Manage Learn to apply best practices and optimize your operations.

Seven key IIS security tips

Here are seven key IIS security tips you should know.

Over the past few years IIS has been the most maligned Web server out there. Whether it's popularity has made it...

an easy target or if it does have some basic weaknesses, there are still some things you should be aware of.

If you are using Internet Information Server, here are seven key security tips you need to know:

  1. The IUSR_<servername> account is just as well-known as the administrator account. If someone can learn your Web server's name, they also know the default Web user account. You should rename this account, but be sure to duplicate the changes both in Active Directory Users and Computers and the IIS Web and FTP services Properties.

  2. The IUSR account is a member of the Everyone & Authenticated Users groups. The IUSR account has the Access this computer from the network and Log on locally User Rights. So, specifically deny access for the IUSR account on everything, then grant the IUSR account access only where needed.

  3. The IUSR account is authenticated automatically, so all anonymous Web and FTP users are logging in even if they don't know it.

  4. Avoid using common filenames and directory structures; i.e., don't use wwwroot, ftproot, or iispub since these are well-known. Using unique folder names will thwart many types of attacks that require a known directory path to function. Also, avoid using virtual directories or creating aliases to folders on other systems. If your directory structure is ever compromised, links to other systems will become vulnerable.

  5. Avoid deploying Web services on domain controllers, file servers and other servers that host sensitive and confidential data.

  6. When hosting internal or private Web services, use an alternate TCP port to make its discovery that much more difficult for those who are not authorized.

  7. Never use any script or programming component on a production IIS system until it has been thoroughly tested. For example, if an ISAPI scripts uses the RevertToSelf(); command, it can grant Web surfers system level privileges.
About the author
James Michael Stewart is a researcher and writer for Lanwrights, Inc.

This was last published in April 2002

Dig Deeper on Windows Server Monitoring and Administration

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.