Last Updated: 27-Sep-1999
This
table outlines some of the steps you should take to secure a Windows NT 4.0
Server running Microsoft Internet Information Server 4.0 on the Internet. Note,
this document does not take into consideration firewalls or proxy servers. It
also assumes the company has a security policy in place.
Server Name |
|
Asset # |
|
Setup Date |
|
Manufacturer |
|
Location |
|
Set up by |
|
|
Step |
Configure hardware to meet security policy |
|
|
Step |
Disable Guest account |
|
Change "Access this computer from the network" from Everyone to Authenticated Users |
|
|
Step |
Set
appropriate virtual directory permissions and partition Web application space |
|
|
|
|
|
Regularly run a security scanner on your Web server, such as
software from one of the companies listed.
You
should regularly update the ERD by running the RDISK tool.