-
Notifications
You must be signed in to change notification settings - Fork 3
IIS Configurations
James Perrin edited this page Jul 30, 2020
·
1 revision
These are the minimum configurations to hardening Windows Server and IIS Web Server.
- Click on the Windows Start Menu button.
- Scroll down and click on Windows Administration Tools to expand.
- Scroll down, then click on Internet Information Services (IIS) Manager.
- Click on the Server's name.
- In the displayed Features View, under the
ASP.NET
section, double-click on Machine Key. - Under Validation method, Select HMACSHA256
- In the right menu, under Actions, click on Apply.
- Restart server
- Download a copy of the WindowsServerHTTPSecurity.ps1 PowerShell script from the below link.
- Click on the Windows Start Menu button.
- Scroll down, then Select and Open the IIS Manager.
- Scroll down and click on Windows PowerShell to expand.
- Scroll down, then right click on Windows PowerShell.
- Select Run as Administrator.
- In the opened Administrator: Windows PowerShell command-line window.
- Navigate to the folder location where you saved the WindowsServerHTTPSecurity.ps1 PowerShell script.
- Type
./WindowsServerHTTPSecurity
in the command-line window. - Then, press the Enter key to execute the command.
- Close the PowerShell command-line window.
- Restart the server.
- Download a copy of the IISCrypto Tool.
- Navigate to the folder location where you saved the IISCrypto Tool.
- Right click on IISCrypto.exe, then select Run as Administrator.
- The License Agreement dialogue will be displayed.
- Click Accept
- The IIS Crypto program be opened.
- WARNING: Don't click on the Best Practices button.
- You should be in the Schannel options.
- Under Server Protocols.
- Unchecked the checkboxes next to:
- SSL 2.0
- SSL 3.0
- TLS 1.0
- Unchecked the checkboxes next to:
- Under Client Protocols.
- Unchecked the checkboxes next to:
- SSL 2.0
- SSL 3.0
- TLS 1.0
- Unchecked the checkboxes next to:
- Click Apply
- Under Server Protocols.
- Close the IIS Crypto program.
- Restart the server.
- Click on the Windows Start Menu button.
- Scroll down and click on Windows System to expand.
- Scroll down and click on Run
- The Run dialog will be displayed.
- In the Open field, type regedit.
- Click OK
- The Registry Editor dialog will be displayed.
- You can now make whatever changes you need to make to the registry, which probably shouldn't be done unless you are versed in how to safely add, change, or delete registry keys and values. Make sure, whatever you do, that you only affect the narrow registry areas that you intend to.
- Navigate to the following registry branch
/HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL
- Create backup of selected registry branch
- Click on the key
/HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL
- On menu, click File.
- Click Export
- Navigate to the data drive.
- Create a new folder named regs.
- Navigate to the new folder named regs.
- For File name recommended to use
reg_SCHANNEL_YYYYMMDD.reg
. - Then, click Save
- Click on the key
- Navigate to the following registry branch
/HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols
- Right click on the key Protocols.
- Select New, then Key.
- Set the Name to
SSL 3.0
. - Right click on the key SSL 3.0.
- Select New, then Key.
- Set the Name to
Client
.- Right Click on the key Client.
- Select New, then DWORD (32-bit) Value.
- Set the Name to
DisabledByDefault
.- Press the Enter key.
- Double-click on the REG_DWORD DisabledByDefault.
- Set the Value data to
1
. - Click OK.
- Right Click on key Client
- Select New, then DWORD (32-bit) Value.
- Set the Name to
Enabled
.- Press the Enter key.
- Double-click on the REG_DWORD Enabled.
- Ensure Set the Value data to
0
. - Click OK.
- Right Click on the key Client.
- Right click on the key SSL 3.0
- Select New, then Key.
- Set the Name to
Server
.- Right Click on the key Server.
- Select New, then DWORD (32-bit) Value.
- Set the Name to
DisabledByDefault
.- Press the Enter key.
- Double-click on the REG_DWORD DisabledByDefault.
- Set the Value data to
1
. - Click OK.
- Right Click on key Server
- Select New, then DWORD (32-bit) Value.
- Set the Name to
Enabled
.- Press the Enter key.
- Double-click on the REG_DWORD Enabled.
- Ensure Set the Value data to
0
. - Click OK.
- Right Click on the key Server.
- Set the Name to
- Select New, then Key.
- Right click on the key Protocols.
- Select New, then Key.
- Set the Name to
TLS 1.0
. - Right click on the key TLS 1.0.
- Select New, then Key.
- Set the Name to
Client
.- Right Click on the key Client.
- Select New, then DWORD (32-bit) Value.
- Set the Name to
DisabledByDefault
.- Press the Enter key.
- Double-click on the REG_DWORD DisabledByDefault.
- Set the Value data to
1
. - Click OK.
- Right Click on key Client
- Select New, then DWORD (32-bit) Value.
- Set the Name to
Enabled
.- Press the Enter key.
- Double-click on the REG_DWORD Enabled.
- Ensure Set the Value data to
0
. - Click OK.
- Right Click on the key Client.
- Right click on the key TLS 1.0
- Select New, then Key.
- Set the Name to
Server
.- Right Click on the key Server.
- Select New, then DWORD (32-bit) Value.
- Set the Name to
DisabledByDefault
.- Press the Enter key.
- Double-click on the REG_DWORD DisabledByDefault.
- Set the Value data to
1
. - Click OK.
- Right Click on key Server
- Select New, then DWORD (32-bit) Value.
- Set the Name to
Enabled
.- Press the Enter key.
- Double-click on the REG_DWORD Enabled.
- Ensure Set the Value data to
0
. - Click OK.
- Right Click on the key Server.
- Set the Name to
- Select New, then Key.
- Restart Server