and inform you the result soon. Brs;
June 1st, 2012 12:38am

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics