• Contact
  • Contact Us
  • Disclamer
  • Home 1
  • Home 2
  • Home 3
  • Privacy Policy
Saturday, May 10, 2025
How VPS - How to use/setup VPS
  • Login
  • Home
  • Management guides
    • Web servers software
      • Directadmin
      • Hocvps Script
      • Centmin Mod
      • CWP
      • Kloxo-MR
      • Plesk
    • Control Panels
    • Securing VPS/Servers
      • SSL Certificates
      • Upgrading
      • Authentication
  • Operating System
    • CentOS
    • Fedora
    • Debian
    • Linux
    • Arch
    • BSD
    • CoreOS
  • Reviews
  • Coupon
    • Domain Coupon
    • Hosting Coupon
No Result
View All Result
  • Home
  • Management guides
    • Web servers software
      • Directadmin
      • Hocvps Script
      • Centmin Mod
      • CWP
      • Kloxo-MR
      • Plesk
    • Control Panels
    • Securing VPS/Servers
      • SSL Certificates
      • Upgrading
      • Authentication
  • Operating System
    • CentOS
    • Fedora
    • Debian
    • Linux
    • Arch
    • BSD
    • CoreOS
  • Reviews
  • Coupon
    • Domain Coupon
    • Hosting Coupon
No Result
View All Result
How VPS - How to use/setup VPS
No Result
View All Result
Home Control Panels

How To Secure IIS Installations

How VPS by How VPS
November 2, 2018
in Control Panels
0
How To Secure IIS Installations
0
SHARES
92
VIEWS
Share on FacebookShare on Twitter

Contents

  1. Transfer The Inetpub Folder To Another Drive
  2. Set Up Suitable IIS Modules
  3. Disable the OPTIONS Method
  4. Allow Dynamic IP Restrictions
  5. Allow And Set Up Request Filtering Rules
  6. Use Server Logs
  7. Make use of the Security Configuration Wizard (SCW) and the Security Compliance Manager (SCM)
  8. Lastly: Update Regularly
  9. Check out these top 3 Windows hosting services:
    1. Was this article helpful?

If you are running IIS, you may be considering what steps you need to take to secure your web server.

This is important because while IIS does come with a number of security features, they do take some configuration before you can take advantage of them. In this article, we’re going to go over some simple steps to secure your IIS installations.

Transfer The Inetpub Folder To Another Drive

By default, lt the Inetpub folder is where your web content is located. Newer versions of IIS put this folder on the system drive but it’s best to move the folder to a different partition.

Separating the content folder from the operating system is good practice from a security standpoint and it makes it easier to back up your data.

Set Up Suitable IIS Modules

Part of securing IIS is making sure you’re only running the modules that you need. IIS comes with over 30 and running extra services that you don’t need increases the chance someone will find a security vulnerability to exploit.

Removing modules you don’t need is one of the simplest ways to increase the security of your IIS server. The steps below will walk you through how to check which modules are installed and how to remove them:

  • Navigate to the IIS Manager and open it
  • Click on the engine name to examine all the elements that come with it. Alternatively, navigate to the particular website to examine all the modules allowed for that particular site.
  • Click on ‘Modules’ twice
  • If you want to disable a component, click on that from the entire component list and click on ‘Remove’ from the Actions panel.
  •  Next, Confirm that you actually want to remove the element by clicking Yes

How To Secure IIS Installations

Disable the OPTIONS Method

The OPTIONS method lists the methods available on the server. While this might be beneficial in some ways, it can provide attackers with useful information about what is running on the server:

  • Open the IIS Manager
  • Select the System Name or change to the specific website you are setting this on
  • Open ‘Request Filtering’
  • Move to the HTTP Verbs button
  • Navigate to the Actions pane, and click on ‘Deny Verb’
  • Then click on the Insert ‘OPTIONS’ in the Verb, and click ‘OK’. This will save the modifications you made.

How To Secure IIS Installations

Allow Dynamic IP Restrictions

The Dynamic IP Restrictions module blocks request traffic from IP addresses that make too many requests. This is a useful module for preventing distributed denial of service attacks because of this.

You can configure the module to block both based on concurrent requests and number of requests over time. Depending on the version of IIS you’ll need to install either the “IP Security” feature or the “IP and Domain Restrictions” feature.

