O'Reilly logo

Seven Deadliest Microsoft Attacks by Naomi Alpern, Mike Borkin, Brian Barber, Rob Kraus

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Defenses Against IIS Attacks

Many of the attacks we have explored in this chapter have various levels of impact, depending on how IIS is implemented and the conditions present within the deployment architecture. Although Microsoft has begun to tighten down the default configuration of IIS over the last few releases, there are still considerations that should be explored before moving a freshly installed IIS server from a staging environment into a production environment. Some of these considerations are simple to address and implement and others may require a good long look at the architecture of your network and Web applications. At a minimum, organizations should review the following recommendations and implement them accordingly; however, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required