国产99久久精品_欧美日本韩国一区二区_激情小说综合网_欧美一级二级视频_午夜av电影_日本久久精品视频

最新文章專題視頻專題問答1問答10問答100問答1000問答2000關(guān)鍵字專題1關(guān)鍵字專題50關(guān)鍵字專題500關(guān)鍵字專題1500TAG最新視頻文章推薦1 推薦3 推薦5 推薦7 推薦9 推薦11 推薦13 推薦15 推薦17 推薦19 推薦21 推薦23 推薦25 推薦27 推薦29 推薦31 推薦33 推薦35 推薦37視頻文章20視頻文章30視頻文章40視頻文章50視頻文章60 視頻文章70視頻文章80視頻文章90視頻文章100視頻文章120視頻文章140 視頻2關(guān)鍵字專題關(guān)鍵字專題tag2tag3文章專題文章專題2文章索引1文章索引2文章索引3文章索引4文章索引5123456789101112131415文章專題3
問答文章1 問答文章501 問答文章1001 問答文章1501 問答文章2001 問答文章2501 問答文章3001 問答文章3501 問答文章4001 問答文章4501 問答文章5001 問答文章5501 問答文章6001 問答文章6501 問答文章7001 問答文章7501 問答文章8001 問答文章8501 問答文章9001 問答文章9501
當(dāng)前位置: 首頁 - 科技 - 知識(shí)百科 - 正文

SecuringMongoDBonWindowsAzure

來源:懂視網(wǎng) 責(zé)編:小采 時(shí)間:2020-11-09 13:20:29
文檔

SecuringMongoDBonWindowsAzure

SecuringMongoDBonWindowsAzure:By Sridhar Nanjesudwaran, Windows Azure lead at 10gen I have used the MongoDB Installer for Windows Azure to deploy my MongoDB instance on a Windows Virtual Machine on Windows Azure. It is not my production environment but I would still li
推薦度:
導(dǎo)讀SecuringMongoDBonWindowsAzure:By Sridhar Nanjesudwaran, Windows Azure lead at 10gen I have used the MongoDB Installer for Windows Azure to deploy my MongoDB instance on a Windows Virtual Machine on Windows Azure. It is not my production environment but I would still li

By Sridhar Nanjesudwaran, Windows Azure lead at 10gen I have used the MongoDB Installer for Windows Azure to deploy my MongoDB instance on a Windows Virtual Machine on Windows Azure. It is not my production environment but I would still li

By Sridhar Nanjesudwaran, Windows Azure lead at 10gen

I have used the MongoDB Installer for Windows Azure to deploy my MongoDB instance on a Windows Virtual Machine on Windows Azure. It is not my production environment but I would still like to secure it. What do I need to do to secure this standalone instance?

Let us take a look at the possible issues and how you would resolve each of them.

  • Password
  • Administrator username
  • Endpoints
  • Password

    We are assuming you have created a strong password for the Administrator user. If not make sure to set a strong password for the Administrator user.

    Administrator Username

    The user name cannot be specified using the installer. It is always “Administrator”. The background here is that when Azure Virtual Machines were preview, “Administrator” was the only username allowed when creating Windows Virtual Machines. This was recently fixed but the installer has not been modified to allow it. To secure the instance it would be a good idea to change the username. You can change the username by logging onto the instance.

    Once you remote desktop to the instance, you can change the username from PowerShell. To change:

    $user = Get-WMIObject Win32_UserAccount -Filter "Name='Administrator'"
    $username = “”
    $user.Rename($username)

    You can verify the username changed by logging out of the instance and retrying with Administrator – this should fail. Now retry with the username you just created which should succeed.

    Endpoints

    By default the installer creates 3 endpoints on the instance. The endpoints are for

  • RDP (starting at 3389)
  • MongoDB (starting at 27017)
  • PowerShell remoting (starting at 5985)
  • We are going to secure the endpoints by

    1. Removing the ports when not required
    2. Choosing non-standard ports
    3. Securing them to your location

    Removing endpoints

    Remove the endpoints if they are not necessary. The PowerShell remoting endpoint is only required for the initial setup. It is not necessary unless you explicitly want to continue to use PowerShell remoting to manage the instance. Hence you should remove the endpoint. Also if you want to use PowerShell remoting to manage the instance, it is more secure to add it via an Azure interface such as (CLI, PowerShell or Management portal) when needed.?

    To remove the PowerShell remoting endpoint, from a Windows Azure PowerShell console:

    # Remove PowerShell remoting endpoints
    Get-AzureVM -ServiceName | Remove-AzureEndpoint -Name endpname-5985-5985 | Update-AzureVM

    The default remoting endpoint name is “endpname-5985-5985”. The service name is the same as the dns prefix you specified in the installer to create the instance. Similarly remove the RDP endpoint. Add it when needed as opposed to keeping it open all the time.

