• Contact
  • Contact Us
  • Disclamer
  • Home 1
  • Home 2
  • Home 3
  • Privacy Policy
Saturday, May 17, 2025
How VPS - How to use/setup VPS
  • Login
  • Home
  • Management guides
    • Web servers software
      • Directadmin
      • Hocvps Script
      • Centmin Mod
      • CWP
      • Kloxo-MR
      • Plesk
    • Control Panels
    • Securing VPS/Servers
      • SSL Certificates
      • Upgrading
      • Authentication
  • Operating System
    • CentOS
    • Fedora
    • Debian
    • Linux
    • Arch
    • BSD
    • CoreOS
  • Reviews
  • Coupon
    • Domain Coupon
    • Hosting Coupon
No Result
View All Result
  • Home
  • Management guides
    • Web servers software
      • Directadmin
      • Hocvps Script
      • Centmin Mod
      • CWP
      • Kloxo-MR
      • Plesk
    • Control Panels
    • Securing VPS/Servers
      • SSL Certificates
      • Upgrading
      • Authentication
  • Operating System
    • CentOS
    • Fedora
    • Debian
    • Linux
    • Arch
    • BSD
    • CoreOS
  • Reviews
  • Coupon
    • Domain Coupon
    • Hosting Coupon
No Result
View All Result
How VPS - How to use/setup VPS
No Result
View All Result
Home Control Panels

How To Secure IIS Installations

How VPS by How VPS
November 2, 2018
in Control Panels
0
How To Secure IIS Installations
0
SHARES
28
VIEWS
Share on FacebookShare on Twitter

Contents

  1. TIP 1: Transfer The Inetpub Folder To Another Drive
  2. Tip 2: Set Up Suitable IIS Modules
  3. Tip 3: Disable The OPTIONS Method
  4. TIP 4: Allow Dynamic IP Restrictions
  5. Tip 5: Allow And Set Up Request Filtering Rules
  6. Tip 6: Allow Logging Attribute
  7. Tip 7: Make use of the Security Configuration Wizard (SCW) and the Security Compliance Manager (SCM)
  8. Lastly: Keep Your Web Server Constantly Updated
  9. Check out these top 3 Best web hosting services
    1. Was this article helpful?

If you have a PC  with IIS installed on your Windows OS and want to engage in web designing, you may be thinking of how to ensure your web server is secure. You’re probably thinking that you can delve into the web development world and forget all about the underlying web server. Although IIS is a Microsoft product, you still have to implement security features to ensure the boost the security of your server.

It is necessary to do this as these security features frequently don‘t come configured out of the box. To ensure the security of your IIS installations, we are going to provide you in this article tips and steps you should follow to secure your IIS installations.

TIP 1: Transfer The Inetpub Folder To Another Drive

The Inetpub folder is the preset position for your website content, IIS sign-in and many more. Microsoft IIS7 and newer versions come with Inetpub folder preset on the system drive. To boost your system security, it is recommended that you lift the Inetpub folder out of that position to another partition to isolate web content from the Windows operating system. You’d commonly be required to transfer this as soon as you finish your installation.

Tip 2: Set Up Suitable IIS Modules

IIS comes with over thirty elements or modules. You don’t have to install all of them. The only ones you should install are the modules you really need for your web apps. To boost your site security, Disallow all the modules that you don’t need, to lesson to the possibility of exposing your web server to risk of hacking attacks. From time to time, you need to examine the modules you install and eliminate those that are no more required. To keep track of the modules that you install and enable, utilize the IIS Manager. to list all the modules that are enabled. To do this follows the steps below:

  • Navigate to the IIS Manager and open it
  • Click on the engine name to examine all the elements that come with it. Alternatively, navigate to the particular website to examine all the modules allowed for that particular site.
  • Click on ‘Modules’ twice
  • If you want to disable a component, click on that from the entire component list and click on ‘Remove’ from the Actions panel.
  •  Next, Confirm that you actually want to remove the element by clicking Yes
How To Secure IIS Installations

