Software features
Powerful immunity and interception capabilities: It has a one-sentence immunity function that can identify common one-sentence behaviors and block suspicious behaviors. At the same time, it can actively intercept backdoors, effectively preventing hackers from invading the server through backdoors.
Integration of multiple protection mechanisms: Integrating multiple functions such as SESSION protection, anti-WEB sniffing, anti-CC, anti-tampering, injection defense, anti-XSS, anti-privilege escalation, upload defense, unknown 0day defense, and alien script defense to comprehensively defend against various network attacks.
Automatic adaptation and efficient protection: The website is automatically isolated, and the script does not have access to important data outside the website directory by default. It can automatically adapt to the website environment without basically any configuration. Full support for FastCGI/ISAPI PHP version, automatic adaptation (when the IIS pool is 32-bit, 64-bit PHP cannot be supported for the time being). In IIS after win2008, D-shield uses Microsoft's new filtering architecture, which does not require the support of the old IIS6 filter and has higher processing efficiency.
Active defense and behavior recording: As an active defense product, it can defend against a large number of unknown attacks without updating rules and killing libraries. It can also record various suspicious behaviors to facilitate users to find problems in time.
Software function
Directory restrictions: Effectively prevent intruders from uploading dangerous programs or codes through scripts, ensuring that services run in a safe state.
Execution restrictions: Prevent intruders from executing dangerous programs, prevent privilege escalation, and ensure the security of server permissions.
Network restrictions: prohibit scripts from connecting to dangerous ports on the machine to prevent privilege escalation through network ports of third-party software. At the same time, UDP is prohibited from being sent out, effectively preventing UDP DDOS attacks, such as PHPDDOS, etc., and preventing network bandwidth from being maliciously occupied.
Component restrictions: prohibit dangerous components from running to reduce server security risks caused by component vulnerabilities.
Injection defense: Prevent the server from being invaded due to injection problems on the website, and protect website data security.
File download control: You can set a ban on downloading certain file types to prevent sensitive information from being exposed and important data from being illegally obtained.
Script extension management: Allows users to set executable script extensions to prevent malicious execution of unauthorized extension scripts, such as Trojan horse programs with extensions such as CER and CDX.
Directory script execution restrictions: prohibit writable directories such as images and uploads from executing scripts to reduce the possibility of hackers using these directories to carry out attacks.
Website information protection: Prevention tools scan website directory and file information, making it difficult for intruders to understand the website structure. At the same time, it prevents MSSQL database error feedback from exposing tables or data information and enhances data confidentiality.
FAQ
1. Mistakenly intercepting normal code or files
Problem performance:
D-shield may mistakenly intercept normal business codes (such as custom scripts, API interfaces) or files (such as configuration files, static resources) because the rule base is too strict.
Reason analysis:
Rule base update lag: the latest code features or legal file patterns are not covered.
The whitelist is not configured: The blocked code or file path is not added to the whitelist.
Default interception strategy: D-shield enables "strict mode" by default, directly intercepting suspicious behaviors (such as dynamic code execution, sensitive function calls).
Solution:
Update rule base:
Click the "Update" button on the D-Shield main interface to download the latest rule base (it is recommended to check for updates every week).
Configure whitelist:
Path whitelist: Add the absolute path of the blocked file or directory in the D-shield settings (such as C:inetpubwwwrootapi).
File characteristic whitelist: Right-click a specific file (such as config.php) and select "Add to Whitelist".
Adjust interception strategy:
In "Options" → "HTTP Options", lower the "Interception Level" or turn off "Dynamic Code Execution Detection" (security risk needs to be assessed).
D-shield update log:
1. Optimized some functions
2. Solved many unbearable bugs
Huajun editor recommends:
D-Shield is so easy to use. It is one of the best software in terms of system security. I believe friends who have used it will say it is easy to use. If you don’t like it, we still have it.Youyi U disk encryption software,360 safe,Blank And Secure,firewall app blocker,USB disk encryptor




















Your comment needs to be reviewed before it can be displayed