How To Secure IIS Installations

You now have access to the ‘IP Address and Domain Restrictions’ in the Internet Service Manager. Open IIS Manager and do the following:

  • Select the System Name or change to the specific website you are setting this on
  • Open ‘IP Address and Domain Restrictions’
  • In the Actions panel, choose ‘Edit Dynamic Restriction Settings’
  • Update the dynamic IP restrictions and click on ‘OK’

How To Secure IIS Installations

Allow And Set Up Request Filtering Rules

Another thing that will increase the security of your server is to use filtering rules to restrict the type of HTTP requests that the server will process. If there is no reason for your server to accept SQL requests, you can set up a rule to filter these requests out. Open the IIS Manager and follow the example below for ASPX traffic, but understand that this technique can be applied to other types of traffic as well.

  • Select the System Name or change to the specific website you are setting this on
  • Open ‘Request Filtering’
  • Switch to the ‘Rules’ tab
  • In the Actions Panel select ‘Add Filtering Rule’
  • Set the rules in the screenshot below.

How To Secure IIS Installations

Use Server Logs

Enabling server logging is a great way to monitor your server. With a record of all of the requests that come in, you can check into any network or performance issues and can investigate possible intrusions.  IIS logging is set up in the IIS Manager.

You get to it by going to Configure and then Logging in the IIS Manager under the machine or domain you want to set up logging for.

Make use of the Security Configuration Wizard (SCW) and the Security Compliance Manager (SCM)

These are two tools provided by Microsoft to help you test the security of IIS. The Security Configuration Wizard (SCW) scans your system identifying known issues and provides solutions for common issues.

The Security Compliance Manager (SCM) will compare your server’s settings and configuration to known good templates based on best security practices and standards.

How To Secure IIS Installations

Lastly: Update Regularly

Ensure you constantly update your web server to ensure it has all the most recently released features and security enhancements. When you get busy, you can overlook the basics.

The reality of Internet security is that most hacks are the result of people not keeping their system updated. Penetrations from ‘0 day’ attacks are relatively rare compared to the number of known existing threats still circulating across the Internet.

Check out these top 3 Windows hosting services:

0

Was this article helpful?

Submit
Previous Post

How To Install The LEMP (Nginx, MariaDB, and PHP) Stack On Ubuntu 18.04 LTS?

Next Post

How to Record and Replay Linux Terminal Sessions using ‘script’ and ‘scriptreplay’ Commands

Next Post

How to Record and Replay Linux Terminal Sessions using ‘script’ and ‘scriptreplay’ Commands

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

No Result
View All Result

Recent Post

Install Imagemagick on CentOS
CentOS

Install Imagemagick on CentOS

by How VPS
June 28, 2023
0

This is how I installed Imagemagick on a vanilla CentOS server Start off by installing the prerequisites yum install php-pear...

Read more
how to Check phpinfo

How to Check phpinfo of Hosting or VPS?

June 28, 2023
Failed to download metadata for repo 'appstream' on Centos 8

How to fix error: Failed to download metadata for repo ‘appstream’ on Centos 8

February 25, 2022
How to Fix MySQL Error "Plugin 'InnoDB' registration as a STORAGE ENGINE failed"?

How to Fix MySQL Error “Plugin ‘InnoDB’ registration as a STORAGE ENGINE failed”?

November 17, 2020
How to optimize Mysql or MariaDB

How to optimize Mysql or MariaDB

November 3, 2020

Recent News

  • Install Imagemagick on CentOS
  • How to Check phpinfo of Hosting or VPS?
  • How to fix error: Failed to download metadata for repo ‘appstream’ on Centos 8

Category

  • Arch
  • Authentication
  • Backups
  • BSD
  • Centmin Mod
  • CentOS
  • Control Panels
  • CoreOS
  • CWP
  • Debian
  • Directadmin
  • Encryption
  • Fedora
  • Firewalls
  • Hocvps Script
  • Hosting providers
  • Kloxo-MR
  • Linux
  • Mitigations
  • Operating System
  • Plesk
  • Reviews
  • Securing VPS/Servers
  • Security Patches
  • SSL Certificates
  • Uncategorized
  • Upgrading
  • VPS/Servers management guides
  • Vulnerability Detection
  • Web servers software
  • Webhosting Control Panel
  • About
  • Advertise
  • Careers
  • Contact

© 2025 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Home
  • Management guides
    • Web servers software
      • Directadmin
      • Hocvps Script
      • Centmin Mod
      • CWP
      • Kloxo-MR
      • Plesk
    • Control Panels
    • Securing VPS/Servers
      • SSL Certificates
      • Upgrading
      • Authentication
  • Operating System
    • CentOS
    • Fedora
    • Debian
    • Linux
    • Arch
    • BSD
    • CoreOS
  • Reviews
  • Coupon
    • Domain Coupon
    • Hosting Coupon

© 2025 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Thabet