Security-Windows Server Hardening Checklist
Security-Windows Server Hardening Checklist
P Do not install the IIS server on a domain P Disable ASP.NET state service if not used Accounts
by your applications.
controller.
P Disable Web Distributed Authoring and P Remove unused accounts from the
P Do not install a printer.
Versioning if not used by the application,
server.
P Use two network interfaces in the or secure it if it is required. P Disable Windows Guest account.
server: one for admin and one for the
network. P Do not install Microsoft Data Access P Rename Administrator account, and set
Components (MDAC) unless specifically a strong password.
P Install service packs, patches and hot needed.
P Disable IUSR_Machine account if it is not
fixes.
P Do not install the HTML version of used by the application.
P Run Microsoft Security Compliance Internet Services Manager.
P Create a custom least-privileged
Toolkit.
P Do not install Microsoft Index Server anonymous account if applications
P Run IIS Lockdown on the server. unless required. require anonymous access.
P Install and configure URLScan. P Do not install Microsoft FrontPage Server P Do not give the anonymous account
Extensions (FPSE) unless required. write access to web content directories
P Secure remote administration of the or allow it to execute command-line
server, and configure for encryption, low P Harden the TCP/IP stack. tools.
session timeouts and account lockouts.
P Disable NetBIOS and Server Message P If you host multiple web applications,
P Disable unnecessary Windows services. Block—closing ports 137, 138, 139 and
configure a separate anonymous user
445.
P Ensure services are running with least- account for each one.
privileged accounts. P Reconfigure recycle bin and page file
system data policies.
P Do not share accounts among P Ensure content directories have deny Auditing and logging
write ACE for anonymous internet
administrators.
accounts. P Audit failed logon attempts.
P Disable null sessions (anonymous
P Remove resource kit tools, utilities and P Relocate and secure IIS log files.
logons).
SDKs.
P Require approval for account delegation. P Configure log files with an appropriate
P Remove any sample applications or file size depending on the application
P Do not allow users and administrators to code. security requirement.
share accounts.
P Remove IP address in header for P Regularly archive and analyze log files.
P Do not create more than two accounts in Content-Location.
P Audit access to the MetaBase.xml and
the administrator group.
MBSchema.xml files.
P Require administrators to log on locally,
Shares P Configure IIS for World Wide Web
or secure the remote administration
Consortium extended log file format
system. P Remove all unnecessary shares, auditing.
including default administration shares.
P Restrict access to required shares—the P Read how to use SQL Server to analyze
Files and directories web logs here.
Everyone group does not have access.
P Use multiple disks or partition volumes, P Remove administrative shares—C$
and do not install the web server home
and Admin$ -- if they are not required. Sites and virtual directories
directory on the same volume as the OS
(Microsoft System Center Operations
folders.
Manager—formerly Microsoft Systems P Put websites on a nonsystem partition.
P Contain files and directories on NT file Management Server and Microsoft P Disable Parent Paths setting.
system (NTFS) volumes. Operations Manager—requires these
shares.) P Remove any unnecessary virtual
directories.