    Choosing non-standard ports

    Only add the RDP endpoint when necessary. When adding ensure you do not use the default port of 3389 for the external load balancer. To create the endpoint for RDP, from a Windows Azure PowerShell console:

    # Add RDP endpoints to the single VM
    Get-AzureVM -ServiceName “myservice” | Add-AzureEndpoint -Name rdp -LocalPort 3389 -Protocol tcp | Update-AzureVM

    The above sets the load balancer port to an arbitrary one from the ephemeral range.

    If an RDPendpoint already exists (like the default one created by the installer), you can change the load balancer port to a non standard port from a?Windows Azure PowerShell console by:

    # Update RDP endpoint external port
    Get-AzureVM -ServiceName “myservice” | Set-AzureEndpoint -Name rdp -LocalPort 3389 -Protocol tcp | Update-AzureVM

    To check the external port you can get it from the management portal or use Windows Azure PowerShell:

    # Get RDP endpoint external port
    Get-AzureVM -ServiceName “myservice” | Get-AzureEndpoint

    Securing the endpoint to your location:

    Prior to the recent updates to Windows Azure and Windows Azure PowerShell, the only method of securing endpoints are using firewall rules on the actual instance. While this does help secure the instance, it still allows for malicious DoS attacks. With the recent updates, in addition to firewall rules you can secure your endpoints by specifying a set of addresses that can access it (white list). You want to secure the MongoDB endpoints to only allow your MongoDB client/app machines (maybe in addition to administrator machines) to access the machines.

    Also if you are enabling the RDPendpoint, secure it by only allowing access by the specified administrator machines. Using a Windows Azure PowerShell:

    # Setup the ACL
    $acl = New-AzureAclConfig
    Set-AzureAclConfig -AddRule Permit -RemoteSubnet “mysubnet” -Order 1 –ACL $acl -Description “Lockdown MongoDB port”
    # Update the endpoint with the ACL
    Get-AzureVM -ServiceName “myservice” | Set-AzureEndpoint -Name endpname-27017-27017 -PublicPort 27017 -LocalPort 27017 -Protocol tcp –ACL $acl | Update-AzureVM

    Mysubnet – is your subnet that you want to allow access specified in the CIDR format.

    聲明:本網(wǎng)頁內(nèi)容旨在傳播知識(shí),若有侵權(quán)等問題請(qǐng)及時(shí)與本網(wǎng)聯(lián)系,我們將在第一時(shí)間刪除處理。TEL:177 7030 7066 E-MAIL:11247931@qq.com

    文檔

    SecuringMongoDBonWindowsAzure

    SecuringMongoDBonWindowsAzure:By Sridhar Nanjesudwaran, Windows Azure lead at 10gen I have used the MongoDB Installer for Windows Azure to deploy my MongoDB instance on a Windows Virtual Machine on Windows Azure. It is not my production environment but I would still li
    推薦度:
    標(biāo)簽: Windows on Azure
    • 熱門焦點(diǎn)

    最新推薦

    猜你喜歡

    熱門推薦

    專題
    Top
    主站蜘蛛池模板: 国产成人久久精品二区三区牛 | 久久一区二区三区精品 | 日韩视频一区二区在线观看 | 亚洲国产成人久久一区久久 | 国产高清在线看 | 欧洲欧美成人免费大片 | 亚洲第一导航 | 国产在线视频在线观看 | 九九啪| 日韩欧美在线观看成人 | 国产一区二区视频在线 | 欧美日韩视频一区二区三区 | 欧洲一区二区三区在线观看 | 日韩精品欧美一区二区三区 | 碰91精品国产91久久婷婷 | 日韩一区二区三区四区不卡 | 亚洲精品影院久久久久久 | 青青草原国产一区二区 | 高清国产在线 | 影音先锋女人aa鲁色资源 | 欧美在线观看一区二区三区 | 国产a精品| 久久91精品国产91 | 久久99久久精品国产99热 | 日本一区二区三区精品视频 | 久久精品视频一区二区三区 | 欧美高清亚洲欧美一区h | 三级中文字幕电影大全 | 欧美骚| 日韩高清在线高清免费 | 日韩欧美亚洲综合 | 亚洲成人精品久久 | 久久精品最新免费国产成人 | 久久亚洲一级α片 | 国产成人一区二区 | 全黄a一级毛片 | 欧美亚洲综合网 | 国产日韩欧美中文 | 欧美激情在线播放一区二区三区 | 国产日韩欧美精品在线 | 国产一区二区在线观看视频 |