How to ensure the security of a dedicated server

Boot detection:

In the case of power-on detection, the server is generally restarted, that is, it needs to be transferred and there are problems. In general, it is best not to restart the server because the impact on the website is relatively large. During the detection process, managers need to check the process of the independent server to see if there is an abnormality, and also need to check whether the CPU and memory are abnormal.

Security update detection:
After the power-on detection is completed, the anti-virus software and virus database of the server need to be checked to see if it is updated to the latest version, and also to see if the vulnerability needs to be fixed. Server status detection: Check the services running on the system. This step usually requires more careful and strict requirements. Many unnecessary services can be closed directly. If you are not sure whether it is a necessary application service, check the executable file corresponding to this service. Files that are being used in the system can then be ignored; in addition, port applications need to be detected. Many unnecessary ports should be closed immediately, and the possibility of port intrusion is very high.

Security log detection:
After checking the ports and services, you also need to check the related log server and directory permissions. Generally speaking, check the running log to filter the log sources that have errors and warnings, find some reasons for errors and faults, and eliminate them. Whether it will affect the security of the server; to detect the directory permissions, it is to check whether the permissions of the system directories and important program applications are normal and whether they have been changed.
——Hurricane Technology

Guess you like

Origin blog.csdn.net/weixin_45841668/article/details/108464654