Articles

UpGuard Policy: 10 Essential Steps For Configuring a New Server

In our previous piece 10 Essential Steps for Configuring a New Server we walked through some of the best practices to follow when setting up a new Linux server. But how can you tell if your server is setup correctly? More importantly, how can you ensure those initial configurations don’t drift over time? With UpGuard, you can do both at any scale, so we’ve created a policy within our cyber resilience platform to match our 10 essential steps as an example of how we can help organizations control their IT environments.

Filed under: operations, security, linux, upguard, policies, server, dns

How-to: Fix Your Horrifically Inconsistent IT State

This article is part of our ongoing How-to series that focuses on ways to keep your environment ready and yourself sane in real world scenarios.

Filed under: configuration, policies, UpGuard101, how-to, IT operations

10 Steps For Improving IIS Security

Microsoft Internet Information Server (IIS) is widely used in the enterprise, despite a less-than-stellar reputation for security. In fact, for many “IIS security” is a contradiction of terms—though in all fairness, Microsoft's web server solution has improved significantly over the years.  IIS 8.5 for server 2012 R2 and IIS 10 for 2016 have been hardened and no longer present the dangerous default configurations of older IIS iterations, but can still be further tightened. By following these 10 steps, you can greatly increase security for your IIS web apps and servers.

Filed under: security, IIS, Microsoft, policies