If you are looking for software to use, go to Huajun Software Park! software release

Hello, if there is a need for software inclusion, please package the software and attach the software name, software introduction, software-related screenshots, software icon, soft copy, and business license (if you do not have a business license, please provide the front and back of the corresponding developer ID card) and a photo of yourself holding your ID card) and send it to your email address http://softwaredownload4.com/sbdm/user/login

Close >>

Send to email:news@onlinedown.net

Close >>

Location: front pagePC softwareNetwork softwareServer class Server security dog
Server security dog

Server Security Dog 4.2 Beta

QR code
  • Software licensing: free software
  • Software size: 38.16MB
  • Software rating:
  • Software type: Domestic software
  • Update time: 2024-10-31
  • Application platform: WinAll
  • Software language: Simplified Chinese
  • Version: 4.2 Beta

Download the service agreement at the bottom of the page

Software introduction Related topics FAQ Other versions Download address

Recommended for you:- Server security dog

Basic introduction
Server security dog ​​segment first LOGO
Server Security Dog official version is a comprehensive server tool that integrates server security protection and security management. The official version of Server Security Dog supports the server security protection software of the full range of Windows operating systems (Windows2003/Windows2008/Windows2012 32-bit and 64-bit) and Linux operating systems, directly shielding attacks from the driver layer to protect server security.

Server Security Dog Core Functions


  1) Document tamper resistance

The official version of Server Security Dog monitors the files in the user's server in real time by setting file monitoring rules. If illegal tampering is found, it will be immediately intercepted and the website will be protected from illegal tampering from the file driver layer.

  2) Website anti-hacking

The official version of Server Security Dog uses the file monitoring function to monitor website directories in real time. Once uploaded (such as FTP upload, online upload) web page Trojans are discovered, they will be deleted immediately, so that the website will never be exposed to the risk of malware.

  3) Remote login monitoring

Protect server remote desktop login. Only whitelisted clients and IP addresses are allowed to log in to the server remote desktop. All non-whitelisted clients are blocked, effectively preventing hackers from logging into the server remote desktop.

  4) System account monitoring

Real-time monitoring of system accounts. Once an illegal user creates an administrator account or shadow account, it will be immediately discovered and deleted immediately to protect server security and prevent hackers from escalating privileges.

  5) DDOS and ARP attack protection

Resist CC, UDP Flood, TCP Flood, SYN Flood, ARP and other types of attacks, and protect the server from illegal attacks from the driver layer

  6) Security policy

The official version of Server Security Dog can customize settings for specific ports and select closed or open ports and exception IP lists to achieve effective protection of server ports.

  7) System optimization

Folder permission optimization, registry optimization, garbage cleaning, vulnerability repair and other functions help you comprehensively optimize the server system environment.

  8) Traffic monitoring mechanism

The server security dog ​​information window intuitively displays the incoming and outgoing traffic data of the server, and any abnormalities can be discovered in time.

  9) Server process connection monitoring and open port monitoring mechanism

The official version of Server Security Dog can promptly discover all connection processes on the server, as well as the ports open to the server; and can directly add the open ports to the security policy for real-time protection.

  10) Server software manager

The official version of Server Security Dog provides users with a large number of must-install software on servers, which avoids the trouble of users looking for software everywhere and improves the efficiency of operation and maintenance work.

How to use server security dog


  How to set up server login protection with Security Dog?

First download and install the official version of Server Security Dog on this site, click to log in, after logging in, click "System Firewall" on the interface

Server security dog ​​screenshot

In "System Firewall", click to enter "Login Protection". Users can perform a series of setting operations, such as setting whitelists, remote login reminders, and setting ports that allow remote login, etc.

"Whitelist Access Control" is "not turned on" by default. You need to set up the whitelist before you can turn it on. Reminder: After setting the [White List], remember to [Enable] so that the setting can take effect.

Server security dog ​​screenshot
Server security dog ​​screenshot

Whitelist access control: Provides real-time, proactive remote desktop login protection to the server by preventing unauthorized users from logging in remotely. Users can set the terminal authentication method and whitelist, etc.

The terminal authentication method is how the system will authenticate the computer that remotely logs in to the server. There are two terminal authentication methods to choose from, "IP or domain name authentication" and "computer name authentication".

"IP or domain name authentication": The system will verify whether the IP or domain name of the computer for remote desktop login is the IP or domain name specified by the user that is allowed to log in to the remote desktop; (The system supports users to add a single IP or IP segment, such as 192.100. x.x or 192.100.x.1-192.100.x.11)

"Computer name authentication": The system will verify whether the computer name used for remote desktop login is the computer name specified by the user that is allowed to log in to the remote desktop. The following takes "IP or domain name authentication" as an example:

(If you have any questions about the settings, you can click "Settings Help" to learn more)

Server security dog ​​screenshot
Server security dog ​​screenshot

The whitelist is mainly used to set the IP/domain name/computer name that allows remote desktop. Servers that are not set to the whitelist will be blocked when they try to log in remotely.

Click "View Details" to jump to the protection log page to view specific interception content.

Server security dog ​​screenshot
Server security dog ​​screenshot

Remote login reminder: Turn on the remote remote login reminder function. By setting a common location on the server cloud, if a remote login occurs, you can set an email or mobile phone reminder.

Remote login port: Set the remote login port that allows login. [It is recommended not to use the commonly used port 3389 for remote login port to avoid being easily able to remotely control the server]

Server security dog ​​screenshot

Click "OK" and follow the prompts. (If you have already joined the service cloud, you will be prompted to have successfully joined the service cloud; if you have not joined, you will be prompted to join) [It is recommended to add the server to the service cloud to avoid remote connection failure after mistaken modification. After joining the server cloud, you can modify the login protection rules through the cloud so that you can remotely access the server normally. 】

Server security dog ​​screenshot
Server security dog ​​screenshot

Click "Next" and Server Security Dog will automatically help users add the modified port to Windows Firewall rules and built-in security policy rules. However, if the addition fails, users can click "Setup Help" and follow the prompts to manually add rules.

Server security dog ​​screenshot

Click "Next" and you will be prompted "Port modification successful and effective immediately". After the port is modified, you need to use the new port for remote connection.

Server security dog ​​screenshot

Related topics

  • Security Dog software download topic

    Security Dog software download topic

  • Server Security Dog Zone

    Server Security Dog Zone

FAQ

Associated version