Server Security Service
Server Security Service
SOSUN The server security maintenance service is aimed at windows server and linux server system. It often encounters hacker intrusion, Trojan horse virus infection, data tampering, server being attacked, website being hacked, database being tampered, data being deleted, server system crashing and website being linked Server security maintenance services tailored specifically for situations such as black chains. We have a number of skilled and professional network security engineers who have been in the security industry for 12 years and provide 7x24 hours of security maintenance services.
Server security maintenance scope and content
Security settings of the underlying system, system vulnerability repairs, system file anti-tampering, system service security settings, remote desktop military regulatory security certification. Reinforcement of system dangerous components and registry, system group policy security settings, IP policy settings, website folder permissions security settings, and security settings of iis, Nginx, Apache, Lnmp and other environments. Anti-CC attack and ARP attack defense, server system backdoor and virus killing and active defense. Webshell, Trojan cleanup, database security and anti-tampering.
Understand the status quo
First conduct a full range of security inspections on the server, including system vulnerabilities, website vulnerabilities, XSS cross-site vulnerabilities, PHP remote file inclusion vulnerabilities, FTP software vulnerabilities and other common ways of hacker intrusion, conduct a comprehensive risk assessment, and conduct corresponding security according to the status quo Reinforcement scheme. The client's server is our own server, and the server is ourselves. Only when we truly understand ourselves can we achieve maximum security.Server security configuration
Security settings for the server environment, including security deployment of IIS, Nginx, Apache, Lnmp and other environments, security settings of the underlying system, IP security policy settings, firewall settings, security reinforcement of system application software, security audit and identity of system ports Authentication, active defense of system kernel rootkit Trojan virus, reinforcement of system registry and dangerous components, security settings of system services, security audit of system logs. System administrator account permissions and access restrictions, military-standard security protection of remote login.
? Linux system security configuration, ssh security settings, Root permission assignment.
? Iptables firewall advanced security strategy
? /tmp /var/tmp /dev/shm security settings
? Linux system file permissions reinforcement, system log security monitoring and early warning.
? Linux system port, program service security hardening, hiding sensitive information such as apache/nginx/php version number.
Site permission security settingsSecurity distribution of permissions for website folders prevents cross-site directories from affecting the security of other websites. ASP security settings, PHP security settings, .net security settings, CGI security settings, group policy security settings. Website database sql2000 sql2005 mysql oracle database security settings, as well as the permission distribution of database accounts. The environment required by Nginx, Apache, IIS and other websites is manually strengthened.
Web server anti-CC settings
Effective security defense against the server encountering CC attacks, automatic shielding according to the characteristics of the attack and the number of tcp connections, etc., does not affect the normal access of the website. Automatic IP unblocking and log blocking, so as to achieve the best effect of preventing CC on the website, and it is also the most effective security solution for preventing CC on the industry website.
Webshell, Trojan cleanup
Perform comprehensive detection and cleaning of files in the website directory. For one-sentence webshell, encrypted website trojans, black chain trojans, Baidu snapshot trojans, and image-type script trojans, perform effective killing and cleaning, global.asa trojans, And the files named after the device are deleted and cleaned up forcibly, so as to achieve the permanent deletion of the Trojan.
Active defense of system Trojans
Deeply excavate and clean up the kernel Trojan horses and rootkit backdoor Trojans in the server system. The sine security Trojan horse active defense strategy effectively checks and kills the popular hidden Trojan horses at home and abroad, deletes its own Trojan horses and backdoors, system kernel files and DLL systems. The files have been fully tamper-proof and monitored to achieve static braking and detection and killing in seconds!