We are aware of a potentially service impacting issue. Learn more

نصب و پیکربندی urlscan Print



urlscan نرم افزار تولیدی مایکروسافت برای کنترل ادرس ها و درخواستهای ارسال شده به HTTP میباشد.(شبیه به modesecurity در apache کار میکند.)
بعد از دانلود و نصب نرم افزار تنظیمات دلخواه در فایل c:\windows\system32\inetsrv\urlscan\urlscan.ini انجام میشود.
تنظیمات پیشنهادی در زیر امده است.


[options]

 
UseAllowVerbs=1                ; If 1, use [AllowVerbs] section, else use the

                               ; [DenyVerbs] section.

 
UseAllowExtensions=0           ; If 1, use [AllowExtensions] section, else use

                               ; the [DenyExtensions] section.

 
NormalizeUrlBeforeScan=1       ; If 1, canonicalize URL before processing.

 
VerifyNormalization=1          ; If 1, canonicalize URL twice and reject request

                               ; if a change occurs.

 
AllowHighBitCharacters=1       ; If 1, allow high bit (ie. UTF8 or MBCS)

                               ; characters in URL.

 
AllowDotInPath=1               ; If 1, allow dots that are not file extensions.

 
RemoveServerHeader=1           ; If 1, remove the 'Server' header from response.

 
EnableLogging=1                ; If 1, log UrlScan activity.

 
PerProcessLogging=0            ; If 1, the UrlScan.log filename will contain a PID

                               ; (ie. UrlScan.123.log).

 
AllowLateScanning=1            ; If 1, then UrlScan will load as a low priority

                               ; filter.

 
PerDayLogging=1                ; If 1, UrlScan will produce a new log each day with

                               ; activity in the form 'UrlScan.010101.log'.

 
UseFastPathReject=0            ; If 1, then UrlScan will not use the

                               ; RejectResponseUrl or allow IIS to log the request.

 
LogLongUrls=1                  ; If 1, then up to 128K per request can be logged.

                               ; If 0, then only 1k is allowed.

 
;

; If UseFastPathReject is 0, then UrlScan will send

; rejected requests to the URL specified by RejectResponseUrl.

; If not specified, '/' will be used.

;

 
RejectResponseUrl=block.htm

 
;

; LoggingDirectory can be used to specify the directory where the

; log file will be created.  This value should be the absolute path

; (ie. c:\some\path).  If not specified, then UrlScan will create

; the log in the same directory where the UrlScan.dll file is located.

;

 
LoggingDirectory=d:\urlscanlog

 
;

; If RemoveServerHeader is 0, then AlternateServerName can be

; used to specify a replacement for IIS's built in 'Server' header

;

 
AlternateServerName=Karen

 
[RequestLimits]

 
;

; The entries in this section impose limits on the length

; of allowed parts of requests reaching the server.

;

; It is possible to impose a limit on the length of the

; value of a specific request header by prepending "Max-" to the

; name of the header.  For example, the following entry would

; impose a limit of 100 bytes to the value of the

; 'Content-Type' header:

;

;   Max-Content-Type=100

;

; To list a header and not specify a maximum value, use 0

; (ie. 'Max-User-Agent=0').  Also, any headers not listed

; in this section will not be checked for length limits.

;

; There are 3 special case limits:

;

;   - MaxAllowedContentLength specifies the maximum allowed

;     numeric value of the Content-Length request header.  For

;     example, setting this to 1000 would cause any request

;     with a content length that exceeds 1000 to be rejected.

;     The default is 30000000.

;

;   - MaxUrl specifies the maximum length of the request URL,

;     not including the query string. The default is 260 (which

;     is equivalent to MAX_PATH).

;

;   - MaxQueryString specifies the maximum length of the query

;     string.  The default is 2048.

;

 
MaxAllowedContentLength=30000000

MaxUrl=260

MaxQueryString=2048

 
[AllowVerbs]

 
;

; The verbs (aka HTTP methods) listed here are those commonly

; processed by a typical IIS server.

