When you are deploying a new web server box what are the standard things you install on it and do to set it up?
What things do you do to ensure the box is locked down and not going to get compromised?
So far:
General
- Apply security patches, etc
- Run the Microsfot Baseline Security Analyzer (MBSA)
- Disable weak encryption algorithms - Scott, also see David Christiansen's article and the serversniff.com site
Network
- Harden TCP/IP stack - K. Brian Kelley
- White list traffic with an IPSEC policy
- All NetBIOS is removed or disabled
- Put web server in a workgroup (not allowed to be on a domain)
- Use a DMZ
IIS
- Install UrlScan
- Run IIS lockdown
What we do:
-Adam
You may wish to;
If so, I wrote a detailed article on Howto: Disable SSL2 and Weak Ciphers on IIS6 which may be worth taking a look at.
This article takes things from the standpoint of satisfying the security requirements set by the Payment Card Industry but is still relevant to general server hardening.
So now to fix the depreciated SSL protocol usage you should either read said Howto: Disable SSL2 and Weak Ciphers article for step-by-step instructions OR read MS Support Article #187498 and you can use ServerSniff to confirm your modifications have taken effect.
p.s. Indeed you could also use ServerSniff to confirm the modifications mentioned in Scott's reply.
In addition to the things already mentioned, I disable weak SSL ciphers.
EDIT: I found the step-by-step instructions I wrote a few years ago.
If possible start with Windows 2003 SP1 Server and make sure the built in firewall is turned on unless you have a network firewall to protect it.
Make sure the following ports are open if you do setup the firewall: - 3389 : Remote Desktop (RDP) - 80 : HTTP
Optional: - 443 : HTTPS (optional) - 25 : SMTP - 110 : Pop3
Utilities: