当前位置:网站首页>What if the server is poisoned? How does the server prevent virus intrusion?
What if the server is poisoned? How does the server prevent virus intrusion?
2022-04-23 15:34:00 【IDC02_ FEIYA】
How does the server prevent virus intrusion ?
- Scheme 1 : Use a strong login password , Avoid weak password , And change the password regularly
- Option two : Enforce password policy through group policy , Stop when the number of errors reaches a certain number
- Option three : Turn off unnecessary ports
- Option four : Use 360 Safety guard “ Black proof reinforcement ” Turn off file sharing 、admin$ Manage sharing 、 Remote service, etc
- Summary
As a The server Administrators , You should know the harmfulness of server poisoning and how to deal with it after server poisoning , First, install anti-virus software , Antivirus in safe mode . At ordinary times, we should pay attention to strengthening the awareness of anti-virus , Do a good job of prevention in advance, such as : Update virus library , Kill virus regularly , Update patches regularly 、 Back up data regularly .
Today, Feifei mainly shares with you several solutions to strengthen server security , I hope I can help you ~
Scheme 1 : Use a strong login password , Avoid weak password , And change the password regularly
1、 High strength password :8 Above position , Use capital letters + Lowercase + Numbers + Symbol ( give an example :CWidc02@!#¥@)
2、 Do not use weak passwords : As the name suggests, weak password means that there is no strict and accurate definition , It is generally believed that passwords that are easy to be guessed by others or cracked by cracking tools are weak passwords ( give an example :123456;abcdefg;admin)
3、 Change password regularly : The normal system login password needs to be in 3-6 Change the password once a month
4、 In addition, if there are multiple servers in the organization, you must not use the same password , In this way, if one server falls, other servers will also be poisoned
5、 Try not to open DMZ Host or desktop mapping function , Avoid computers IP Burst and leak on the public network
Option two : Enforce password policy through group policy , Stop when the number of errors reaches a certain number
1、win+r Turn on run , Input gpedit.msc
2、 Computer settings —Windows Set up — Security Settings — Account Strategy — Account locking strategy ”, Then go to... In the right pane “ Account lock threshold ” term , The number of failed login attempts of the user can be set here , The value is 0 To 999 Between , The default is 0 Indicates that the number of logins is unlimited , We can change it to 3 or 10.( After setting up , You can also set the time of account locking )
3、 Note after modification : When the number of times a user tries to log in to the system and enters the wrong password reaches a certain threshold, the account will be locked automatically , Before the account lock expires , This user will not be able to use , Unless the administrator manually unlocks .
Option three : Turn off unnecessary ports
Such as :445、135,139 etc. , Yes 3389 The port can be configured with a white list , Only those in the white list are allowed ip Connection landing
1、 First, right-click the taskbar network icon , choice “ Open the network and Sharing Center ” Click in the lower left corner of the network and sharing center “Windows A firewall ”
2、 stay Windows Click... In the firewall “ Advanced settings ”, Click on the top left corner “ Inbound rules ”, Then select the new rule in the upper right corner
3、 Rule type click port , Select next
4、 stay “ Specific local port ” Input in “445”, Click to go to the next step , Then select... In the operation “ Block connection ”, Click to go to the next step
5、 Click to go to the next step , Click Finish to finish the 445 Port closure , Similarly, other ports can be disabled in the same way
Option four : Use 360 Safety guard “ Black proof reinforcement ” Turn off file sharing 、admin$ Manage sharing 、 Remote service, etc
1、 open 360 The security guard searches at the top right “ Black proof reinforcement ” Open this tool
2、 Prompt detection after opening , Click on “ Detect immediately ”
3、 The inspection results will prompt relevant reinforcement suggestions , Follow the recommendations , Can effectively protect against attack
Summary
Through the above four methods , Can effectively protect the server from remote attacks , If you are worried that your computer or the company's computer will be attacked, then quickly set the protection manually according to the above methods
版权声明
本文为[IDC02_ FEIYA]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204231526479336.html
边栏推荐
- 通过 PDO ODBC 将 PHP 连接到 MySQL
- 通过 PDO ODBC 将 PHP 连接到 MSSQL
- PHP PDO ODBC将一个文件夹的文件装载到MySQL数据库BLOB列,并将BLOB列下载到另一个文件夹
- Deeply learn the skills of parameter adjustment
- 网站某个按钮样式爬取片段
- 深度学习——超参数设置
- Compiling OpenSSL
- Have you really learned the operation of sequence table?
- Explanation 2 of redis database (redis high availability, persistence and performance management)
- 自动化测试框架常见类型▏自动化测试就交给软件测评机构
猜你喜欢
Detailed explanation of kubernetes (XI) -- label and label selector
Recommended search common evaluation indicators
Cookie&Session
Mysql连接查询详解
Multitimer V2 reconstruction version | an infinitely scalable software timer
重定向和请求转发详解
Reptile exercises (1)
推荐搜索 常用评价指标
Differential privacy (background)
Detailed explanation of redirection and request forwarding
随机推荐
JVM-第2章-类加载子系统(Class Loader Subsystem)
[leetcode daily question] install fence
Functions (Part I)
Llvm - generate addition
T2 icloud calendar cannot be synchronized
Demonstration meeting on startup and implementation scheme of swarm intelligence autonomous operation smart farm project
MySQL sync could not find first log file name in binary log index file error
Application of skiplist in leveldb
Mysql database explanation (8)
Differential privacy (background)
Sorting and replying to questions related to transformer
How to test mobile app?
移动app测试如何进行?
木木一路走好呀
How did the computer reinstall the system? The display has no signal
Connect PHP to MySQL via PDO ODBC
Connectez PHP à MySQL via aodbc
JSON date time date format
通过 PDO ODBC 将 PHP 连接到 MSSQL
基础贪心总结