;

; Note that these entries are effective if "UseAllowVerbs=1"

; is set in the [Options] section above.

;

 
GET

HEAD

POST

OPTIONS

 
[DenyVerbs]

 
;

; The verbs (aka HTTP methods) listed here are used for publishing

; content to an IIS server via WebDAV.

;

; Note that these entries are effective if "UseAllowVerbs=0"

; is set in the [Options] section above.

;

 
PROPFIND

PROPPATCH

MKCOL

DELETE

PUT

COPY

MOVE

LOCK

UNLOCK

OPTIONS

SEARCH

 
[DenyHeaders]

 
;

; The following request headers alter processing of a

; request by causing the server to process the request

; as if it were intended to be a WebDAV request, instead

; of a request to retrieve a resource.

;

 
If:

Lock-Token:

 
 
[AllowExtensions]

 
;

; Extensions listed here are commonly used on a typical IIS server.

;

; Note that these entries are effective if "UseAllowExtensions=1"

; is set in the [Options] section above.

;

 
.htm

.html

.txt

.jpg

.jpeg

.gif

.aspx

.asp

.axd

.ashx

 
[DenyExtensions]

 
;

; Extensions listed here either run code directly on the server,

; are processed as scripts, or are static files that are

; generally not intended to be served out.

;

; Note that these entries are effective if "UseAllowExtensions=0"

; is set in the [Options] section above.

;

; Also note that ASP scripts are denied with the below

; settings.  If you wish to enable ASP, remove the

; following extensions from this list:

;    .asp

;    .cer

;    .cdx

;    .asa

;

 
; Deny ASP requests

;.asp

;.cer

;.cdx

;.asa

 
; Deny executables that could run on the server

.exe

.bat

.cmd

.com

 
; Deny infrequently used scripts

.htw     ; Maps to webhits.dll, part of Index Server

.ida     ; Maps to idq.dll, part of Index Server

.idq     ; Maps to idq.dll, part of Index Server

.htr     ; Maps to ism.dll, a legacy administrative tool

.idc     ; Maps to httpodbc.dll, a legacy database access tool

.shtm    ; Maps to ssinc.dll, for Server Side Includes

.shtml   ; Maps to ssinc.dll, for Server Side Includes

.stm     ; Maps to ssinc.dll, for Server Side Includes

.printer ; Maps to msw3prt.dll, for Internet Printing Services

 
; Deny various static files

.ini     ; Configuration files

.log     ; Log files

.pol     ; Policy files

.dat     ; Configuration files

.tmp     ; deny temporary file

.sav     ; deny backup registry files

.htw     ; deny Index Server hit-highlighting

.evt     ; deny Event Viewer logs

.btr     ; deny FrontPage dependency files

 
;dot net deny files

.asax

.ascx

.config

.cs

.csproj

.dll

.licx

.pdb

.resx

.resources

.vb

.vbproj

.vsdisco

.webinfo

.xsd

.xsx

 
[DenyUrlSequences]

..         ; deny directory traversals

./         ; deny trailing dot on a directory name

\          ; deny backslashes in URL

:          ; deny alternate stream access

%          ; deny escaping after normalization

&          ; deny multiple CGI processes to run on a single request

/fpdb/     ; deny browse access to FrontPage database files

/_private  ; deny FrontPage private files (often form results)

/_vti_pvt  ; deny FrontPage Web configuration files

/_vti_cnf  ; deny FrontPage metadata files

/_vti_txt  ; deny FrontPage text catalogs and indices

/_vti_log  ; deny FrontPage authoring log files



ادرس های مرجع مایکروسافت:
http://www.microsoft.com/technet/security/tools/urlscan.mspx
http://support.microsoft.com/kb/307608
http://support.microsoft.com/kb/326444/EN-US/
http://support.microsoft.com/kb/309394/EN-US/
http://support.microsoft.com/kb/318290/EN-US/
http://support.microsoft.com/kb/815155/EN-US/
http://support.microsoft.com/kb/312376/
 

Was this answer helpful?

  • 0
« Back