Server Security Dog Core Functions
1) Document tamper resistance
The official version of Server Security Dog monitors the files in the user's server in real time by setting file monitoring rules. If illegal tampering is found, it will be immediately intercepted and the website will be protected from illegal tampering from the file driver layer.
2) Website anti-hacking
The official version of Server Security Dog uses the file monitoring function to monitor website directories in real time. Once uploaded (such as FTP upload, online upload) web page Trojans are discovered, they will be deleted immediately, so that the website will never be exposed to the risk of malware.
3) Remote login monitoring
Protect server remote desktop login. Only whitelisted clients and IP addresses are allowed to log in to the server remote desktop. All non-whitelisted clients are blocked, effectively preventing hackers from logging into the server remote desktop.
4) System account monitoring
Real-time monitoring of system accounts. Once an illegal user creates an administrator account or shadow account, it will be immediately discovered and deleted immediately to protect server security and prevent hackers from escalating privileges.
5) DDOS and ARP attack protection
Resist CC, UDP Flood, TCP Flood, SYN Flood, ARP and other types of attacks, and protect the server from illegal attacks from the driver layer
6) Security policy
The official version of Server Security Dog can customize settings for specific ports and select closed or open ports and exception IP lists to achieve effective protection of server ports.
7) System optimization
Folder permission optimization, registry optimization, garbage cleaning, vulnerability repair and other functions help you comprehensively optimize the server system environment.
8) Traffic monitoring mechanism
The server security dog information window intuitively displays the incoming and outgoing traffic data of the server, and any abnormalities can be discovered in time.
9) Server process connection monitoring and open port monitoring mechanism
The official version of Server Security Dog can promptly discover all connection processes on the server, as well as the ports open to the server; and can directly add the open ports to the security policy for real-time protection.
10) Server software manager
The official version of Server Security Dog provides users with a large number of must-install software on servers, which avoids the trouble of users looking for software everywhere and improves the efficiency of operation and maintenance work.
How to use server security dog
How to set up server login protection with Security Dog?
First download and install the official version of Server Security Dog on this site, click to log in, after logging in, click "System Firewall" on the interface
In "System Firewall", click to enter "Login Protection". Users can perform a series of setting operations, such as setting whitelists, remote login reminders, and setting ports that allow remote login, etc.
"Whitelist Access Control" is "not turned on" by default. You need to set up the whitelist before you can turn it on. Reminder: After setting the [White List], remember to [Enable] so that the setting can take effect.
Whitelist access control: Provides real-time, proactive remote desktop login protection to the server by preventing unauthorized users from logging in remotely. Users can set the terminal authentication method and whitelist, etc.
The terminal authentication method is how the system will authenticate the computer that remotely logs in to the server. There are two terminal authentication methods to choose from, "IP or domain name authentication" and "computer name authentication".
"IP or domain name authentication": The system will verify whether the IP or domain name of the computer for remote desktop login is the IP or domain name specified by the user that is allowed to log in to the remote desktop; (The system supports users to add a single IP or IP segment, such as 192.100. x.x or 192.100.x.1-192.100.x.11)
"Computer name authentication": The system will verify whether the computer name used for remote desktop login is the computer name specified by the user that is allowed to log in to the remote desktop. The following takes "IP or domain name authentication" as an example:
(If you have any questions about the settings, you can click "Settings Help" to learn more)
The whitelist is mainly used to set the IP/domain name/computer name that allows remote desktop. Servers that are not set to the whitelist will be blocked when they try to log in remotely.
Click "View Details" to jump to the protection log page to view specific interception content.
Remote login reminder: Turn on the remote remote login reminder function. By setting a common location on the server cloud, if a remote login occurs, you can set an email or mobile phone reminder.
Remote login port: Set the remote login port that allows login. [It is recommended not to use the commonly used port 3389 for remote login port to avoid being easily able to remotely control the server]
Click "OK" and follow the prompts. (If you have already joined the service cloud, you will be prompted to have successfully joined the service cloud; if you have not joined, you will be prompted to join) [It is recommended to add the server to the service cloud to avoid remote connection failure after mistaken modification. After joining the server cloud, you can modify the login protection rules through the cloud so that you can remotely access the server normally. 】
Click "Next" and Server Security Dog will automatically help users add the modified port to Windows Firewall rules and built-in security policy rules. However, if the addition fails, users can click "Setup Help" and follow the prompts to manually add rules.
Click "Next" and you will be prompted "Port modification successful and effective immediately". After the port is modified, you need to use the new port for remote connection.
it works
it works
it works