{"id":21396,"date":"2016-07-04T10:00:08","date_gmt":"2016-07-04T10:00:08","guid":{"rendered":"https:\/\/blog.locaweb.com.br\/?p=21396"},"modified":"2025-04-14T16:46:13","modified_gmt":"2025-04-14T19:46:13","slug":"como-melhorar-seguranca-dos-servidores","status":"publish","type":"post","link":"https:\/\/www.locaweb.com.br\/blog\/produtos\/vps-e-cloud\/como-melhorar-seguranca-dos-servidores\/","title":{"rendered":"Como melhorar a seguran\u00e7a dos servidores"},"content":{"rendered":"<p>Este artigo vai mostrar algumas t\u00e9cnicas para aumentar a seguran\u00e7a em seus servidores. No entanto, vale ressaltar que somente estas dicas n\u00e3o garantem 100% de seguran\u00e7a.<\/p>\n<p>Vejamos o cen\u00e1rio em que voc\u00ea contratou seu servi\u00e7o de <a href=\"http:\/\/www.locaweb.com.br\/cloud\/#solucoes-em-cloud\" target=\"_blank\" rel=\"noopener\"><strong>Cloud Locaweb<\/strong><\/a>, entrou em <a href=\"http:\/\/cloud.locaweb.com.br\/\">http:\/\/servidores.locaweb.com.br<\/a> com seu usu\u00e1rio e senha e l\u00e1 est\u00e3o os servidores contratados. Com a senha do usu\u00e1rio<strong> root <\/strong>em m\u00e3os, voc\u00ea vai levantar os seus servi\u00e7os e colocar a sua m\u00e1quina operar, certo? Errado, sempre voc\u00ea deve se preocupar com seguran\u00e7a e, neste tutorial, veja como deixar os ambientes mais seguros.<\/p>\n<p><strong>1. N\u00e3o permitir acesso com usu\u00e1rio root<\/strong><\/p>\n<p>Nunca deixe o acesso feito ao seu servidor Linux ser feito via usu\u00e1rio <em>root<\/em>. Prefira, sempre, acessar com um usu\u00e1rio comum e assumir acesso root apenas depois de entrar em seu servidor, usando o comando sudo su, ou com o comando sudo -i (se nosso usu\u00e1rio comum estiver no arquivo de sudoers), ou com o comando su (se n\u00e3o estiver). Com o comando su, ser\u00e1 necess\u00e1rio a senha do usu\u00e1rio root; com o comando sudo, basta a senha do usu\u00e1rio.<\/p>\n<p>Antes de bloquear o acesso <strong>SSH<\/strong> do usu\u00e1rio <strong>root<\/strong>, voc\u00ea deve ter acesso com algum usu\u00e1rio comum. Se n\u00e3o tiver um usu\u00e1rio comum, crie com os seguintes passos:<\/p>\n<p>[sourcecode]<br \/>\nroot@cpro36320:~# adduser wsilva<br \/>\nAdding user `wsilva&#8217; &#8230;<br \/>\nAdding new group `wsilva&#8217; (1000) &#8230;<br \/>\nAdding new user `wsilva&#8217; (1000) with group `wsilva&#8217; &#8230;<br \/>\nCreating home directory `\/home\/wsilva&#8217; &#8230;<br \/>\nCopying files from `\/etc\/skel&#8217; &#8230;<br \/>\nEnter new UNIX password:<br \/>\nRetype new UNIX password:<br \/>\npasswd: password updated successfully<br \/>\nChanging the user information for wsilva<br \/>\nEnter the new value, or press ENTER for the default<br \/>\nFull Name []: Wellington<br \/>\nRoom Number []:<br \/>\nWork Phone []:<br \/>\nHome Phone []:<br \/>\nOther []:<br \/>\nIs the information correct? [Y\/n] Y<br \/>\nroot@cpro36320:~#<br \/>\n[\/sourcecode]<\/p>\n<p>Para bloquear o acesso como root, voc\u00ea deve editar o arquivo \/etc\/ssh\/sshd_config. \u00c9 preciso editar o arquivo <strong><em>sshd_config<\/em><\/strong> e n\u00e3o o arquivo <strong><em>ssh_config<\/em><\/strong>.