Solved

Hiding IIS with an Apache reverse proxy

Posted on 2004-08-02
4
242 Views
Last Modified: 2013-12-04
Based on the recent bugs in IIS I am looking at hiding IIS behind an Apache reverse proxy.  Will this work or with the current problem will it just pass the request unaltered to the IIS box?  If it does work are there any configuration issues that I should know?
0
Comment
Question by:NBBCTest01
4 Comments
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 250 total points
ID: 11699475
From reading up on Apache's RP, looks like it's transparent, all request will be passed- meaning if you look at the headers you get back, they will say IIS verXX. There are filters that can be applied on the apache porxy that may deny certain exploits, but your best bet is to lock it(iis) down with IIS-Lockdown, and UrlScan... keep up with patches, and run AV on the servers if possible. Or move to Apache altogether... always block all ports except the most necessary ones.

http://www.microsoft.com/windows2000/downloads/recommended/iislockdown/default.asp
http://www.microsoft.com/technet/security/tools/urlscan.mspx

-rich
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Join & Write a Comment

As I write this article, I am finishing cleanup from the Qakbot virus variant found in the wild on April 18, 2011.  It was a messy beast that had varying levels of infection, speculated as being dependent on how long it resided on the infected syste…
Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now