Tip

Seven key IIS security tips



Over the past few years IIS has been the most maligned Web server out there. Whether it's popularity has made it an easy target or if it does have some basic weaknesses, there are still some things you should be aware of.


If you are using Internet Information Server, here are seven key security tips you need to know:

  1. The IUSR_<servername> account is just as well-known as the administrator account. If someone can learn your Web server's name, they also know the default Web user account. You should rename this account, but be sure to duplicate the changes both in Active Directory Users and Computers and the IIS Web and FTP services Properties.

  2. The IUSR account is a member of the Everyone & Authenticated Users groups. The IUSR account has the Access this computer from the network and Log on locally User Rights. So, specifically deny access for the IUSR account on everything, then grant the IUSR account access only where needed.

  3. The IUSR account is authenticated automatically, so all anonymous Web and FTP users are logging in even if they don't know it.

  4. Avoid using common filenames and directory structures; i.e., don't use wwwroot, ftproot, or iispub since these are well-known. Using unique folder names will thwart many types of attacks that require a known directory path to function. Also, avoid using virtual directories or creating aliases to folders on other systems. If your directory structure is ever compromised,

    Requires Free Membership to View

  1. links to other systems will become vulnerable.

  2. Avoid deploying Web services on domain controllers, file servers and other servers that host sensitive and confidential data.

  3. When hosting internal or private Web services, use an alternate TCP port to make its discovery that much more difficult for those who are not authorized.

  4. Never use any script or programming component on a production IIS system until it has been thoroughly tested. For example, if an ISAPI scripts uses the RevertToSelf(); command, it can grant Web surfers system level privileges.
About the author
James Michael Stewart is a researcher and writer for Lanwrights, Inc.


This was first published in April 2002

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.