<\/p>\n<p>[sourcecode]<br \/>\nroot@cpro36320:~# vim \/etc\/ssh\/sshd_config<br \/>\n[\/sourcecode]<\/p>\n<p>A linha com o conte\u00fado <strong>PermitRootLogin yes<\/strong> deve ser alterada para <strong>PermitRootLogin<\/strong>. Depois, n\u00e3o se esque\u00e7a de gravar e sair do arquivo de configura\u00e7\u00e3o e, em seguida, reiniciar o servi\u00e7o de SSH.<\/p>\n<p>[sourcecode]<br \/>\nroot@cpro36320:~# sudo service ssh restart<br \/>\nssh stop\/waiting<br \/>\nssh start\/running, process 30751<br \/>\nroot@cpro36320:~#<br \/>\n[\/sourcecode]<\/p>\n<p><strong>2. Mudar porta do servi\u00e7o SSH<\/strong><\/p>\n<p>Apesar de o bypass ser uma mudan\u00e7a muito f\u00e1cil de ser realizada, o simples fato de alterar a porta padr\u00e3o em que o servi\u00e7o roda j\u00e1 dificulta a a\u00e7\u00e3o de rob\u00f4s mais simples. Consequentemente, cada passo que voc\u00ea adicionar para dificultar um acesso n\u00e3o autorizado, j\u00e1 ajuda. Um paralelo que se pode fazer \u00e9 imaginar dois carros id\u00eanticos, um trancado e com alarme, e outro aberto e com as chaves no contato.<\/p>\n<p>O que tem maior probabilidade de ser furtado \u00e9 o que der menos trabalho ao criminoso, ou seja: o que j\u00e1 est\u00e1 aberto e com chaves no contato.<\/p>\n<p>Para mudar a porta padr\u00e3o do servi\u00e7o de SSH, basta alterar a diretiva Port no arquivo \/etc\/ssh\/sshd_config, citado no dica anterior. Para alterar, por exemplo, para o servi\u00e7o de SSH responder na porta 2222, basta fazer a altera\u00e7\u00e3o no arquivo e reiniciar o servi\u00e7o.<\/p>\n<p>[sourcecode]<br \/>\nroot@cpro36320:~# vim \/etc\/ssh\/sshd_config<\/p>\n<p># What ports, IPs and protocols we listen for<br \/>\nPort 2222<br \/>\n# Port 22<\/p>\n<p>root@cpro36320:~# service ssh restart<br \/>\nssh stop\/waiting<br \/>\nssh start\/running, process 28867<br \/>\nroot@cpro36320:~#<br \/>\n[\/sourcecode]<\/p>\n<p><strong>3. Colocar mensagem para inibir acesso a<\/strong><\/p>\n<p>Esta \u00e9 uma t\u00e9cnica que n\u00e3o surte muito efeito, mas assusta um atacante inexperiente.<\/p>\n<p>No arquivo \/etc\/ssh\/sshd_config, citado anteriormente, deve-se &#8220;descomentar&#8221; e definir a op\u00e7\u00e3o <strong>Banner<\/strong>:<\/p>\n<p>[sourcecode]<br \/>\nroot@cpro36320:~# vim \/etc\/ssh\/sshd_config<br \/>\nBanner \/etc\/issue.net<br \/>\n[\/sourcecode]<\/p>\n<p>No arquivo \/etc\/issue.net, colocamos o <strong>texto<\/strong> e <strong>ascii art<\/strong>, se tivermos.