Difference between revisions of "IIS Security Practices"

From MgmtWiki
Jump to: navigation, search
(References)
Line 9: Line 9:
 
Starting with Server 2008 R2 IIS services will not longer run as network services but with virtual [https://docs.microsoft.com/en-us/iis/manage/configuring-security/application-pool-identities Application Pool Identities] that have no entry local or domain accounts, and hence no "Current User" cert store or HKCU registry entries.
 
Starting with Server 2008 R2 IIS services will not longer run as network services but with virtual [https://docs.microsoft.com/en-us/iis/manage/configuring-security/application-pool-identities Application Pool Identities] that have no entry local or domain accounts, and hence no "Current User" cert store or HKCU registry entries.
 
==References==
 
==References==
 +
* This provides details for the wiki page [[Web Site Security]].
  
 
[[Category:Best Practice]]
 
[[Category:Best Practice]]
 
[[Category:Web Site]]
 
[[Category:Web Site]]
 
[[Category:Security]]
 
[[Category:Security]]

Revision as of 22:10, 21 July 2020

Full Title or Meme

Security practices to follow on IIS for good security.

Context

  • Assuming IIS (or any web platform) is running as a front end web server, it should never be trusted with high value assets and assumed to be hackable. Still there are ways to make the hacks much less frequent.

Solutions

Application Pool Identities

Starting with Server 2008 R2 IIS services will not longer run as network services but with virtual Application Pool Identities that have no entry local or domain accounts, and hence no "Current User" cert store or HKCU registry entries.

References