Looking at all the enabled modules from the IIS Manager

Tip 3: Disable The OPTIONS Method

The OPTIONS method offers a record of methods the web server supports. Despite the fact that this appears to be useful, it at the same time acts as a potential connection between your web server and attackers. It gives a potential attacker the information he or she requires to investigate and explore your site and discover potential ways to launch attack. Thus, it’s a good practice to disable the OPTIONS method entirely. You can do this by disallowing the OPTIONS verb from the HTTP Verb request filtering rulings in IIS. To do this:

  • Go to the IIS Manager and open it
  • Choose the name of the engine to set this up globally. Alternatively, alter the setting on the particular website you need to set this up on.
  • Click on the ‘Request Filtering’ two times
  • Move to the HTTP Verbs button
  • Navigate to the Actions pane, and click on ‘Deny Verb’
  • Then click on the Insert ‘OPTIONS’ in the Verb, and click OK . This will save the modifications you made.
How To Secure IIS Installations

The OPTIONS method denied from the IIS Manager

TIP 4: Allow Dynamic IP Restrictions

The Dynamic IP Restrictions module makes it possible for a potential attacker to gain block access to IP addresses that process a definite number of requests and therefore, assists to inhibit Denial of Service (DoS) attacks. This component will verify the IP address of every request forwarded to the web server and go ahead to filter these queries to be able to momentarily disable IP addresses that illustrate a specific line of attack structure. You can set the Dynamic IP Restrictions component to restrict access to IP addresses after a number of simultaneous queries or by obstructing IP addresses that send out a specific amount of queries across a specific time period. What you need to do is to enable either the ‘IP Security’ feature or the “IP and Domain Restrictions”. Which one among them you enable depends on the IIS version you are working with.

How To Secure IIS Installations

Enable the ‘IP Security’ attribute to permit  for Dynamic IP Restrictions in IIS

By doing this, you’ll incorporate the ‘IP Address and Domain Restrictions component in the IIS Manager. From there, you can setup the dynamic IP restrictions can be set. Follow the steps below to achieve this:

  • Go to the Open IIS Manager and press to open it
  • Choose the name of the device you need to set up to enable you to set it up globally.

Alternatively, you can do by altering the particular website for which you need to set this up.

  • Press on the ‘IP Address and Domain Restrictions’ twice
  • Navigate to the Actions panel, choose ‘Edit Dynamic Restriction Settings’
  • Alter and adjust the dynamic IP restriction settings according to your needs and click on OK to ensure you save all the changes you made.
How To Secure IIS Installations

Modifying Dynamic IP Restrictions settings  from the IIS Manager

Tip 5: Allow And Set Up Request Filtering Rules

It is as well a great idea to limit the types of HTTP queries the IIS process. To prevent possible injurious queries being processed, you need to configure exceptions and rulings. This is essential because IIS has the capacity to block these requests if the define the query filtering rules. For instance, you can set a rule to filter traffic that shows signs of SQL Injection trials. Although the susceptibility of SQL Injection ought to be set at a foundation, filtering for SQL Injection attacks is essential for minimizing such attacks. You can normally set this from the Rules button you’ll see in the Request Filtering interface of the IIS Manager. To do this, follow the steps below:

  • Click to open the IIS Manager
  • Click on the name of the device for which you want to set it up for to set it up globally or modify the settings in the particular website for which you require to set this up. To do this, follow the steps below:
  • Click on ‘Request Filtering’ twice
  • Alter the Rules button
  • Go to the Actions panel, choose ‘Integrate Filtering Rule’
  • Configure the needed rules, and click on OK to ensure you save the changes you have made.

The rule configured in the following screenshot would direct IIS to look for the offered threads the query for .asp and .aspx pages. This would direct IIS to obstruct the query from any threads like this whenever they are observed.

How To Secure IIS Installations

Configuring  Request filtering rule to investigate for SQL Injection attacks

Besides, you can filter requests that are made up of features like high-bit scripts or double escape scripts.

Tip 6: Allow Logging Attribute

Setting up IIS logging will make IIS log data from HTTP query that comes from the server. This is a great help and can help you understand issues that may have happened on your website if you run into problems. You can as well monitor the logs stored by your server constantly or at intervals to verify how your server is performing and give you an idea when you need to optimize for more security features.

This can be automated with the use of server verification tools. Therefore, it is essential to back up your server’s logs.