<\/p>\n<p>[sourcecode]<br \/>\nroot@cpro36320:~# cat \/etc\/issue.net<br \/>\n################################################################<br \/>\n# All connections are monitored here. \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0#<br \/>\n# Disconnect IMMEDIATELY if you are not an authorized user. \u00a0\u00a0\u00a0#<br \/>\n# LAWS will be applied in case of RULES VIOLATION. \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0#<br \/>\n################################################################<br \/>\n[\/sourcecode]<\/p>\n<p>Em seguida, pode reiniciar o servi\u00e7o SSH e tentar acessar para visualizar a mensagem:<\/p>\n<p>[sourcecode]<br \/>\nroot@cpro36320:~# service ssh restart<br \/>\nssh stop\/waiting<br \/>\nssh start\/running, process 29877<br \/>\nroot@cpro36320:~#<br \/>\nroot@cpro36320:~# exit<br \/>\nexit<br \/>\nwsilva@cpro36320:~$ exit<br \/>\nlogout<br \/>\nConnection to cpro36320.publiccloud.com.br closed.<br \/>\n[wsilva@localhost ~]$ ssh wsilva@cpro36320.publiccloud.com.br<br \/>\n################################################################<br \/>\n# All connections are monitored here \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0#<br \/>\n# Disconnect IMMEDIATELY if you are not an authorized user. \u00a0\u00a0\u00a0#<br \/>\n# Laws will be applied in case of rules violation. \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0#<br \/>\n################################################################<br \/>\nWelcome to Ubuntu 14.04.4 LTS (GNU\/Linux 3.13.0-79-generic x86_64)<br \/>\n[\/sourcecode]<\/p>\n<p>* Documentation: \u00a0https:\/\/help.ubuntu.com\/<br \/>\nLast login: Mon Mar 27 16:18:22 2016 from 200.205.195.2<\/p>\n<p><strong>4. Bloquear ataques de bruteforce<\/strong><\/p>\n<p>Para bloquear ataques de bruteforce, existe algumas ferramentas como <em>denyhosts<\/em> e <em>fail2ban<\/em>, que bloqueiam, temporariamente, o endere\u00e7o IP do atacante para qualquer tentativa de acesso via ssh. O <em>fail2ban<\/em> pode ser configurado para bloquear acesso a outros servi\u00e7os como apache, asterisk e mysql-auth, entre outros. Tamb\u00e9m, voc\u00ea pode personalizar as a\u00e7\u00f5es a serem tomadas, mais do que simplesmente bloquear o atacante no iptables, como enviar e-mails e notificac\u00f5es de alertas, por exemplo.<\/p>\n<p>Voc\u00ea pode instalar o <strong>fail2ban. <\/strong>Para isso, utilize o gerenciador de pacotes de nossa distribui\u00e7\u00e3o Linux.<\/p>\n<p>Para <strong>CentOS<\/strong>, <strong>RedHat<\/strong>, <strong>Fedora<\/strong> e similares:<\/p>\n<p>[sourcecode]<br \/>\nroot@cpro36320:~# yum install fail2ban<br \/>\n[\/sourcecode]<\/p>\n<p>Para <strong>Debian<\/strong>, <strong>Ubuntu<\/strong>, <strong>Mint<\/strong> e similares:<\/p>\n<p>[sourcecode]<br \/>\nroot@cpro36320:~# apt-get install fail2ban<br \/>\n[\/sourcecode]<\/p>\n<p>O arquivo de configura\u00e7\u00e3o do <strong>fail2ban<\/strong> fica em \/etc\/fail2ban\/jail.conf. Devemos ter aten\u00e7\u00e3o aos seguintes par\u00e2metros:<\/p>\n<ul>\n<li><strong><em>ignoreip<\/em><\/strong>: define que redes ser\u00e3o ignoradas do monitoramento. Deve ser declarado no formato de <strong>CIDR<\/strong>. Ex.: 192.168.1.0\/255.255.255.0 ou 192.168.1.0\/24;<\/li>\n<li><strong><em>bantime<\/em><\/strong>: \u00e9 o tempo em segundos que o atacante ser\u00e1 banido;<\/li>\n<li><strong><em>maxretry<\/em><\/strong>: define o m\u00e1ximo de tentativas permitidas;<\/li>\n<li><strong><em>banaction<\/em><\/strong>: define qual ser\u00e1 a a\u00e7\u00e3o que o fail2ban vai tomar, o padr\u00e3o \u00e9 bloquear o acesso a todas as portas via <strong>iptables<\/strong>.<\/li>\n<\/ul>\n<p>Essas configura\u00e7\u00f5es s\u00e3o para qualquer servi\u00e7o e ficam dentro de [DEFAULT]. As diretivas espec\u00edficas para acesso SSH est\u00e3o agrupadas pela marca\u00e7\u00e3o [ssh] e, dentre elas, destacam-se as seguintes:<\/p>\n<ul>\n<li><strong><em>enable<\/em><\/strong>: habilita o servi\u00e7o;<\/li>\n<li><strong><em>port<\/em><\/strong>: define a porta a ser monitorada para o servi\u00e7o;<\/li>\n<li><strong><em>filter<\/em><\/strong>: define o filtro que ser\u00e1 usado pelo ao analisar os arquivos de logs;<\/li>\n<li><strong><em>logpath<\/em><\/strong>: define o caminho para o arquivo de log que ser\u00e1 usado durante o monitoramento;<\/li>\n<li><strong><em>maxretry<\/em><\/strong>: usado para sobreescrever o valor padr\u00e3o de tentativas global.<\/li>\n<\/ul>\n<p>O mais interessante \u00e9 que voc\u00ea pode ver os endere\u00e7os <strong>IPs<\/strong> sendo bloqueados e desbloqueados no <strong>log<\/strong>:<\/p>\n<p>[sourcecode]<br \/>\nroot@cpro36320:~# tail -f \/var\/log\/fail2ban.log<br \/>\n2016-03-27 14:43:05,638 fail2ban.server : INFO \u00a0\u00a0Exiting Fail2ban<br \/>\n2016-03-27 14:43:06,214 fail2ban.server : INFO \u00a0\u00a0Changed logging target to \/var\/log\/fail2ban.log for Fail2ban v0.8.11<br \/>\n2016-03-27 14:43:06,215 fail2ban.jail \u00a0\u00a0: INFO \u00a0\u00a0Creating new jail &#8216;ssh&#8217;<br \/>\n2016-03-27 14:43:06,276 fail2ban.jail \u00a0\u00a0: INFO \u00a0\u00a0Jail &#8216;ssh&#8217; uses pyinotify<br \/>\n2016-03-27 14:43:06,325 fail2ban.jail \u00a0\u00a0: INFO \u00a0\u00a0Initiated &#8216;pyinotify&#8217; backend<br \/>\n2016-03-27 14:43:06,328 fail2ban.filter : INFO \u00a0\u00a0Added logfile = \/var\/log\/auth.log<br \/>\n2016-03-27 14:43:06,329 fail2ban.filter : INFO \u00a0\u00a0Set maxRetry = 3<br \/>\n2016-03-27 14:43:06,330 fail2ban.filter : INFO \u00a0\u00a0Set findtime = 600<br \/>\n2016-03-27 14:43:06,331 fail2ban.actions: INFO \u00a0\u00a0Set banTime = 600<br \/>\n2016-03-27 14:43:06,391 fail2ban.jail \u00a0\u00a0: INFO \u00a0\u00a0Jail &#8216;ssh&#8217; started<br \/>\n2016-03-27 14:45:41,838 fail2ban.actions: WARNING [ssh] Ban 58.218.211.11<br \/>\n2016-03-27 14:55:41,014 fail2ban.actions: WARNING [ssh] Unban 58.218.211.11<br \/>\n2016-03-27 14:56:45,047 fail2ban.actions: WARNING [ssh] Ban 188.214.58.170<br \/>\n2016-03-27 15:06:45,227 fail2ban.actions: WARNING [ssh] Unban 188.214.58.170<br \/>\n2016-03-27 15:22:03,276 fail2ban.actions: WARNING [ssh] Ban 188.214.58.170<br \/>\n2016-03-27 15:22:25,331 fail2ban.actions: WARNING [ssh] Ban 58.218.204.30<br \/>\n2016-03-27 15:32:03,483 fail2ban.actions: WARNING [ssh] Unban 188.214.58.170<br \/>\n2016-03-27 15:32:20,533 fail2ban.actions: WARNING [ssh] Ban 188.214.58.170<br \/>\n2016-03-27 15:32:25,568 fail2ban.actions: WARNING [ssh] Unban 58.218.204.30<br \/>\n2016-03-27 15:42:20,739 fail2ban.actions: WARNING [ssh] Unban 188.214.58.170<br \/>\n2016-03-27 15:45:02,145 fail2ban.actions: WARNING [ssh] Ban 125.88.146.116<br \/>\n2016-03-27 15:55:02,322 fail2ban.actions: WARNING [ssh] Unban 125.88.146.116<br \/>\n2016-03-27 16:20:09,796 fail2ban.actions: WARNING [ssh] Ban 125.88.146.116<br \/>\n2016-03-27 16:30:09,977 fail2ban.actions: WARNING [ssh] Unban 125.88.146.116<br \/>\n2016-03-27 16:29:44,572 fail2ban.actions: WARNING [ssh] Ban 46.172.71.249<br \/>\n2016-03-27 16:39:44,749 fail2ban.actions: WARNING [ssh] Unban 46.172.71.249<br \/>\n[\/sourcecode]<\/p>\n<p><strong>5. Acesso por meio de chave (sem configurar uma senha)<\/strong><\/p>\n<p>Esta t\u00e9cnica consiste em gerar um <strong>par de chaves<\/strong> (uma <strong>chave p\u00fablica<\/strong> e uma chave privada) e enviar a <strong>chave p\u00fablica<\/strong> para o servidor. Ao acessar o servidor, n\u00e3o ser\u00e1 mais necess\u00e1rio digitar nossa senha.<\/p>\n<p>Primeiro passo \u00e9 gerar um par de chaves em nossa m\u00e1quina local, caso ainda n\u00e3o tenhamos. Basta executar o seguinte comando e seguir as instru\u00e7\u00f5es da tela tais como onde gravar o arquivo da chave e senha para criptografar e gerar a chave.<\/p>\n<p>[sourcecode]<br \/>\n[wsilva@localhost ~]$ ssh-keygen<br \/>\nGenerating public\/private rsa key pair.<br \/>\nEnter file in which to save the key (\/Users\/wsilva\/.ssh\/id_rsa): \/Users\/wsilva\/.ssh\/id_rsa_teste<br \/>\nEnter passphrase (empty for no passphrase):<br \/>\nEnter same passphrase again:<br \/>\nYour identification has been saved in \/Users\/wsilva\/.ssh\/id_rsa_teste.<br \/>\nYour public key has been saved in \/Users\/wsilva\/.ssh\/id_rsa_teste.pub.<br \/>\nThe key fingerprint is:<br \/>\nSHA256:wELug3EAUQ\/w2pRf8YY\/5hwKXBWdOx2Mf1\/RMdfVjdM wsilva@localhost<br \/>\nThe key&#8217;s randomart image is:<br \/>\n+&#8212;[RSA 2048]&#8212;-+<br \/>\n|+=+ . . oo + \u00a0\u00a0=X|<br \/>\n| . B . = \u00a0+ o o.E|<br \/>\n| \u00a0= = * o \u00a0+ . ..|<br \/>\n| + B + + \u00a0o o . .|<br \/>\n|. o * \u00a0\u00a0S \u00a0. . ..|<br \/>\n| \u00a0\u00a0\u00a0\u00a0o = o \u00a0\u00a0\u00a0\u00a0\u00a0.|<br \/>\n| \u00a0\u00a0\u00a0\u00a0\u00a0. o \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0|<br \/>\n| \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0|<br \/>\n| \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0|<br \/>\n+&#8212;-[SHA256]&#8212;&#8211;+<br \/>\n[wsilva@localhost ~]$<br \/>\n[\/sourcecode]<\/p>\n<p>Com a chave gerada, agora voc\u00ea pode envi\u00e1-la para o servidor. Ser\u00e1 necess\u00e1rio digitar a sua senha criada ao gerar as chaves:<\/p>\n<p>[sourcecode]<br \/>\n[wsilva@localhost ~]$ ssh-copy-id -i \/Users\/wsilva\/.ssh\/id_rsa_teste.pub cpro36320.publiccloud.com.br<br \/>\n\/usr\/local\/bin\/ssh-copy-id: INFO: Source of key(s) to be installed: &quot;\/Users\/wsilva\/.ssh\/id_rsa_teste.pub&quot;<br \/>\n\/usr\/local\/bin\/ssh-copy-id: INFO: attempting to log in with the new key(s), to filter out any that are already installed<br \/>\n\/usr\/local\/bin\/ssh-copy-id: INFO: 1 key(s) remain to be installed &#8212; if you are prompted now it is to install the new keys<br \/>\n################################################################<br \/>\n# All connections are monitored here \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0#<br \/>\n# Disconnect IMMEDIATELY if you are not an authorized user. \u00a0\u00a0\u00a0#<br \/>\n# Laws will be applied in case of rules violation. \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0#<br \/>\n################################################################<br \/>\nwsilva@cpro36320.publiccloud.com.br&#8217;s password:<\/p>\n<p>Number of key(s) added: \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a01<\/p>\n<p>Now try logging into the machine, with: \u00a0\u00a0&quot;ssh &#8216;cpro36320.publiccloud.com.br&#8217;&quot;<br \/>\nand check to make sure that only the key(s) you wanted were added.<\/p>\n<p>[wsilva@localhost ~]$<br \/>\n[\/sourcecode]<\/p>\n<p><strong>Teste acessando um servidor<\/strong><\/p>\n<p>[sourcecode]<br \/>\n[wsilva@localhost ~]$ ssh wsilva@cpro36320.publiccloud.com.br<br \/>\n################################################################<br \/>\n# All connections are monitored here \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0#<br \/>\n# Disconnect IMMEDIATELY if you are not an authorized user. \u00a0\u00a0\u00a0#<br \/>\n# Laws will be applied in case of rules violation. \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0#<br \/>\n################################################################<br \/>\nWelcome to Ubuntu 14.04.4 LTS (GNU\/Linux 3.13.0-79-generic x86_64)<br \/>\n[\/sourcecode]<\/p>\n<p>* Documentation: \u00a0https:\/\/help.ubuntu.com\/<br \/>\nLast login: Mon Mar 27 16:30:22 2016 from 200.205.195.2<br \/>\nwsilva@cpro36320:~$<\/p>\n<p><strong>6. Redes privadas<\/strong><\/p>\n<p>Uma t\u00e9cnica muito eficaz \u00e9 colocar os servidores em uma rede privada inacess\u00edvel, nessa mesma rede deixamos um servidor exclusivo para acesso chamado <strong>bastion<\/strong>. O acesso a qualquer servidor \u00e9 feito via <strong>bastion<\/strong>.<\/p>\n<p><a href=\"http:\/\/blog.locaweb.com.br\/wp-content\/uploads\/2016\/06\/Untitled-2.jpg\"><img decoding=\"async\" class=\"alignnone wp-image-21421 size-full\" src=\"http:\/\/blog.locaweb.com.br\/wp-content\/uploads\/2016\/06\/Untitled-2.jpg\" alt=\"Untitled-2\" width=\"577\" height=\"400\" \/><\/a><\/p>\n<p><strong>7. E se os servidores n\u00e3o s\u00e3o Windows?<\/strong><\/p>\n<p>Algumas dicas se baseiam em t\u00e9cnicas que podem ser aplicadas tamb\u00e9m em servidores Windows, por\u00e9m, devemos ter aten\u00e7\u00e3o com outras brechas de seguran\u00e7a.<\/p>\n<p><strong>Mantenha seus servidores sempre atualizados<\/strong><\/p>\n<p>Sempre instale as atualiza\u00e7\u00f5es de seguran\u00e7a disponibilizadas pela Microsoft, pelo menos <strong>uma vez por m\u00eas<\/strong>, elas normalmente corrigem falhas que podem ser exploradas por atacantes mal intencionados.