Microsoft additionally offers the Log Parser tool to help you query and salvage particular data from IIS logs. Furthermore, log consolidation tools are very essential for strengthening consolidating and archiving data obtain from server logs in a more significant manner.

IIS logging can be allowed and set up IIS Manager. From the manager click on the name of the device you are configuring the feature for and then click on Logging. Given that, these logs files can be enormous, it is advisable to open a new file from time to time.

How To Secure IIS Installations

Enabling Logging options in IIS

Tip 7: Make use of the Security Configuration Wizard (SCW) and the Security Compliance Manager (SCM)

These are two tools provided by Microsoft to help you verify the security of your IIS installations. The Security Configuration Wizard (SCW) carries out various investigations and offers suggestions on the way you can harden the security of your web servers.

The Security Compliance Manager (SCM) instrument, on the other hand, carry out security checks and investigations on your server and make a comparison of your server settings to the preset templates required for every industry standard and suggestions made in the security guide.

How To Secure IIS Installations

The Microsoft Security Compliance Manager (SCM) appliance

Lastly: Keep Your Web Server Constantly Updated

Lastly, ensure you constantly update your web server to ensure it has all the latest updates and security patches. Very often, we overlook and neglect this basic security essential but it is highly necessary. The larger part of server attacks recorded frequently happens on servers that are not properly patched.

This is an indication that keeping your web server up to date is a highly essential security tip to implement. The majority of hacks affecting the web server occur on unpatched servers. This just demonstrates how important it is to always keep your IIS web server up to date.

Check out these top 3 Best web hosting services

0

Was this article helpful?

Submit
Previous Post

How To Install Anaconda Python on Ubuntu 18.04 LTS

Next Post

10 Useful Linux Command Line Tricks for Newbies – Part 2

Next Post

10 Useful Linux Command Line Tricks for Newbies – Part 2

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

No Result
View All Result

Recent Post

Install Imagemagick on CentOS
CentOS

Install Imagemagick on CentOS

by How VPS
June 28, 2023
0

This is how I installed Imagemagick on a vanilla CentOS server Start off by installing the prerequisites yum install php-pear...

Read more
how to Check phpinfo

How to Check phpinfo of Hosting or VPS?

June 28, 2023
Failed to download metadata for repo 'appstream' on Centos 8

How to fix error: Failed to download metadata for repo ‘appstream’ on Centos 8

February 25, 2022
How to Fix MySQL Error "Plugin 'InnoDB' registration as a STORAGE ENGINE failed"?

How to Fix MySQL Error “Plugin ‘InnoDB’ registration as a STORAGE ENGINE failed”?

November 17, 2020
How to optimize Mysql or MariaDB

How to optimize Mysql or MariaDB

November 3, 2020

Recent News

  • Install Imagemagick on CentOS
  • How to Check phpinfo of Hosting or VPS?
  • How to fix error: Failed to download metadata for repo ‘appstream’ on Centos 8

Category

  • Arch
  • Authentication
  • Backups
  • BSD
  • Centmin Mod
  • CentOS
  • Control Panels
  • CoreOS
  • CWP
  • Debian
  • Directadmin
  • Encryption
  • Fedora
  • Firewalls
  • Hocvps Script
  • Hosting providers
  • Kloxo-MR
  • Linux
  • Mitigations
  • Operating System
  • Plesk
  • Reviews
  • Securing VPS/Servers
  • Security Patches
  • SSL Certificates
  • Uncategorized
  • Upgrading
  • VPS/Servers management guides
  • Vulnerability Detection
  • Web servers software
  • Webhosting Control Panel
  • About
  • Advertise
  • Careers
  • Contact

© 2025 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Home
  • Management guides
    • Web servers software
      • Directadmin
      • Hocvps Script
      • Centmin Mod
      • CWP
      • Kloxo-MR
      • Plesk
    • Control Panels
    • Securing VPS/Servers
      • SSL Certificates
      • Upgrading
      • Authentication
  • Operating System
    • CentOS
    • Fedora
    • Debian
    • Linux
    • Arch
    • BSD
    • CoreOS
  • Reviews
  • Coupon
    • Domain Coupon
    • Hosting Coupon

© 2025 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Thabet