<\/p>\n<p>Basta ir em <strong>&#8220;Control Panel&#8221;<\/strong>, <strong>&#8220;System and Security&#8221;<\/strong>, <strong>&#8220;Windows Update&#8221;<\/strong> para verificar se existe alguma atualiza\u00e7\u00e3o dispon\u00edvel. Voc\u00ea pode aproveitar para checar o que ser\u00e1 alterado com a atualiza\u00e7\u00e3o. Isso o ajuda a se previnir e instalar as atualiza\u00e7\u00f5es dispon\u00edveis.<\/p>\n<p><a href=\"http:\/\/blog.locaweb.com.br\/wp-content\/uploads\/2016\/05\/Windows-Update.jpg\"><img decoding=\"async\" class=\"alignnone wp-image-21398 size-full\" src=\"http:\/\/blog.locaweb.com.br\/wp-content\/uploads\/2016\/05\/Windows-Update.jpg\" alt=\"Windows Update\" width=\"1392\" height=\"854\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/blog.locaweb.com.br\/wp-content\/uploads\/2016\/05\/Select-Update.jpg\"><img decoding=\"async\" class=\"alignnone wp-image-21399 size-full\" src=\"http:\/\/blog.locaweb.com.br\/wp-content\/uploads\/2016\/05\/Select-Update.jpg\" alt=\"Select Update\" width=\"1392\" height=\"854\" \/><\/a><\/p>\n<p><strong>Bloqueie o acesso remoto para administradores<\/strong><\/p>\n<p>Usu\u00e1rios administradores t\u00eam muitos privil\u00e9gios. N\u00e3o \u00e9 seguro acessar o servidor diretamente com esse tipo de usu\u00e1rio. Assim como no Linux \u00e9 recomendado bloquear o acesso, se necess\u00e1rio, fa\u00e7a login com um usu\u00e1rio comum e execute os programas que precisa como administrador. Lembre-se que \u00e9 poss\u00edvel o acesso por meio do painel de administra\u00e7\u00e3o da Locaweb.<\/p>\n<p>No Windows, para remover esse privil\u00e9gio de acesso remoto, devemos acessar <strong>&#8220;Computer Configuration&#8221;<\/strong>, <strong>&#8220;Windows Settings&#8221;<\/strong>, <strong>&#8220;Security Settings&#8221;<\/strong>, <strong>&#8220;Local Policies&#8221;<\/strong>, <strong>&#8220;User Rights Assignment&#8221;<\/strong>.<\/p>\n<p><a href=\"http:\/\/blog.locaweb.com.br\/wp-content\/uploads\/2016\/05\/Local-Group.jpg\"><img decoding=\"async\" class=\"alignnone wp-image-21400 size-full\" src=\"http:\/\/blog.locaweb.com.br\/wp-content\/uploads\/2016\/05\/Local-Group.jpg\" alt=\"Local Group\" width=\"1392\" height=\"854\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/blog.locaweb.com.br\/wp-content\/uploads\/2016\/05\/Select-Users.jpg\"><img decoding=\"async\" class=\"alignnone wp-image-21401 size-full\" src=\"http:\/\/blog.locaweb.com.br\/wp-content\/uploads\/2016\/05\/Select-Users.jpg\" alt=\"Select Users\" width=\"1392\" height=\"854\" \/><\/a><\/p>\n<p><strong>Utilize firewalls<\/strong><\/p>\n<p>Execute as tarefas do servidor com o firewall habilitado. Somente libere as portas que s\u00e3o necess\u00e1rias para que a aplica\u00e7\u00e3o relacionada ao servidor seja acessada.<\/p>\n<p>Voc\u00ea pode acessar o <strong>Firewall do Windows 2012 Server<\/strong> pelo &#8220;<strong>Server Manager<\/strong>&#8220;, &#8220;<strong>Tools<\/strong>&#8220;, &#8220;<strong>Windows Firewall with Advanced Security<\/strong>&#8220;.<\/p>\n<p><a href=\"http:\/\/blog.locaweb.com.br\/wp-content\/uploads\/2016\/05\/Dashboard.jpg\"><img decoding=\"async\" class=\"alignnone wp-image-21402 size-full\" src=\"http:\/\/blog.locaweb.com.br\/wp-content\/uploads\/2016\/05\/Dashboard.jpg\" alt=\"Dashboard\" width=\"1392\" height=\"854\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/blog.locaweb.com.br\/wp-content\/uploads\/2016\/05\/Windows-firewall.jpg\"><img decoding=\"async\" class=\"alignnone wp-image-21403 size-full\" src=\"http:\/\/blog.locaweb.com.br\/wp-content\/uploads\/2016\/05\/Windows-firewall.jpg\" alt=\"Windows firewall\" width=\"1392\" height=\"854\" \/><\/a><\/p>\n<p><strong>DMZ<\/strong><\/p>\n<p>Assim como no <strong>Linux<\/strong>, mostramos a t\u00e9cnica de acesso via <strong>Bastion<\/strong> no <strong>Windows<\/strong>. \u00c9 recomendado que seu servidor esteja em uma rede <strong>DMZ<\/strong>, protegendo sua rede interna ou privada.<\/p>\n<p>Agora n\u00e3o tem mais motivo para deixar o seu servidor desprotegido n\u00e3o \u00e9 mesmo?\u00a0Comenta a\u00ed o que achou e se tiver mais alguma sugest\u00e3o de t\u00e1tica\u00a0que possa deixar os servidores mais seguros, compartilha com a gente.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Este artigo vai mostrar algumas t\u00e9cnicas para aumentar a seguran\u00e7a em seus servidores. No entanto, vale ressaltar que somente estas dicas n\u00e3o garantem 100% de seguran\u00e7a. Vejamos o cen\u00e1rio em que voc\u00ea contratou seu servi\u00e7o de Cloud Locaweb, entrou em http:\/\/servidores.locaweb.com.br com seu usu\u00e1rio e senha e l\u00e1 est\u00e3o os servidores contratados. Com a senha [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":21407,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[29],"tags":[],"class_list":["post-21396","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-vps-e-cloud"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.locaweb.com.br\/blog\/wp-json\/wp\/v2\/posts\/21396","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.locaweb.com.br\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.locaweb.com.br\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.locaweb.com.br\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.locaweb.com.br\/blog\/wp-json\/wp\/v2\/comments?post=21396"}],"version-history":[{"count":1,"href":"https:\/\/www.locaweb.com.br\/blog\/wp-json\/wp\/v2\/posts\/21396\/revisions"}],"predecessor-version":[{"id":53077,"href":"https:\/\/www.locaweb.com.br\/blog\/wp-json\/wp\/v2\/posts\/21396\/revisions\/53077"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.locaweb.com.br\/blog\/wp-json\/wp\/v2\/media\/21407"}],"wp:attachment":[{"href":"https:\/\/www.locaweb.com.br\/blog\/wp-json\/wp\/v2\/media?parent=21396"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.locaweb.com.br\/blog\/wp-json\/wp\/v2\/categories?post=21396"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.locaweb.com.br\/blog\/wp-json\/wp\/v2\/tags?post=21396"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}